{"acronym":"19c3","aspect_ratio":"4:3","updated_at":"2026-04-09T06:15:02.986+02:00","title":"19C3: Out Of Order","schedule_url":null,"slug":"congress/2002","event_last_released_at":"2008-02-06T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2002","logo_url":"https://static.media.ccc.de/media/congress/2002/folder-19c3.png","images_url":"https://static.media.ccc.de/media/congress/2002","recordings_url":"https://cdn.media.ccc.de/congress/2002","url":"https://api.media.ccc.de/public/conferences/19c3","events":[{"guid":"import-ecb02c4dfaabbaf766","title":"Spam Prevention\nSpam Prevention","subtitle":null,"slug":"19C3-386-spam-prevention","link":"http://www.ccc.de/congress/2002/fahrplan/event/386.en.html","description":"SPAM is a growing problem that is hard to fight. On the one hand you want to communicate with everybody, on the other hand you don´t want to be filled up with SPAM. To fight spam effectifly there are some server and clientside solutions which help and put some mails into the trash by their own.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":38,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-15T12:15:03.385+01:00","length":2939,"duration":2939,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-386-spam-prevention.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-386-spam-prevention_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ecb02c4dfaabbaf766-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ecb02c4dfaabbaf766-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-386-spam-prevention","url":"https://api.media.ccc.de/public/events/import-ecb02c4dfaabbaf766","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":1},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":1},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":2},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":2},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1678,"event_guid":"import-499496e1f8d0dc96ab","weight":1},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":1},{"event_id":1981,"event_guid":"FqITQxsZ3GJ3mETYBdzW8w","weight":1},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":1},{"event_id":2885,"event_guid":"36ff9cc8-f717-42f3-b570-fca9810a02fa","weight":1},{"event_id":2979,"event_guid":"e2d62f19-f20d-47fe-94eb-4a892e95875e","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3816,"event_guid":"e370add0-106d-48e6-9e97-cd560ba60b9c","weight":1}]},{"guid":"import-36ab6d2a93d3fc6e96","title":"forensik schluesselspuren (445)","subtitle":null,"slug":"19C3-445-forensik-schluesselspuren","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":91,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-04T23:30:09.458+01:00","length":2355,"duration":2355,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-445-forensik-schluesselspuren.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-445-forensik-schluesselspuren_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-36ab6d2a93d3fc6e96-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-36ab6d2a93d3fc6e96-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-445-forensik-schluesselspuren","url":"https://api.media.ccc.de/public/events/import-36ab6d2a93d3fc6e96","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":2},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":3},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":2},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":5},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":5},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":3},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":3},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":3},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":3},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":3},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":3},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":3}]},{"guid":"import-677c2c0d3542346fc9","title":"Statistische Stego-Analyse mit R","subtitle":null,"slug":"19C3-464-stego-analyse","link":"http://www.ccc.de/congress/2002/fahrplan/event/464.en.html","description":"Vorstellung eines Packages für das GPL-Statistiksystem R, das speziell zur statistischen Analyse von Stega-Alorithmen entworfen wurde und Funktionen zum Angriff auf die bisher stärksten Einbettungsalgorithmen in JPEG-Dateien bereitstellt. Im beschränkten Rahmen werde ich auf steganografische Grundlagen und den Umgang mit R eingehen. Ziel ist es, die Teilnehmer zu eigenen Experimenten auf diesem Gebiet zu ermutigen.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":41,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-06T20:00:09.642+01:00","length":2942,"duration":2942,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-464-stego-analyse.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-464-stego-analyse_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-677c2c0d3542346fc9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-677c2c0d3542346fc9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-464-stego-analyse","url":"https://api.media.ccc.de/public/events/import-677c2c0d3542346fc9","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":2},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":2},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":2},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":2},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":2},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":2},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":2},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":2},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":2}]},{"guid":"import-8596f6465a398aab20","title":"NOC Review","subtitle":null,"slug":"19C3-461-noc-review","link":"http://www.ccc.de/congress/2002/fahrplan/event/461.en.html","description":"Die NOC Crew berichtet über die auf dem 19C3 mit dem internen Netz gesammelten Erfahrungen.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":261,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-16T11:30:10.317+01:00","length":2360,"duration":2360,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-461-noc-review.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-461-noc-review_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8596f6465a398aab20-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8596f6465a398aab20-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-461-noc-review","url":"https://api.media.ccc.de/public/events/import-8596f6465a398aab20","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":8},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":5},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":10},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":13},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":4},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":4},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":5},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":4},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":4},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":4},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":5},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":2}]},{"guid":"import-8591d47cbc8f002261","title":"Jahresrückblick","subtitle":null,"slug":"19C3-435-ccc-jahresrueckblick","link":"http://www.ccc.de/congress/2002/fahrplan/event/435.en.html","description":"In dieser mittlerweile traditionellen Veranstaltung, versuchen die CCC Sprecher die Vorgänge und Themen die den Club in der Aussenkommunikation beschäftigten und die diesbezüglichen Erfahrungen zusammenfassend wiederzugeben.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":174,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-01T02:45:06.805+01:00","length":1729,"duration":1729,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-435-ccc-jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-435-ccc-jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8591d47cbc8f002261-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8591d47cbc8f002261-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-435-ccc-jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-8591d47cbc8f002261","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":10},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":6},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":6},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":7},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":8},{"event_id":781,"event_guid":"import-777375527796871e60","weight":3},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":9}]},{"guid":"import-416e7f9fdd0e7280f3","title":"Rapid Deployment von IPv6 mit 6to4","subtitle":"","slug":"19C3-400-ipv6-rapid-deployment","link":"http://www.ccc.de/congress/2002/fahrplan/event/400.en.html","description":"IPv6 wird allgemein als Nachfolger des \"Internet Protokolls\" gehandelt, ist aber leider noch nicht sonderlich weit verbreitet. mit \"6to4\" ist ein relativ einfacher Mechanismus fuer den Einsatz von IPv6 verfügbar, der hier näher erläutert werden soll. Diskutiert werden Grundlagen von automatischen und konfigurierten Tunnels, Bezug von Adressraum, Connectivity, Sicherheit, sowie der Setup für NetBSD, Linux und Windows. Ein Überblick über die IPv6-Infrastruktur der FH Regensburg rundet die Präsentation ab.\r\n","original_language":"eng","persons":["Hubert \"hubertf\" Feyrer"],"tags":["19c3"],"view_count":66,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-04T20:00:27.193+01:00","length":3143,"duration":3143,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-400-ipv6-rapid-deployment.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-400-ipv6-rapid-deployment_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-416e7f9fdd0e7280f3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-416e7f9fdd0e7280f3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-400-ipv6-rapid-deployment","url":"https://api.media.ccc.de/public/events/import-416e7f9fdd0e7280f3","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":205,"event_guid":"import-17e2f2334e694b4d28","weight":1},{"event_id":722,"event_guid":"import-5826515db01b0b0b87","weight":5},{"event_id":2967,"event_guid":"cabf79b8-cadc-45ef-89c8-c3c877baf379","weight":1}]},{"guid":"import-7ca461f131b65253c2","title":"NetBSD Status Report","subtitle":"","slug":"19C3-397-netbsd","link":"http://www.ccc.de/congress/2002/fahrplan/event/397.en.html","description":"Last year's Regensburg city marathon was filmed, digitized and rendered so each of the 5.500 participants was able to retrieve his personal video of them reaching the goal. The rendering was done on a 45-machine cluster running the NetBSD operating system. An overview of the project will be given, including computational steps performed in the cluster, details on the technical setup and experiences gained in the project.\r\n","original_language":"eng","persons":["Hubert \"hubertf\" Feyrer"],"tags":["19c3"],"view_count":153,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-10T10:45:04.490+01:00","length":2121,"duration":2121,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-397-netbsd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-397-netbsd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-7ca461f131b65253c2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-7ca461f131b65253c2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-397-netbsd","url":"https://api.media.ccc.de/public/events/import-7ca461f131b65253c2","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":3},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":3},{"event_id":718,"event_guid":"import-7624c4fe48560c1db5","weight":4},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":5},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":3},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":2},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":2},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":3}]},{"guid":"import-183e79f219e4094116","title":"EU data retention","subtitle":null,"slug":"19C3-517-eu-data-retention","link":"http://www.ccc.de/congress/2002/fahrplan/event/517.en.html","description":"Die Rolle hochrangiger FBI-Agenten in europäischen Überwachungsarbeitsgruppen. Total Information Awareness kommt auch in Europa. Daten und Fakten dazu und die neuesten bekannten Entwicklungen.\n\nDie Veranstaltung wird noch vorr. um einige andere Referenten erweitert und inhaltlich ergänzt. Bitte noch etwas Geduld, wir arbeiten dran... \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":25,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-12T10:00:06.747+01:00","length":7043,"duration":7043,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-517-eu-data-retention.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-517-eu-data-retention_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-183e79f219e4094116-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-183e79f219e4094116-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-517-eu-data-retention","url":"https://api.media.ccc.de/public/events/import-183e79f219e4094116","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":719,"event_guid":"import-aef220e2a9fcc65152","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":2},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":741,"event_guid":"import-d3655889f2e0e90149","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":1},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":1},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":1},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":3}]},{"guid":"import-ea3c62f4ae68df82e6","title":"Big Brother Awards 2002/2003","subtitle":null,"slug":"19C3-489-big-brother-awards","link":"http://www.ccc.de/congress/2002/fahrplan/event/489.en.html","description":"In immer mehr Ländern der Welt werden Big Brother Awards vergeben. Vertreter der Organisationen aus Deutschland, Österreich und der Schweiz berichten über die Preisträger des Jahres 2002 und geben Ausblick auf die zukünftige Sicherheitslage.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":219,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-18T14:45:07.803+01:00","length":2816,"duration":2816,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-489-big-brother-awards.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-489-big-brother-awards_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ea3c62f4ae68df82e6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ea3c62f4ae68df82e6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-489-big-brother-awards","url":"https://api.media.ccc.de/public/events/import-ea3c62f4ae68df82e6","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":5},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":6},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":5},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":4},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":5},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":8},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":4},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":4}]},{"guid":"import-8e99ee5524fb2d218b","title":"AES Attacks","subtitle":null,"slug":"19C3-413-aes-attacks","link":"http://www.ccc.de/congress/2002/fahrplan/event/413.en.html","description":"Gross war seit Oktober 2000 die Freude, endlich über ein standardisiertes und sichereres Verschlüsselungsverfahren zu verfügen. Der neue Chipher Rijndael ist schnell und elegant - vielleicht etwas zu schnell und sehr wahrscheinlich viel zu elegant. Neue Angriffsmethoden lassen jedenfalls, obgleich noch entfernt von einer praktischen Durchführbarkeit, bei vielen Kryptographen recht ungute Gefühle entstehen. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":504,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-17T08:00:05.889+01:00","length":2850,"duration":2850,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-413-aes-attacks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-413-aes-attacks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8e99ee5524fb2d218b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8e99ee5524fb2d218b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-413-aes-attacks","url":"https://api.media.ccc.de/public/events/import-8e99ee5524fb2d218b","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":4},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":4},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":9},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":7},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":6},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":9},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":15},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":4},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":9},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":4},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":6},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":8},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":6},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":7},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":15},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":5},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":6}]},{"guid":"import-72f36f6e2f89c8ba36","title":"Die fünf Pforten der Manipulation","subtitle":null,"slug":"19C3-453-die-fuenf-pforten-der-manipulation","link":"http://www.ccc.de/congress/2002/fahrplan/event/453.en.html","description":"Wie treibt ein winziger Fadenwurm eine Süßwassergarnele in den Selbstmord? Was haben Autoverkäufer von den Verhörmethoden des CIA gelernt? Wie schafft man es, dass eine Horde Affen sich plötzlich von Weizen ernährt? Kurz: Wie bringt man jemanden dazu, sich selbst zu schaden und gegen seine eigenen Instinkte zu handeln? Eine Einführung in die Kunst der Manipulation. Mit anschaulichen Beispielen von Adam und Eva über Anne Parillaud, Gammarus lacustris und Mercedes Benz bis hin zu Thomas Gottschalk.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":636,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-30T21:00:04.882+02:00","length":4681,"duration":4681,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-453-die-fuenf-pforten-der-manipulation.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-453-die-fuenf-pforten-der-manipulation_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-72f36f6e2f89c8ba36-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-72f36f6e2f89c8ba36-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-453-die-fuenf-pforten-der-manipulation","url":"https://api.media.ccc.de/public/events/import-72f36f6e2f89c8ba36","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":5},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":7},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":8},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":7},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":4},{"event_id":732,"event_guid":"import-19fc7a9e94509e5fe4","weight":3},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":5},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":7},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":9},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":3},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":3},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":10},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":5},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":6},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":3},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":3},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":3},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":6},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":3}]},{"guid":"import-35bef068c59b3b5fc9","title":"radiokampagne (441)","subtitle":null,"slug":"19C3-441-radiokampagne","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":35,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-12T10:00:06.736+01:00","length":2514,"duration":2514,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-441-radiokampagne.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-441-radiokampagne_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-35bef068c59b3b5fc9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-35bef068c59b3b5fc9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-441-radiokampagne","url":"https://api.media.ccc.de/public/events/import-35bef068c59b3b5fc9","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":3},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":2},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":2},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":3},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":2}]},{"guid":"import-540cd24572d4e80cfc","title":"Abschlussveranstaltung","subtitle":null,"slug":"19C3-429-abschlussveranstaltung","link":"http://www.ccc.de/congress/2002/fahrplan/event/429.en.html","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":233,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-08T22:15:33.127+01:00","length":1761,"duration":1761,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-429-abschlussveranstaltung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-429-abschlussveranstaltung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-540cd24572d4e80cfc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-540cd24572d4e80cfc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-429-abschlussveranstaltung","url":"https://api.media.ccc.de/public/events/import-540cd24572d4e80cfc","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":10},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":7},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":8},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":7},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":4},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":4},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":4},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":5},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":4},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":4},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":6}]},{"guid":"import-5826515db01b0b0b87","title":"TCP/IP v6 Einführung","subtitle":"","slug":"19C3-478-ipv6","link":"http://www.ccc.de/congress/2002/fahrplan/event/478.en.html","description":"IPv6 - den Namen des 'next generation' Internet Protocols hat wohl inzwischen jeder schon einmal gehört. Was sich genau dahinter verbirgt, und wie man bereits heute mit dieser neuen Technologie spielen kann, verrät der Vortrag.\r\n\r\nThemen:\r\n\r\nIPv6 - Warum?\r\n\r\nIPv6 - Aufbau des Protokolls (Header, ...)\r\n\r\nIPv6 - Unterschiede zu IPv4\r\n\r\nIPv6 - Welche Betriebssysteme bieten Unterstützung?\r\n\r\nIPv6 - Wie bekomme ich Zugang?\r\n\r\nIPv6 - Ausblick auf das deployment","original_language":"eng","persons":[],"tags":["19c3"],"view_count":72,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-14T17:30:08.568+01:00","length":2134,"duration":2134,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-478-ipv6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-478-ipv6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-5826515db01b0b0b87-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-5826515db01b0b0b87-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-478-ipv6","url":"https://api.media.ccc.de/public/events/import-5826515db01b0b0b87","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":711,"event_guid":"import-416e7f9fdd0e7280f3","weight":5},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":2}]},{"guid":"import-61262399b0beda7cb0","title":"Call Center ","subtitle":null,"slug":"19C3-409-call-center","link":"http://www.ccc.de/congress/2002/fahrplan/event/409.en.html","description":"Über den Aufbau, die Funktion und die Auswirkungen von Callcentern und anderen modernen Formen der Kundengewinnung und -haltung gibt es häufig Unsicherheiten, Desintereresse und Unwissen. Der Vortrag stellt auf der Basis aktueller Untersuchungen und eigenen Erfahrungen die Funktionen, Wirkungsweisen und ökonomischen Triebkräfte hinter dem Trend den Kunden immer und überall zu erreichen dar. Weiterhin werden Hinweise zum artgerechten Umgang mit Callcentern gegeben, sowohl aus der Perspektive des Kunden als auch der des Callcenter-Mitarbeiters.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":251,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-27T23:15:06.724+01:00","length":3731,"duration":3731,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-409-call-center.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-409-call-center_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-61262399b0beda7cb0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-61262399b0beda7cb0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-409-call-center","url":"https://api.media.ccc.de/public/events/import-61262399b0beda7cb0","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":26,"event_guid":"import-7546b8f6ee2d14b2e6","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":5},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":11},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":10},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":10},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":6},{"event_id":718,"event_guid":"import-7624c4fe48560c1db5","weight":4},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":7},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":6},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":5},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":7},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":6},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":8},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":6},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":6},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":5}]},{"guid":"import-a479932fbfd0650ddf","title":"How to find anything on the web","subtitle":null,"slug":"19C3-443-how-to-find-anything-on-the-web","link":"http://www.ccc.de/congress/2002/fahrplan/event/443.en.html","description":"Session: Web wizard searching techniques, anti-advertisement galore and software reversing tips\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":295,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T19:45:06.567+01:00","length":6716,"duration":6716,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-443-how-to-find-anything-on-the-web.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-443-how-to-find-anything-on-the-web_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-a479932fbfd0650ddf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-a479932fbfd0650ddf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-443-how-to-find-anything-on-the-web","url":"https://api.media.ccc.de/public/events/import-a479932fbfd0650ddf","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":5},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":7},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":4},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":3},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":4},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":5},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":4},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":4},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":3},{"event_id":735,"event_guid":"import-8292b0b8200c093615","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":6},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":5},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":4},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":4},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":5},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":9},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":3},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":3},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":3},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":3}]},{"guid":"import-8292b0b8200c093615","title":"Its my box","subtitle":null,"slug":"19C3-399-xbox-linux","link":"http://www.ccc.de/congress/2002/fahrplan/event/399.en.html","description":"Microsoft went to some lengths to ensure that only approved code could be run on their 'Microsoft-only' PC, the Xbox. The talk gives an overview of the Xbox hardware components, and a detailed background into the Xbox 'security' architecture of the Xbox, and how the chain of trust was defeated using custom hardware. Also covered in detail is Microsoft's recent changes to the boot crypto using Palladium-style hash methods, and how this was broken by our team. We will also talk briefly about TCPA/Palladium, the implications and its possible future as well as the process of porting Linux.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":143,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-10T16:45:06.366+01:00","length":7396,"duration":7396,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-399-xbox-linux.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-399-xbox-linux_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8292b0b8200c093615-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8292b0b8200c093615-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-399-xbox-linux","url":"https://api.media.ccc.de/public/events/import-8292b0b8200c093615","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":3},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":5}]},{"guid":"import-e6b3200a23ed44995e","title":"Zero Tool Hacking","subtitle":null,"slug":"19C3-448-zero-tool-hacking","link":"http://www.ccc.de/congress/2002/fahrplan/event/448.en.html","description":"or: Options and Uses of Utils you have never heard before\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":190,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-05T13:15:12.313+01:00","length":3302,"duration":3302,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-448-zero-tool-hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-448-zero-tool-hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-e6b3200a23ed44995e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-e6b3200a23ed44995e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-448-zero-tool-hacking","url":"https://api.media.ccc.de/public/events/import-e6b3200a23ed44995e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":8},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":9},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":4},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":5},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":8},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":8},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":6},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":6},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":7},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":5},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":6},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":4},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":4},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":4}]},{"guid":"import-815c7442f3da8d756e","title":"C Optimizations for the masses","subtitle":null,"slug":"19C3-500-c-optimizations","link":"http://www.ccc.de/congress/2002/fahrplan/event/500.en.html","description":"Aus dem staunenden Blickwinkel eines Assemblerprogrammierers werden die typischen Alltagsfehler, Zeitverschwendungen und Stylefauxpas des Durschnitts-C-Programmierers an echten Beispielen analysiert und Tips und Tricks zu resourcenschonender Programmierung fuer alle Prozessoren verraten.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":214,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-03T00:15:30.128+01:00","length":3033,"duration":3033,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-500-c-optimizations.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-500-c-optimizations_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-815c7442f3da8d756e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-815c7442f3da8d756e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-500-c-optimizations","url":"https://api.media.ccc.de/public/events/import-815c7442f3da8d756e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":7},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":5},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":5},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":3},{"event_id":2350,"event_guid":"433e598a-4a96-4be5-90f1-014b4be7b3ec","weight":3},{"event_id":3558,"event_guid":"dd3cbbf6-b5de-4efe-9704-16e4a01ff5b5","weight":2},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":2},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":3},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":2}]},{"guid":"import-93add0c79a0a5e23dd","title":"Biometrie","subtitle":null,"slug":"19C3-415-biometrie","link":"http://www.ccc.de/congress/2002/fahrplan/event/415.en.html","description":"In dem Vortrag gehen wir auf die Funktionsweise der am häufigsten verwendeten biometrischen Verfahren ein, zeigen die jeweiligen Schwächen auf und demonstrieren diese an einigen ausgewählten Systemen.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":126,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-08T18:45:05.717+01:00","length":3028,"duration":3028,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-415-biometrie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-415-biometrie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-93add0c79a0a5e23dd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-93add0c79a0a5e23dd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-415-biometrie","url":"https://api.media.ccc.de/public/events/import-93add0c79a0a5e23dd","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":3},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":3},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":5},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":6},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":5},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":4},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2}]},{"guid":"import-9407d03f44908c0cf5","title":"ISP User Profiles","subtitle":null,"slug":"19C3-460-isp-user-profiles","link":"http://www.ccc.de/congress/2002/fahrplan/event/460.en.html","description":"Der Vortrag behandelt die Erfassung von User-Bewegungsprofilen bei kleinen und mittleren ISPs, sowie die Nutzungsmöglichkeiten und Kosten solcher Lösungen. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":82,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-09T13:30:12.678+01:00","length":3203,"duration":3203,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-460-isp-user-profiles.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-460-isp-user-profiles_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-9407d03f44908c0cf5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-9407d03f44908c0cf5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-460-isp-user-profiles","url":"https://api.media.ccc.de/public/events/import-9407d03f44908c0cf5","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":3},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":3},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":5},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":2},{"event_id":735,"event_guid":"import-8292b0b8200c093615","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":3},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":2}]},{"guid":"import-f4e0b835ae0c12299f","title":"Die zeitliche Dimension von Sicherheit","subtitle":null,"slug":"19C3-432-sicherheit-zeitliche-dimension","link":"http://www.ccc.de/congress/2002/fahrplan/event/432.en.html","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":58,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-04-22T00:30:05.633+02:00","length":4189,"duration":4189,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-432-sicherheit-zeitliche-dimension.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-432-sicherheit-zeitliche-dimension_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-f4e0b835ae0c12299f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-f4e0b835ae0c12299f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-432-sicherheit-zeitliche-dimension","url":"https://api.media.ccc.de/public/events/import-f4e0b835ae0c12299f","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":2},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":3},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":3},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":2},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":2},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":2},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":3},{"event_id":1350,"event_guid":"import-bbaef39cd440f712fd","weight":2}]},{"guid":"import-e0dc3d63d8c85c7c2f","title":"Network Hijacking","subtitle":null,"slug":"19C3-401-network-hijacking","link":"http://www.ccc.de/congress/2002/fahrplan/event/401.en.html","description":"Neben den Grundlagen von TCP-Hijacking werden u.a. Hijacking in geswitchten Umgebungen mit ARP-Spoofing /-Relaying sowie ICMP-Redirection besprochen.\n\nAls Exkurs wird dieses Jahr das Thema \"Social-Hijacking\" angeschnitten.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":131,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T19:45:06.665+01:00","length":3332,"duration":3332,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-401-network-hijacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-401-network-hijacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-e0dc3d63d8c85c7c2f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-e0dc3d63d8c85c7c2f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-401-network-hijacking","url":"https://api.media.ccc.de/public/events/import-e0dc3d63d8c85c7c2f","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":2}]},{"guid":"import-4099fe221ad402ce1d","title":"Siegerehrung Deutsche Meisterschaften im Schlossöffnen","subtitle":null,"slug":"19C3-412-lockpicking","link":"http://www.ccc.de/congress/2002/fahrplan/event/412.en.html","description":"Nach der Siegerehrung der Deutsche Meisterschaften im Schlossöffnen auf dem Chaos Communication Congress findet noch die Auflösung des Schlüsselrätsels sowie der Wettkampf Blitz-Öffnung in dieser Veranstaltung statt.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":103,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-07T17:30:08.942+01:00","length":3071,"duration":3071,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-412-lockpicking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-412-lockpicking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-4099fe221ad402ce1d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-4099fe221ad402ce1d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-412-lockpicking","url":"https://api.media.ccc.de/public/events/import-4099fe221ad402ce1d","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":2},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":4},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":741,"event_guid":"import-d3655889f2e0e90149","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":4374,"event_guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","weight":1}]},{"guid":"import-9bee3d8a1b3b5b0ba4","title":"Schach der Künstlichen Un-Intelligenz","subtitle":null,"slug":"19C3-414-kuenstliche-unintelligenz","link":"http://www.ccc.de/congress/2002/fahrplan/event/414.en.html","description":"Der Wettkampf des Schachweltmeisters Kramnik gegen das niederländisch-deutsche Schachprogramm Deep Fritz demonstrierte auf recht eindrückliche Weise sowohl den sportlichen Erfolg, wie auch die Unintelligenz moderner Schachprogramme. In diesem Vortrag blicken wir unter anderem auf die durchweg tragikomischen Höhepunkte des toten Rennens.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":112,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-21T00:30:02.871+02:00","length":2344,"duration":2344,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-414-kuenstliche-unintelligenz.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-414-kuenstliche-unintelligenz_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-9bee3d8a1b3b5b0ba4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-9bee3d8a1b3b5b0ba4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-414-kuenstliche-unintelligenz","url":"https://api.media.ccc.de/public/events/import-9bee3d8a1b3b5b0ba4","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":3},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":3},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":2},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":3},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":2}]},{"guid":"import-ff979c2f6c330b3a57","title":"Eröffnung","subtitle":null,"slug":"19C3-428-eroffnung","link":"http://www.ccc.de/congress/2002/fahrplan/event/428.en.html","description":"Auftaktveranstaltung des 19. Chaos Communication Congress. Begrüßung und Information über das Congressprogramm, auf dem Congress aktive Gruppen und sonstige Veranstaltungen und nützliche Informationen rund um den 19C3. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":116,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-31T21:00:14.375+01:00","length":2174,"duration":2174,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-428-eroffnung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-428-eroffnung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ff979c2f6c330b3a57-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ff979c2f6c330b3a57-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-428-eroffnung","url":"https://api.media.ccc.de/public/events/import-ff979c2f6c330b3a57","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":4},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":5},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":2},{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":6},{"event_id":781,"event_guid":"import-777375527796871e60","weight":4},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":4},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":4},{"event_id":1753,"event_guid":"0i_XOY92eUOxB3jQO_Zj4g","weight":4},{"event_id":2317,"event_guid":"c5ddba17-7ac1-4c51-af61-54e442167cae","weight":2},{"event_id":3504,"event_guid":"e59d3c63-29a6-0955-302a-ca7a2be2e4b1","weight":2}]},{"guid":"import-849c60e1dfce00f547","title":"Symbolics Lisp Machines","subtitle":null,"slug":"19C3-488-symbolics-lisp-machines","link":"http://www.ccc.de/congress/2002/fahrplan/event/488.en.html","description":"Are you tired of buffer overflows? Do you wonder why, when there's a bug, you can't just click on the stack trace, and an editor window with the faulty source pops up - for all parts of the system? Are you sick of losing your uptime because you can't upgrade the kernel without booting?\n\nMeet the Lisp Machines, a family of computers that were running an OS written entirely in Lisp, right down to the hardware. Not only were buffer overflows a problem completely unknown, also the availability of the complete source code at the click of the mouse made for a system of great hack value unmatched by any of the systems available. Remind you, that was at a time before Apple released the Mac.\n\nThis workshop gives an overview of the history of Lisp machines, their implementation principle, tries to look into reasons why such a superior system failed in the market, and gives a demonstration of a running Symbolics MacIvory (if we can make it work again in time). \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":408,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-09T06:15:02.983+02:00","length":3313,"duration":3313,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-488-symbolics-lisp-machines.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-488-symbolics-lisp-machines_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-849c60e1dfce00f547-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-849c60e1dfce00f547-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-488-symbolics-lisp-machines","url":"https://api.media.ccc.de/public/events/import-849c60e1dfce00f547","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":9},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":5},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":2},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":6},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":2},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":3},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":2},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":3},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":2},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":2}]},{"guid":"import-19fc7a9e94509e5fe4","title":"Erfahrungen bei Design und Abnahme eines BSI zertifizierten Systems","subtitle":null,"slug":"19C3-483-bsi-zertifizierung","link":"http://www.ccc.de/congress/2002/fahrplan/event/483.en.html","description":"Der Referent hat die Entwicklung eines Dokumentenarchivierungsdienst mitgestaltet, in dem Dokumente wie Kontoauszüge oder Telefonabrechnungen gespeichert werden.\n\nDas System ist als erstes (und aktuell einziges) vom BSI nach den IT-Grundschutz-Richtlinien zertifiziert worden.\n\nIn diesem Vortrag spricht der Referent über die Architektur der Hardware, der Software und der Anbindung von Partnerunternehmen. Der Referent berichtet über die Erfahrungen bei der Erstellung eines zertifizierten Systems und nimmt einen Vergleich mit dem Whitepaper der OWASP (www.owasp.org) vor. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":137,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-10T17:15:09.795+01:00","length":3814,"duration":3814,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-483-bsi-zertifizierung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-483-bsi-zertifizierung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-19fc7a9e94509e5fe4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-19fc7a9e94509e5fe4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-483-bsi-zertifizierung","url":"https://api.media.ccc.de/public/events/import-19fc7a9e94509e5fe4","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":196,"event_guid":"import-0ef4016fcc30dbd97e","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":2},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":1},{"event_id":771,"event_guid":"import-4d16517d50ae0e0c3b","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1041,"event_guid":"import-7f7937ab691a2b98e6","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":2465,"event_guid":"d1f3810f-43b1-4856-b8ee-7c767234d185","weight":1},{"event_id":2470,"event_guid":"c131b08d-e1be-4658-b98a-a223bc746784","weight":1},{"event_id":2472,"event_guid":"e8d65b1e-ce8a-4307-b056-e8b60461c825","weight":1},{"event_id":2473,"event_guid":"f83350dc-8152-422c-921f-379b018c0fa2","weight":1},{"event_id":2477,"event_guid":"cb9bc487-84aa-4f9c-931a-6de0bdf25e43","weight":1},{"event_id":2478,"event_guid":"85bae1d2-e024-48e9-91e1-d4ecfde18694","weight":1},{"event_id":2487,"event_guid":"581757d7-5b47-491c-8907-9aa5d235edb8","weight":1},{"event_id":2501,"event_guid":"51565c6b-399f-4cf7-9d74-7ffd5d14f7af","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":1},{"event_id":2545,"event_guid":"2ee47684-8114-4361-8f3e-8b61946d8335","weight":1},{"event_id":2546,"event_guid":"bd4515b7-fdcf-4d9b-8fc8-0ec47f5c8a80","weight":1},{"event_id":2550,"event_guid":"3064add4-ab1e-4d05-84b8-d753b9733097","weight":1},{"event_id":2551,"event_guid":"f8909f2d-fac5-4d5f-b483-cff184591b0c","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3063,"event_guid":"10226b1a-0d77-438f-898d-9a39289342e6","weight":1},{"event_id":3104,"event_guid":"b2bc162c-1745-4f45-ba56-766b4174095b","weight":1},{"event_id":3390,"event_guid":"780f8f8e-9210-4bf6-8e0f-087b56bdd54c","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3741,"event_guid":"725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":3873,"event_guid":"da554088-7556-43ca-81f0-1de27299973a","weight":1},{"event_id":3919,"event_guid":"gRgxvK4ufa8hgzLOpcsDCw","weight":1},{"event_id":4551,"event_guid":"524e4a4e-584d-2020-2020-202020202020","weight":1},{"event_id":4608,"event_guid":"1501cfe4-7ea5-5c9d-9e68-df4aafa308a8","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1},{"event_id":5965,"event_guid":"c9dcd2a5-288f-55d0-8577-dc00c2e185ce","weight":2}]},{"guid":"import-bf118c75c91fbf6195","title":"Lawful Interception of IP Traffic","subtitle":null,"slug":"19C3-442-lawful-interception-europe","link":"http://www.ccc.de/congress/2002/fahrplan/event/442.en.html","description":"Lawful Interception (LI) is currently in development internationally and the area of IP interception poses significant regulatory, as well as implementation, challenges. The presentation attempts to elucidate major legal and technical issues as well as citing the vendors, operators and governments involved in creating the standards and solutions.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":116,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-24T10:30:10.070+01:00","length":3545,"duration":3545,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-442-lawful-interception-europe.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-442-lawful-interception-europe_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-bf118c75c91fbf6195-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-bf118c75c91fbf6195-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-442-lawful-interception-europe","url":"https://api.media.ccc.de/public/events/import-bf118c75c91fbf6195","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":3},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":4}]},{"guid":"import-2f01514bbfe5970182","title":"Amateurfunk - Quo Vadis?","subtitle":null,"slug":"19C3-508-amateurfunk","link":"http://www.ccc.de/congress/2002/fahrplan/event/508.en.html","description":"Amateurfunk - braucht man das im Zeitalter des Internets noch?\n\nWir (Peter, DO1GVT und Michael, DL3KJU) sagen \"Ja\", und zeigen Euch, was auch heutzutage noch spannendes möglich ist. Amateurfunk ist kreativer Umgang mit Technologie in Reinform!\n\nUnsere Themen (u.a.): D-ATV (digitales Amateurfunk-Fernsehen), Funkruf (Pager in Afu-Funkruf-Empfänger umwandeln), PSK31 (digitale Sendeverfahren mit geringen Sendeleistungen), Wireless-LAN im Amateurfunk und andere spannende Themen.\n\nAbschließend erzählen wir Euch noch, wie man Funkamateur werden kann, und wie die wichtigsten gesetzlichen Regelungen grob aussehen.\n\nZielgruppe des Vortrags sind vor allem interessierte HackerInnen mit keinen oder nur wenig Vorkenntnissen zum Thema.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":547,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-18T14:30:06.834+01:00","length":3366,"duration":3366,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-508-amateurfunk.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-508-amateurfunk_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-2f01514bbfe5970182-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-2f01514bbfe5970182-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-508-amateurfunk","url":"https://api.media.ccc.de/public/events/import-2f01514bbfe5970182","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":7},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":9},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":8},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":9},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":5},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":3},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":6},{"event_id":2336,"event_guid":"9fbe3c36-63f4-4a1c-a7a8-2d51ac7f9aa2","weight":4},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":7},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":9},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":4}]},{"guid":"import-e7492b8aa05ee34d8c","title":"SCTP ","subtitle":null,"slug":"19C3-495-sctp","link":"http://www.ccc.de/congress/2002/fahrplan/event/495.en.html","description":"The SCTP (Stream Control Transmission Protocol) is a new reliable transfer protocol standardized by the Internet Engineering Task Force (IETF) in the documents [1], [2] and [3]. It was primarily developed by the SIGTRAN group to provide a mechanism for transporting currently circuit switched telephony signaling (SS7) data over packet switched networks.\n\nDesigned to overcome some deficiencies of TCP, its main benefits are a more flexible, message oriented data delivery to its user, and inherent support for multi-homimng. As such, it is not only a transport protocol for delivery of SS7 signaling data over IP networks, as originally intended. Much rather, it is a general purpose transport protocol, suitable for any kind of message oriented traffic (e.g. Internet file transfer, SCSI over IP, SIP, HTTP, etc.), and thus a successor to TCP.\n\nTogether with enhancements to the core protocol (as per [4] and [5]), features for mobility of SCTP endpoints and multimedia transmissions can be added to SCTP implementations.\n\nSo far, major operating systems vendors started integrating SCTP into their protocol stacks, among these Linux, FreeBSD, Solaris, HP-UX, IBM AIX, Cisco IOS, and many more.\n\nThis presentation will be about the features of the core protocol, and explain the protocol enhancements for transport layer mobility and partial reliability. Security solutions using IPSec or TLS [6] will also be covered. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":304,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-15T02:45:06.251+01:00","length":3055,"duration":3055,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-495-sctp.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-495-sctp_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-e7492b8aa05ee34d8c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-e7492b8aa05ee34d8c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-495-sctp","url":"https://api.media.ccc.de/public/events/import-e7492b8aa05ee34d8c","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":5},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":4},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":3},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":3},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":3},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":2},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":3},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":4},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":27}]},{"guid":"import-f0546db014bfefb027","title":"Big Brother Awards 2002/2003 Diskussion","subtitle":null,"slug":"19C3-521-big-brother-awards-discussion","link":"http://www.ccc.de/congress/2002/fahrplan/event/521.en.html","description":"In immer mehr Ländern der Welt werden Big Brother Awards vergeben. Vertreter der Organisationen aus Deutschland, Österreich und der Schweiz berichten über die Preisträger des Jahres 2002 und geben Ausblick auf die zukünftige Sicherheitslage.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":104,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-10-12T20:00:02.804+02:00","length":2823,"duration":2823,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-521-big-brother-awards-discussion.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-521-big-brother-awards-discussion_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-f0546db014bfefb027-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-f0546db014bfefb027-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-521-big-brother-awards-discussion","url":"https://api.media.ccc.de/public/events/import-f0546db014bfefb027","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":5},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":5},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":4}]},{"guid":"import-0ff4fc254d51ae809f","title":"Angriffe auf Paddingverfahren zu RSA","subtitle":null,"slug":"19C3-463-rsa-padding-angriffe","link":"http://www.ccc.de/congress/2002/fahrplan/event/463.en.html","description":"RSA wird gemeinhin als gut erprobtes und damit sicheres asymetrisches Kryptosystem angesehen und eingesetzt. Allerdings ermöglchen Designfehler im Datenformat PKCS 1 und haufenweise Implementierungsfehler in kommerziellen Produkten unter bestimmten Umständen adaptive, aktive Angriffe, die den Klartext Preis geben. Ziel des Vortrags ist, die Problematik zu erläutern und die Zuhörer für das Thema zu sensibilisieren.\n\nSchliesslich ist die Wahl des Paddingverfahrens mitunter genauso kritisch wie die Wahl der Kryptofunktion selbst. Das Forschungsgebiet ist relativ neu, wesentliche Erkenntnisse wurde erst in den vergangenen zwei Jahren publiziert.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":151,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-29T02:00:08.742+01:00","length":2248,"duration":2248,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-463-rsa-padding-angriffe.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-463-rsa-padding-angriffe_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-0ff4fc254d51ae809f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-0ff4fc254d51ae809f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-463-rsa-padding-angriffe","url":"https://api.media.ccc.de/public/events/import-0ff4fc254d51ae809f","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":5},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":3},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2}]},{"guid":"import-8f844c9c19dc5a0dbf","title":"Project Blinkenlights: ARCADE","subtitle":null,"slug":"19C3-381-blinkenlights-arcade","link":"http://www.ccc.de/congress/2002/fahrplan/event/381.en.html","description":"Projekt Blinkenlights hat in diesem Jahr eine neue Lichtinstallation in die Welt gesetzt. Auf der Französischen Nationalbibliothek in Paris wurde \"ARCADE\" realisiert. Die technische Realisierung basiert auf einer konsequenten Weiterentwicklung der ursprünglich für die Berliner Installation \"Blinkenlights\" entworfenen Konzepte. Der Vortrag stellt die Aktion und die dahinter steckende Technologie vor.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":120,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-16T00:30:11.996+01:00","length":2972,"duration":2972,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-381-blinkenlights-arcade.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-381-blinkenlights-arcade_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8f844c9c19dc5a0dbf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8f844c9c19dc5a0dbf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-381-blinkenlights-arcade","url":"https://api.media.ccc.de/public/events/import-8f844c9c19dc5a0dbf","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":3},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":5},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":4},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":8},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":4},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":3},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":2},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":2}]},{"guid":"import-691e5b62d72613fe8d","title":"Network Hijacking Workshop","subtitle":null,"slug":"19C3-402-network-hijacking-workshop","link":"http://www.ccc.de/congress/2002/fahrplan/event/402.en.html","description":"An praktischen Beispielen werden einfache Angriffe mit Paketgeneratoren und komplexere Angriffe mit fertigen Tools vorgeführt. Der Workshop soll einerseits die Technik der Angriffe veranschaulichen, andererseits zeigen, was Möglich ist und wie gross die Gefahr ist.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":50,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T19:45:06.678+01:00","length":5269,"duration":5269,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-402-network-hijacking-workshop.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-402-network-hijacking-workshop_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-691e5b62d72613fe8d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-691e5b62d72613fe8d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-402-network-hijacking-workshop","url":"https://api.media.ccc.de/public/events/import-691e5b62d72613fe8d","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":3},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":2},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":2},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":2},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":784,"event_guid":"import-ce2f906c7ada48cec9","weight":1},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":2},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1122,"event_guid":"import-a24ed08b895b751d60","weight":1},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1678,"event_guid":"import-499496e1f8d0dc96ab","weight":2},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":1},{"event_id":1764,"event_guid":"PuDWTZPratvP-gVrrPScWQ","weight":1},{"event_id":2162,"event_guid":"_lVlmBO98KMg4M-n-_A3FA","weight":1},{"event_id":2206,"event_guid":"1Xe2U3LqTfMTXAvI6hrgxg","weight":1},{"event_id":2218,"event_guid":"1hSKsR-r9B0BnpLfUvpDAg","weight":1},{"event_id":2969,"event_guid":"a4b72599-b24b-4890-85bb-4f3e24e452e2","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3645,"event_guid":"2a9ac911-1072-4672-8fbc-2887f4fd7aec","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":1},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1}]},{"guid":"import-194c93a98f08232d2e","title":"Detecting DDos Attacks and Countermeasures at ISPs","subtitle":null,"slug":"19C3-506-detecting-ddos-attacks","link":"http://www.ccc.de/congress/2002/fahrplan/event/506.en.html","description":"[english]\n\nThis workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis.\n\nThe second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring).\n\nThe results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks. \n\n[german]\n\nDieser Workshop teilt sich in zwei Teile: einerseits die Vorstellung von aktuellen Tools und Möglichkeiten, DDOS Attacken zu erkennen, zu blocken und eine post-mortem-Analyse durchzuführen.\n\nDer zweite Teil soll aufbauend auf dem ersten Teil ein Diskussionsforum werden, um Ideen und Moeglichkeiten der Community zu erforschen, um die Verbesserung der Gegenmassnahmen zu ermöglichen (z.B. distributed blocking oder distributed monitoring).\n\nAls Ziel sollen Informationen interessierten ISPs zur Verfügung gestellt werden, bzw. weiterhin Tools entwickelt werden, um die DDOS-Attacken einzugrenzen und weiterhin (vielleicht) zu unterbinden. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":118,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-22T14:15:08.148+01:00","length":2819,"duration":2819,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-506-detecting-ddos-attacks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-506-detecting-ddos-attacks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-194c93a98f08232d2e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-194c93a98f08232d2e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-506-detecting-ddos-attacks","url":"https://api.media.ccc.de/public/events/import-194c93a98f08232d2e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":2},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":1365,"event_guid":"import-f6fe16e0e51dda7134","weight":2},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":2}]},{"guid":"import-17db1511dcc50ce552","title":"Einführung in Geschichte und Struktur des CCC","subtitle":null,"slug":"19C3-374-ccc-geschichte","link":"http://www.ccc.de/congress/2002/fahrplan/event/374.en.html","description":"Da der Chaos Computer Club nun schon über 20 Jahre unterwegs ist, auf dem Congress aber viele Besucher nur einen Teil der Geschichte des Clubs kennen, versucht dieser Vortrag einen groben Überblick über die Geschichte des CCC zu geben. Verständlich sollen dabei nicht nur die Strukturelemente und kulturellen Eigenarten dieser merkwürdigen Anhäufung von Menschen werden, sondern auch einige Empfindlichkeiten, deren Berücksichtigung es dem werten Congressbesucher erlauben, den Congress möglicherweise besser zu verstehen.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":185,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T12:30:06.497+01:00","length":3150,"duration":3150,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-374-ccc-geschichte.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-374-ccc-geschichte_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-17db1511dcc50ce552-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-17db1511dcc50ce552-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-374-ccc-geschichte","url":"https://api.media.ccc.de/public/events/import-17db1511dcc50ce552","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":8},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":6},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":2},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":3},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":3},{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":3},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":3},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":3},{"event_id":741,"event_guid":"import-d3655889f2e0e90149","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":4},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":7},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":6},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":3},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":3}]},{"guid":"import-889a1b50b1e3adc8f5","title":"Smartcards mit SOSSE sind lecker","subtitle":null,"slug":"19C3-449-smartcards-sosse","link":"http://www.ccc.de/congress/2002/fahrplan/event/449.en.html","description":"SOSSE (Simple Operating System for Smartcard Education) ist GPLtes Smartcard-Betriebssystem fuer AVR-Karten. Es soll es ermöglichen direkt an der Hardware mit Chipkarten zu experimentieren und zu lernen. Es versucht deshalb kommerzielle Systeme nachzuahmen und ist zur leichteren Verstaendlichkeit so weit wie moeglich in C programmiert. Aber eigentlich geht es ja sowieso nur um Gniedla.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":68,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-09-22T23:45:03.901+02:00","length":2111,"duration":2111,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-449-smartcards-sosse.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-449-smartcards-sosse_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-889a1b50b1e3adc8f5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-889a1b50b1e3adc8f5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-449-smartcards-sosse","url":"https://api.media.ccc.de/public/events/import-889a1b50b1e3adc8f5","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":553,"event_guid":"import-1642ac54dd91815d89","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":732,"event_guid":"import-19fc7a9e94509e5fe4","weight":1},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":2},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":3},{"event_id":1221,"event_guid":"import-28f2251a0a4fa316f6","weight":3},{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":1},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":2},{"event_id":1726,"event_guid":"w9UU1iDfP18QvWJ5i2VDsg","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":1},{"event_id":2365,"event_guid":"157510b7-5154-4f7d-ac20-a680e45f53c1","weight":1},{"event_id":2385,"event_guid":"b55ec10e-b12f-40e0-bb25-4fee2f13ad86","weight":1},{"event_id":2407,"event_guid":"7c371767bfd05e41e9e8e1cf8dff6766","weight":1},{"event_id":2465,"event_guid":"d1f3810f-43b1-4856-b8ee-7c767234d185","weight":1},{"event_id":2470,"event_guid":"c131b08d-e1be-4658-b98a-a223bc746784","weight":1},{"event_id":2472,"event_guid":"e8d65b1e-ce8a-4307-b056-e8b60461c825","weight":1},{"event_id":2473,"event_guid":"f83350dc-8152-422c-921f-379b018c0fa2","weight":1},{"event_id":2477,"event_guid":"cb9bc487-84aa-4f9c-931a-6de0bdf25e43","weight":1},{"event_id":2478,"event_guid":"85bae1d2-e024-48e9-91e1-d4ecfde18694","weight":1},{"event_id":2487,"event_guid":"581757d7-5b47-491c-8907-9aa5d235edb8","weight":1},{"event_id":2501,"event_guid":"51565c6b-399f-4cf7-9d74-7ffd5d14f7af","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":1},{"event_id":2545,"event_guid":"2ee47684-8114-4361-8f3e-8b61946d8335","weight":1},{"event_id":2546,"event_guid":"bd4515b7-fdcf-4d9b-8fc8-0ec47f5c8a80","weight":1},{"event_id":2550,"event_guid":"3064add4-ab1e-4d05-84b8-d753b9733097","weight":1},{"event_id":2551,"event_guid":"f8909f2d-fac5-4d5f-b483-cff184591b0c","weight":1},{"event_id":2736,"event_guid":"abef1838-6353-4013-bb99-6c23630742e2","weight":1},{"event_id":2744,"event_guid":"7c933d1d-6a52-48ac-9417-601e529bcddc","weight":3},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3947,"event_guid":"ZwjtZbsZpe6Xfim50cj-CA","weight":1},{"event_id":4046,"event_guid":"dc7ea8e7-8072-5f8f-afb0-a735433590de","weight":1},{"event_id":4669,"event_guid":"d81a5dd7-4132-4afe-8749-aab08b324687","weight":1},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":1},{"event_id":5107,"event_guid":"baf60354-aae9-4649-aa1e-501b5de49cd4","weight":1},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":1},{"event_id":5474,"event_guid":"178e37b7-7508-50e9-b603-ce864723e0db","weight":1},{"event_id":5620,"event_guid":"0b0db69d-bda6-567e-9c5a-9fea99e86404","weight":2}]},{"guid":"import-7624c4fe48560c1db5","title":"Clustering the NetBSD Operating System for Video Rendering","subtitle":"","slug":"19C3-396-videorendering-cluster","link":"http://www.ccc.de/congress/2002/fahrplan/event/396.en.html","description":"Last year's Regensburg city marathon was filmed, digitized and rendered so each of the 5.500 participants was able to retrieve his personal video of them reaching the goal. The rendering was done on a 45-machine cluster running the NetBSD operating system. An overview of the project will be given, including computational steps performed in the cluster, details on the technical setup and experiences gained in the project.\r\n","original_language":"eng","persons":["Hubert \"hubertf\" Feyrer"],"tags":["19c3"],"view_count":91,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-06T20:30:06.381+02:00","length":2398,"duration":2398,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-396-videorendering-cluster.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-396-videorendering-cluster_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-7624c4fe48560c1db5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-7624c4fe48560c1db5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-396-videorendering-cluster","url":"https://api.media.ccc.de/public/events/import-7624c4fe48560c1db5","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":4},{"event_id":741,"event_guid":"import-d3655889f2e0e90149","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":4},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":1},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":1169,"event_guid":"import-b911d815ea63e3bd2f","weight":1},{"event_id":1182,"event_guid":"import-3ee182cd32660abeb3","weight":1},{"event_id":1195,"event_guid":"import-85f6ed1f7f99a5a228","weight":1},{"event_id":1197,"event_guid":"import-0cb4adc089215fd488","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1407,"event_guid":"import-aa97ee865d5e945700","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1809,"event_guid":"tbP0pE8M3Do-9jVyC04sXg","weight":1},{"event_id":1841,"event_guid":"wX415KPkBVf8zeBPWdqT2Q","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":2311,"event_guid":"29dbd740-b1c8-476d-b8f1-ad98df418bb7","weight":1},{"event_id":2512,"event_guid":"8e851e7a-d9d1-4074-a802-4e9d7a297a6a","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1}]},{"guid":"import-1189217471366c5a15","title":"Patent Party","subtitle":null,"slug":"19C3-411-patent-party","link":"http://www.ccc.de/congress/2002/fahrplan/event/411.en.html","description":"Software-Patente bedrohen den gesamten IT-Mittelstand existenziell.\n\nWer proprietäre Software schreibt, kann hoffen, übersehen zu werden. Das ist dann wie Autofahren ohne Sicherheitsgurt: *Meistens* passiert nichts. Wer sich hingegen für Freie Software einsetzt, steht ganz oben auf der Abschußliste.\n\nProblem: Bislang hat sich dies alles noch nicht ins Bewußtsein der Öffentlichkeit vorgearbeitet.\n\nLösung: Wir machen eine Party draus. :-)\n\nAlle Programmierer sind übrigens bereits jetzt dazu eingeladen, sich an einem Patentverletzungsprogrammierwettbewerb [4] zu beteiligen.\n\nNoch ist die Teilnahme übrigens freiwillig. Wenn jedoch Software-Patente in Europa Wirklichkeit werden, nimmt jeder Programmierer automatisch an dem dann stattfindenden atentverletzungsprogrammierwettbewerb teil, ob er will oder nicht. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":28,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2023-09-13T22:30:04.336+02:00","length":9453,"duration":9453,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-411-patent-party.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-411-patent-party_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-1189217471366c5a15-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-1189217471366c5a15-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-411-patent-party","url":"https://api.media.ccc.de/public/events/import-1189217471366c5a15","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":718,"event_guid":"import-7624c4fe48560c1db5","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":1},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":2},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":2},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1169,"event_guid":"import-b911d815ea63e3bd2f","weight":1},{"event_id":1182,"event_guid":"import-3ee182cd32660abeb3","weight":1},{"event_id":1195,"event_guid":"import-85f6ed1f7f99a5a228","weight":1},{"event_id":1197,"event_guid":"import-0cb4adc089215fd488","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":2},{"event_id":1764,"event_guid":"PuDWTZPratvP-gVrrPScWQ","weight":1},{"event_id":4221,"event_guid":"c4980da2-60ad-459f-a375-3db135641d9f","weight":1},{"event_id":4367,"event_guid":"f284b8f1-f27b-466e-9084-c3de794f8fd3","weight":1}]},{"guid":"import-93ad379cd4c23b73b5","title":"Quantenkryptographie","subtitle":null,"slug":"19C3-382-quantenkryptographie","link":"http://www.ccc.de/congress/2002/fahrplan/event/382.en.html","description":"One of the fundamental laws of quantum mechanics, the Heisenberg uncertainty relation, tells us that every quantum measurement significantly influences the observed system. Thus Quantum Cryptography can guarantee secure communication between Alice (transmitter) and Bob (receiver). In our experiment we show that it is possible to perform Quantum Cryptography not only in laboratory demonstration experiments but also in a small and user friendly setup which can be used on everybodysw's desk for secure communication.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":144,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-17T18:00:04.219+01:00","length":6273,"duration":6273,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-382-quantenkryptographie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-382-quantenkryptographie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-93ad379cd4c23b73b5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-93ad379cd4c23b73b5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-382-quantenkryptographie","url":"https://api.media.ccc.de/public/events/import-93ad379cd4c23b73b5","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":3},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":8},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":3},{"event_id":781,"event_guid":"import-777375527796871e60","weight":3},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":4},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":4},{"event_id":2059,"event_guid":"1oeeHOhsxwY6RF09x5sGMw","weight":7},{"event_id":2866,"event_guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","weight":4},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":4}]},{"guid":"import-dcf334af1c126ddf07","title":"TCPA","subtitle":null,"slug":"19C3-366-tcpa","link":"http://www.ccc.de/congress/2002/fahrplan/event/366.en.html","description":"TCPA und Palladium bedrohen die Wissensgesellschaft in fundamentaler Weise. Neben den wirtschaftlichen und gesellschaftlichen Folgen diskutieren wir in diesem Vortrag auch die kryptograpischen und netzwerktechnischen Problemen. Selbst, wenn Microsoft moralisch gut und edel wäre und zum ersten Male überhaupt fehlerfreien Code produzieren würde, wären die Folgen für die Informationsgesellschaft verheerend.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":42,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-13T23:45:07.256+02:00","length":6980,"duration":6980,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-366-tcpa.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-366-tcpa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-dcf334af1c126ddf07-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-dcf334af1c126ddf07-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-366-tcpa","url":"https://api.media.ccc.de/public/events/import-dcf334af1c126ddf07","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":2},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":1},{"event_id":732,"event_guid":"import-19fc7a9e94509e5fe4","weight":1},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":1},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":1},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":1},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":770,"event_guid":"import-45631ec4e36434bfcc","weight":1},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":778,"event_guid":"import-c736b4398a8616a7e5","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":2},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":785,"event_guid":"import-5a1d49359193696c0a","weight":1},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":1},{"event_id":795,"event_guid":"import-4fe70f274d636f9fcb","weight":1},{"event_id":799,"event_guid":"import-eb8873e1925f207dc7","weight":1},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":1},{"event_id":977,"event_guid":"import-7066236907169c00ee","weight":1},{"event_id":1587,"event_guid":"import-a54618b083eeb9fc4d","weight":1},{"event_id":1684,"event_guid":"import-563270facd1ec3ab80","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":3163,"event_guid":"E77Wt8LD3UInw6PneAOiUw","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":1}]},{"guid":"import-aef220e2a9fcc65152","title":"EU-Urheberrechtslinie, deutsche Implementierung und Auswirkungen auf die Informationsfreiheit","subtitle":null,"slug":"19C3-479-eu-urheberrechtslinie","link":"http://www.ccc.de/congress/2002/fahrplan/event/479.en.html","description":"Zwei WIPO-Verträge von 1996 bildeten den Auftakt, um das Urheberrecht auf die Höhe der digitalen Zeiten zu bringen. Der US-amerikanische DMCA von 1998 war ihre erste Umsetzung in nationales Recht. In Europa bildet die Urheberrechtsrichtlinie von 2001 den Rahmen für die Implementierung. Die deutsche Novelle wird voraussichtlich im Februar 2003 verabschiedet.\n\nIm Kern der Novellierung steht ein Sonderschutz für \"technische Maßnahmen\" zur Nutzungskontrolle, besser bekannt als \"Digital Restrictions Management\". Wie funktioniert dieses Lex DRM und welche Auswirkungen wird es auf die Informationsfreiheiten haben? \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":29,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-12-15T17:00:03.193+01:00","length":3804,"duration":3804,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-479-eu-urheberrechtslinie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-479-eu-urheberrechtslinie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-aef220e2a9fcc65152-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-aef220e2a9fcc65152-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-479-eu-urheberrechtslinie","url":"https://api.media.ccc.de/public/events/import-aef220e2a9fcc65152","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":883,"event_guid":"import-7b2f4e2357361a251e","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":980,"event_guid":"import-bc2aaf07ba36dce54b","weight":1},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":1},{"event_id":2223,"event_guid":"nH8WWBIPmElTIWVCbrjcrg","weight":1},{"event_id":2278,"event_guid":"d8fb48bd-c5af-45fe-b942-3a55a7681d8f","weight":1},{"event_id":2283,"event_guid":"47f2e2cd-46a7-412e-9784-8eabd1ad7867","weight":1},{"event_id":2287,"event_guid":"8a908634-6d94-4183-beaf-9bfb3f82648c","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":1},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":1},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":1},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":1},{"event_id":4776,"event_guid":"825add58-9218-4afe-a489-4dd8c4408e45","weight":1},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":1},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":4822,"event_guid":"3ab79865-b681-4d61-8ac5-6d8aa4678d08","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":6507,"event_guid":"787007cf-828d-4409-94b0-90a0b8d727a0","weight":1},{"event_id":6553,"event_guid":"a667d070-483e-4e2b-9bf9-d9a5475b6356","weight":1}]},{"guid":"import-d3655889f2e0e90149","title":"Pop Culture and Media Hacking","subtitle":null,"slug":"19C3-440-pop-culture-and-media-hacking","link":"http://www.ccc.de/congress/2002/fahrplan/event/440.en.html","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":55,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-27T21:45:06.509+01:00","length":2506,"duration":2506,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-440-pop-culture-and-media-hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-440-pop-culture-and-media-hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-d3655889f2e0e90149-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-d3655889f2e0e90149-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-440-pop-culture-and-media-hacking","url":"https://api.media.ccc.de/public/events/import-d3655889f2e0e90149","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":3},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":718,"event_guid":"import-7624c4fe48560c1db5","weight":1},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":1},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":1},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":1},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":1},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":1407,"event_guid":"import-aa97ee865d5e945700","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1809,"event_guid":"tbP0pE8M3Do-9jVyC04sXg","weight":1},{"event_id":1841,"event_guid":"wX415KPkBVf8zeBPWdqT2Q","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":1}]},{"guid":"import-26327c95883d3939d5","title":"Intro zu X86_64 und IA64 Architektur und Assembler","subtitle":null,"slug":"19C3-494-x86_64-ia64-architecture","link":"http://www.ccc.de/congress/2002/fahrplan/event/494.en.html","description":"Zwei neue Computer-Architekturen zeichnen sich am Horizont ab. x86_64 ist AMDs Hammer und IA64 ist Intels Itanic^Hum. Was zeichnet diese Architekturen aus, was sollte man als Assembler-Hacker über sie wissen?\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":245,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-08T07:45:05.940+01:00","length":3132,"duration":3132,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-494-x86_64-ia64-architecture.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-494-x86_64-ia64-architecture_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-26327c95883d3939d5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-26327c95883d3939d5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-494-x86_64-ia64-architecture","url":"https://api.media.ccc.de/public/events/import-26327c95883d3939d5","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":646,"event_guid":"import-7af3c11a86c7ca7fca","weight":5},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":5},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":5},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":5},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":2},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":5},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":4},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":2},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":2},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":4},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":4}]},{"guid":"import-ebd04c7e96a2a62450","title":"one time crypto (480)","subtitle":null,"slug":"19C3-480-one-time-crypto","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":142,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-17T19:45:07.492+01:00","length":3096,"duration":3096,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-480-one-time-crypto.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-480-one-time-crypto_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ebd04c7e96a2a62450-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ebd04c7e96a2a62450-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-480-one-time-crypto","url":"https://api.media.ccc.de/public/events/import-ebd04c7e96a2a62450","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":4},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":2},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":5},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":6},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":3},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":2},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":2},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":3},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":2},{"event_id":770,"event_guid":"import-45631ec4e36434bfcc","weight":2},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":3},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":2},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":2},{"event_id":1764,"event_guid":"PuDWTZPratvP-gVrrPScWQ","weight":2}]},{"guid":"import-34ae371136afd59188","title":"Distributed Computing Panel","subtitle":null,"slug":"19C3-491-distributed-computing","link":"http://www.ccc.de/congress/2002/fahrplan/event/491.en.html","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":29,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-28T02:15:03.787+01:00","length":12051,"duration":12051,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-491-distributed-computing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-491-distributed-computing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-34ae371136afd59188-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-34ae371136afd59188-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-491-distributed-computing","url":"https://api.media.ccc.de/public/events/import-34ae371136afd59188","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":2},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":2},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":2},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":3},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":3},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":3},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":3},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":2},{"event_id":799,"event_guid":"import-eb8873e1925f207dc7","weight":2},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":2}]},{"guid":"import-3d2fea9bd42aa8754d","title":"TCP/IP für Anfänger","subtitle":null,"slug":"19C3-433-tcp-ip-fuer-anfaenger","link":"http://www.ccc.de/congress/2002/fahrplan/event/433.en.html","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":700,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-04T15:15:10.736+01:00","length":3647,"duration":3647,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-433-tcp-ip-fuer-anfaenger.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-433-tcp-ip-fuer-anfaenger_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-3d2fea9bd42aa8754d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-3d2fea9bd42aa8754d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-433-tcp-ip-fuer-anfaenger","url":"https://api.media.ccc.de/public/events/import-3d2fea9bd42aa8754d","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":3},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":3},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":9},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":9},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":20},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":4},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":9},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":5},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":5},{"event_id":722,"event_guid":"import-5826515db01b0b0b87","weight":3},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":3},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":8},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":5},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":4},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":4},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":6},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":4},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":2},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":2},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":6},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":5},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":12},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":8},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":4},{"event_id":781,"event_guid":"import-777375527796871e60","weight":6},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":4},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":5},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":4},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":4},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":2},{"event_id":1778,"event_guid":"7abembel5Nwrd3h_pRjeOQ","weight":4},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":3},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":2},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":3},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":2}]},{"guid":"import-c737c39b1b07cb8799","title":"icann status quo (430)","subtitle":null,"slug":"19C3-430-icann-status-quo","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":32,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-02-22T17:00:06.880+01:00","length":3353,"duration":3353,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-430-icann-status-quo.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-430-icann-status-quo_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-c737c39b1b07cb8799-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-c737c39b1b07cb8799-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-430-icann-status-quo","url":"https://api.media.ccc.de/public/events/import-c737c39b1b07cb8799","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":2},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":741,"event_guid":"import-d3655889f2e0e90149","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":3},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":1},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":775,"event_guid":"import-b6cd88dc4ad69cbd83","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":917,"event_guid":"import-2623e5399f12d9c994","weight":1},{"event_id":939,"event_guid":"import-af4384252d9f0d7190","weight":1},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3236,"event_guid":"3ed24374-7c3e-4d29-a13a-a0adb06e72f9","weight":1},{"event_id":4624,"event_guid":"9b01013a-2e85-3074-5c29-33a2f606f5a2","weight":1}]},{"guid":"import-b09161bd0e821fd4fc","title":"Spass mit Codeflow-Analyse","subtitle":null,"slug":"19C3-392-codeflow-analyse","link":"http://www.ccc.de/congress/2002/fahrplan/event/392.en.html","description":"Programme, die nur als Maschinencode vorliegen sind oft nicht leicht zu handhaben: beim Übersetzen des noch verständlichen Sourcecodes gibt es zu viele Möglichkeiten durch Optimierungen die Struktur des Programmes zu verklären. Wir versuchen diese Struktur teilweise wieder zu gewinnen, darzustellen und für unsere Zwecke aufzubereiten.\n\nDabei wird zunächst der Maschinencode von IA32/Linux ELF Binärdateien disassembliert, mit Hilfe einer selbstentwickelten Disassembler-Library, deren Aufbau kurz erläutert wird. Die einzelnen Instruktionen werden danach mittels Trace-Verfahren in strukturellen Einheiten (basic blocks) zusammengefasst, zwischen denen der Codeflow analysiert werden kann.\n\nAls Anwendung dieser Techniken zeigen wir zuerst das Fingerprinten von Funktionen. Dies nutzen wir zum Erkennung und Verändern von Schutzcode im Kernel (am Beispiel des StMichael Kernel \"Schutz\"-Modules). Weiter betrachten wir die Möglichkeiten bestimmte Aussagen über den Control-Flow zu machen, die für versteckte Backdoors genutzt werden können. Die Erkenntnisse daraus verwenden wir anschliessend um beliebigen Programmcode in einem anderen Programm an optimalen Stellen einzubauen.\n\nAm Ende des Vortrages wird der Quellcode unter einer nicht-restriktiven Lizens veröffentlicht (LGPL, GPL, BSD oder so).\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":69,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-03T01:15:19.474+01:00","length":5871,"duration":5871,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-392-codeflow-analyse.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-392-codeflow-analyse_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-b09161bd0e821fd4fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-b09161bd0e821fd4fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-392-codeflow-analyse","url":"https://api.media.ccc.de/public/events/import-b09161bd0e821fd4fc","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":2},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":3},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":2},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":2},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":3},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":2}]},{"guid":"import-ec30852f5b7122171e","title":"Security Nightmares III","subtitle":null,"slug":"19C3-434-security-nightmares","link":"http://www.ccc.de/congress/2002/fahrplan/event/434.en.html","description":"Der Vortrag präsentiert aktuelle technische Entwicklungen, die ein Garant für kommende Verwicklungen und Enthüllen zu sein scheinen. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":1466,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-05T18:30:06.548+02:00","length":3717,"duration":3717,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-434-security-nightmares.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-434-security-nightmares_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ec30852f5b7122171e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ec30852f5b7122171e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-434-security-nightmares","url":"https://api.media.ccc.de/public/events/import-ec30852f5b7122171e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":9},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":36},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":24},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":14},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":19},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":30},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":9},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":6},{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":8},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":8},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":7},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":15},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":12},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":6},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":73},{"event_id":781,"event_guid":"import-777375527796871e60","weight":10},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":23},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":5},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":14},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":14},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":9},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":7},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":12},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":9},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":12},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":7},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":9},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":6},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":10},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":8},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":10},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":6},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":14},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":16}]},{"guid":"import-ea2c94e6b14d7bed0e","title":"Freedom CPU : Year 4","subtitle":null,"slug":"19C3-498-freedom-cpu","link":"http://www.ccc.de/congress/2002/fahrplan/event/498.en.html","description":"F-CPU is not dead : it is stable since 2000 and some source code exists. The VHDL tool chain problems are slowly solved and new software is written : the goal of designing a microprocessor only with Free Software is not utopic anymore. Some french F-CPU contributors will present a few architectural aspects, some code examples and the available (incomplete) software suite.\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":89,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-03T00:30:22.150+01:00","length":3355,"duration":3355,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-498-freedom-cpu.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-498-freedom-cpu_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-ea2c94e6b14d7bed0e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-ea2c94e6b14d7bed0e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-498-freedom-cpu","url":"https://api.media.ccc.de/public/events/import-ea2c94e6b14d7bed0e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":2},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":2},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":3},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":3},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":4},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":3},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":2},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":2},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":3}]},{"guid":"import-8e036a3b313a2fc755","title":"EC-Kartenunsicherheit","subtitle":null,"slug":"19C3-426-ec-karten-unsicherheit","link":"http://www.ccc.de/congress/2002/fahrplan/event/426.en.html","description":"Auch im Jahr 2002 erreichten den CCC wieder unzählige Anfragen von Bankkunden, die sich nach Entwendung ihrer EC-Karte mit dem Problem konfrontiert sahen, daß ihnen nicht nur Geld vom Konto mithilfe der EC-Karte abgehoben wurde, sondern sich die jeweilige Hausbank auch noch auf den Standpunkt stellt, daß das EC-Karten Verfahren so sicher sei, daß der Dieb den PIN-Code unmöglich habe errechnen können und die mißbräuchlichen Abhebungen nur dadurch möglich geworden seien, daß der Kunde den PIN-Code zusammen mit der Karte aufbewahrt habe - und somit seine Sorgfaltspflicht verletzt habe.\n\nKurz: der Kunde soll für die mißbräuchlichen Abhebungen oftmals bezahlen, wenn er nicht nachweisen kann, daß er seiner Sorgfaltspflicht nachgekommen ist.\n\nIn diesem kleinen Workshop tragen wir noch einmal die Geschichte des EC-Karten Verfahrens zusammen, berichten über die diversen Möglichkeiten für kriminelle Akteure, sich den PIN-Code zu verschaffen und beleuchten die vergangenen und aktuellen technischen Entwicklungen rund um das EC-Karten bzw. Maestro-System. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":184,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-04T23:00:05.525+02:00","length":3796,"duration":3796,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-426-ec-karten-unsicherheit.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-426-ec-karten-unsicherheit_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8e036a3b313a2fc755-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8e036a3b313a2fc755-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-426-ec-karten-unsicherheit","url":"https://api.media.ccc.de/public/events/import-8e036a3b313a2fc755","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":7},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":2},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":2},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":3},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":3},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":3},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":2},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":2},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":3}]}]}