{"acronym":"21c3","aspect_ratio":"4:3","updated_at":"2026-03-10T08:45:08.824+01:00","title":"21C3: The Usual Suspects","schedule_url":null,"slug":"congress/2004","event_last_released_at":"2008-01-19T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2004","logo_url":"https://static.media.ccc.de/media/congress/2004/folder-21c3.png","images_url":"https://static.media.ccc.de/media/congress/2004","recordings_url":"https://cdn.media.ccc.de/congress/2004","url":"https://api.media.ccc.de/public/conferences/21c3","events":[{"guid":"import-21a7d876450c6cf8e6","title":"Thriller","subtitle":null,"slug":"Thriller","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["21c3"],"view_count":18,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2023-10-26T18:45:02.792+02:00","length":731,"duration":731,"thumb_url":"https://static.media.ccc.de/media/congress/2004/bonus/Thriller.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/bonus/Thriller_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-21a7d876450c6cf8e6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-21a7d876450c6cf8e6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Thriller","url":"https://api.media.ccc.de/public/events/import-21a7d876450c6cf8e6","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":3},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":2},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":2}]},{"guid":"import-cf1820bec95269f63d","title":"Opening Event","subtitle":"Let the games begin...","slug":"249_Opening_Event","link":"http://www.ccc.de/congress/2004/fahrplan/event/249.en.html","description":"Opening ceremony of 21C3. Introduction to the Congress schedule, lectures and facilities.\n","original_language":"eng","persons":["Tim Pritlove","Jens Ohlig"],"tags":["21c3"," General"],"view_count":4,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:39.147+02:00","length":884,"duration":884,"thumb_url":"https://static.media.ccc.de/media/congress/2004/249 Opening Event.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/249 Opening Event_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-cf1820bec95269f63d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-cf1820bec95269f63d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/249_Opening_Event","url":"https://api.media.ccc.de/public/events/import-cf1820bec95269f63d","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1}]},{"guid":"import-b822e547f12d286095","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-Piepie","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:51.758+02:00","length":263,"duration":263,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Piepie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Piepie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-b822e547f12d286095-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-b822e547f12d286095-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-Piepie","url":"https://api.media.ccc.de/public/events/import-b822e547f12d286095","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-761d71dcd5912fa78e","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-Liquid_Democracy_Voting_Machines_in_Brazil","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:00.079+02:00","length":453,"duration":453,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Liquid Democracy Voting Machines in Brazil.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Liquid Democracy Voting Machines in Brazil_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-761d71dcd5912fa78e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-761d71dcd5912fa78e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-Liquid_Democracy_Voting_Machines_in_Brazil","url":"https://api.media.ccc.de/public/events/import-761d71dcd5912fa78e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-c00de1759015484068","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-muttng","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":3,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:16.737+02:00","length":249,"duration":249,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-muttng.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-muttng_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c00de1759015484068-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c00de1759015484068-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-muttng","url":"https://api.media.ccc.de/public/events/import-c00de1759015484068","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-97bb78e3135b8f2073","title":"Internet censorship in China","subtitle":null,"slug":"045_Internet_Censorship_in_China","link":"http://www.ccc.de/congress/2004/fahrplan/event/45.en.html","description":"A look at the technical, political and cultural backgound of the Great Firewall of China. Practical tips for travellers to China on how to circumvent censorship and ideas on how Chinese cyber-culture may be different.\n","original_language":"eng","persons":[],"tags":["21c3"," Society"],"view_count":3,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:29.138+02:00","length":2615,"duration":2615,"thumb_url":"https://static.media.ccc.de/media/congress/2004/045 Internet Censorship in China.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/045 Internet Censorship in China_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-97bb78e3135b8f2073-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-97bb78e3135b8f2073-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/045_Internet_Censorship_in_China","url":"https://api.media.ccc.de/public/events/import-97bb78e3135b8f2073","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-8d9e61b46e671e228e","title":"Zufallszahlengeneratoren","subtitle":null,"slug":"049_Zufallszahlengeneratoren","link":"http://www.ccc.de/congress/2004/fahrplan/event/49.en.html","description":"Vorgestellt werden Verfahren und Schaltpläne sowie Hardware zum Erzeugen von Zufallszahlen und zugehörige mathematische Beweise. Im Mittelpunkt stehen Zufallszahlengeneratoren, die auf dem zentralen Grenzwertsatz basieren und sich auch für schnelle Anwendungen wie Rausch-Radar eignen. Einige dieser Generatoren werden auch gezeigt und vorgeführt.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":5,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:40.184+02:00","length":2019,"duration":2019,"thumb_url":"https://static.media.ccc.de/media/congress/2004/049 Zufallszahlengeneratoren.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/049 Zufallszahlengeneratoren_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-8d9e61b46e671e228e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-8d9e61b46e671e228e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/049_Zufallszahlengeneratoren","url":"https://api.media.ccc.de/public/events/import-8d9e61b46e671e228e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":2},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":2},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":2},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":2}]},{"guid":"import-5ee13c48e9859449de","title":"Pirate Radio","subtitle":"Running a Station and Staying on the Air","slug":"141_Pirate_Radio","link":"http://www.ccc.de/congress/2004/fahrplan/event/141.en.html","description":"Pirate radio DJs ZT and b9punk will discuss the Whats, Hows and Whys of starting your own station, including a technical overview of what is required to get on the air, legal concerns, and the philosophy and social relevance of the movement as a whole.\n","original_language":"eng","persons":["b9punk"],"tags":["21c3"," Community"],"view_count":6,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:45.071+02:00","length":2598,"duration":2598,"thumb_url":"https://static.media.ccc.de/media/congress/2004/141 Pirate Radio.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/141 Pirate Radio_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5ee13c48e9859449de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5ee13c48e9859449de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/141_Pirate_Radio","url":"https://api.media.ccc.de/public/events/import-5ee13c48e9859449de","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":809,"event_guid":"import-7fc44374aacaa4ff10","weight":1},{"event_id":810,"event_guid":"import-3fea5c777527b01b1c","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1660,"event_guid":"import-87fe91710bd736fc78","weight":1},{"event_id":1740,"event_guid":"0IuyfNlW5fXVnrMIgEXesw","weight":1},{"event_id":1778,"event_guid":"7abembel5Nwrd3h_pRjeOQ","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1}]},{"guid":"import-3a4109a3ae368e3b29","title":"Protesting in the new Millenium","subtitle":"The Use of Electronic Communications to Protest","slug":"138_Protesting_in_the_new_Millenium","link":"http://www.ccc.de/congress/2004/fahrplan/event/138.en.html","description":"Emmanuel Goldstein describes the changing times in the United States. While hackers were always looked upon with suspicion, they are now seen as a very definite threat on the order of terrorists. Add activism into the mix and there's no end to the potential for trouble.\n","original_language":"eng","persons":["Emmanuel Goldstein"],"tags":["21c3"," Society"],"view_count":2,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:56.813+02:00","length":3409,"duration":3409,"thumb_url":"https://static.media.ccc.de/media/congress/2004/138 Protesting in the new Millenium.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/138 Protesting in the new Millenium_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-3a4109a3ae368e3b29-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-3a4109a3ae368e3b29-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/138_Protesting_in_the_new_Millenium","url":"https://api.media.ccc.de/public/events/import-3a4109a3ae368e3b29","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":824,"event_guid":"import-64c7badad4a7f2761e","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":1513,"event_guid":"import-2be92c4b683e5c9a1c","weight":1}]},{"guid":"import-52afc66c4fe5654a0d","title":"Das Literarische Code-Quartett","subtitle":null,"slug":"097_Das_Literarische_Code-Quartett","link":"http://www.ccc.de/congress/2004/fahrplan/event/97.en.html","description":"Die Parallelen bei Software und Büchern gehen von dem kreativen Schaffensprozeß über Konsumverhalten, Entlohnung bis zu Fragen wie Lizenzen und Verwertungsmodelle.  Wir werden das dieses Jahr noch etwas weiter treiben, indem wir analog zur bekannten Fernsehsendung besonders prägnante Codestücke auf der Bühne mit Publikum kritisieren werden.\n","original_language":"eng","persons":[],"tags":["21c3"," Culture"],"view_count":29,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:24.601+02:00","length":3430,"duration":3430,"thumb_url":"https://static.media.ccc.de/media/congress/2004/097 Das Literarische Code-Quartett.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/097 Das Literarische Code-Quartett_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-52afc66c4fe5654a0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-52afc66c4fe5654a0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/097_Das_Literarische_Code-Quartett","url":"https://api.media.ccc.de/public/events/import-52afc66c4fe5654a0d","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":3},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":4},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":2}]},{"guid":"import-c37d6e2bd9f4f412fa","title":"Toll Collect","subtitle":null,"slug":"046_Tollcollect","link":"http://www.ccc.de/congress/2004/fahrplan/event/46.en.html","description":"Technik und juristischer Hintergrund des Mautsystems ausgeleuchtet nach Stärken, Schwächen und dem Überwachungsauftrag.\n","original_language":"eng","persons":[],"tags":["21c3"," Society"],"view_count":6,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:29.620+02:00","length":3470,"duration":3470,"thumb_url":"https://static.media.ccc.de/media/congress/2004/046 Tollcollect.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/046 Tollcollect_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c37d6e2bd9f4f412fa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c37d6e2bd9f4f412fa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/046_Tollcollect","url":"https://api.media.ccc.de/public/events/import-c37d6e2bd9f4f412fa","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":2},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":3}]},{"guid":"import-7c99dcae00d6905772","title":"Trusted Computing","subtitle":null,"slug":"064_Trusted_Computing","link":"http://www.ccc.de/congress/2004/fahrplan/event/64.en.html","description":"Die Trusted Computer Group hat einen neuen Standard 1.2 angekündigt. Trotzdem sind nicht alle Probleme gelöst. Der Vortrag stellt die Entwicklungen des letzten Jahres vor und erklärt, was noch zu tun ist.\n","original_language":"eng","persons":[],"tags":["21c3"," Society"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:26.240+02:00","length":3562,"duration":3562,"thumb_url":"https://static.media.ccc.de/media/congress/2004/064 Trusted Computing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/064 Trusted Computing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7c99dcae00d6905772-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7c99dcae00d6905772-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/064_Trusted_Computing","url":"https://api.media.ccc.de/public/events/import-7c99dcae00d6905772","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1}]},{"guid":"import-700ce3e707006d5b53","title":"Lightning Talks: Subnetting in P2P systems","subtitle":null,"slug":"250_Lightning_Talk-Subnetting_in_P2P_systems","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":["Hanno Wagner"],"tags":["21c3"," General"],"view_count":4,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:42.409+02:00","length":310,"duration":310,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Subnetting in P2P systems.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Subnetting in P2P systems_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-700ce3e707006d5b53-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-700ce3e707006d5b53-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-Subnetting_in_P2P_systems","url":"https://api.media.ccc.de/public/events/import-700ce3e707006d5b53","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":1303,"event_guid":"import-8a69e7b1ee3f8cc625","weight":1}]},{"guid":"import-99c932bbb16b077ade","title":"Lightning Talks: Day 1","subtitle":null,"slug":"142_Lightning_Talk-Linuxclub_de","link":"http://www.ccc.de/congress/2004/fahrplan/event/142.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-19T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:40.024+02:00","length":258,"duration":258,"thumb_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Linuxclub.de.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Linuxclub.de_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-99c932bbb16b077ade-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-99c932bbb16b077ade-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/142_Lightning_Talk-Linuxclub_de","url":"https://api.media.ccc.de/public/events/import-99c932bbb16b077ade","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":200,"event_guid":"import-e6e7597a0d663e48ca","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":874,"event_guid":"import-06fe953d244caab474","weight":1}]},{"guid":"import-37bc554b396781f093","title":"The Art of Fingerprinting","subtitle":null,"slug":"013_The_Art_of_Fingerprinting","link":"http://www.ccc.de/congress/2004/fahrplan/event/13.en.html","description":"Fingerprinting is the art of extracting features from a resource and comparing it to a database to draw conclusions about the probed resource. We show the current state of the art of fingerprinting on all layers of the TCPstack, will evaluate existing tools and relase our own new fingerprinting engine.\n","original_language":"eng","persons":[],"tags":["21c3"," Science"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:28.009+02:00","length":3580,"duration":3580,"thumb_url":"https://static.media.ccc.de/media/congress/2004/013 The Art of Fingerprinting.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/013 The Art of Fingerprinting_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-37bc554b396781f093-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-37bc554b396781f093-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/013_The_Art_of_Fingerprinting","url":"https://api.media.ccc.de/public/events/import-37bc554b396781f093","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":838,"event_guid":"import-c1686d2fd8b7d767ee","weight":1},{"event_id":868,"event_guid":"import-d76842c2e07bb3bb29","weight":1}]},{"guid":"import-e3bf427a6d2ffaa0a2","title":"CCC-Jahresrückblick","subtitle":null,"slug":"055_CCC-Jahresrueckblick","link":"http://www.ccc.de/congress/2004/fahrplan/event/55.en.html","description":"Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen an denen CCC-Vertreter teilgenommen haben.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":86,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:25.937+02:00","length":3307,"duration":3307,"thumb_url":"https://static.media.ccc.de/media/congress/2004/055 CCC-Jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/055 CCC-Jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e3bf427a6d2ffaa0a2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e3bf427a6d2ffaa0a2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/055_CCC-Jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-e3bf427a6d2ffaa0a2","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":3},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":3},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":3},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":2},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":2},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":5},{"event_id":1186,"event_guid":"import-dbafd960390d3c1330","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":3}]},{"guid":"import-bc7febd16b387304be","title":"Passive covert channels in the Linux kernel","subtitle":"Implementation and detection of kernel based backdoors and covert channels in Linux kernels","slug":"176_Passive_covert_channels_in_the_Linux_kernel","link":"http://www.ccc.de/congress/2004/fahrplan/event/176.en.html","description":"The presentation will describe the idea of passive covert channels (PCC). By passive covert channels, one means a specific kind of CC, which does not generate its own traffic. A PCC only changes some fields in the packets generated by a legitimate user (or processes) of the compromised host. For example, a PCC can be implemented as a kernel module which will change the Initial Sequence Number (ISN) in all (or only some) outgoing TCP connections. The new ISNs will carry the secret message, which could be, for example, the password sniffed by malicious software running on the compromised machine.\n","original_language":"eng","persons":["Joanna Rutkowska"],"tags":["21c3"," Hacking"],"view_count":6,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:21:26.646+02:00","length":6951,"duration":6951,"thumb_url":"https://static.media.ccc.de/media/congress/2004/176 Passive covert channels in the Linux kernel.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/176 Passive covert channels in the Linux kernel_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-bc7febd16b387304be-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-bc7febd16b387304be-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/176_Passive_covert_channels_in_the_Linux_kernel","url":"https://api.media.ccc.de/public/events/import-bc7febd16b387304be","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":809,"event_guid":"import-7fc44374aacaa4ff10","weight":1},{"event_id":810,"event_guid":"import-3fea5c777527b01b1c","weight":1},{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1}]},{"guid":"import-7aa2cbc85d76bb4f02","title":"Recent features to OpenBSD: ntpd and bgpd","subtitle":null,"slug":"051_Recent_features_to_OpenBSD-ntpd_and_bgpd","link":"http://www.ccc.de/congress/2004/fahrplan/event/51.en.html","description":"The talk will introduce some of the recent changes in the OpenBSD operating system, namely the introduction of bgpd, a free BGP implementation and OpenNTPD, a free NTP implementation. Using those concrete examples, Henning Brauer will point out important DOs and DONTs for writing scalable and secure network daemons.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":0,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:17.769+02:00","length":2617,"duration":2617,"thumb_url":"https://static.media.ccc.de/media/congress/2004/051 Recent features to OpenBSD-ntpd and bgpd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/051 Recent features to OpenBSD-ntpd and bgpd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7aa2cbc85d76bb4f02-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7aa2cbc85d76bb4f02-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/051_Recent_features_to_OpenBSD-ntpd_and_bgpd","url":"https://api.media.ccc.de/public/events/import-7aa2cbc85d76bb4f02","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-06fe953d244caab474","title":"Closing Event","subtitle":"So long and thanks for all the fish","slug":"173_Closing_Event","link":"http://www.ccc.de/congress/2004/fahrplan/event/173.en.html","description":"The final get-together looking back at three days of genuine hacking experience at bcc. 21C3 tried to reinvent the Congress in a couple of ways. Did we succeed? Could we do better? Of course we can, but looking ahead to 22C3 should bring us finally on the road to a true international event that serves the community as one of the best and funniest events on this planet.\n","original_language":"eng","persons":["Tim Pritlove"],"tags":["21c3"," General"],"view_count":52,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:33.879+02:00","length":1813,"duration":1813,"thumb_url":"https://static.media.ccc.de/media/congress/2004/173 Closing Event.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/173 Closing Event_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-06fe953d244caab474-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-06fe953d244caab474-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/173_Closing_Event","url":"https://api.media.ccc.de/public/events/import-06fe953d244caab474","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":16,"event_guid":"import-539bcb7fe84721a1b5","weight":1},{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":200,"event_guid":"import-e6e7597a0d663e48ca","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":810,"event_guid":"import-3fea5c777527b01b1c","weight":1},{"event_id":817,"event_guid":"import-c865fbf5a8d13de458","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":3},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":895,"event_guid":"import-99c932bbb16b077ade","weight":1},{"event_id":1974,"event_guid":"5015774f62abf360","weight":1},{"event_id":2469,"event_guid":"f76a7853-6dfa-4294-81b6-1b37a9632b67","weight":1},{"event_id":2481,"event_guid":"61faba33-5bfa-4c58-a864-d527c6f31b7d","weight":1},{"event_id":2506,"event_guid":"dcd095aa-67c7-4db0-8d95-1eea799da466","weight":1},{"event_id":3259,"event_guid":"e27f048b-bf94-5a87-a375-9f16985adc5f","weight":1}]},{"guid":"import-0471982425cb8af2ac","title":"Phishing the Web","subtitle":null,"slug":"016_Phishing_the_Web","link":"http://www.ccc.de/congress/2004/fahrplan/event/16.en.html","description":"Phishing became a serious problem in 2004 with media coverage even in non-technical context. The lecture will gather the incidents, shows common attacks-techniques and tries to give a prognosis for the near future.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:51.046+02:00","length":2445,"duration":2445,"thumb_url":"https://static.media.ccc.de/media/congress/2004/016 Phishing the Web.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/016 Phishing the Web_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-0471982425cb8af2ac-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-0471982425cb8af2ac-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/016_Phishing_the_Web","url":"https://api.media.ccc.de/public/events/import-0471982425cb8af2ac","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1}]},{"guid":"import-0f3021b09bdc4b986b","title":"Sicherheit bei VoIP-Systemen, eine Einführung","subtitle":null,"slug":"015_Sicherheit_bei_VoIP-Systemen","link":"http://www.ccc.de/congress/2004/fahrplan/event/15.en.html","description":"Der Vortrag beschäftigt sich mit Sicherheit von VoIP, einem Stiefkind der Entwicklung rund um diese neue Killerapplikation. Es wird versucht, einen Überblick über bestehende Produkte und Lösungen zu geben und aufzuzeigen, welche Sicherheit heute (noch nicht) geboten wird. Neben der Betrachtung der Protokolle SIP, IAX, H.323 und SCCP folgt auch ein Überblick über ausgewählte Produkte mit hoher Marktdurchdringung (Cisco CallManager, Asterisk...)\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:14.504+02:00","length":2732,"duration":2732,"thumb_url":"https://static.media.ccc.de/media/congress/2004/015 Sicherheit bei VoIP-Systemen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/015 Sicherheit bei VoIP-Systemen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-0f3021b09bdc4b986b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-0f3021b09bdc4b986b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/015_Sicherheit_bei_VoIP-Systemen","url":"https://api.media.ccc.de/public/events/import-0f3021b09bdc4b986b","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1}]},{"guid":"import-5e76f5e34a08fd2102","title":"Lightning Talks: Stacksmashing Winner","subtitle":null,"slug":"250_Lightning_Talk-Stacksmashing_Winner","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":0,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:01.257+02:00","length":225,"duration":225,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Stacksmashing Winner.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Stacksmashing Winner_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5e76f5e34a08fd2102-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5e76f5e34a08fd2102-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-Stacksmashing_Winner","url":"https://api.media.ccc.de/public/events/import-5e76f5e34a08fd2102","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-79e2b2b739208e74c8","title":"Lightning Talks: Day 1","subtitle":null,"slug":"142_Lightning_Talk-Stacksmashing_Contest","link":"http://www.ccc.de/congress/2004/fahrplan/event/142.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:57.499+02:00","length":118,"duration":118,"thumb_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Stacksmashing Contest.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Stacksmashing Contest_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-79e2b2b739208e74c8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-79e2b2b739208e74c8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/142_Lightning_Talk-Stacksmashing_Contest","url":"https://api.media.ccc.de/public/events/import-79e2b2b739208e74c8","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-25e7da9a84d7431bdf","title":"SPAM Workshop","subtitle":"SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel von qmail","slug":"163_SPAM_Workshop","link":"http://www.ccc.de/congress/2004/fahrplan/event/163.en.html","description":"SPAM-Mails und virenverseuchte Mails von Zombie-Rechnern stellen für kleine und große Provider eine dauerhafte Herausforderung dar. Am Beispiel von qmail wird die Integration von einem mehrstufigem, modularen Anti-SPAM-Konzept erläutert. An welcher Stelle des \"Qmail-Big-Picture\" setzt welches Verfahren an, und warum ist dies alles nur Flickwerk? Bewußt werden eventuelle zukünftiger Standards noch nicht berücksichtigt, sondern nur derzeitig umsetzbare Möglichkeiten zur Kombination verschiedener Verfahren erklärt.\n","original_language":"eng","persons":["Sirko Zidlewitz"],"tags":["21c3"," Hacking"],"view_count":6,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:56.145+02:00","length":6640,"duration":6640,"thumb_url":"https://static.media.ccc.de/media/congress/2004/163 SPAM Workshop.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/163 SPAM Workshop_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-25e7da9a84d7431bdf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-25e7da9a84d7431bdf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/163_SPAM_Workshop","url":"https://api.media.ccc.de/public/events/import-25e7da9a84d7431bdf","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":2},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":898,"event_guid":"import-8aacd36995f77f7f3d","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1}]},{"guid":"import-3aae12cacdafcdcae7","title":"Biometrie überwinden","subtitle":null,"slug":"028_Biometrie_ueberwinden","link":"http://www.ccc.de/congress/2004/fahrplan/event/28.en.html","description":"In diesem Workshop werden biometrische Verfahren genauer beleuchtet werden. Er baut auf dem Vortrag \"Biometrie in Ausweisdokumententen\" auf.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":89,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:57.430+02:00","length":2931,"duration":2931,"thumb_url":"https://static.media.ccc.de/media/congress/2004/028 Biometrie ueberwinden.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/028 Biometrie ueberwinden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-3aae12cacdafcdcae7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-3aae12cacdafcdcae7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/028_Biometrie_ueberwinden","url":"https://api.media.ccc.de/public/events/import-3aae12cacdafcdcae7","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":2},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":5},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":2}]},{"guid":"import-a5e037ae18a0585a58","title":"Biometrie in Ausweisdokumenten","subtitle":null,"slug":"027_Biometrie_in_Ausweisdokumenten","link":"http://www.ccc.de/congress/2004/fahrplan/event/27.en.html","description":"Eine kurze Einführung in die Technik und ein Überblick über die zurückliegenden, gegenwärtigen und zukünftigen politischen Entscheidungen unter Berücksichtigung von Studien und Test zur Tauglichkeit vorraussichtlich verwendeter Systeme. Ziel ist es, aufzuzeigen, wie wenig die Systeme in den geplanten Einsatzszenarien den versprochenen Sicherheitsgewinn bringen. Im Anschluss wird es noch ein paar Vorführungen zur Überwindbarkeit der drei wichtigsten Systeme (Gesichtserkennung, Fingerabdruck und Iriserkennung) und eine offene Diskussion über die Politik und die Einstellung gegenüber der Technik geben.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":130,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:49.553+02:00","length":3402,"duration":3402,"thumb_url":"https://static.media.ccc.de/media/congress/2004/027 Biometrie in Ausweisdokumenten.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/027 Biometrie in Ausweisdokumenten_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a5e037ae18a0585a58-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a5e037ae18a0585a58-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/027_Biometrie_in_Ausweisdokumenten","url":"https://api.media.ccc.de/public/events/import-a5e037ae18a0585a58","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":3},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":3},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":3},{"event_id":817,"event_guid":"import-c865fbf5a8d13de458","weight":2},{"event_id":818,"event_guid":"import-bc28bda3e380385a9d","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":3},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":3},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":3},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":4},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":6},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":2}]},{"guid":"import-496dba1358b7997c25","title":"Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand","subtitle":"Untersuchung eines Austauschsystems für hochsensible personenbezogene Daten","slug":"307_Gesundheitskarte","link":"http://www.ccc.de/congress/2004/fahrplan/event/307.en.html","description":"Gerade für den Staat schreibt das Datenschutzgesetz strenge Schutz- und Vorsichtsmaßnahmen vor, wie mit persönlichen und personenbezogenen Daten umzugehen ist.  In der Praxis scheitern die meisten IT-Großprojekte der öffentlichen Hand schon vorher an anderen Sachen, aber wenn sie zur Fertigstellung kommen, wie geht man dann vor, um zu testen, wie so ein System mit den Daten umgeht?  Dieser Vortrag beleuchtet das an einem aktuellen Beispiel aus der Praxis.\n","original_language":"eng","persons":["ThoMaus"],"tags":["21c3"," Hacking"],"view_count":4,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:19:41.539+02:00","length":3864,"duration":3864,"thumb_url":"https://static.media.ccc.de/media/congress/2004/307 Gesundheitskarte.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/307 Gesundheitskarte_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-496dba1358b7997c25-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-496dba1358b7997c25-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/307_Gesundheitskarte","url":"https://api.media.ccc.de/public/events/import-496dba1358b7997c25","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1}]},{"guid":"import-c7588115cc796ab3e7","title":"The Blinking Suspects","subtitle":null,"slug":"058_The_Blinking_Suspects","link":"http://www.ccc.de/congress/2004/fahrplan/event/58.en.html","description":"Was gab es für blinkende Aktivitäten im Jahr 2004? Wie funktionieren die einzelnen Nachbau-Projekte und wie bekommt man sie ins eigene Wohnzimmer?\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":5,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:32.875+02:00","length":1871,"duration":1871,"thumb_url":"https://static.media.ccc.de/media/congress/2004/058 The Blinking Suspects.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/058 The Blinking Suspects_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c7588115cc796ab3e7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c7588115cc796ab3e7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/058_The_Blinking_Suspects","url":"https://api.media.ccc.de/public/events/import-c7588115cc796ab3e7","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":831,"event_guid":"import-d31ef9384f4b7266c8","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":2},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1}]},{"guid":"import-4104c4f713e1c17903","title":"Gentoo Hardened","subtitle":null,"slug":"123_Gentoo_Hardened","link":"http://www.ccc.de/congress/2004/fahrplan/event/123.en.html","description":"An introduction to the hardened toolchain used at the Hardened Gentoo project, which, combined with the PaX kernel, strong DAC/MAC control mechanisms and a thorough low-entry oriented user documentation provides \"full scale\" protection for a wide range from home users to enterprise businesses.\n","original_language":"eng","persons":["Pappy"],"tags":["21c3"," Hacking"],"view_count":6,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:18.208+02:00","length":3129,"duration":3129,"thumb_url":"https://static.media.ccc.de/media/congress/2004/123 Gentoo Hardened.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/123 Gentoo Hardened_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-4104c4f713e1c17903-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-4104c4f713e1c17903-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/123_Gentoo_Hardened","url":"https://api.media.ccc.de/public/events/import-4104c4f713e1c17903","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":2},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":3}]},{"guid":"import-afa9740fa6dfa5476b","title":"Mehr Sicherheit für HostAP-WLANs","subtitle":"WLANs mit Wi-Fi Protected Access (WPA) betreiben","slug":"146_Mehr_Sicherheit_fuer_HostAP-WLANs","link":"http://www.ccc.de/congress/2004/fahrplan/event/146.en.html","description":"Der HostAP Treiber wird für Prism 802.11b Karten unter Linux entwickelt. Er unterstützt den Betrieb im Master Modus. Damit lässt sich ein Access Point realisieren. Es soll gezeigt werden, wie dieser mit Security Features (WPA [PSK|EAP]) aufgerüstet werden kann.\n","original_language":"eng","persons":["Jan Fiegert"],"tags":["21c3"," Hacking"],"view_count":2,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:41.668+02:00","length":1777,"duration":1777,"thumb_url":"https://static.media.ccc.de/media/congress/2004/146 Mehr Sicherheit fuer HostAP-WLANs.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/146 Mehr Sicherheit fuer HostAP-WLANs_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-afa9740fa6dfa5476b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-afa9740fa6dfa5476b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/146_Mehr_Sicherheit_fuer_HostAP-WLANs","url":"https://api.media.ccc.de/public/events/import-afa9740fa6dfa5476b","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-d24d60d8726b688985","title":"How to find *anything* on the Web","subtitle":"Advanced internet searching strategies \u0026 \"wizard seeking\" tips","slug":"158_How_to_find_anything_on_the_web","link":"http://www.ccc.de/congress/2004/fahrplan/event/158.en.html","description":"Participants will be trained to become good \"seekers\". Techniques and tricks used for efficiently searching through the world wide web will be taught and search engines will be reviewed; in short: the hacker's approach to searching.\n","original_language":"eng","persons":["Fravia"],"tags":["21c3"," Hacking"],"view_count":32,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:30.986+02:00","length":5121,"duration":5121,"thumb_url":"https://static.media.ccc.de/media/congress/2004/158 How to find anything on the web.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/158 How to find anything on the web_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d24d60d8726b688985-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d24d60d8726b688985-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/158_How_to_find_anything_on_the_web","url":"https://api.media.ccc.de/public/events/import-d24d60d8726b688985","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":2},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":883,"event_guid":"import-7b2f4e2357361a251e","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1026,"event_guid":"import-aa49a5b7081faac804","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2855,"event_guid":"52706f90-a2f9-48be-a4c3-786257fce233","weight":1},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2915,"event_guid":"eb36c9f7-076a-45cc-ad66-ac97768e0c75","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3161,"event_guid":"4aeT8lX5EnteXRtPO9yYFA","weight":1}]},{"guid":"import-e848aa3a18f08fcdfa","title":"Der 2. Korb der Urheberrechtsnovelle","subtitle":null,"slug":"114_Der_2__Korb_der_Urheberrechtsnovelle","link":"http://www.ccc.de/congress/2004/fahrplan/event/114.en.html","description":"Die aktuellen Entwicklungen im Urheberrecht sollen beleuchtet und anschließend diskutiert werden.\n","original_language":"eng","persons":["Martin Kreißl","Markus Beckedahl"],"tags":["21c3"," Society"],"view_count":17,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:46.857+02:00","length":3324,"duration":3324,"thumb_url":"https://static.media.ccc.de/media/congress/2004/114 Der 2. Korb der Urheberrechtsnovelle.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/114 Der 2. Korb der Urheberrechtsnovelle_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e848aa3a18f08fcdfa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e848aa3a18f08fcdfa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/114_Der_2__Korb_der_Urheberrechtsnovelle","url":"https://api.media.ccc.de/public/events/import-e848aa3a18f08fcdfa","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":2},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":2},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2}]},{"guid":"import-243f70505a86f78f5f","title":"Hacker Jeopardy","subtitle":null,"slug":"074_Hacker-Jeopardy","link":"http://www.ccc.de/congress/2004/fahrplan/event/74.en.html","description":"Ein kurzweiliges Quiz in dem 9 Kandidaten aus den Reihen der Congress-Besucher ihr Hackertum unter Beweis stellen und versuchen, den Vorjahressieger von seinem Thron zu vertreiben.\n","original_language":"eng","persons":[],"tags":["21c3"," Culture"],"view_count":41,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:21:04.118+02:00","length":7805,"duration":7805,"thumb_url":"https://static.media.ccc.de/media/congress/2004/074 Hacker-Jeopardy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/074 Hacker-Jeopardy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-243f70505a86f78f5f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-243f70505a86f78f5f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/074_Hacker-Jeopardy","url":"https://api.media.ccc.de/public/events/import-243f70505a86f78f5f","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":781,"event_guid":"import-777375527796871e60","weight":7},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":3},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":2},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":3},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":3},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2}]},{"guid":"import-584a664d39c59ba70c","title":"Lightning Talks: IT security magazines","subtitle":null,"slug":"250_Lightning_Talk-IT_security_magazines_in_Europe","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:07.635+02:00","length":310,"duration":310,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-IT security magazines in Europe.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-IT security magazines in Europe_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-584a664d39c59ba70c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-584a664d39c59ba70c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-IT_security_magazines_in_Europe","url":"https://api.media.ccc.de/public/events/import-584a664d39c59ba70c","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-88982546e6a87804cc","title":"USB - Unbekannter Serieller Bus","subtitle":null,"slug":"080_USB-Unbekannter_Serieller_Bus","link":"http://www.ccc.de/congress/2004/fahrplan/event/80.en.html","description":"Der Vortrag erläutert die Funktionsweise von USB - vom Hardwareaufbau bis zu den Protokollen (jedoch nicht die Anwendungs-Protokolle der USB-Klassen). Am Ende wird als Beispiel eines selbstgebauten USB-Geräts - der HackerPort - vorgestellt.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":8,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:26.125+02:00","length":3068,"duration":3068,"thumb_url":"https://static.media.ccc.de/media/congress/2004/080 USB-Unbekannter Serieller Bus.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/080 USB-Unbekannter Serieller Bus_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-88982546e6a87804cc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-88982546e6a87804cc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/080_USB-Unbekannter_Serieller_Bus","url":"https://api.media.ccc.de/public/events/import-88982546e6a87804cc","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":2},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":2},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2}]},{"guid":"import-c865fbf5a8d13de458","title":"Computer und Robotik in Entenhausen","subtitle":null,"slug":"018_Computer_und_Robotik_in_Entenhausen","link":"http://www.ccc.de/congress/2004/fahrplan/event/18.en.html","description":"Schon Mitte der 50er Jahre experimentierte Daniel Düsentrieb mit unterschiedlichen Robotern und Dagobert Duck setzte Computer ein. Segen und Tücken der Technik werden vorgestellt - natürlich mit verschwenderischer Präsentation von Bildmaterial - und die Frage gestellt, ob nicht Düsentriebs Winzroboter \"Helferlein\" eigentlich die am besten funktionierende Erfindung Düsentriebs war und ist.\n","original_language":"eng","persons":[],"tags":["21c3"," Culture"],"view_count":55,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:33.732+02:00","length":3088,"duration":3088,"thumb_url":"https://static.media.ccc.de/media/congress/2004/018 Computer und Robotik in Entenhausen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/018 Computer und Robotik in Entenhausen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c865fbf5a8d13de458-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c865fbf5a8d13de458-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/018_Computer_und_Robotik_in_Entenhausen","url":"https://api.media.ccc.de/public/events/import-c865fbf5a8d13de458","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":4}]},{"guid":"import-75dd511530fcb882b6","title":"Aspects of Elliptic Curve Cryptography","subtitle":null,"slug":"078_Aspects_of_Elliptic_Curve_Cryptography","link":"http://www.ccc.de/congress/2004/fahrplan/event/78.en.html","description":"The talk will give an introduction to elliptic curve cryptography and explain some recent developments regarding attacks on the discrete logarithm problem on elliptic curves. In practice, elliptic curve cryptography can for example be employed in the TLS/SSL and IPsec protocols. It is well suited for use in constraint devices such as smart cards.\n","original_language":"eng","persons":[],"tags":["21c3"," Science"],"view_count":63,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:22.994+02:00","length":3533,"duration":3533,"thumb_url":"https://static.media.ccc.de/media/congress/2004/078 Aspects of Elliptic Curve Cryptography.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/078 Aspects of Elliptic Curve Cryptography_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-75dd511530fcb882b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-75dd511530fcb882b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/078_Aspects_of_Elliptic_Curve_Cryptography","url":"https://api.media.ccc.de/public/events/import-75dd511530fcb882b6","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":2},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":4},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":4},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2}]},{"guid":"import-317927cbb6b25c7035","title":"Secure Instant Messaging","subtitle":"Suppression of secure communications by governments","slug":"134_Secure_Instant_Messaging","link":"http://www.ccc.de/congress/2004/fahrplan/event/134.en.html","description":"The talk describes some of the current practices of Instant Messaging providers, and go over what makes some of the design choices better or worse, describing possible and known attacks against messaging protocols and suggest possible solutions to those problems. If possible a live demonstration of exploitation of AOLs Instant Messenger will be shown though a simple attack on DNS.\n","original_language":"eng","persons":["phar"],"tags":["21c3"," Hacking"],"view_count":3,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:55.369+02:00","length":2808,"duration":2808,"thumb_url":"https://static.media.ccc.de/media/congress/2004/134 Secure Instant Messaging.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/134 Secure Instant Messaging_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-317927cbb6b25c7035-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-317927cbb6b25c7035-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/134_Secure_Instant_Messaging","url":"https://api.media.ccc.de/public/events/import-317927cbb6b25c7035","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":1408,"event_guid":"import-b7cf56b6bbe50e728c","weight":1}]},{"guid":"import-78755f31c627cb2c61","title":"Spam-Politik","subtitle":"Politisch-rechtliche Bekämpfung unerwünschter Information","slug":"168_Spampolitik","link":"http://www.ccc.de/congress/2004/fahrplan/event/168.en.html","description":"Spam ist ein nicht einfach zu fassender Begriff. Unterschiedliche Perspektiven auf die spam-Phänomene, entgegenstehende Interessen und die Historie führen zu unterschiedlichen Problemdarstellung und schließlich Lösungsvorschlägen für die spam-Bekämpfung. Dieser widmet sich der Vortrag aus politischer Sicht, zeigt Akteure, ihre Ziele und Lösungen auf. Komplexer wird die spam-Bekämpfung dadurch, dass sie von Entwicklungen in anderen IT-Bereichen beeinflusst wird, wie auch diese auche eine Infrastruktur für andere  Zielsetzung - z.B. Lösungen für den Schutz von Verwertungsrechten - bieten kann.\n","original_language":"eng","persons":["Dirk Schmidt"],"tags":["21c3"," Society"],"view_count":3,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:42.604+02:00","length":3496,"duration":3496,"thumb_url":"https://static.media.ccc.de/media/congress/2004/168 Spampolitik.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/168 Spampolitik_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-78755f31c627cb2c61-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-78755f31c627cb2c61-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/168_Spampolitik","url":"https://api.media.ccc.de/public/events/import-78755f31c627cb2c61","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":841,"event_guid":"import-2b04e5dc1d9f2d9812","weight":1}]},{"guid":"import-e33afefda42fb6de03","title":"Practical Mac OS X Insecurity","subtitle":"Security Concepts, Problems, and Exploits on Your Mac","slug":"218_Practical_MacOS_X_Insecurities","link":"http://www.ccc.de/congress/2004/fahrplan/event/218.en.html","description":"Some recent security problems with Mac OS X stem from the fact that Apple tries to combine the Unix security model with easy and convient usability and closed source. Showing examples from our own research we will take you on a pleasant journey to get root on almost any recent Macintosh. And of course, there will be \"just one more thing\".\n","original_language":"eng","persons":["Angelo Laub"],"tags":["21c3"," Hacking"],"view_count":5,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:35.695+02:00","length":3136,"duration":3136,"thumb_url":"https://static.media.ccc.de/media/congress/2004/218 Practical MacOS X Insecurities.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/218 Practical MacOS X Insecurities_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e33afefda42fb6de03-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e33afefda42fb6de03-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/218_Practical_MacOS_X_Insecurities","url":"https://api.media.ccc.de/public/events/import-e33afefda42fb6de03","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":883,"event_guid":"import-7b2f4e2357361a251e","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":1186,"event_guid":"import-dbafd960390d3c1330","weight":1},{"event_id":2449,"event_guid":"cd793876-8f18-46cf-a28e-304e290ca3fd","weight":1},{"event_id":3614,"event_guid":"450d2481-6606-40fe-ba8b-7117d4724155","weight":1}]},{"guid":"import-241828382ede764577","title":"Weird Programming 2","subtitle":null,"slug":"077_Weird_Programming_2","link":"http://www.ccc.de/congress/2004/fahrplan/event/77.en.html","description":"Like in the last year, examples of strange programming (art)work will be shown. In addition to the funny and sportive disciplines known from last year, some examples of painful production code will be presented.\n\nWie letztes Jahr werden wieder beispielhaft grenzwertige Programmier- (kunst)werke beleuchtet. Neben den spassig-sportlichen \"Disziplinen\" werden diesmal auch schmerzhafte Beispiele von Produktivcode vorgestellt.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":4,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:34.117+02:00","length":3163,"duration":3163,"thumb_url":"https://static.media.ccc.de/media/congress/2004/077 Weird Programming 2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/077 Weird Programming 2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-241828382ede764577-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-241828382ede764577-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/077_Weird_Programming_2","url":"https://api.media.ccc.de/public/events/import-241828382ede764577","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":1},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":1},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":1},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":1}]},{"guid":"import-6e55685953155bed41","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-Whats_hot_in_Wikilandia","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:56.074+02:00","length":272,"duration":272,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Whats hot in Wikilandia.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Whats hot in Wikilandia_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-6e55685953155bed41-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-6e55685953155bed41-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-Whats_hot_in_Wikilandia","url":"https://api.media.ccc.de/public/events/import-6e55685953155bed41","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-20edce84e2b2f0e929","title":"Machine Learning in Science and Engineering","subtitle":null,"slug":"044_Machine_Learning_in_Science_and_Engineering","link":"http://www.ccc.de/congress/2004/fahrplan/event/44.en.html","description":"A broad overview about the current stage of research in Machine Learning starting with the general motivation and the setup of learning problems and discussion of state-of-the-art learning algorithms for novelty detection, classification and regression. Additionally, machine learning methods used for spam detection, intrusion detection, brain computer interace and biological sequence analysis are outlined.\n","original_language":"eng","persons":[],"tags":["21c3"," Science"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:25.792+02:00","length":3339,"duration":3339,"thumb_url":"https://static.media.ccc.de/media/congress/2004/044 Machine Learning in Science and Engineering.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/044 Machine Learning in Science and Engineering_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-20edce84e2b2f0e929-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-20edce84e2b2f0e929-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/044_Machine_Learning_in_Science_and_Engineering","url":"https://api.media.ccc.de/public/events/import-20edce84e2b2f0e929","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":4539,"event_guid":"384d5955-3745-2020-2020-202020202020","weight":1}]},{"guid":"import-e60778954ffaa71e88","title":"SUN Bloody Daft Solaris Mechanisms","subtitle":null,"slug":"057_SUN_Bloody_Daft_Solaris_Mechanisms","link":"http://www.ccc.de/congress/2004/fahrplan/event/57.en.html","description":"A new look into writing Solaris kernel rootkits using the new tools provided to the Solaris 10 Admin by SUN.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:35.952+02:00","length":2187,"duration":2187,"thumb_url":"https://static.media.ccc.de/media/congress/2004/057 SUN Bloody Daft Solaris Mechanisms.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/057 SUN Bloody Daft Solaris Mechanisms_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e60778954ffaa71e88-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e60778954ffaa71e88-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/057_SUN_Bloody_Daft_Solaris_Mechanisms","url":"https://api.media.ccc.de/public/events/import-e60778954ffaa71e88","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1}]},{"guid":"import-a1a1cc355460e393a5","title":"Kampagne Fair Sharing","subtitle":null,"slug":"117_Kampagne_Fair_Sharing","link":"http://www.ccc.de/congress/2004/fahrplan/event/117.en.html","description":"Die Musikindustrie setzt gerade alles daran, ihre Kunden und potentiellen Kunden zu verklagen und sieht keine Alternative um den Kampf gegen Tauschbörsen zu gewinnen. Dabei ist die Kriminalisierung einer ganzen Generation weder Sinnvoll noch wünschenswert. Die Kulturflatrate zeigt einen Ausweg...\n","original_language":"eng","persons":["Matthias Mehldau","Oliver Moldenhauer","Volker Grassmuck","Julian 'hds' Finn","Markus Beckedahl"],"tags":["21c3"," Society"],"view_count":3,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:24:52.239+02:00","length":3299,"duration":3299,"thumb_url":"https://static.media.ccc.de/media/congress/2004/117 Kampagne Fair Sharing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/117 Kampagne Fair Sharing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a1a1cc355460e393a5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a1a1cc355460e393a5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/117_Kampagne_Fair_Sharing","url":"https://api.media.ccc.de/public/events/import-a1a1cc355460e393a5","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":831,"event_guid":"import-d31ef9384f4b7266c8","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1}]},{"guid":"import-0fa6485c220df5e791","title":"Physical Security","subtitle":"The Good, the Bad and the Ugly","slug":"130_Physical_Security_Pt_2","link":"http://www.ccc.de/congress/2004/fahrplan/event/130.en.html","description":"Physical security is an oft-overlooked but critical prerequisite for good information security. Software has leaked into every aspect of modern life and now controls access to physical resources as well as to business and personal information. When critically examined, physical security policies and mechanisms have (perhaps have *always*) contained substantial snake oil components, including back doors, extensive use of protection by \"security through obscurity\", and piece solutions which ignore their environmental context or need to function in a system.\n","original_language":"eng","persons":["Mark Seiden","Barry"],"tags":["21c3"," Hacking"],"view_count":1,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:44.007+02:00","length":3510,"duration":3510,"thumb_url":"https://static.media.ccc.de/media/congress/2004/130 Physical Security Pt 2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/130 Physical Security Pt 2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-0fa6485c220df5e791-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-0fa6485c220df5e791-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/130_Physical_Security_Pt_2","url":"https://api.media.ccc.de/public/events/import-0fa6485c220df5e791","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1}]},{"guid":"import-76a88a1e7144ed0e8b","title":"Einführung in kryptographische Methoden","subtitle":null,"slug":"041_Einfuehrung_in_Kryptographische_Methoden","link":"http://www.ccc.de/congress/2004/fahrplan/event/41.en.html","description":"Kryptographie ist z. Zt. das wohl einzige Mittel um zuverlässig die Privatsphäre zu schätzen oder die Integrität von Daten sicherzustellen. Kryptographische Methoden sind außerdem auch hervorragende Mittel um Rechnersysteme vor Manipulation und Einbruch zu schützen bzw. diesen nachzuweisen. Dieser Vortrag soll eine Einführung in grundlegende Methoden bieten und richtet sich an absolute Einsteiger und setzt keine weiteren Kenntnisse voraus.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":16,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:54.094+02:00","length":3458,"duration":3458,"thumb_url":"https://static.media.ccc.de/media/congress/2004/041 Einfuehrung in Kryptographische Methoden.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/041 Einfuehrung in Kryptographische Methoden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-76a88a1e7144ed0e8b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-76a88a1e7144ed0e8b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/041_Einfuehrung_in_Kryptographische_Methoden","url":"https://api.media.ccc.de/public/events/import-76a88a1e7144ed0e8b","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":3},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":3},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":4},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":3}]},{"guid":"import-76eda6a4d2ee2ee3de","title":"The Convergence of Anti-Counterfeiting and Computer Security","subtitle":"Reverse-engineering currency detection systems","slug":"108_The_Convergence_of_Anti-Counterfeiting_and_Computer_Security","link":"http://www.ccc.de/congress/2004/fahrplan/event/108.en.html","description":"This talk examines the similarities between computer security and\noptical document security. Also we describe our work on reverse\nengineering anti-counterfeiting measures, included in much modern\ngraphics software, and discuss its impact on Open Source.\n","original_language":"eng","persons":["Steven J. Murdoch"],"tags":["21c3"," Hacking"],"view_count":2,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:34.103+02:00","length":2710,"duration":2710,"thumb_url":"https://static.media.ccc.de/media/congress/2004/108 The Convergence of Anti-Counterfeiting and Computer Security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/108 The Convergence of Anti-Counterfeiting and Computer Security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-76eda6a4d2ee2ee3de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-76eda6a4d2ee2ee3de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/108_The_Convergence_of_Anti-Counterfeiting_and_Computer_Security","url":"https://api.media.ccc.de/public/events/import-76eda6a4d2ee2ee3de","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-64c7badad4a7f2761e","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-Bags_for_Cellphones_Silvercell","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:19.613+02:00","length":242,"duration":242,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Bags for Cellphones Silvercell.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Bags for Cellphones Silvercell_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-64c7badad4a7f2761e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-64c7badad4a7f2761e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-Bags_for_Cellphones_Silvercell","url":"https://api.media.ccc.de/public/events/import-64c7badad4a7f2761e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":881,"event_guid":"import-3a4109a3ae368e3b29","weight":1},{"event_id":1513,"event_guid":"import-2be92c4b683e5c9a1c","weight":1}]},{"guid":"import-004ae3e6155e123c59","title":"Enforcing the GNU GPL","subtitle":null,"slug":"053_Enforcing_the_GNU_GPL","link":"http://www.ccc.de/congress/2004/fahrplan/event/53.en.html","description":"Linux is used more and more, especially in the embedded market. Unfortunately, a number of vendors do not comply with the GNU GPL. The author has enforced the GPL numerous times in and out of court, and will talk about his experience.\n","original_language":"eng","persons":[],"tags":["21c3"," Society"],"view_count":6,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:09.550+02:00","length":3618,"duration":3618,"thumb_url":"https://static.media.ccc.de/media/congress/2004/053 Enforcing the GNU GPL.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/053 Enforcing the GNU GPL_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-004ae3e6155e123c59-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-004ae3e6155e123c59-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/053_Enforcing_the_GNU_GPL","url":"https://api.media.ccc.de/public/events/import-004ae3e6155e123c59","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1}]},{"guid":"import-31c9ce21788db44716","title":"Learning OpenPGP by example","subtitle":null,"slug":"131_Learning_OpenPGP_by_Example","link":"http://www.ccc.de/congress/2004/fahrplan/event/131.en.html","description":"The goal of this talk is to help demystify some of the internals of the OpenPGP standard, through example, so that others can learn from and hopefully continue the process. The current (free) open source implementations of the OpenPGP standard are easily better than many commercial solutions, as well as more readily supported. To do this, I will show off a number of the OpenPGP-based projects I've been working on lately, including: subliminally leaking keys in digital signatures; vanity key generation; extending the web of trust to ssh host keys; and maybe even some attacks against the keyserver network that I'll later regret showing off code for.\n","original_language":"eng","persons":["Seth Hardy"],"tags":["21c3"," Hacking"],"view_count":4,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:50.173+02:00","length":2737,"duration":2737,"thumb_url":"https://static.media.ccc.de/media/congress/2004/131 Learning OpenPGP by Example.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/131 Learning OpenPGP by Example_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-31c9ce21788db44716-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-31c9ce21788db44716-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/131_Learning_OpenPGP_by_Example","url":"https://api.media.ccc.de/public/events/import-31c9ce21788db44716","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":809,"event_guid":"import-7fc44374aacaa4ff10","weight":1},{"event_id":810,"event_guid":"import-3fea5c777527b01b1c","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":841,"event_guid":"import-2b04e5dc1d9f2d9812","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":883,"event_guid":"import-7b2f4e2357361a251e","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":1},{"event_id":1510,"event_guid":"import-5c41c1053cc25fb4b8","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2384,"event_guid":"15a42829-1e83-4ff4-aa1a-c39f6cdf2a15","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2855,"event_guid":"52706f90-a2f9-48be-a4c3-786257fce233","weight":1},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2915,"event_guid":"eb36c9f7-076a-45cc-ad66-ac97768e0c75","weight":1},{"event_id":3681,"event_guid":"149f13d4-cc8c-49a9-9e68-544754646022","weight":1}]},{"guid":"import-fc17172c131ec48efa","title":"Honeypot Forensics","subtitle":"No stone unturned or: logs, what logs?","slug":"105_Honeypot_Forensics","link":"http://www.ccc.de/congress/2004/fahrplan/event/105.en.html","description":"In the world of intrusion detection, intrusion prevention and hacker research honeypots are a quite a new and interesting technology. But only few know there is more to achieve with honeypots than just catch an intruders attention. Honeypots could reward you with versatile results and this presentation will be interesting to you even if you are familiar with deploying IDS/IPS/Honeypot systems. We will give an overview of the existing tools and provide you with a methodology to start your own forensic examinations.\n","original_language":"eng","persons":["Krisztian Piller","Sebastian Wolfgarten"],"tags":["21c3"," Hacking"],"view_count":11,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:23:09.225+02:00","length":7030,"duration":7030,"thumb_url":"https://static.media.ccc.de/media/congress/2004/105 Honeypot Forensics.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/105 Honeypot Forensics_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-fc17172c131ec48efa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-fc17172c131ec48efa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/105_Honeypot_Forensics","url":"https://api.media.ccc.de/public/events/import-fc17172c131ec48efa","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":2},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":3}]},{"guid":"import-86823fbaef16d5d5b8","title":"Fight for your Right to Fileshare","subtitle":"Content Flatrate, not Copyright War","slug":"315_Fight_for_your_Right_to_Fileshare","link":"http://www.ccc.de/congress/2004/fahrplan/event/315.en.html","description":"Current copyright law has only one answer to p2p filesharers: sue them. A much better model not only for users but for authors as well, is to permit what can‘t be prevented anyway, and in turn collect a flat levy on Internet access. Thus, the Content Flatrate achieves compensation for creators without control of users.\n","original_language":"eng","persons":["Rasmus Fleischer","Volker Grassmuck"],"tags":["21c3"," Society"],"view_count":9,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:20:04.200+02:00","length":6332,"duration":6332,"thumb_url":"https://static.media.ccc.de/media/congress/2004/315 Fight for your Right to Fileshare.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/315 Fight for your Right to Fileshare_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-86823fbaef16d5d5b8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-86823fbaef16d5d5b8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/315_Fight_for_your_Right_to_Fileshare","url":"https://api.media.ccc.de/public/events/import-86823fbaef16d5d5b8","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":2},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":876,"event_guid":"import-004ae3e6155e123c59","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1}]},{"guid":"import-2361b575bf9cefaa52","title":"Voting Machine Technology","subtitle":null,"slug":"135_Voting_Machine_Technology","link":"http://www.ccc.de/congress/2004/fahrplan/event/135.en.html","description":"The talk will be about voting machine technology, a short history, its vulnerabilities and overall reliability. There will be a concentration about the Diebold e-voting code and its limitations.\n","original_language":"eng","persons":["Tom Trumpbour"],"tags":["21c3"," Hacking"],"view_count":3,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:14.745+02:00","length":3057,"duration":3057,"thumb_url":"https://static.media.ccc.de/media/congress/2004/135 Voting Machine Technology.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/135 Voting Machine Technology_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-2361b575bf9cefaa52-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-2361b575bf9cefaa52-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/135_Voting_Machine_Technology","url":"https://api.media.ccc.de/public/events/import-2361b575bf9cefaa52","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":770,"event_guid":"import-45631ec4e36434bfcc","weight":1},{"event_id":771,"event_guid":"import-4d16517d50ae0e0c3b","weight":1},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":1},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":1},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1}]},{"guid":"import-a6e12dabd1d28df5ea","title":"Datamining the NSA: Introduction","subtitle":null,"slug":"047_Datamining_the_NSA","link":"http://www.ccc.de/congress/2004/fahrplan/event/47.en.html","description":"An inquiry into the strategies, methods and actors of the \"Biometrics  Consortium\" an NSA led incubator project in the field of biometrics. Presentation by q/uintessenz biometrics research unit.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":33,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:38.837+02:00","length":3002,"duration":3002,"thumb_url":"https://static.media.ccc.de/media/congress/2004/047 Datamining the NSA.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/047 Datamining the NSA_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a6e12dabd1d28df5ea-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a6e12dabd1d28df5ea-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/047_Datamining_the_NSA","url":"https://api.media.ccc.de/public/events/import-a6e12dabd1d28df5ea","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":836,"event_guid":"import-6a2a70a40fa9ac92e5","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":876,"event_guid":"import-004ae3e6155e123c59","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1660,"event_guid":"import-87fe91710bd736fc78","weight":1},{"event_id":1740,"event_guid":"0IuyfNlW5fXVnrMIgEXesw","weight":1},{"event_id":1778,"event_guid":"7abembel5Nwrd3h_pRjeOQ","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3659,"event_guid":"c849ebc8-b3b9-49fb-a9a2-ebef217c80b6","weight":1}]},{"guid":"import-61f9360e56315a6d0d","title":"Barrierefreies Internet","subtitle":"Aspekte der Minimierung der Unmöglichkeit","slug":"164_Barrierefreies_Internet","link":"http://www.ccc.de/congress/2004/fahrplan/event/164.en.html","description":"Menschen mit Behinderungen sind überdurchschnittlich häufig im Internet aktiv weil dies eine Kommunikationsmöglichkeit darstellt die sie im 'real live' nicht oder nur eingeschränkt haben. Der Vortrag soll zeigen welche Barrieren sich im Internet für Behinderte beim Besuch von Homepages ergeben und wie man versuchen kann, diese als Ersteller von Seiten zu umgehen. Verschiedene Arten von Behinderungen verlangen die Berücksichtigung verschiedener Aspekte, die sich durchaus auch widersprechen.\n","original_language":"eng","persons":["Petra Berndt","Ralf Roletschek"],"tags":["21c3"," Community"],"view_count":113,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:41.378+02:00","length":3214,"duration":3214,"thumb_url":"https://static.media.ccc.de/media/congress/2004/164 Barrierefreies Internet.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/164 Barrierefreies Internet_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-61f9360e56315a6d0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-61f9360e56315a6d0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/164_Barrierefreies_Internet","url":"https://api.media.ccc.de/public/events/import-61f9360e56315a6d0d","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":8},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":3},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":3}]},{"guid":"import-a9c491602c0e5aa632","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-trusted_computing_for_everybody","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":0,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:04.547+02:00","length":371,"duration":371,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-trusted computing for everybody.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-trusted computing for everybody_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a9c491602c0e5aa632-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a9c491602c0e5aa632-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-trusted_computing_for_everybody","url":"https://api.media.ccc.de/public/events/import-a9c491602c0e5aa632","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-adc67a0660f250c812","title":"GameCube Hacking","subtitle":null,"slug":"208_Gamecube_Hacking","link":"http://www.ccc.de/congress/2004/fahrplan/event/208.en.html","description":"The GameCube - what it is made of and how it can be hacked. We'll describe different approachs of getting own code onto the GameCube and things that you can do with a GameCube under your control. Of course it runs Linux.\n","original_language":"eng","persons":["Felix Domke","Michael Steil","Rob Reilink"],"tags":["21c3"," Hacking"],"view_count":22,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:28.829+02:00","length":3316,"duration":3316,"thumb_url":"https://static.media.ccc.de/media/congress/2004/208 Gamecube Hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/208 Gamecube Hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-adc67a0660f250c812-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-adc67a0660f250c812-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/208_Gamecube_Hacking","url":"https://api.media.ccc.de/public/events/import-adc67a0660f250c812","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":3},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":2}]},{"guid":"import-57ec6bf04e9a6b0c37","title":"Information - Wissen - Macht","subtitle":"Dunkle Seiten der Informationsgesellschaft?","slug":"310_Information-Wissen-Macht","link":"http://www.ccc.de/congress/2004/fahrplan/event/310.en.html","description":"Information und Wissen sind die Pfeiler der  Informationsgesellschaft . Das alte Sprichwort  Wissen ist Macht  erreicht vollkommen neue Dimensionen: Wissen ist nunmehr die Grundvoraussetzung für Macht, und wird zum Machterhalt genutzt. Die Kriminalisierung non-konformer Gruppierungen und Überwachung aller sind Bestandteil unseres täglichen Lebens.  Sicherheit  dient in dieser Gesellschaft als pass-par-tout-Argument, um die Privatsphäre des Individuums auszuhebeln. Der digital divide   den es von offizieller Seite her zu vermeiden gilt ist nicht nur vorprogrammiert, sondern wahrscheinlich auch gewollt. Der Staat kann und will den Bürger nicht schützen. Mündige Bürger stehen seinem Machtbestreben entgegen.\n","original_language":"eng","persons":["Marko Maglić"],"tags":["21c3"," Society"],"view_count":9,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:40.369+02:00","length":3364,"duration":3364,"thumb_url":"https://static.media.ccc.de/media/congress/2004/310 Information-Wissen-Macht.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/310 Information-Wissen-Macht_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-57ec6bf04e9a6b0c37-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-57ec6bf04e9a6b0c37-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/310_Information-Wissen-Macht","url":"https://api.media.ccc.de/public/events/import-57ec6bf04e9a6b0c37","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":2},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":2},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":3},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":3},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":2}]},{"guid":"import-189868fb0a895cce3c","title":"Humanoid Robots","subtitle":null,"slug":"178_Humanoid_Robots","link":"http://www.ccc.de/congress/2004/fahrplan/event/178.en.html","description":"Humanoid robots are investigated, because the human body facilitates acting in a world designed for humans, simplifies the interaction with humans, and allows for intuitive multimodal communication. They are also a tool to understand human intelligence. In the talk I will review some humanoid robot projects and introduce you to our robots Alpha, Toni, Kondo, and RoboSapien.\n","original_language":"eng","persons":["Sven Behnke"],"tags":["21c3"," Science"],"view_count":8,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:34.001+02:00","length":2981,"duration":2981,"thumb_url":"https://static.media.ccc.de/media/congress/2004/178 Humanoid Robots.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/178 Humanoid Robots_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-189868fb0a895cce3c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-189868fb0a895cce3c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/178_Humanoid_Robots","url":"https://api.media.ccc.de/public/events/import-189868fb0a895cce3c","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1}]},{"guid":"import-8dd1b22906d302c7a1","title":"State of Emergent Democracy","subtitle":"Where are we today?","slug":"159_State_of_Emergent_Democracy","link":"http://www.ccc.de/congress/2004/fahrplan/event/159.en.html","description":"Since I started my first web site 10 years ago, we've moved from a vision of cyber-utopia to the lust of the bubble, to bust and back to a cautious optimism. Two years after writing my somewhat optimistic paper on Emergent Democracy we've seen blogs challenge the mass media, Wikipedia challenge the authority of encyclopedias and an American election heavily influenced by the Internet. I will speak about the impact that blogging and other social software is having on politics and free speech, and will discuss the US elections in this context.\n","original_language":"eng","persons":["Joi Ito"],"tags":["21c3"," Society"],"view_count":4,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:49.184+02:00","length":3570,"duration":3570,"thumb_url":"https://static.media.ccc.de/media/congress/2004/159 State of Emergent Democracy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/159 State of Emergent Democracy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-8dd1b22906d302c7a1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-8dd1b22906d302c7a1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/159_State_of_Emergent_Democracy","url":"https://api.media.ccc.de/public/events/import-8dd1b22906d302c7a1","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-2b04e5dc1d9f2d9812","title":"Siegerehrung Lockpicking","subtitle":"8. Deutsche Meisterschaften im Schlossöffnen","slug":"171_Siegerehrung_Lockpicking","link":"http://www.ccc.de/congress/2004/fahrplan/event/171.en.html","description":"Siegerehrung der 8. Deutschen Meisterschaften im Schlossöffnen. Ehrenvoll, unterhaltsam, spannend und auch informativ.\n","original_language":"eng","persons":["Steffen Wernéry"],"tags":["21c3"," Lockpicking"],"view_count":5,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:48.337+02:00","length":3687,"duration":3687,"thumb_url":"https://static.media.ccc.de/media/congress/2004/171 Siegerehrung Lockpicking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/171 Siegerehrung Lockpicking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-2b04e5dc1d9f2d9812-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-2b04e5dc1d9f2d9812-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/171_Siegerehrung_Lockpicking","url":"https://api.media.ccc.de/public/events/import-2b04e5dc1d9f2d9812","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":840,"event_guid":"import-78755f31c627cb2c61","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":1},{"event_id":1510,"event_guid":"import-5c41c1053cc25fb4b8","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2384,"event_guid":"15a42829-1e83-4ff4-aa1a-c39f6cdf2a15","weight":1},{"event_id":3681,"event_guid":"149f13d4-cc8c-49a9-9e68-544754646022","weight":1}]},{"guid":"import-d76842c2e07bb3bb29","title":"Portable Software-Installation with pkgsrc","subtitle":null,"slug":"098_Portable_Software-Installation_with_pkg_source","link":"http://www.ccc.de/congress/2004/fahrplan/event/98.en.html","description":"Have you tried installing a certain package on (say) Linux, Solaris, MacOS X, MS Windows and NetBSD at the same time? The pkgsrc system allows doing so by a simple \"make install\" instead of knowing lots of details.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:14.074+02:00","length":2535,"duration":2535,"thumb_url":"https://static.media.ccc.de/media/congress/2004/098 Portable Software-Installation with pkg source.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/098 Portable Software-Installation with pkg source_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d76842c2e07bb3bb29-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d76842c2e07bb3bb29-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/098_Portable_Software-Installation_with_pkg_source","url":"https://api.media.ccc.de/public/events/import-d76842c2e07bb3bb29","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":801,"event_guid":"import-37bc554b396781f093","weight":1},{"event_id":838,"event_guid":"import-c1686d2fd8b7d767ee","weight":1}]},{"guid":"import-951b951bbc36e5c5d7","title":"The Incomputable Alan Turing","subtitle":"Ein Audio-Feature","slug":"215_The_Incomputable_Alan_Turing","link":"http://www.ccc.de/congress/2004/fahrplan/event/215.en.html","description":"Live-Performance der Hörspielwerkstatt der Humboldt-Universität Berlin\n","original_language":"eng","persons":["Jens-Martin Loebel","Julia Böttcher","Constanze Kurz","Marcus Richter","Kai Kittler"],"tags":["21c3"," Culture"],"view_count":6,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:02.866+02:00","length":2579,"duration":2579,"thumb_url":"https://static.media.ccc.de/media/congress/2004/215 The Incomputable Alan Turing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/215 The Incomputable Alan Turing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-951b951bbc36e5c5d7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-951b951bbc36e5c5d7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/215_The_Incomputable_Alan_Turing","url":"https://api.media.ccc.de/public/events/import-951b951bbc36e5c5d7","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":2},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":2},{"event_id":831,"event_guid":"import-d31ef9384f4b7266c8","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":2},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1209,"event_guid":"import-a1c2e2cf95802d85dd","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1313,"event_guid":"import-ab7c839b128736450c","weight":1},{"event_id":1454,"event_guid":"import-3299afbb3645f5d6ee","weight":1},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1646,"event_guid":"import-3f6920f8040f18da31","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1}]},{"guid":"import-d5b993915f58107a0b","title":"Positionsbezogene Ad-hoc Kollaboration über WLAN","subtitle":null,"slug":"232_Positionsbezogene_Ad-hoc_Kollaboration_ueber_WLAN","link":"http://www.ccc.de/congress/2004/fahrplan/event/232.en.html","description":"Wir  haben  ein  System  zur  Positionsbestimmung  mobiler  Systeme  basierend  auf  WLAN  Signalstärke-Auswertung  entwickelt.  Es  arbeitet  rein  softwarebasiert,  d.h.  bei  den  mobilen  Systemen ist außer einer konventionellen WLAN-Karte keine weitere Hardware erforderlich. Die  WLAN Access Points können beliebig verteilt bzw. ggf. sogar mobil sein und es sind weder  Eingriffe an der AP-Hardware noch an der Software nötig.\n","original_language":"eng","persons":["Peter Ibach"],"tags":["21c3"," Hacking"],"view_count":2,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:19:00.615+02:00","length":3267,"duration":3267,"thumb_url":"https://static.media.ccc.de/media/congress/2004/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d5b993915f58107a0b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d5b993915f58107a0b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/232_Positionsbezogene_Ad-hoc_Kollaboration_ueber_WLAN","url":"https://api.media.ccc.de/public/events/import-d5b993915f58107a0b","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":899,"event_guid":"import-241828382ede764577","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1}]},{"guid":"import-7b2f4e2357361a251e","title":"XMPP/Jabber","subtitle":"Introducing the 'lingua franca' of Instant Messaging","slug":"101_XMPP_-_Jabber","link":"http://www.ccc.de/congress/2004/fahrplan/event/101.en.html","description":"XMPP is a free, next-generation, feature rich instant messaging architecture and protocol, which perhaps cat put an end to the great IM war between propritary protocols. This talk introduces the basic protocol concepts (bidirectional XML streams, transports/gateways to other IM-networks), the general XMPP network architecture and features like GPG end-to-end encryption will be demonstrated.\n","original_language":"eng","persons":["fd0"],"tags":["21c3"," Hacking"],"view_count":12,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:28.852+02:00","length":2049,"duration":2049,"thumb_url":"https://static.media.ccc.de/media/congress/2004/101 XMPP - Jabber.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/101 XMPP - Jabber_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7b2f4e2357361a251e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7b2f4e2357361a251e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/101_XMPP_-_Jabber","url":"https://api.media.ccc.de/public/events/import-7b2f4e2357361a251e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":719,"event_guid":"import-aef220e2a9fcc65152","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":1186,"event_guid":"import-dbafd960390d3c1330","weight":1},{"event_id":1871,"event_guid":"import-0756c4b55d70bf753b","weight":1},{"event_id":1880,"event_guid":"import-5d6f6be871a59ca0a2","weight":1},{"event_id":2449,"event_guid":"cd793876-8f18-46cf-a28e-304e290ca3fd","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2855,"event_guid":"52706f90-a2f9-48be-a4c3-786257fce233","weight":1},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2915,"event_guid":"eb36c9f7-076a-45cc-ad66-ac97768e0c75","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1}]},{"guid":"import-af588154ff7d6d3317","title":"MD5 To Be Considered Harmful Someday","subtitle":null,"slug":"308_MD5_To_Be_Considered_Harmful_Someday","link":"http://www.ccc.de/congress/2004/fahrplan/event/308.en.html","description":"Joux and Wang’s multicollision attack has yielded collisions for several one-way hash algorithms. Of these, MD5 is the most problematic due to its heavy deployment, but there exists a perception that the flaws identified have no applied implications. We show that the appendability of Merkle-Damgard allows us to add any payload to the proof-of-concept hashes released by Wang et al.\n","original_language":"eng","persons":["Dan Kaminsky"],"tags":["21c3"," Hacking"],"view_count":8,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:19:02.704+02:00","length":3024,"duration":3024,"thumb_url":"https://static.media.ccc.de/media/congress/2004/308 MD5 To Be Considered Harmful Someday.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/308 MD5 To Be Considered Harmful Someday_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-af588154ff7d6d3317-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-af588154ff7d6d3317-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/308_MD5_To_Be_Considered_Harmful_Someday","url":"https://api.media.ccc.de/public/events/import-af588154ff7d6d3317","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":807,"event_guid":"import-700ce3e707006d5b53","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":883,"event_guid":"import-7b2f4e2357361a251e","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":1303,"event_guid":"import-8a69e7b1ee3f8cc625","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1}]},{"guid":"import-c1686d2fd8b7d767ee","title":"Lightning Talks: Mute Magazine and openmute.org","subtitle":null,"slug":"250_Lightning_Talk-Mute_Magazine_and_openmute_org","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:52.408+02:00","length":327,"duration":327,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Mute Magazine and openmute.org.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Mute Magazine and openmute.org_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c1686d2fd8b7d767ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c1686d2fd8b7d767ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-Mute_Magazine_and_openmute_org","url":"https://api.media.ccc.de/public/events/import-c1686d2fd8b7d767ee","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":801,"event_guid":"import-37bc554b396781f093","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":868,"event_guid":"import-d76842c2e07bb3bb29","weight":1}]},{"guid":"import-7fc44374aacaa4ff10","title":"Lightning Talks: Day 1","subtitle":null,"slug":"142_Lightning_Talk-IT_Security_-_Quo_Vadis","link":"http://www.ccc.de/congress/2004/fahrplan/event/142.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":["Frank Rosengart"],"tags":["21c3"," Community"],"view_count":4,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:13.425+02:00","length":447,"duration":447,"thumb_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-IT Security - Quo Vadis.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-IT Security - Quo Vadis_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7fc44374aacaa4ff10-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7fc44374aacaa4ff10-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/142_Lightning_Talk-IT_Security_-_Quo_Vadis","url":"https://api.media.ccc.de/public/events/import-7fc44374aacaa4ff10","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":810,"event_guid":"import-3fea5c777527b01b1c","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1}]},{"guid":"import-562245a5e2737f8681","title":"GNOME Anwendungsentwicklung","subtitle":null,"slug":"037_GNOME_Anwendungsentwicklung","link":"http://www.ccc.de/congress/2004/fahrplan/event/37.en.html","description":"Svens Vortrag steigt sehr schnell in die Interna von GObject, dem Objekt-Orientierungs-Framework ein, um dann anhand von Nautilus- und Evolution-Plugins zu zeigen, wie man Plugins in GNOME realsiert. Im Anschluss kann dann noch eine Hilfestellung gegeben werden, wo sich welche GNOME-Bibliotheken einsetzen lassen.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":4,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:37.530+02:00","length":2755,"duration":2755,"thumb_url":"https://static.media.ccc.de/media/congress/2004/037 GNOME Anwendungsentwicklung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/037 GNOME Anwendungsentwicklung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-562245a5e2737f8681-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-562245a5e2737f8681-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/037_GNOME_Anwendungsentwicklung","url":"https://api.media.ccc.de/public/events/import-562245a5e2737f8681","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1}]},{"guid":"import-e998285d2df414cb5a","title":"Verdeckte Netzwerkanalyse","subtitle":null,"slug":"019_Verdeckte_Netzwerkanalyse","link":"http://www.ccc.de/congress/2004/fahrplan/event/19.en.html","description":"Es gibt relativ viele Möglichkeiten passiv fastzustellen, mit welchem Betriebssystem man sich gerade \"unterhält\". Die theoretischen Grundlagen des Fingerprintings und einige Tools werden vorgestellt. Einige Tipps zur Abhilfe (hide myself) werden ebenfalls gegeben.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":5,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:12.079+02:00","length":3511,"duration":3511,"thumb_url":"https://static.media.ccc.de/media/congress/2004/019 Verdeckte Netzwerkanalyse.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/019 Verdeckte Netzwerkanalyse_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e998285d2df414cb5a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e998285d2df414cb5a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/019_Verdeckte_Netzwerkanalyse","url":"https://api.media.ccc.de/public/events/import-e998285d2df414cb5a","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":2}]},{"guid":"import-3fea5c777527b01b1c","title":"Robocup","subtitle":null,"slug":"029_Robocup","link":"http://www.ccc.de/congress/2004/fahrplan/event/29.en.html","description":"Raúl Rojas and his team have implemented a centrally controlled team of football playing robots. They will present this project (including a video) and show us their robots.\n","original_language":"eng","persons":[],"tags":["21c3"," Science"],"view_count":5,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:42.796+02:00","length":3425,"duration":3425,"thumb_url":"https://static.media.ccc.de/media/congress/2004/029 Robocup.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/029 Robocup_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-3fea5c777527b01b1c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-3fea5c777527b01b1c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/029_Robocup","url":"https://api.media.ccc.de/public/events/import-3fea5c777527b01b1c","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":809,"event_guid":"import-7fc44374aacaa4ff10","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":874,"event_guid":"import-06fe953d244caab474","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1}]},{"guid":"import-c767cd58e7116fb747","title":"Automated Hacking via Google","subtitle":null,"slug":"113_Automated_Hacking_via_Google","link":"http://www.ccc.de/congress/2004/fahrplan/event/113.en.html","description":"A look at methods of locating vulnerable sites via google and exploiting them with no user interaction and how to prevent your code being vulnerable.\n","original_language":"eng","persons":["Daniel Bartlett"],"tags":["21c3"," Hacking"],"view_count":136,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:14.458+02:00","length":1049,"duration":1049,"thumb_url":"https://static.media.ccc.de/media/congress/2004/113 Automated Hacking via Google.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/113 Automated Hacking via Google_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c767cd58e7116fb747-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c767cd58e7116fb747-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/113_Automated_Hacking_via_Google","url":"https://api.media.ccc.de/public/events/import-c767cd58e7116fb747","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":8},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":4},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":5},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":5},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":2}]},{"guid":"import-bd0a3920b25e83b5ca","title":"How To Herd Cats","subtitle":null,"slug":"133_How_to_Herd_Cats","link":"http://www.ccc.de/congress/2004/fahrplan/event/133.en.html","description":"Despite the hacker ethic of free information real life frameworks for constructive dialogue are sadly lacking. Interestingly a number of systems, from socratic dialogue to parliamentary procedure already exist for structuring conversation toward a goal. In this talk we will look at hacker workgroups from open source developers to CTF teams and look at what solutions have been tried, and what tools have been developed. Also, this topic lends itself to analysis of common hacker roles and social structures that define and impede growth and development within the community.\n","original_language":"eng","persons":["Druid"],"tags":["21c3"," Community"],"view_count":15,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:39.070+02:00","length":3679,"duration":3679,"thumb_url":"https://static.media.ccc.de/media/congress/2004/133 How to Herd Cats.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/133 How to Herd Cats_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-bd0a3920b25e83b5ca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-bd0a3920b25e83b5ca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/133_How_to_Herd_Cats","url":"https://api.media.ccc.de/public/events/import-bd0a3920b25e83b5ca","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":2},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":812,"event_guid":"import-fc17172c131ec48efa","weight":3},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":818,"event_guid":"import-bc28bda3e380385a9d","weight":1},{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":1},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":1},{"event_id":832,"event_guid":"import-cb8043167214127d3c","weight":1},{"event_id":836,"event_guid":"import-6a2a70a40fa9ac92e5","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":841,"event_guid":"import-2b04e5dc1d9f2d9812","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":3},{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":2},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":1},{"event_id":1510,"event_guid":"import-5c41c1053cc25fb4b8","weight":1},{"event_id":1878,"event_guid":"import-159c383d86bea5f232","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2384,"event_guid":"15a42829-1e83-4ff4-aa1a-c39f6cdf2a15","weight":1},{"event_id":2734,"event_guid":"a1533367-f889-4b07-8d2f-b2718ad6b9a6","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":1},{"event_id":3681,"event_guid":"149f13d4-cc8c-49a9-9e68-544754646022","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1}]},{"guid":"import-8db13adee78594ad9e","title":"Lightning Talks: Block Ciphers","subtitle":null,"slug":"250_Lightning_Talk-Block_Ciphers_creates_by_evolutionary_algorithms","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":3,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:45.180+02:00","length":320,"duration":320,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Block Ciphers creates by evolutionary algorithms.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Block Ciphers creates by evolutionary algorithms_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-8db13adee78594ad9e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-8db13adee78594ad9e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-Block_Ciphers_creates_by_evolutionary_algorithms","url":"https://api.media.ccc.de/public/events/import-8db13adee78594ad9e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1}]},{"guid":"import-ed958b5b11d6620ab1","title":"Lightning Talks: Day 1","subtitle":null,"slug":"142_Lightning_Talk-Plazes_by_Plazes","link":"http://www.ccc.de/congress/2004/fahrplan/event/142.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:29.428+02:00","length":279,"duration":279,"thumb_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Plazes by Plazes.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Plazes by Plazes_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-ed958b5b11d6620ab1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-ed958b5b11d6620ab1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/142_Lightning_Talk-Plazes_by_Plazes","url":"https://api.media.ccc.de/public/events/import-ed958b5b11d6620ab1","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-da603ce84b2f8643de","title":"Wikipedia Sociographics","subtitle":null,"slug":"059_Wikipedia_Sociographics","link":"http://www.ccc.de/congress/2004/fahrplan/event/59.en.html","description":"The lecture reports on social dynamics of the Wikipedia project and presents a bunch of statistics and results of research exploring the inner workings of the project.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:51.418+02:00","length":3837,"duration":3837,"thumb_url":"https://static.media.ccc.de/media/congress/2004/059 Wikipedia Sociographics.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/059 Wikipedia Sociographics_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-da603ce84b2f8643de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-da603ce84b2f8643de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/059_Wikipedia_Sociographics","url":"https://api.media.ccc.de/public/events/import-da603ce84b2f8643de","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-9aa26412eb8a583273","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-New_Demonstration_Tactics_Pink_Silver_Block","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:19.798+02:00","length":247,"duration":247,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-New Demonstration Tactics Pink Silver Block.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-New Demonstration Tactics Pink Silver Block_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-9aa26412eb8a583273-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-9aa26412eb8a583273-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-New_Demonstration_Tactics_Pink_Silver_Block","url":"https://api.media.ccc.de/public/events/import-9aa26412eb8a583273","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1}]},{"guid":"import-bc28bda3e380385a9d","title":"GPL für Anfänger","subtitle":null,"slug":"099_GPL_fuer_Anfaenger","link":"http://www.ccc.de/congress/2004/fahrplan/event/99.en.html","description":"Es sollen die Hintergründe \"freier\" Software beleuchtet werden. Der Vortrag erläutert rechtliche Grundlagen (Urheberrecht, Lizenzen \u0026 Patente) geben und anschliessend anhand der GPL einige Eigenschaften \"freier\" Software aufgezeigt weden.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":11,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:56.809+02:00","length":2839,"duration":2839,"thumb_url":"https://static.media.ccc.de/media/congress/2004/099 GPL fuer Anfaenger.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/099 GPL fuer Anfaenger_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-bc28bda3e380385a9d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-bc28bda3e380385a9d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/099_GPL_fuer_Anfaenger","url":"https://api.media.ccc.de/public/events/import-bc28bda3e380385a9d","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":788,"event_guid":"import-e0385b5ff2224635db","weight":1},{"event_id":790,"event_guid":"import-c429172db8cd508503","weight":1},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":1},{"event_id":798,"event_guid":"import-1c79c2ce56e02c06d9","weight":1},{"event_id":812,"event_guid":"import-fc17172c131ec48efa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":817,"event_guid":"import-c865fbf5a8d13de458","weight":1},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":1878,"event_guid":"import-159c383d86bea5f232","weight":1},{"event_id":2999,"event_guid":"0cd4467e-31c9-43bf-a315-491dc48c3c6a","weight":1},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":1}]},{"guid":"import-fc07a90fda73c4c1af","title":"Edit This Page","subtitle":null,"slug":"063_Edit_This_Page","link":"http://www.ccc.de/congress/2004/fahrplan/event/63.en.html","description":"Wikipedia developers chronicle the evolution of the MediaWiki software and server farm to manage the popular and ever-growing editable encyclopedia. Planned scalability improvements are outlined, plus developers' conference and hacking session.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":4,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:42.631+02:00","length":2727,"duration":2727,"thumb_url":"https://static.media.ccc.de/media/congress/2004/063 Edit This Page.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/063 Edit This Page_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-fc07a90fda73c4c1af-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-fc07a90fda73c4c1af-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/063_Edit_This_Page","url":"https://api.media.ccc.de/public/events/import-fc07a90fda73c4c1af","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":2}]},{"guid":"import-a97a7d656631c75f3f","title":"c3-trailer","subtitle":null,"slug":"21C3-trailer","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["21c3"],"view_count":107,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2026-01-04T22:30:25.523+01:00","length":30,"duration":30,"thumb_url":"https://static.media.ccc.de/media/congress/2004/bonus/21C3-trailer.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/bonus/21C3-trailer_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a97a7d656631c75f3f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a97a7d656631c75f3f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/21C3-trailer","url":"https://api.media.ccc.de/public/events/import-a97a7d656631c75f3f","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":131,"event_guid":"import-43791f22a53f559498","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":712,"event_guid":"import-34ae371136afd59188","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":723,"event_guid":"import-0ff4fc254d51ae809f","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":729,"event_guid":"import-8591d47cbc8f002261","weight":1},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":1},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":1},{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":1},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":1},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":755,"event_guid":"import-9bee3d8a1b3b5b0ba4","weight":1},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":1},{"event_id":759,"event_guid":"import-35bef068c59b3b5fc9","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":2},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":770,"event_guid":"import-45631ec4e36434bfcc","weight":1},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":778,"event_guid":"import-c736b4398a8616a7e5","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":1},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":785,"event_guid":"import-5a1d49359193696c0a","weight":1},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":1},{"event_id":795,"event_guid":"import-4fe70f274d636f9fcb","weight":1},{"event_id":799,"event_guid":"import-eb8873e1925f207dc7","weight":2},{"event_id":803,"event_guid":"import-496dba1358b7997c25","weight":1},{"event_id":807,"event_guid":"import-700ce3e707006d5b53","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":4},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":1},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":1},{"event_id":1180,"event_guid":"import-5fa00c37cb75885d36","weight":1},{"event_id":1303,"event_guid":"import-8a69e7b1ee3f8cc625","weight":1},{"event_id":2521,"event_guid":"55a2a1d7-f022-4e5a-8d24-568e42b8dadd","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3644,"event_guid":"d1681340-162c-48ce-8c0b-61c3e176696d","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":6381,"event_guid":"c0e4f528-92c7-4170-aff3-d4dd5cd74b2c","weight":1},{"event_id":6428,"event_guid":"6c44067f-a011-48ec-b302-fbaff1260b78","weight":1},{"event_id":6465,"event_guid":"622c9585-e332-4915-a9ac-987a34da4d14","weight":1},{"event_id":6477,"event_guid":"c85de43e-107e-4247-b550-946f376e2ec4","weight":1},{"event_id":6482,"event_guid":"86b96f3f-a6b5-49c0-a189-69912c016916","weight":1},{"event_id":6490,"event_guid":"a13bb3ac-fde1-4b82-833e-1fcf1f8f25dd","weight":1},{"event_id":6492,"event_guid":"bc545b26-8319-43fb-abc2-f624ef414ee8","weight":1},{"event_id":6526,"event_guid":"18b77974-03f4-43a5-b94c-b2dda689e78c","weight":1},{"event_id":6546,"event_guid":"51bb6adc-c0e7-4675-8f93-cf0e2dbd9587","weight":1},{"event_id":6608,"event_guid":"46b7c5d8-318d-4f6c-a17e-73f2638ab46a","weight":1},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":1}]},{"guid":"import-cb8043167214127d3c","title":"Freedom of expression in new Arab landscape","subtitle":"Spreading of new Arab satellite TV stations: consequences on public opinions and on state control of freedom of expression","slug":"209_Freedom_of_expression_in_new_Arab_landscape","link":"http://www.ccc.de/congress/2004/fahrplan/event/209.en.html","description":"The lecture will deal about freedom of expression in the Arab world after the spreading of new private satellite channels opposing the traditional state monopoly and censorship in TV broadcasting. It will focus on the case study of Al Jazeera being the first Arab TV station to build its editorial policy around “the opinion and the counter-opinion” and the public expression of different points of view, from the very conservative to the ones that are traditionally banned because of their violent opposition to Arab regimes.\n","original_language":"eng","persons":["Donatella Della Ratta"],"tags":["21c3"," Society"],"view_count":7,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:10.068+02:00","length":3136,"duration":3136,"thumb_url":"https://static.media.ccc.de/media/congress/2004/209 Freedom of expression in new Arab landscape.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/209 Freedom of expression in new Arab landscape_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-cb8043167214127d3c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-cb8043167214127d3c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/209_Freedom_of_expression_in_new_Arab_landscape","url":"https://api.media.ccc.de/public/events/import-cb8043167214127d3c","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":812,"event_guid":"import-fc17172c131ec48efa","weight":1},{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":1},{"event_id":836,"event_guid":"import-6a2a70a40fa9ac92e5","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":1952,"event_guid":"e7ca6d029c833227","weight":1},{"event_id":2984,"event_guid":"950ed6a2-a367-43c4-a046-022d37bfc039","weight":1},{"event_id":2990,"event_guid":"6de11db2-2aae-4cd1-969f-f2a16a557f8f","weight":1},{"event_id":2994,"event_guid":"1a1b0866-0e61-410e-842d-2f6879634423","weight":1},{"event_id":3001,"event_guid":"45e4959c-f5d7-44b1-968f-9b2d8832e480","weight":1},{"event_id":3110,"event_guid":"b7935ff9-54e1-4b97-9ce4-1febd50e6f82","weight":1}]},{"guid":"import-8aacd36995f77f7f3d","title":"Lobbying für Nerds","subtitle":null,"slug":"174_Lobbying_fuer_Nerds","link":"http://www.ccc.de/congress/2004/fahrplan/event/174.en.html","description":"Eine Vielzahl von politischen Direktiven und Gesetzen veränder den Umgang mit den neuen Medien. Viele einflußreiche Lobbygruppen nutzen die in diesem Themengebiet unerfahrenen Politiker, um ihre Interessen politisch durchzubringen. Idee dieses Vortrags ist es, politische Prozesse transparent zu machen und Hilfestellungen zu geben, wie für die eigenen Vorstellungen einer freien Wissensgesellschaft an die Entscheidungsträger kommuniziert werden kann.\n","original_language":"eng","persons":["Markus Beckedahl","Andy Müller-Maguhn","Andreas Dietl","Andreas Bogk"],"tags":["21c3"," Society"],"view_count":4,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:09.673+02:00","length":3880,"duration":3880,"thumb_url":"https://static.media.ccc.de/media/congress/2004/174 Lobbying fuer Nerds.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/174 Lobbying fuer Nerds_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-8aacd36995f77f7f3d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-8aacd36995f77f7f3d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/174_Lobbying_fuer_Nerds","url":"https://api.media.ccc.de/public/events/import-8aacd36995f77f7f3d","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1}]},{"guid":"import-d31ef9384f4b7266c8","title":"TKÜV - Das Ohr am Draht","subtitle":"Recht, Regulierung und Realität der Telekommunikationsüberwachung in Deutschland","slug":"278_TKUeV-Das_Ohr_am_Draht","link":"http://www.ccc.de/congress/2004/fahrplan/event/278.en.html","description":"Rund 200 Verpflichtete müssen bis zum 31.12.2004 Konzepte für die Überwachung von E-Mail bei der RegTP eingereicht haben. Über Breitband-IP-Access (xDSL, Cable, Wireless) und VoiP wird heftig diskutiert. Der Vortrag gibt einen Überblick über Entwicklung und Stand der Normen zur Telekommunikationsüberwachung und deren Umsetzung mit dem Schwerpunkt Internet und IP-basierende Dienste.\n","original_language":"eng","persons":["Jörg Müller-Kindt"],"tags":["21c3"," Society"],"view_count":4,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:51.564+02:00","length":3389,"duration":3389,"thumb_url":"https://static.media.ccc.de/media/congress/2004/278 TKUeV-Das Ohr am Draht.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/278 TKUeV-Das Ohr am Draht_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d31ef9384f4b7266c8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d31ef9384f4b7266c8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/278_TKUeV-Das_Ohr_am_Draht","url":"https://api.media.ccc.de/public/events/import-d31ef9384f4b7266c8","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1}]},{"guid":"import-a7100f85ea482235a4","title":"Die Üblichen Verdächtigen","subtitle":null,"slug":"052_Die_Ueblichen_Verdaechtigen","link":"http://www.ccc.de/congress/2004/fahrplan/event/52.en.html","description":"Eröffnung des Congresses und Keynote durch Peter Glaser.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":16,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:19.011+02:00","length":1786,"duration":1786,"thumb_url":"https://static.media.ccc.de/media/congress/2004/052 Die Ueblichen Verdaechtigen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/052 Die Ueblichen Verdaechtigen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-a7100f85ea482235a4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-a7100f85ea482235a4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/052_Die_Ueblichen_Verdaechtigen","url":"https://api.media.ccc.de/public/events/import-a7100f85ea482235a4","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":888,"event_guid":"import-562245a5e2737f8681","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":2311,"event_guid":"29dbd740-b1c8-476d-b8f1-ad98df418bb7","weight":1}]},{"guid":"import-bf3cd69c919622674e","title":"c3 - the network equipment delivery","subtitle":null,"slug":"21C3_-_The_Network_Equipment_Delivery","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["21c3"],"view_count":154,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2026-03-10T08:45:08.819+01:00","length":285,"duration":285,"thumb_url":"https://static.media.ccc.de/media/congress/2004/bonus/21C3_-_The_Network_Equipment_Delivery.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/bonus/21C3_-_The_Network_Equipment_Delivery_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-bf3cd69c919622674e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-bf3cd69c919622674e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/21C3_-_The_Network_Equipment_Delivery","url":"https://api.media.ccc.de/public/events/import-bf3cd69c919622674e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":2},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":4},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":4},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":2},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":3}]},{"guid":"import-d5ee3267065710d01e","title":"Hacktivity","subtitle":null,"slug":"090_Hacktivity","link":"http://www.ccc.de/congress/2004/fahrplan/event/90.en.html","description":"Um den Menschen wieder Spass und Kreativität beim Umgang mit der Technik zu vermitteln, hat sich die Chaosnahe Gruppe Wien eine kleine Unterhaltungsshow mit Publikumsbeteiligung einfallen lassen. Es geht hierbei weniger um konkretes Fachwissen, als um den kreativen Umgang mit eben diesem. Vier Kandidaten müssen sich den schweren Aufgaben des Hacktivity Bewerbes stellen wollen. Ebenso bekommt das Publikum eine Aufgabe, die es zu lösen hat..\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":13,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:46.147+02:00","length":5633,"duration":5633,"thumb_url":"https://static.media.ccc.de/media/congress/2004/090 Hacktivity.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/090 Hacktivity_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d5ee3267065710d01e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d5ee3267065710d01e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/090_Hacktivity","url":"https://api.media.ccc.de/public/events/import-d5ee3267065710d01e","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":812,"event_guid":"import-fc17172c131ec48efa","weight":2},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":3}]},{"guid":"import-5685aa37dd09699cd0","title":"Lightning Talks: Day 1","subtitle":null,"slug":"142_Lightning_Talk-Shortest_C_Coding_Contest_Announcement","link":"http://www.ccc.de/congress/2004/fahrplan/event/142.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:14.846+02:00","length":266,"duration":266,"thumb_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Shortest C Coding Contest Announcement.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/142 Lightning Talk-Shortest C Coding Contest Announcement_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5685aa37dd09699cd0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5685aa37dd09699cd0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/142_Lightning_Talk-Shortest_C_Coding_Contest_Announcement","url":"https://api.media.ccc.de/public/events/import-5685aa37dd09699cd0","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-6a2a70a40fa9ac92e5","title":"Free Software in South America","subtitle":null,"slug":"038_Free_Software_Usage_in_South_America","link":"http://www.ccc.de/congress/2004/fahrplan/event/38.en.html","description":"Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":19,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:23.624+02:00","length":3066,"duration":3066,"thumb_url":"https://static.media.ccc.de/media/congress/2004/038 Free Software Usage in South America.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/038 Free Software Usage in South America_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-6a2a70a40fa9ac92e5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-6a2a70a40fa9ac92e5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/038_Free_Software_Usage_in_South_America","url":"https://api.media.ccc.de/public/events/import-6a2a70a40fa9ac92e5","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":812,"event_guid":"import-fc17172c131ec48efa","weight":1},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":1},{"event_id":832,"event_guid":"import-cb8043167214127d3c","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":873,"event_guid":"import-5e09c79bf02694e476","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1}]},{"guid":"import-0bb1b23fdd210c6531","title":"Fnord-Jahresrückblick","subtitle":null,"slug":"070_Fnord-Jahresrueckblick","link":"http://www.ccc.de/congress/2004/fahrplan/event/70.en.html","description":"Der Fnord-Jahresrückblick beleuchtet Teile des Weltgeschehens des gerade zuende gehenden Jahres, die wir für unter Gebühr beleuchtet halten: Nachrichten, die es gar nicht in die Mainstream-Medien geschafft haben, oder die von irgendwelchen Sommerloch-Skandalchen auf Seite 15 ins Kleingedruckte verdrängt wurden.  Trotz des Ernstes der Lage zeigt der  Fnord-Jahresrückblick aber auch den humoristischen Teil der Nachrichtenlage.\n","original_language":"eng","persons":[],"tags":["21c3"," Culture"],"view_count":51,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:25.127+02:00","length":4111,"duration":4111,"thumb_url":"https://static.media.ccc.de/media/congress/2004/070 Fnord-Jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/070 Fnord-Jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-0bb1b23fdd210c6531-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-0bb1b23fdd210c6531-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/070_Fnord-Jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-0bb1b23fdd210c6531","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":5},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":12},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":9},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":4},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":5},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":4}]},{"guid":"import-0a413f7d032aa553e8","title":"Physical Security","subtitle":null,"slug":"130_Physical_Security_Pt_1","link":"http://www.ccc.de/congress/2004/fahrplan/event/130.en.html","description":"Physical security is an oft-overlooked but critical prerequisite for good information security. Software has leaked into every aspect of modern life and now controls access to physical resources as well as to business and personal information. When critically examined, physical security policies and mechanisms have (perhaps have *always*) contained substantial snake oil components, including back doors, extensive use of protection by \"security through obscurity\", and piece solutions which ignore their environmental context or need to function in a system.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":1,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:07.944+02:00","length":2689,"duration":2689,"thumb_url":"https://static.media.ccc.de/media/congress/2004/130 Physical Security Pt 1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/130 Physical Security Pt 1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-0a413f7d032aa553e8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-0a413f7d032aa553e8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/130_Physical_Security_Pt_1","url":"https://api.media.ccc.de/public/events/import-0a413f7d032aa553e8","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":800,"event_guid":"import-9906f6330cc2edabce","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1}]},{"guid":"import-e1e2fe74a381c0f127","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-Window_Manager_Improved_GUI_Concepts","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":0,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:53.141+02:00","length":353,"duration":353,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Window Manager Improved GUI Concepts.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-Window Manager Improved GUI Concepts_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e1e2fe74a381c0f127-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e1e2fe74a381c0f127-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-Window_Manager_Improved_GUI_Concepts","url":"https://api.media.ccc.de/public/events/import-e1e2fe74a381c0f127","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-c871e4bc6ef12f09f9","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-TPP_text_presentation_program","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":["Volker Birk"],"tags":["21c3"," General"],"view_count":2,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:22.447+02:00","length":332,"duration":332,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-TPP text presentation program.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-TPP text presentation program_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-c871e4bc6ef12f09f9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-c871e4bc6ef12f09f9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-TPP_text_presentation_program","url":"https://api.media.ccc.de/public/events/import-c871e4bc6ef12f09f9","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-7d27a5ec4fcd8ee9be","title":"Bluetooth Hacking","subtitle":null,"slug":"066_Bluetooth_Hacking","link":"http://www.ccc.de/congress/2004/fahrplan/event/66.en.html","description":"Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure...\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":147,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:43.848+02:00","length":5875,"duration":5875,"thumb_url":"https://static.media.ccc.de/media/congress/2004/066 Bluetooth Hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/066 Bluetooth Hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7d27a5ec4fcd8ee9be-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7d27a5ec4fcd8ee9be-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/066_Bluetooth_Hacking","url":"https://api.media.ccc.de/public/events/import-7d27a5ec4fcd8ee9be","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":4},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":5},{"event_id":817,"event_guid":"import-c865fbf5a8d13de458","weight":4},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":6},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":5},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":5}]},{"guid":"import-5e09c79bf02694e476","title":"Hacking EU funding for a FOSS project","subtitle":null,"slug":"062_Hacking_EU_funding_for_a_FOSS_project","link":"http://www.ccc.de/congress/2004/fahrplan/event/62.en.html","description":"FOSS culture hacks^h^h^h^h meets the EU buerocracy. It is not easy for FOSS projects to get $$$ funding by the European Union. We'll look and discuss how it played out for the PyPy project, a language project targetting itself with a \"Münchhausen\" approach. We'll try to see why it took the project - tackling deeply technical issues - one year to communicate \"correctly\" with the European Union.\n","original_language":"eng","persons":[],"tags":["21c3"," Community"],"view_count":9,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:57.311+02:00","length":3397,"duration":3397,"thumb_url":"https://static.media.ccc.de/media/congress/2004/062 Hacking EU funding for a FOSS project.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/062 Hacking EU funding for a FOSS project_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5e09c79bf02694e476-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5e09c79bf02694e476-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/062_Hacking_EU_funding_for_a_FOSS_project","url":"https://api.media.ccc.de/public/events/import-5e09c79bf02694e476","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":820,"event_guid":"import-4104c4f713e1c17903","weight":2},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":2}]},{"guid":"import-d1c5557749e194d544","title":"Lightning Talks: Introducing Meshdisk single floppy Linux","subtitle":null,"slug":"250_Lightning_Talk-Introducing_Meshdisk_single_floppy_Linux","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":0,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:49.931+02:00","length":417,"duration":417,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Introducing Meshdisk single floppy Linux.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-Introducing Meshdisk single floppy Linux_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-d1c5557749e194d544-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-d1c5557749e194d544-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-Introducing_Meshdisk_single_floppy_Linux","url":"https://api.media.ccc.de/public/events/import-d1c5557749e194d544","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-52a7361983fa23c44f","title":"Die Propagandawüste des realen Krieges","subtitle":"Direkte und indirekte Steuerungsmöglichkeiten der Medien im Krieg des 21. Jahrhunderts","slug":"129_Die_Propagandawueste_des_realen_Krieges","link":"http://www.ccc.de/congress/2004/fahrplan/event/129.en.html","description":"Ein Essay über die Medienstrategien kriegsführender Parteien von Napoleon bis zum Zeitalter der Satellitentechnik und Enthauptungen per Videostream im Internet. Im Fokus sind vorwiegend die Entwicklungen und Veränderungen im Nachgang des Vietnamkrieges. Eine Zeitachse vom Falklandkrieg via NATO-Jugoslawien-Feldzug bis zum Irak-Krieg und dem war on terror von Heute wird beleuchtet und kritisch bewertet.\n","original_language":"eng","persons":["Gerd Fittkau"],"tags":["21c3"," Society"],"view_count":7,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:04.312+02:00","length":4050,"duration":4050,"thumb_url":"https://static.media.ccc.de/media/congress/2004/129 Die Propagandawueste des realen Krieges.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/129 Die Propagandawueste des realen Krieges_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-52a7361983fa23c44f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-52a7361983fa23c44f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/129_Die_Propagandawueste_des_realen_Krieges","url":"https://api.media.ccc.de/public/events/import-52a7361983fa23c44f","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2}]},{"guid":"import-ee7ad68100703a6507","title":"RFID Technologie und Implikationen","subtitle":null,"slug":"246_RFID_Technologie_und_Implikationen","link":"http://www.ccc.de/congress/2004/fahrplan/event/246.en.html","description":"Einführende Präsentation zum Thema RFID. Die Grundlagen der RFID Technik und des dahinter liegenden EPC Netzwerks werden erklärt. Darauf aufbauend werden Verbraucherschutzfragen diskutiert. Anhand von\nAttack-Trees werden dann Sicherheitsrisiken isoliert und zum Teil, insbesondere im Bereich der Deaktivierungsverfahren, vertieft.\n","original_language":"eng","persons":["Holger Ziekow"],"tags":["21c3"," Science"],"view_count":7,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:12.128+02:00","length":3308,"duration":3308,"thumb_url":"https://static.media.ccc.de/media/congress/2004/246 RFID Technologie und Implikationen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/246 RFID Technologie und Implikationen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-ee7ad68100703a6507-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-ee7ad68100703a6507-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/246_RFID_Technologie_und_Implikationen","url":"https://api.media.ccc.de/public/events/import-ee7ad68100703a6507","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":803,"event_guid":"import-496dba1358b7997c25","weight":1},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":838,"event_guid":"import-c1686d2fd8b7d767ee","weight":1},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":2},{"event_id":851,"event_guid":"import-d5ee3267065710d01e","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":2},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":887,"event_guid":"import-a97a7d656631c75f3f","weight":1},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":898,"event_guid":"import-8aacd36995f77f7f3d","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1}]},{"guid":"import-6e52965da255fa6ba9","title":"The Kernel Accelerator Device","subtitle":"Reconfigurable computing for the kernel","slug":"111_The_Kernel_Accelerator_Device","link":"http://www.ccc.de/congress/2004/fahrplan/event/111.en.html","description":"KAD is an interdisciplinary development project which consists of kernel driver programming, fpga programming (VHDL/Verilog) and hardware development. There is no working KAD at the moment, but our aim is to develop such a device under the GPL with much support from everyone who likes to do so. The development will be carried out from bottom up by integrating existing components into the kad.\n","original_language":"eng","persons":["LuJa"],"tags":["21c3"," Hacking"],"view_count":3,"promoted":false,"date":"2004-12-29T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:06.752+02:00","length":2700,"duration":2700,"thumb_url":"https://static.media.ccc.de/media/congress/2004/111 The Kernel Accelerator Device.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/111 The Kernel Accelerator Device_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-6e52965da255fa6ba9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-6e52965da255fa6ba9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/111_The_Kernel_Accelerator_Device","url":"https://api.media.ccc.de/public/events/import-6e52965da255fa6ba9","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-9906f6330cc2edabce","title":"Digital Prosthetics","subtitle":null,"slug":"060_Digital_Prosthetics","link":"http://www.ccc.de/congress/2004/fahrplan/event/60.en.html","description":"A lecture on how digital media prosthetics, institutionalisation (in particular the manifestations of copyright and patent law which lurk behind vested interests in controlling the transition to a vastly powerful new world), and the imperatives of corporate planning have come into a conflict so fierce that shared lived experience, increasingly, is forced to undergo a rapid process of commodification.\n","original_language":"eng","persons":[],"tags":["21c3"," Society"],"view_count":10,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:03.057+02:00","length":2198,"duration":2198,"thumb_url":"https://static.media.ccc.de/media/congress/2004/060 Digital Prosthetics.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/060 Digital Prosthetics_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-9906f6330cc2edabce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-9906f6330cc2edabce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/060_Digital_Prosthetics","url":"https://api.media.ccc.de/public/events/import-9906f6330cc2edabce","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":835,"event_guid":"import-0a413f7d032aa553e8","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":866,"event_guid":"import-86823fbaef16d5d5b8","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":896,"event_guid":"import-bc7febd16b387304be","weight":1},{"event_id":900,"event_guid":"import-0471982425cb8af2ac","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1}]},{"guid":"import-4066c8a0f3fb731db4","title":"Lightning Talks: Day 2","subtitle":null,"slug":"157_Lightning_Talk-SEXual_Salvation_","link":"http://www.ccc.de/congress/2004/fahrplan/event/157.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":3,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:02.805+02:00","length":493,"duration":493,"thumb_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-SEXual Salvation .jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/157 Lightning Talk-SEXual Salvation _preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-4066c8a0f3fb731db4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-4066c8a0f3fb731db4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/157_Lightning_Talk-SEXual_Salvation_","url":"https://api.media.ccc.de/public/events/import-4066c8a0f3fb731db4","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]},{"guid":"import-5a4a8c1099b9cb88ee","title":"Anti-Honeypot Technology","subtitle":null,"slug":"109_Anti-Honeypot_Techniques","link":"http://www.ccc.de/congress/2004/fahrplan/event/109.en.html","description":"Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots.\n","original_language":"eng","persons":["Thorsten Holz"],"tags":["21c3"," Hacking"],"view_count":154,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:14.597+02:00","length":3341,"duration":3341,"thumb_url":"https://static.media.ccc.de/media/congress/2004/109 Anti-Honeypot Techniques.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/109 Anti-Honeypot Techniques_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5a4a8c1099b9cb88ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5a4a8c1099b9cb88ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/109_Anti-Honeypot_Techniques","url":"https://api.media.ccc.de/public/events/import-5a4a8c1099b9cb88ee","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":4},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":3},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":9},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":5},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":3},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":4}]},{"guid":"import-36a3b6a2ff3909dcad","title":"Inside PDF","subtitle":null,"slug":"067_Inside_PDF","link":"http://www.ccc.de/congress/2004/fahrplan/event/67.en.html","description":"Introduction to the Portable Document Format. We look inside PDF files and learn about the format itself, it's strengths and weaknesses, and try to set a base for further individual studies.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":14,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:38.475+02:00","length":3295,"duration":3295,"thumb_url":"https://static.media.ccc.de/media/congress/2004/067 Inside PDF.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/067 Inside PDF_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-36a3b6a2ff3909dcad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-36a3b6a2ff3909dcad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/067_Inside_PDF","url":"https://api.media.ccc.de/public/events/import-36a3b6a2ff3909dcad","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":2},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":2},{"event_id":818,"event_guid":"import-bc28bda3e380385a9d","weight":2},{"event_id":823,"event_guid":"import-52a7361983fa23c44f","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":3},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":2},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":2}]},{"guid":"import-7b2da0dafbb3681624","title":"Lightning Talks: NetBSD Status Report","subtitle":null,"slug":"250_Lightning_Talk-NetBSD_Status_Report","link":"http://www.ccc.de/congress/2004/fahrplan/event/250.en.html","description":"Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.\n","original_language":"eng","persons":[],"tags":["21c3"," General"],"view_count":7,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:15:58.403+02:00","length":247,"duration":247,"thumb_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-NetBSD Status Report.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/250 Lightning Talk-NetBSD Status Report_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7b2da0dafbb3681624-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7b2da0dafbb3681624-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/250_Lightning_Talk-NetBSD_Status_Report","url":"https://api.media.ccc.de/public/events/import-7b2da0dafbb3681624","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[]}]}