{"acronym":"23c3","aspect_ratio":"4:3","updated_at":"2026-04-04T13:30:06.203+02:00","title":"23C3: Who can you trust?","schedule_url":null,"slug":"congress/2006","event_last_released_at":"2008-01-01T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2006","logo_url":"https://static.media.ccc.de/media/congress/2006/folder-23c3.png","images_url":"https://static.media.ccc.de/media/congress/2006","recordings_url":"https://cdn.media.ccc.de/congress/2006","url":"https://api.media.ccc.de/public/conferences/23c3","events":[{"guid":"import-db54e58bf23eac0f57","title":"The Rise and Fall of Open Source","subtitle":"The Million Eyeball Principle and forkbombs","slug":"23C3-1523-en-the_rise_and_fall_of_open_source","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1523.en.html","description":"This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends.\n","original_language":"eng","persons":["Tonnerre Lombard"],"tags":["23c3"," Community"],"view_count":30,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-01-05T13:45:07.021+01:00","length":2793,"duration":2793,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1523-en-the_rise_and_fall_of_open_source.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1523-en-the_rise_and_fall_of_open_source_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-db54e58bf23eac0f57-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-db54e58bf23eac0f57-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1523-en-the_rise_and_fall_of_open_source","url":"https://api.media.ccc.de/public/events/import-db54e58bf23eac0f57","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":162,"event_guid":"import-c103a561a60405ea5c","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":2},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1051,"event_guid":"import-4cc0be04257f4b5318","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":2},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1102,"event_guid":"import-d92bb58ed116334bd1","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1146,"event_guid":"import-c1870c28577ba8fca5","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1292,"event_guid":"import-67317fc1b3b5c3dc8c","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1564,"event_guid":"import-6719b9183f1139890a","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4281,"event_guid":"271f3623-a772-4052-81da-04872d9651ce","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1}]},{"guid":"import-0690032e133e01561f","title":"Hacking the Electoral Law","subtitle":null,"slug":"23C3-1692-en-hacking_the_electoral_law","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1692.en.html","description":"How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament.\n","original_language":"eng","persons":["Ulrich Wiesner"],"tags":["23c3"," Culture"],"view_count":9,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-12-15T16:30:03.221+01:00","length":4381,"duration":4381,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1692-en-hacking_the_electoral_law.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1692-en-hacking_the_electoral_law_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-0690032e133e01561f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-0690032e133e01561f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1692-en-hacking_the_electoral_law","url":"https://api.media.ccc.de/public/events/import-0690032e133e01561f","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-3358e29cb284c40d70","title":"To live outside the law you gotta be honest","subtitle":"Ist nicht jedes Passwort eine Manifestation des Mißtrauens?","slug":"23C3-1540-de-learn_to_be_honest","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1540.en.html","description":"As a dealer of illegal substances in the late 60s, early 70s, I learned how to work without written contracts and without advertising.\n","original_language":"eng","persons":["Werner Pieper"],"tags":["23c3"," Society"],"view_count":622,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-23T16:15:05.949+01:00","length":3293,"duration":3293,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1540-de-learn_to_be_honest.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1540-de-learn_to_be_honest_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-3358e29cb284c40d70-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-3358e29cb284c40d70-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1540-de-learn_to_be_honest","url":"https://api.media.ccc.de/public/events/import-3358e29cb284c40d70","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":6},{"event_id":1145,"event_guid":"import-909ed6ab4ce1e0379c","weight":3},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":3},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":3},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":2},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":3},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":2}]},{"guid":"import-4cc0be04257f4b5318","title":"Hacking a Country: FOSS in India","subtitle":"An Overview Free and Open Source Software efforts and projects in India","slug":"23C3-1603-en-foss_in_india","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1603.en.html","description":"This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer.\n","original_language":"eng","persons":["Atul Chitnis"],"tags":["23c3"," Community"],"view_count":27,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-31T13:15:18.431+01:00","length":3701,"duration":3701,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1603-en-foss_in_india.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1603-en-foss_in_india_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4cc0be04257f4b5318-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4cc0be04257f4b5318-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1603-en-foss_in_india","url":"https://api.media.ccc.de/public/events/import-4cc0be04257f4b5318","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1102,"event_guid":"import-d92bb58ed116334bd1","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1474,"event_guid":"import-00d4d9403ecf738d65","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1649,"event_guid":"import-7cade354c732da038f","weight":1},{"event_id":1651,"event_guid":"import-0effc299ee3daeeece","weight":1},{"event_id":1704,"event_guid":"import-a9812440f38232930c","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3705,"event_guid":"b8d9fac7-bbe6-40da-aa80-aed27f77a708","weight":1},{"event_id":3748,"event_guid":"09eb4f7a-8cf0-436f-aaa4-88190ee26e6d","weight":1}]},{"guid":"import-c50f2b33dd2c1a31d6","title":"Lightning Talks Day 1","subtitle":null,"slug":"23C3-1514-en-lightning_talks_day_1","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1514.en.html","description":"Definition: Lightning Talks is a daily event. which consists in one\nhour of several short talks. Each talk is limited to five minutes.\n\nGoal: There is one slot for Lightning Talks each day of the\ncongress.  The goal is to present 10 talks within each slot.\nSo this might be up to 40 interesting talks in total.\n\nSee the Wiki page for current info.\n","original_language":"eng","persons":["b9punk","Sven Guckes"],"tags":["23c3"],"view_count":36,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-22T10:30:06.788+01:00","length":3488,"duration":3488,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1514-en-lightning_talks_day_1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1514-en-lightning_talks_day_1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c50f2b33dd2c1a31d6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c50f2b33dd2c1a31d6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1514-en-lightning_talks_day_1","url":"https://api.media.ccc.de/public/events/import-c50f2b33dd2c1a31d6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1101,"event_guid":"import-760f3fe02dd1e65e6b","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1119,"event_guid":"import-519513c2cae6de84b6","weight":2},{"event_id":1125,"event_guid":"import-5e422c2c63c5cffb01","weight":3},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1}]},{"guid":"import-5c51d2ca6467e8e4a4","title":"Kollaboratives Wissensmanagement im Bildungsbereich","subtitle":"Die Zitierfähigkeit von Wiki-Wissen","slug":"23C3-1543-de-kollaboratives_wissenmanagement","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1543.en.html","description":"Im Mittelpunkt des Beitrags steht das wissenschaftliche Zitieren der Wikipedia im Kontext der Diskussion um stabile Versionen, Qualitätssicherung und die Sicherung von Expertenwissen; welcher Zusammenhang besteht zwischen wissenschaftlichem Arbeiten und dem Wissenskonsens der Wikipedia? Erlaubt die Wikipedia die Bereitstellung von wissenschaftlich verwertbaren Zitaten und wie kann sie wissenschaftlich zitiert werden?\n","original_language":"eng","persons":["Rüdiger Weis","Martin Haase/maha"],"tags":["23c3"," Science"],"view_count":87,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-01-14T13:30:07.308+01:00","length":3666,"duration":3666,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1543-de-kollaboratives_wissenmanagement.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1543-de-kollaboratives_wissenmanagement_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-5c51d2ca6467e8e4a4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-5c51d2ca6467e8e4a4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1543-de-kollaboratives_wissenmanagement","url":"https://api.media.ccc.de/public/events/import-5c51d2ca6467e8e4a4","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":79,"event_guid":"import-2654c06bae3e5515d7","weight":3},{"event_id":572,"event_guid":"import-57f029a26744e148e6","weight":2},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":2},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":2},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":3},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":2},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":3},{"event_id":2400,"event_guid":"4a9bf7495fd14b4e4ac986bc0a27106b","weight":3},{"event_id":2880,"event_guid":"72ad2630-b736-4d4c-8ea1-d982076426bc","weight":2}]},{"guid":"import-4be8d960e783fac67d","title":"Java wird Groovy","subtitle":"Eine Einführung in die neue, dynamische Sprache für das Java-Ökosystem","slug":"23C3-1419-de-java_wird_groovy","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1419.en.html","description":"Groovy ist eine neue, dynamische Sprache für die Java-VM. \nSie greift Konzepte von Smalltalk, Python und Ruby auf und integriert Sie nach Java.\nDie Integration ist leichtgängig, da die Syntax hinreichend ähnlich zu Java ist und\nreibungslos bestehende Java-Bibliotheken genutzt werden können.\n","original_language":"eng","persons":["tof (Christof Vollrath)"],"tags":["23c3"," Hacking"],"view_count":44,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-27T13:15:09.150+01:00","length":3030,"duration":3030,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1419-de-java_wird_groovy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1419-de-java_wird_groovy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4be8d960e783fac67d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4be8d960e783fac67d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1419-de-java_wird_groovy","url":"https://api.media.ccc.de/public/events/import-4be8d960e783fac67d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2},{"event_id":1082,"event_guid":"import-d11d50d901f7d39189","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":2},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1296,"event_guid":"import-bad5c7ffff3e2cea52","weight":1},{"event_id":1350,"event_guid":"import-bbaef39cd440f712fd","weight":1},{"event_id":1674,"event_guid":"import-0657639f3aaa512fd5","weight":1},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":1},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":1}]},{"guid":"import-18f66a038ddc2f30c7","title":"4+2+1 Jahre BigBrotherAwards Deutschland","subtitle":"Eine Lesung aus dem Buch \"Schwarzbuch Datenschutz\"","slug":"23C3-1561-de-big_brother_awards","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1561.en.html","description":"Vorgestellt wird das \"Schwarzbuch Datenschutz\", das in diesem Jahr entstanden ist: Sieben Jahre BigBrotherAwards Deutschland sind gelaufen. Was ist passiert und was bleibt übrig? Eine Rückschau auf die interessantesten Gewinner der ersten sechs Jahre, die im Buch \"Schwarzbuch Datenschutz\" zusammengefasst wurden, und auf die aktuellen Preisträger.\n","original_language":"eng","persons":["Rena Tangens","padeluun"],"tags":["23c3"," Society"],"view_count":78,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-06-28T14:00:05.789+02:00","length":3176,"duration":3176,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1561-de-big_brother_awards.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1561-de-big_brother_awards_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-18f66a038ddc2f30c7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-18f66a038ddc2f30c7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1561-de-big_brother_awards","url":"https://api.media.ccc.de/public/events/import-18f66a038ddc2f30c7","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":2},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":2},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":2},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":2},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":2},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":2},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":3},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":2},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":2}]},{"guid":"import-b44a02e908289fda31","title":"Unlocking FileVault","subtitle":"An analysis of Apple's encrypted disk storage system","slug":"23C3-1642-en-unlocking_filevault","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1642.en.html","description":"Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X.\n","original_language":"eng","persons":["Ralf-Philipp Weinmann","Jacob Appelbaum"],"tags":["23c3"," Hacking"],"view_count":370,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-26T23:00:04.787+01:00","length":3257,"duration":3257,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1642-en-unlocking_filevault.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1642-en-unlocking_filevault_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b44a02e908289fda31-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b44a02e908289fda31-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1642-en-unlocking_filevault","url":"https://api.media.ccc.de/public/events/import-b44a02e908289fda31","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":977,"event_guid":"import-7066236907169c00ee","weight":2},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":4},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":1},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":4},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":3},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":1847,"event_guid":"47tqlwa7F-wL0kxo11mvgg","weight":1},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":3},{"event_id":2528,"event_guid":"6393a33b-889d-4850-b0e3-cbc7caeab1cb","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":3},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":2},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":2},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":1},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":1}]},{"guid":"import-581b252506da8022c4","title":"Drones","subtitle":"Autonomous flying vehicles","slug":"23C3-1402-de-drones","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1402.en.html","description":"I am watching you: drones for private use are getting real. A live presentation of actual devices in real action.\n","original_language":"eng","persons":["Steini"],"tags":["23c3"," Science"],"view_count":529,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-14T22:45:19.558+01:00","length":3039,"duration":3039,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1402-de-drones.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1402-de-drones_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-581b252506da8022c4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-581b252506da8022c4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1402-de-drones","url":"https://api.media.ccc.de/public/events/import-581b252506da8022c4","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":78,"event_guid":"import-61e36e026ee60071ab","weight":4},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":33},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":5},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":2},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":7},{"event_id":3225,"event_guid":"8ded6890-b77e-4969-9d2c-06240f008528","weight":2},{"event_id":3513,"event_guid":"5e2e66e3-23ac-4331-b2cf-5428a2649694","weight":6},{"event_id":3672,"event_guid":"c45fa431-69f9-47db-a90c-fb596efdcb55","weight":7},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":3},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":5},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":2},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":13},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":2},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":2},{"event_id":6467,"event_guid":"6e25dd44-763f-494b-bae5-75b409dcf1d0","weight":2}]},{"guid":"import-2d3f3e91ab482231f6","title":"Kritik an den Illuminaten zwischen 1787 und 2006","subtitle":"Der Stand der Auseinandersetzung zwischen Discordiern und Illuminaten","slug":"23C3-1678-de-kritik_an_den_illuminaten","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1678.en.html","description":"Bereits 1787 formulierte der Theologe Benedikt Stattler in seiner Schrift \"Das Geheimniß der Bosheit des Stifters des Illuminatismus in Baiern zur Warnung der Unvorsichtigen hell aufgedeckt von einem seiner alten Kenner und Freunde\" Kritik an dem von Adam Weishaupt gegründeten Illuminatenorden. Der CCC hat sich in vielen Aspekten in seiner Eigenschaft als discordische Vereinigung ebenfalls in kritischer Art und Weise mit Plänen und Aktionen der Illuminaten im Sinne der \"New World Order\" und Aktionen wie der \"Total Information Awareness\" auseinandergesetzt.\n","original_language":"eng","persons":["Andy Müller-Maguhn"],"tags":["23c3"," Culture"],"view_count":427,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T11:45:05.398+01:00","length":3067,"duration":3067,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1678-de-kritik_an_den_illuminaten.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1678-de-kritik_an_den_illuminaten_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-2d3f3e91ab482231f6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-2d3f3e91ab482231f6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1678-de-kritik_an_den_illuminaten","url":"https://api.media.ccc.de/public/events/import-2d3f3e91ab482231f6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":3},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":3},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":3},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":4},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":5},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":3},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":3},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":6},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":5},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":2},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":2},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":2}]},{"guid":"import-1352ddbdeebc2fb2b6","title":"Open Source Machine Translation","subtitle":"From tools, to tricks, to projects: build a translation engine from Klingon to Finnish in an hour","slug":"23C3-1701-en-open_source_machine_translation","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1701.en.html","description":"Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods.  This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen.\n","original_language":"eng","persons":["Christine Corbett Moran"],"tags":["23c3"," Science"],"view_count":37,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-18T03:00:02.541+01:00","length":2669,"duration":2669,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1701-en-open_source_machine_translation.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1701-en-open_source_machine_translation_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-1352ddbdeebc2fb2b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-1352ddbdeebc2fb2b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1701-en-open_source_machine_translation","url":"https://api.media.ccc.de/public/events/import-1352ddbdeebc2fb2b6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-3f1e79fba7d576051e","title":"Schlossöffnung bei der Staatssicherheit der DDR","subtitle":"Werkzeuge und Vorgehen der STASI","slug":"23C3-1759-de-schlossoeffnung_staatssicherheit","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1759.en.html","description":"Arthur Meister erläutert das operative Vorgehen und die speziellen Werkzeuge zur Schlossöffnung,\ndie von der Staatssicherheit der DDR verwendet wurden. Von der opartiven Vorbereitung, über die Erstöffnung bis zur Herstellung von Nachschlüsslen werden speziell von der STASI entwicklete Werkzeuge und deren Einsatz gezeigt.\n","original_language":"eng","persons":["Arthur Meister"],"tags":["23c3"," Society"],"view_count":1543,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-03T17:00:04.869+02:00","length":3069,"duration":3069,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1759-de-schlossoeffnung_staatssicherheit.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1759-de-schlossoeffnung_staatssicherheit_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-3f1e79fba7d576051e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-3f1e79fba7d576051e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1759-de-schlossoeffnung_staatssicherheit","url":"https://api.media.ccc.de/public/events/import-3f1e79fba7d576051e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":196,"event_guid":"import-0ef4016fcc30dbd97e","weight":7},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":9},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":4},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":3},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":11},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":3},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":3},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":6},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":4},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":5}]},{"guid":"import-4a118e414c2784362b","title":"Hacking fingerprint recognition systems","subtitle":"Kann ich dir ein Bier ausgeben?","slug":"23C3-1578-de-hacking_fingerprint_recognition_systems","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1578.en.html","description":"Der Vortrag stellt Wege und Werkzeuge vor um aus unterschiedlichen Quellen Bilder für die Herstellung von Fingerabdruckattrappen zu gewinnen.\n","original_language":"eng","persons":["starbug"],"tags":["23c3"," Hacking"],"view_count":544,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-02T15:45:08.255+02:00","length":3637,"duration":3637,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1578-de-hacking_fingerprint_recognition_systems.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1578-de-hacking_fingerprint_recognition_systems_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4a118e414c2784362b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4a118e414c2784362b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1578-de-hacking_fingerprint_recognition_systems","url":"https://api.media.ccc.de/public/events/import-4a118e414c2784362b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":14},{"event_id":1935,"event_guid":"Uo38_f5Bc4djTtf3Phgwzw","weight":11},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":14},{"event_id":2438,"event_guid":"ba45991d-6548-4a8f-90d8-da72fd417f89","weight":5},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":5},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":9}]},{"guid":"import-501635afc9ab5db2ce","title":"Closing Ceremony","subtitle":"Who did you trust?","slug":"23C3-1727-en-closing_ceremony","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1727.en.html","description":"\n","original_language":"eng","persons":["Tim Pritlove"],"tags":["23c3"," General"],"view_count":53,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-23T02:45:03.342+01:00","length":1907,"duration":1907,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1727-en-closing_ceremony.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1727-en-closing_ceremony_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-501635afc9ab5db2ce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-501635afc9ab5db2ce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1727-en-closing_ceremony","url":"https://api.media.ccc.de/public/events/import-501635afc9ab5db2ce","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":422,"event_guid":"import-eb14e2366d0f50820e","weight":1},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":1},{"event_id":780,"event_guid":"import-5c1c621fcd842e565d","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":3},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":2},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1161,"event_guid":"import-74174aec9e7f633fc0","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1180,"event_guid":"import-5fa00c37cb75885d36","weight":2},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":1},{"event_id":1295,"event_guid":"import-e764d19e33d6433269","weight":1},{"event_id":1409,"event_guid":"import-d226c92ea5f3884368","weight":1},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":1},{"event_id":1516,"event_guid":"import-7a231e34c3be021873","weight":1},{"event_id":1607,"event_guid":"import-ad556a07ac6390b289","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1715,"event_guid":"import-91fa9b308b32d15504","weight":1},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":1},{"event_id":2233,"event_guid":"7bdbb7a1-63f2-400f-97a1-d7abfc455f73","weight":1},{"event_id":2479,"event_guid":"76a90ce3-42fc-4273-b1ef-89d08cd21356","weight":1},{"event_id":2486,"event_guid":"439d64b1-b08b-4313-87f9-c469211d4206","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2738,"event_guid":"d4b2f5e6-417f-454c-981e-df75465d956d","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":2},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":2978,"event_guid":"1e7ea0be-38c8-47f2-99bb-9f0ce71a53ee","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3551,"event_guid":"96de15c5-a017-4fb6-a3a0-09cdf8addd09","weight":1},{"event_id":3688,"event_guid":"226e244c-4781-47e4-8dd7-2d74607ae02f","weight":1},{"event_id":3753,"event_guid":"f79171fd-67ca-4b74-90c8-9dd382103eb0","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":2},{"event_id":4373,"event_guid":"ce865c40-0cce-4ad5-9c51-f4f1d4aea377","weight":1}]},{"guid":"import-c1870c28577ba8fca5","title":"How to squeeze more performance out of your wifi","subtitle":"Cross-layer optimization strategies for long-range IEEE 802.11e based radio (mesh) networks","slug":"23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1634.en.html","description":"Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;).\n","original_language":"eng","persons":["Achim Friedland"],"tags":["23c3"," Science"],"view_count":77,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-07T12:00:07.026+02:00","length":3537,"duration":3537,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c1870c28577ba8fca5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c1870c28577ba8fca5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi","url":"https://api.media.ccc.de/public/events/import-c1870c28577ba8fca5","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":107,"event_guid":"import-e465bfa0bfac679a06","weight":1},{"event_id":302,"event_guid":"import-6ec3fee34771317bff","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1105,"event_guid":"import-9bb3adc4750dab7fda","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":2960,"event_guid":"a871e2e5-3750-4bf7-b96f-8204bd9a951d","weight":1},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1},{"event_id":3609,"event_guid":"1efa803c-d280-49f0-bd17-8ec8f28e054f","weight":1},{"event_id":3796,"event_guid":"6d0ad07f-0bb2-48ac-af93-10c63ec45cb3","weight":1},{"event_id":3802,"event_guid":"a588243f-a16e-4298-9e66-d26fb949aaea","weight":1},{"event_id":3898,"event_guid":"8b54f7fa-012e-4a13-a0cf-a07408e767bf","weight":1},{"event_id":4955,"event_guid":"05c94f17-0ea3-4873-a2fe-a843995d1486","weight":1},{"event_id":5006,"event_guid":"d5afa965-4bfb-4d28-8ff9-ad5eef4bec3e","weight":1},{"event_id":5676,"event_guid":"dcc0ceda-0a43-49dd-a3d0-277e1046b8d7","weight":1},{"event_id":6021,"event_guid":"ac6568e2-ae17-43b6-b7ff-8fd9799c259f","weight":1},{"event_id":6431,"event_guid":"c6790632-b9eb-49a2-87fe-30129fbcbce1","weight":1}]},{"guid":"import-81fb5c39090d6797a6","title":"Advanced Attacks Against PocketPC Phones","subtitle":"0wnd by an MMS","slug":"23C3-1545-en-advanced_attacks_against_pocketpc_phones","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1545.en.html","description":"Smart phones are the new favorite target of many attackers. Also most current attacks are harmless, since these mostly rely on user mistake or lack of better knowledge. Current attacks are mostly based on logic errors rather then code inject and often are only found by accident. The talk will show some real attacks against smart phones and the kind of vulnerability analysis which lead to their discovery.\n","original_language":"eng","persons":["Collin Mulliner"],"tags":["23c3"," Hacking"],"view_count":63,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2021-08-08T12:15:02.982+02:00","length":2881,"duration":2881,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1545-en-advanced_attacks_against_pocketpc_phones.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1545-en-advanced_attacks_against_pocketpc_phones_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-81fb5c39090d6797a6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-81fb5c39090d6797a6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1545-en-advanced_attacks_against_pocketpc_phones","url":"https://api.media.ccc.de/public/events/import-81fb5c39090d6797a6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":418,"event_guid":"import-9930bb4b04bad35bcc","weight":1},{"event_id":619,"event_guid":"import-441f6211ee783d472a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":1},{"event_id":2760,"event_guid":"2cddcb2a-8f50-41bd-9a55-9691b6abc4bc","weight":1},{"event_id":3252,"event_guid":"3c8a53c9-bf68-5739-801c-0f0d2207fd50","weight":1},{"event_id":3529,"event_guid":"a5991386-5a5e-53b0-b24e-3b24e1eee36a","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1}]},{"guid":"import-c9f7320f170642feee","title":"Project Sputnik","subtitle":"Realtime in-building location tracking at the 23C3","slug":"23C3-1736-en-project_sputnik","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1736.en.html","description":"Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc).  Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event.\n","original_language":"eng","persons":["Harald Welte","Milosch Meriac"],"tags":["23c3"," Hacking"],"view_count":90,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-09-19T20:00:07.449+02:00","length":8157,"duration":8157,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1736-en-project_sputnik.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1736-en-project_sputnik_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c9f7320f170642feee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c9f7320f170642feee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1736-en-project_sputnik","url":"https://api.media.ccc.de/public/events/import-c9f7320f170642feee","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":102,"event_guid":"import-e32ef94a78d74116fb","weight":3},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":4},{"event_id":1169,"event_guid":"import-b911d815ea63e3bd2f","weight":1},{"event_id":2148,"event_guid":"NjtxGgpt76NkFb1Q4LLjvg","weight":1},{"event_id":2156,"event_guid":"-n9QScyDLXMEwkqrCHASYw","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":3312,"event_guid":"1a1e0a43-8fb7-5149-baa4-64725600a6c4","weight":1},{"event_id":3642,"event_guid":"fd205d0d-d767-4ff6-9771-9f2d4c933fe7","weight":1},{"event_id":3666,"event_guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","weight":1},{"event_id":5227,"event_guid":"544e5950-4642-2020-2020-202020202020","weight":1},{"event_id":5237,"event_guid":"44544851-574d-2020-2020-202020202020","weight":1},{"event_id":5243,"event_guid":"41524d50-3344-2020-2020-202020202020","weight":1},{"event_id":5272,"event_guid":"bf1b743d-4a17-4c6a-957a-87dbf893ed21","weight":1},{"event_id":5278,"event_guid":"4c534a45-394e-2020-2020-202020202020","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6600,"event_guid":"68619725-72ae-5645-8b6c-8e645e5d9c47","weight":1}]},{"guid":"import-a24ed08b895b751d60","title":"Biometrics in Science Fiction","subtitle":"2nd Iteration","slug":"23C3-1600-en-biometrics","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1600.en.html","description":"It is a buzzword at the moment: biometrics. Everyone is talking about it and consumers are buying laptops with shiny finger print scanners. This talk will take a look at biometrics in science fiction films.\n","original_language":"eng","persons":["Roland Kubica","Constanze Kurz"],"tags":["23c3"," Culture"],"view_count":53,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-02T21:00:14.058+01:00","length":3784,"duration":3784,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1600-en-biometrics.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1600-en-biometrics_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a24ed08b895b751d60-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a24ed08b895b751d60-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1600-en-biometrics","url":"https://api.media.ccc.de/public/events/import-a24ed08b895b751d60","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":4},{"event_id":1080,"event_guid":"import-ed88ca5ebf2520ebf0","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":3616,"event_guid":"e4fbbb8d-0b74-4129-83b7-bda2247175bc","weight":1},{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3645,"event_guid":"2a9ac911-1072-4672-8fbc-2887f4fd7aec","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":2}]},{"guid":"import-cb58bfabbea5115d54","title":"Podjournalism","subtitle":"The Role of Podcasting in Critical and Investigative Journalism","slug":"23C3-1257-en-podjournalism","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1257.en.html","description":"Throughout the world, major media companies are cutting their budgets for investigative reporting.  Most journalists will soon be freelancers, losing their freedom to investigate the more controversial or difficult topics.  Yet at the same time, podcasting as a form of citizen journalism has risen, free of the constraints of organizations and editors.  But without the funding that the tradional media enjoyed, how are podcasting journalists carrying out their work, and what does it mean for the media consumer?\n","original_language":"eng","persons":["Bicyclemark"],"tags":["23c3"," Society"],"view_count":10,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-10-16T18:45:04.085+02:00","length":4008,"duration":4008,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1257-en-podjournalism.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1257-en-podjournalism_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-cb58bfabbea5115d54-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-cb58bfabbea5115d54-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1257-en-podjournalism","url":"https://api.media.ccc.de/public/events/import-cb58bfabbea5115d54","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-c872b9c2f9c5b49694","title":"DRM comes to European digital TV","subtitle":"How the DVB project is locking down TV standards and importing U.S. mistakes.","slug":"23C3-1699-en-drm_comes_to_european_digital_tv","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1699.en.html","description":"European digital television standards (both free-to-air broadcast and\npay TV) developed by the DVB project are exemplary for including\nno digital rights management.  But now DVB is rushing to change that\nand impose new restrictions on receiving equipment.\n","original_language":"eng","persons":["Seth Schoen"],"tags":["23c3"," Society"],"view_count":68,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-04-19T08:45:03.732+02:00","length":2892,"duration":2892,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1699-en-drm_comes_to_european_digital_tv.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1699-en-drm_comes_to_european_digital_tv_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c872b9c2f9c5b49694-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c872b9c2f9c5b49694-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1699-en-drm_comes_to_european_digital_tv","url":"https://api.media.ccc.de/public/events/import-c872b9c2f9c5b49694","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":2},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1145,"event_guid":"import-909ed6ab4ce1e0379c","weight":1},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1199,"event_guid":"import-33d008be85a0548e56","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1239,"event_guid":"import-27fa6e2b6bb6fbc64d","weight":1},{"event_id":1243,"event_guid":"import-14815d5b90a0058d10","weight":1},{"event_id":1780,"event_guid":"hWph2wdjII5XK6nCL_1kWA","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":1},{"event_id":1805,"event_guid":"z2_SbAXdwSQnezj6oPTuIg","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":2206,"event_guid":"1Xe2U3LqTfMTXAvI6hrgxg","weight":1},{"event_id":3551,"event_guid":"96de15c5-a017-4fb6-a3a0-09cdf8addd09","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":4291,"event_guid":"4e3e001a-61ad-4f4b-adc8-0ade9a4206bf","weight":1}]},{"guid":"import-579aacb878d51bf5c4","title":"Data Retention Update","subtitle":"News and Perspectives on Implementation and Opposition","slug":"23C3-1609-en-data_retention_update","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1609.en.html","description":"The EU adopted a directive on the retention of data regarding the communications, movements and use of media of all 365 mio. EU citizens. The struggle is now continuing on the national levels, and privacy groups are preparing legal, political and technical challenges to this surveillance scheme.\n","original_language":"eng","persons":["Rikke Frank Jørgensen","Ralf Bendrath","Patrick Breyer"],"tags":["23c3"," Society"],"view_count":16,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-05-09T21:00:02.982+02:00","length":4123,"duration":4123,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1609-en-data_retention_update.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1609-en-data_retention_update_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-579aacb878d51bf5c4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-579aacb878d51bf5c4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1609-en-data_retention_update","url":"https://api.media.ccc.de/public/events/import-579aacb878d51bf5c4","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":6514,"event_guid":"7228f88d-8d6f-40a9-a5dd-b5c91b823ada","weight":1}]},{"guid":"import-d8ab7a89bd5682b6d7","title":"Secure Network Server Programming on Unix","subtitle":"Techniques and best practices to securely code your network server","slug":"23C3-1446-en-secure_network_server_programming_on_unix","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1446.en.html","description":"This talk describes a software system to securely execute predefined commands over an untrusted network, analyzes the potential attack vectors against this system and defines countermeasures to make it impossible for an attacker to use these attack vectors.\n","original_language":"eng","persons":["Andreas Krennmair"],"tags":["23c3"," Hacking"],"view_count":50,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-09-27T18:30:11.220+02:00","length":2750,"duration":2750,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1446-en-secure_network_server_programming_on_unix.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1446-en-secure_network_server_programming_on_unix_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d8ab7a89bd5682b6d7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d8ab7a89bd5682b6d7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1446-en-secure_network_server_programming_on_unix","url":"https://api.media.ccc.de/public/events/import-d8ab7a89bd5682b6d7","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":738,"event_guid":"import-7ca461f131b65253c2","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":4},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2322,"event_guid":"d5939d6c-e1d4-4bf2-a792-2b270377e948","weight":1},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":5262,"event_guid":"1e7ca9c3-609b-4c73-bf25-60501cba6791","weight":1},{"event_id":5271,"event_guid":"3af88c8a-b051-4691-9c3e-f518f42ca5d3","weight":1},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":1},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":1},{"event_id":5707,"event_guid":"37a90809-5147-5662-bbce-c669c810fec9","weight":1},{"event_id":5708,"event_guid":"138ff0ac-a12c-5211-aeaf-722cc072ea07","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1}]},{"guid":"import-38355af6e03d054ba5","title":"Privacy, Identity, and Anonymity in Web 2.0","subtitle":null,"slug":"23C3-1611-en-privacy_identity_and_anonymity_in_web_20","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1611.en.html","description":"The presentation will show the hidden privacy implications of some web2.0 and identity2.0 services, standards and applications and discuss the underlying trend here.\n","original_language":"eng","persons":["Ralf Bendrath","Jan Schallaböck","Udo Neitzel"],"tags":["23c3"," Society"],"view_count":60,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-13T01:30:17.392+01:00","length":3605,"duration":3605,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1611-en-privacy_identity_and_anonymity_in_web_20_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-38355af6e03d054ba5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-38355af6e03d054ba5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1611-en-privacy_identity_and_anonymity_in_web_20","url":"https://api.media.ccc.de/public/events/import-38355af6e03d054ba5","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":480,"event_guid":"import-8a89cf5b26fff8766e","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":5824,"event_guid":"0a8b729c-ebe9-48f3-a30a-7b422fccbc0d","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1},{"event_id":6493,"event_guid":"2375222b-7dae-4bca-a5b0-aea227ab0d76","weight":1},{"event_id":6507,"event_guid":"787007cf-828d-4409-94b0-90a0b8d727a0","weight":1},{"event_id":6931,"event_guid":"5d71aae2-bc0c-52d0-80d1-443103928101","weight":1}]},{"guid":"import-b27048411397f630ff","title":"Digitale Bildforensik","subtitle":"Spuren in Digitalfotos","slug":"23C3-1605-de-digitale_bildforensik","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1605.en.html","description":"Mit der mehr und mehr digitalisierten Fototechnik ist es heute ohne Vorwissen nahezu jedem möglich, Bilder zu manipulieren. Bekanntgewordene Fälle in den Medien haben auch die Öffentlichkeit für dieses Thema sensibilisiert. Verfahren der digitalen Bildforensik bieten die Möglichkeit, die Authentizität eines Bildes auch ohne Zugriff auf das Original zu überprüfen.\n","original_language":"eng","persons":["Matthias Kirchner"],"tags":["23c3"," Science"],"view_count":263,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-30T12:30:08.633+02:00","length":4463,"duration":4463,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1605-de-digitale_bildforensik.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1605-de-digitale_bildforensik_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b27048411397f630ff-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b27048411397f630ff-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1605-de-digitale_bildforensik","url":"https://api.media.ccc.de/public/events/import-b27048411397f630ff","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1069,"event_guid":"import-5d344713a4331b21b2","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":3},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":5},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":6},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":3},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":3},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1245,"event_guid":"import-fac887be3731450734","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":2},{"event_id":1342,"event_guid":"import-8f19a40ed78b95df8d","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1376,"event_guid":"import-b4f1afea850aa4a506","weight":1},{"event_id":1383,"event_guid":"import-c5cfcdb5af5a7ff87e","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":3},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1686,"event_guid":"import-57ec2e2f53fbb46f45","weight":1},{"event_id":1697,"event_guid":"import-3d743102bd3d845235","weight":1},{"event_id":1707,"event_guid":"import-637333afe02a1de8d8","weight":1},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":2},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":2},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":2},{"event_id":1873,"event_guid":"import-08c713ee308dfefba3","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":2},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":3},{"event_id":2276,"event_guid":"XGhOde-ujLyDS1gsvpebMg","weight":1},{"event_id":2279,"event_guid":"d42702a8-d760-473d-bc21-0a53b7ea9603","weight":1},{"event_id":2443,"event_guid":"8f0fe51c-671a-44bb-acba-647ba4342466","weight":2},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":2},{"event_id":2867,"event_guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3836,"event_guid":"385033fe-d217-0020-aca6-28dd05677c66","weight":1},{"event_id":4576,"event_guid":"fc198f7f-f56d-5379-b9fc-2a3cd11e3e64","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4700,"event_guid":"aadf222c-3ded-49b4-b80e-5a36e17d5dcb","weight":2},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":3},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":1},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1}]},{"guid":"import-49fe42523b9cb3d932","title":"Console Hacking 2006","subtitle":"Xbox 360, Playstation 3, Wii","slug":"23C3-1606-en-console_hacking_2006","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1606.en.html","description":"\"Next Generation\" gaming consoles should not be limited to games, they have powerful hardware which we want to exploit for our needs. The talk gives a hardware overview of each of the 3 consoles, an overview of their security systems, as well as an update on hacking the Xbox 360, which has been on the market for about a year.\n","original_language":"eng","persons":["Felix Domke"],"tags":["23c3"," Hacking"],"view_count":727,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-28T16:45:06.319+01:00","length":3025,"duration":3025,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1606-en-console_hacking_2006.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1606-en-console_hacking_2006_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-49fe42523b9cb3d932-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-49fe42523b9cb3d932-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1606-en-console_hacking_2006","url":"https://api.media.ccc.de/public/events/import-49fe42523b9cb3d932","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":17},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":5},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":3},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":19},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":20},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":23},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":12},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":3},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":11},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":5},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":23},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":4},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":4}]},{"guid":"import-9bb3adc4750dab7fda","title":"Vehicular Communication and VANETs","subtitle":"The future and security of communicating vehicles","slug":"23C3-1608-en-vehicular_communication_and_vanets","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1608.en.html","description":"Vehicle communication is a major research topic, covered by many national and international research projects. Applications promise to make our driving safer, more efficient, and more fun. The talk presents applications, technology, and also addresses security and privacy issues.\n","original_language":"eng","persons":["Frank Kargl"],"tags":["23c3"," Science"],"view_count":89,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-09-18T17:00:04.704+02:00","length":3773,"duration":3773,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1608-en-vehicular_communication_and_vanets.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1608-en-vehicular_communication_and_vanets_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-9bb3adc4750dab7fda-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-9bb3adc4750dab7fda-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1608-en-vehicular_communication_and_vanets","url":"https://api.media.ccc.de/public/events/import-9bb3adc4750dab7fda","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":656,"event_guid":"import-be8c7f62fda931eaa6","weight":1},{"event_id":1681,"event_guid":"import-458d8b56875aa1d93a","weight":3},{"event_id":2523,"event_guid":"afe359da-56c9-4e76-8f56-45ed406494e5","weight":1},{"event_id":2897,"event_guid":"276311bf-60b5-411a-ab68-6a8fbb0fd6a9","weight":2},{"event_id":3308,"event_guid":"5ab9f90a-a768-59c0-a0e4-a7ad9f61279c","weight":1}]},{"guid":"import-7837c4968ac13514ce","title":"Introduction to matrix programming: trance codes","subtitle":"How to recognize trance coded communication patterns","slug":"23C3-1619-en-introduction_to_matrix_programming","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1619.en.html","description":"The main communication streams in our realities happen besides the exchange of facts and arguments. \"The matrix\" is built on emotions! Trance coded communication patterns are a natural thing to exchange emotions between individuals. Using them is as normal, as not to be aware of it. But once you recognize the patterns, it is playtime!\n","original_language":"eng","persons":["ulong"],"tags":["23c3"," Hacking"],"view_count":75,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-07T18:00:08.688+02:00","length":2711,"duration":2711,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1619-en-introduction_to_matrix_programming.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1619-en-introduction_to_matrix_programming_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-7837c4968ac13514ce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-7837c4968ac13514ce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1619-en-introduction_to_matrix_programming","url":"https://api.media.ccc.de/public/events/import-7837c4968ac13514ce","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":225,"event_guid":"import-bfdbdf620d772b1d4c","weight":1},{"event_id":998,"event_guid":"import-79733a0b60ccfdcda9","weight":1},{"event_id":3433,"event_guid":"da626bb9-5540-45e8-a13b-e5d8065755ea","weight":1},{"event_id":4538,"event_guid":"41484e52-4847-2020-2020-202020202020","weight":1},{"event_id":5945,"event_guid":"52486d44-0fed-5499-a21f-3c88e72d9b48","weight":1},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":1}]},{"guid":"import-54ac75812fba306f63","title":"Inside VMware","subtitle":"How VMware, VirtualPC and Parallels actually work","slug":"23C3-1592-en-inside_vmware","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1592.en.html","description":"Virtualization is rocket science. In cooperation with the host operating system, VMware takes over complete control of the machine hundreds of times a second, handles pagetables completely manually, and may chose to wire (make-non-pageable) as much memory as it chooses. This talk explains why it still works.\n","original_language":"eng","persons":["Michael Steil"],"tags":["23c3"," Hacking"],"view_count":315,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-23T15:45:05.380+01:00","length":4120,"duration":4120,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1592-en-inside_vmware.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1592-en-inside_vmware_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-54ac75812fba306f63-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-54ac75812fba306f63-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1592-en-inside_vmware","url":"https://api.media.ccc.de/public/events/import-54ac75812fba306f63","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":8},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":3},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":3},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":4},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":8},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":13},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":4},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":4},{"event_id":3660,"event_guid":"69ce21df-4bf5-43ce-a500-ac7707ee64b7","weight":3},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3696,"event_guid":"9d36932f-616a-4677-b924-60c1986fbbfc","weight":2},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":20},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":3},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":3},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":4},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":17},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":3},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":3},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":3}]},{"guid":"import-ecb0e5ebfd05aa20b9","title":"Black Ops 2006 Viz Edition","subtitle":"Pixel Fuzzing and the Bioinformatic Bindiff","slug":"23C3-1713-en-black_ops_2006","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1713.en.html","description":"Tools for visualizing the genome can be repurposed to visualize code. Visualized code can be used as a map for fuzzing efforts, change identification, and showing your mom what you do for a living. I'm going to demonstrate a series of tools that brings a new, half-automated, half-visually driven approach to data manipulation and destruction.\n","original_language":"eng","persons":["Dan Kaminsky"],"tags":["23c3"," Hacking"],"view_count":163,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-10T05:45:04.358+01:00","length":3319,"duration":3319,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1713-en-black_ops_2006.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1713-en-black_ops_2006_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-ecb0e5ebfd05aa20b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-ecb0e5ebfd05aa20b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1713-en-black_ops_2006","url":"https://api.media.ccc.de/public/events/import-ecb0e5ebfd05aa20b9","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1237,"event_guid":"import-79cc8593f4948ee217","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":7181,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb8100","weight":1}]},{"guid":"import-c2248d7798bcff363c","title":"Transparency and Privacy","subtitle":"The 7 Laws of Identity and the Identity Metasystem","slug":"23C3-1724-en-transparency_and_privacy","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1724.en.html","description":"Microsoft has proposed architectural principles (\"7 Laws of Identity\") to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an \"Identity Metasystem\". This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.\n","original_language":"eng","persons":["Caspar Bowden"],"tags":["23c3"," Society"],"view_count":21,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-19T20:00:12.496+01:00","length":3802,"duration":3802,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1724-en-transparency_and_privacy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1724-en-transparency_and_privacy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c2248d7798bcff363c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c2248d7798bcff363c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1724-en-transparency_and_privacy","url":"https://api.media.ccc.de/public/events/import-c2248d7798bcff363c","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":178,"event_guid":"import-3fd66cad1f5c12c6c5","weight":1},{"event_id":664,"event_guid":"import-70c200884c5a8b15b6","weight":1},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":1},{"event_id":1710,"event_guid":"import-23969f74f61375b2c6","weight":1},{"event_id":1743,"event_guid":"i5TMBRf_-3TiDrceuY3osQ","weight":1},{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":1},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":2180,"event_guid":"H_jf4nwFLZMEY7zwBlrehA","weight":1},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3850,"event_guid":"ae999450-3893-11e7-890f-9f81551c7b53","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4969,"event_guid":"2f480a87-d595-4312-97c1-0a0f0fa0f75a","weight":1}]},{"guid":"import-9ab6de393c480e625b","title":"Homegrown Interactive Tables","subtitle":"Any Technology Sufficiently Advanced is Indistinguishable from Magic","slug":"23C3-1512-de-homegrown_interactive_tables","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1512.en.html","description":"Technology to build low-cost touch-sensitive tables with high precision is publicly available since the beginning of 2006. The talk will give a practical introduction on building hard- and software of these tables using FTIR sensing pioneered by Jeff Han (see links), based on our experiences in making a table at the c-base.\n","original_language":"eng","persons":["Andre Helwig","Christian Bennat","Andreas Dietrich","Ulrich von Zadow","Mirco Fichtner"],"tags":["23c3"," Culture"],"view_count":25,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-06-27T18:15:03.303+02:00","length":2743,"duration":2743,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1512-de-homegrown_interactive_tables.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1512-de-homegrown_interactive_tables_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-9ab6de393c480e625b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-9ab6de393c480e625b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1512-de-homegrown_interactive_tables","url":"https://api.media.ccc.de/public/events/import-9ab6de393c480e625b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1}]},{"guid":"import-7f89d23c34c725db07","title":"Fuzzing in the corporate world","subtitle":"The use of fuzzing in the corporate world over the years and recent implementation of fuzzing tools into the development cycle and as a requirement before purchase","slug":"23C3-1758-en-fuzzing_corporate_world","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1758.en.html","description":"We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing (\"fuzzing before release\") and third party testing (\"fuzzing before purchase\"). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle.\n","original_language":"eng","persons":["Gadi Evron"],"tags":["23c3"," Community"],"view_count":23,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-07-10T22:00:02.948+02:00","length":3192,"duration":3192,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1758-en-fuzzing_corporate_world.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1758-en-fuzzing_corporate_world_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-7f89d23c34c725db07-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-7f89d23c34c725db07-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1758-en-fuzzing_corporate_world","url":"https://api.media.ccc.de/public/events/import-7f89d23c34c725db07","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":908,"event_guid":"import-76a40622f79a62b91d","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":3},{"event_id":1298,"event_guid":"import-c748bf74c4d26f8d7e","weight":1},{"event_id":2371,"event_guid":"318a2c32-3c4e-44b3-8037-778f022dad03","weight":1},{"event_id":2469,"event_guid":"f76a7853-6dfa-4294-81b6-1b37a9632b67","weight":1},{"event_id":3005,"event_guid":"f390d1c8-9712-40bd-a09d-9d7b7508b348","weight":1},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":1},{"event_id":3950,"event_guid":"L0a92AY4MXdIRWubHJn0Jg","weight":1},{"event_id":4257,"event_guid":"9f3c556d-5cb0-4b17-a099-3c4626a7e83b","weight":1}]},{"guid":"import-57e0e95fca3dedeec9","title":"Ego Striptease - Ich zeig dir, wer du bist","subtitle":"Blogs, flickr, etc: warum machen wir es ihnen so einfach?","slug":"23C3-1494-de-ego_striptease","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1494.en.html","description":"Als Orkut aufkam, gab es zwei Sorten Menschen: die einen wetteiferten um die meisten Invitations, die anderen schüttelten den Kopf ob der Bereitwilligkeit, eine Datenkrake zu füttern. Heute manifestiert sich das Phänomen als flickr, del.icio.us, upcoming.org und blog - kurz gesagt \"soziale Web 2.0 Anwendungen\". Wieso lassen wir uns alle so bereitwillig taggen, kommentieren und outen?\n","original_language":"eng","persons":["Teemu Schaabl","Jule Riede-Buechele"],"tags":["23c3"," Society"],"view_count":243,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-21T11:45:06.543+01:00","length":3644,"duration":3644,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1494-de-ego_striptease.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1494-de-ego_striptease_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-57e0e95fca3dedeec9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-57e0e95fca3dedeec9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1494-de-ego_striptease","url":"https://api.media.ccc.de/public/events/import-57e0e95fca3dedeec9","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":4},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":5},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":2},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":2},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":2},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":2},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":3},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":2},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":4},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":2},{"event_id":7431,"event_guid":"508fe23f-bc69-4521-abc3-59b649598eb5","weight":2}]},{"guid":"import-3d147238f2f1434907","title":"Building an Open Source PKI using OpenXPKI","subtitle":"Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs, stir, season to taste, enjoy!","slug":"23C3-1596-en-openxpki","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1596.en.html","description":"OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking.\n","original_language":"eng","persons":["Alexander Klink","Michael Bell"],"tags":["23c3"," Hacking"],"view_count":507,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-25T09:45:08.228+01:00","length":3281,"duration":3281,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1596-en-openxpki.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1596-en-openxpki_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-3d147238f2f1434907-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-3d147238f2f1434907-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1596-en-openxpki","url":"https://api.media.ccc.de/public/events/import-3d147238f2f1434907","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":460,"event_guid":"import-a06deb348ba5dc5997","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":5960,"event_guid":"541dc917-721a-59c3-b4eb-371a7e8acc3e","weight":1}]},{"guid":"import-575502e1e9906233c7","title":"Tracking von Personen in Videoszenen","subtitle":"Wie trackt man automatisch sich bewegende Objekte?","slug":"23C3-1604-de-tracking_von_personen_in_videoszenen","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1604.en.html","description":"Mittels der Computer-Vision-Library OpenCV wird gezeigt, welche Bildverarbeitungsschritte notwendig sind, um bewegte Objekte in Videoszenen zu erkennen und nachzuverfolgen.\n","original_language":"eng","persons":["pille"],"tags":["23c3"," Science"],"view_count":103,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-01-05T08:30:05.210+01:00","length":3896,"duration":3896,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1604-de-tracking_von_personen_in_videoszenen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1604-de-tracking_von_personen_in_videoszenen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-575502e1e9906233c7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-575502e1e9906233c7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1604-de-tracking_von_personen_in_videoszenen","url":"https://api.media.ccc.de/public/events/import-575502e1e9906233c7","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":2},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":3},{"event_id":1924,"event_guid":"0_vboNiskfaosp862h7D0g","weight":3}]},{"guid":"import-7957df8d511dddee9d","title":"The gift of sharing","subtitle":"A critical approach to the notion of gift economy within the everyday life-world of free and open source software (FOSS).","slug":"23C3-1502-en-the_gift_of_sharing","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1502.en.html","description":"This paper will dive into this complex questionmark through a comparison between primitive hunter-gatherer societies and the everyday life-world of FOSS. The discussion will focus on the thesis that FOSS practice is based on social sharing and not on processes of exchange. This will entail a negation of the paradigm of economic logic and instead pull a quest for valuable relationships to the forefront of the FOSS sociality.\n","original_language":"eng","persons":["Gregers Petersen"],"tags":["23c3"," Society"],"view_count":10,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2021-08-20T11:15:02.754+02:00","length":2897,"duration":2897,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1502-en-the_gift_of_sharing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1502-en-the_gift_of_sharing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-7957df8d511dddee9d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-7957df8d511dddee9d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1502-en-the_gift_of_sharing","url":"https://api.media.ccc.de/public/events/import-7957df8d511dddee9d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-c74e7042968738ecd2","title":"Ethernet mit Mikrocontrollern","subtitle":"Wie funktioniert TCP mit 2kb RAM?","slug":"23C3-1554-de-ethernet_mit_mikrocontrollern","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1554.en.html","description":"Steuer- und Messaufgaben erledigt am besten ein Mikrocontroller.  Wenn zeitgemäß auf dieses Device zugegriffen werden soll, kommt man um Ethernet eigentlich nicht herum. Aber ist ein Mikrocontroller mit nur 2-4Kb RAM in der Lage, TCP/IP zu sprechen?\n","original_language":"eng","persons":["fd0"],"tags":["23c3"," Hacking"],"view_count":97,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-05-29T21:45:09.370+02:00","length":2954,"duration":2954,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1554-de-ethernet_mit_mikrocontrollern.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1554-de-ethernet_mit_mikrocontrollern_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c74e7042968738ecd2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c74e7042968738ecd2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1554-de-ethernet_mit_mikrocontrollern","url":"https://api.media.ccc.de/public/events/import-c74e7042968738ecd2","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":629,"event_guid":"import-e8ee54170329e5e523","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":1},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":1013,"event_guid":"import-81d644382a78a73130","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":2},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":2},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1323,"event_guid":"import-5e89fe5c21c6e4d891","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":2},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2227,"event_guid":"H1GEe9l64eUbo1oZXtLkEg","weight":1},{"event_id":2245,"event_guid":"wyL8OVhv0Y6VczeYR3K_jQ","weight":1},{"event_id":2261,"event_guid":"uJGVeWdNzwr_8AvAXa2DKA","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":2807,"event_guid":"77a03013-82df-48f7-8c0f-65a9e9f23490","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":2},{"event_id":3313,"event_guid":"7d5e3c54-aa42-58f3-a135-8f1a42f596fe","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3743,"event_guid":"72e44333-c59a-47a4-9ef3-d5e8c9637eb6","weight":1},{"event_id":3787,"event_guid":"f3358998-1465-4445-885e-74d880be57d0","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":4617,"event_guid":"79c30c06-b3c5-5754-bb76-91489995d24b","weight":1},{"event_id":4627,"event_guid":"b4b35a2e-dc10-0435-43a9-66521c933088","weight":1},{"event_id":4760,"event_guid":"b14c9516-d104-465e-8c7c-b2eae5d31f5a","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":1},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":1},{"event_id":5254,"event_guid":"83235eb6-ce2d-4f4d-8124-1d38010a2076","weight":1},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":3},{"event_id":6076,"event_guid":"68c30487-d434-4b4e-8df0-fb06aa4e8cdf","weight":1},{"event_id":6157,"event_guid":"b512a4cb-3c13-4065-076f-94039f987bf8","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1},{"event_id":7176,"event_guid":"064dfcac-df2d-4e9c-b1a0-efd1bcc16c5b","weight":1},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":1}]},{"guid":"import-599ee41bb3c5d7aa87","title":"Security in the cardholder data processing?!","subtitle":"Experiences and lessons learned with the Payment Card Industry Data Security Standard","slug":"23C3-1457-en-credit_card_security","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1457.en.html","description":"MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps.\n","original_language":"eng","persons":["Manuel Atug"],"tags":["23c3"," Hacking"],"view_count":81,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-26T17:00:08.248+01:00","length":4312,"duration":4312,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1457-en-credit_card_security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1457-en-credit_card_security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-599ee41bb3c5d7aa87-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-599ee41bb3c5d7aa87-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1457-en-credit_card_security","url":"https://api.media.ccc.de/public/events/import-599ee41bb3c5d7aa87","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1661,"event_guid":"import-f96ec72f41d4dca7d6","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":6552,"event_guid":"84be4017-78a0-444b-8b6f-5a14089bb0f7","weight":1}]},{"guid":"import-20a6b9aac8f72f4d2c","title":"Tor and China","subtitle":"Design of a blocking-resistant anonymity system","slug":"23C3-1444-en-tor_and_china","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html","description":"Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.\n","original_language":"eng","persons":["Roger Dingledine"],"tags":["23c3"," Hacking"],"view_count":168,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-09T16:15:10.135+01:00","length":5266,"duration":5266,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1444-en-tor_and_china.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1444-en-tor_and_china_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-20a6b9aac8f72f4d2c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-20a6b9aac8f72f4d2c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1444-en-tor_and_china","url":"https://api.media.ccc.de/public/events/import-20a6b9aac8f72f4d2c","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":2},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":2},{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":2},{"event_id":1805,"event_guid":"z2_SbAXdwSQnezj6oPTuIg","weight":3},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":4}]},{"guid":"import-5104c3e4165a14fde4","title":"The Story of The Hacker Foundation","subtitle":"Challenges of Organizing a Foundation for Hackers in the USA","slug":"23C3-1373-en-hacker_foundation","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1373.en.html","description":"Talk will focus on the three year history of the Hacker Foundation\nin the USA including the legal, organizational and motivational\nhurdles. Ongoing project successes, failures and the reasons behind each\nwill be covered.\n","original_language":"eng","persons":["Nick Farr"],"tags":["23c3"," Community"],"view_count":15,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-09T12:00:04.624+01:00","length":3722,"duration":3722,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1373-en-hacker_foundation.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1373-en-hacker_foundation_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-5104c3e4165a14fde4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-5104c3e4165a14fde4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1373-en-hacker_foundation","url":"https://api.media.ccc.de/public/events/import-5104c3e4165a14fde4","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":1},{"event_id":1676,"event_guid":"import-d5a95005e665b332d7","weight":1}]},{"guid":"import-f7a9d70ee5cd203be2","title":"\"We are great together, the liberal society and its enemies!\"","subtitle":"monochrom","slug":"23C3-1347-en-we_are_great_together","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1347.en.html","description":"A talk medley from monochrom, a worldwide operating collective from Vienna dealing with technology, art, context hacking, and philosophy which was founded in 1993. They specialize in an unpeculiar mixture of proto-aesthetic fringe work, pop attitude, subcultural science, and political activism. Their mission is conducted everywhere, but first and foremost \"in culture-archaeological digs into the seats (and pockets) of ideology and entertainment\".\n","original_language":"eng","persons":["Johannes Grenzfurthner"],"tags":["23c3"," Culture"],"view_count":179,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-02-24T03:30:03.135+01:00","length":3625,"duration":3625,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1347-en-we_are_great_together.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1347-en-we_are_great_together_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-f7a9d70ee5cd203be2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-f7a9d70ee5cd203be2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1347-en-we_are_great_together","url":"https://api.media.ccc.de/public/events/import-f7a9d70ee5cd203be2","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":499,"event_guid":"import-3c1a01df08f075d5a8","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":2},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":4},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":2},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":2}]},{"guid":"import-6e414b43d8c4576d29","title":"Gäste-Überwachung in Hotels durch staatliche und private Schnüffler","subtitle":null,"slug":"23C3-1505-de-gaeste_ueberwachung","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1505.en.html","description":"- Fragwürdige Methoden der Informationsbeschaffung\n- Rekonstruktion authentischer Fälle\n- Schutz von Geschäftsgeheimnnissen und Privatsphäre\n","original_language":"eng","persons":["Manfred Fink"],"tags":["23c3"," Society"],"view_count":95,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-02-25T13:15:09.601+01:00","length":3289,"duration":3289,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1505-de-gaeste_ueberwachung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1505-de-gaeste_ueberwachung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-6e414b43d8c4576d29-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-6e414b43d8c4576d29-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1505-de-gaeste_ueberwachung","url":"https://api.media.ccc.de/public/events/import-6e414b43d8c4576d29","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":556,"event_guid":"import-7533ec84858fec87b8","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1069,"event_guid":"import-5d344713a4331b21b2","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":2},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":2},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":4},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":3},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":2},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":2},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":3},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":3},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":3},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":2},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":2},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":3},{"event_id":1342,"event_guid":"import-8f19a40ed78b95df8d","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1368,"event_guid":"import-2f5b6d9d75ad65da1d","weight":1},{"event_id":1376,"event_guid":"import-b4f1afea850aa4a506","weight":1},{"event_id":1383,"event_guid":"import-c5cfcdb5af5a7ff87e","weight":1},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":1},{"event_id":1820,"event_guid":"glr14-wGaYxsV63N4TJZDQ","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":1873,"event_guid":"import-08c713ee308dfefba3","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":1},{"event_id":2201,"event_guid":"xmlu4jFXkob2t8CUHi0Rng","weight":1},{"event_id":2253,"event_guid":"uMGv2XJJqkQodKm0_Mtr_A","weight":1},{"event_id":2401,"event_guid":"44dc4f3a5a21b8f2af50faf3fd01ea16","weight":1},{"event_id":2405,"event_guid":"5640ced59c1ddef8adf6787a8f5df094","weight":1},{"event_id":3559,"event_guid":"f3975e63-9760-479a-8765-a678f188581d","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":4576,"event_guid":"fc198f7f-f56d-5379-b9fc-2a3cd11e3e64","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4700,"event_guid":"aadf222c-3ded-49b4-b80e-5a36e17d5dcb","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":1},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":1}]},{"guid":"import-d58db20dbd73783f0e","title":"Juristische Fragen um die Mitbenutzung fremder WLANs","subtitle":"Zivilrechtliche und strafrechtliche Haftung","slug":"23C3-1416-de-wlan_schwarzsurfen_und_das_recht","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1416.en.html","description":"Der Vortrag gibt einen Überblick über den rechtlichen Rahmen des WLAN-Surfens im Zivil- und Strafrecht mit aktueller Rechtsprechungsübersicht.\n","original_language":"eng","persons":["soeren"],"tags":["23c3"," Society"],"view_count":26,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-08T14:45:06.039+02:00","length":3281,"duration":3281,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1416-de-wlan_schwarzsurfen_und_das_recht_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d58db20dbd73783f0e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d58db20dbd73783f0e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1416-de-wlan_schwarzsurfen_und_das_recht","url":"https://api.media.ccc.de/public/events/import-d58db20dbd73783f0e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":1},{"event_id":1082,"event_guid":"import-d11d50d901f7d39189","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":2},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":1167,"event_guid":"import-f1078d534b35506b91","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1}]},{"guid":"import-642660b4ee88817288","title":"Stealth malware - can good guys win?","subtitle":"Challenges in detecting system compromises and why we’re so far behind the (smart) bad guys","slug":"23C3-1381-en-stealth_malware","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1381.en.html","description":"The presentation will try to present current challenges in detecting advanced forms of stealth malware and explain why current detection approaches, as used in commercial A/V or IDS products, are insufficient.\n","original_language":"eng","persons":["Joanna Rutkowska"],"tags":["23c3"," Hacking"],"view_count":317,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-04T14:00:08.374+01:00","length":4735,"duration":4735,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1381-en-stealth_malware.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1381-en-stealth_malware_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-642660b4ee88817288-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-642660b4ee88817288-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1381-en-stealth_malware","url":"https://api.media.ccc.de/public/events/import-642660b4ee88817288","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":1051,"event_guid":"import-4cc0be04257f4b5318","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1102,"event_guid":"import-d92bb58ed116334bd1","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":2234,"event_guid":"_kPJG76FUvxbX7Z6h20Gcw","weight":1},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":7},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2867,"event_guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","weight":1},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":2},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":2},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":1},{"event_id":3070,"event_guid":"9a153e36-2653-4927-a47b-78351a0f79d7","weight":1},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3715,"event_guid":"4c92b3f4-e32a-483b-9e5f-4e8201849284","weight":1},{"event_id":3745,"event_guid":"97570300-6590-45c9-a477-ab629f92a3b1","weight":1},{"event_id":3759,"event_guid":"c6decee9-310c-40b9-90af-5937df22e1aa","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2},{"event_id":3942,"event_guid":"ec1c7660-cf4a-46be-b0d7-7e0c2a956c0a","weight":1},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":1}]},{"guid":"import-63b6e70b859a1b152d","title":"Software Protection and the TPM","subtitle":"The Mac OS X Story","slug":"23C3-1721-en-software_protection_and_the_tpm","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1721.en.html","description":"Ever since Apple announced the x86 version of Mac OS X, people have been obsessed with running the operating system on non-Apple hardware. The media has given this topic more than its fair share of coverage, with nary a week going by without some discussion of the tussle between Apple and system attackers attempting to \"crack\" Mac OS X.\n","original_language":"eng","persons":["Amit Singh"],"tags":["23c3"," Hacking"],"view_count":88,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-13T18:30:05.798+02:00","length":4139,"duration":4139,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1721-en-software_protection_and_the_tpm.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1721-en-software_protection_and_the_tpm_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-63b6e70b859a1b152d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-63b6e70b859a1b152d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1721-en-software_protection_and_the_tpm","url":"https://api.media.ccc.de/public/events/import-63b6e70b859a1b152d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1258,"event_guid":"import-37514cebcac18da418","weight":1},{"event_id":1837,"event_guid":"ZYk9lubJJBkqDWJBOZpWyw","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":1},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":1},{"event_id":4227,"event_guid":"80884192-2031-4559-b1f2-e2f2f7dbe9cb","weight":1},{"event_id":4267,"event_guid":"e02b1946-a7ce-4779-a4c2-d120a43edd19","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":5619,"event_guid":"a2690ffd-d1c2-53f3-8af7-5d79e5b947a9","weight":1},{"event_id":6454,"event_guid":"2963ebe9-6499-5d17-9f2f-0c3f31db5738","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1}]},{"guid":"import-b59b49e433ecf74450","title":"Pornography and Technology","subtitle":"a love affair","slug":"23C3-1422-en-pornography_and_technology","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1422.en.html","description":"Pornography is an abstract phenomenon. It cannot exist without a medium to propagate it, and it has very little (if anything at all) to do with sex. The relationship between pornography, which is entirely fictional and sex, which is very real, very sweaty and mostly not a very aesthetic thing is something like the correlation of science-fiction literature and technological innovation: sometimes the ideas are bizarre, completely nuts and would never work without a Heisenberg Compensator - but sometimes some fragment lasts and is taken to the real world.\n","original_language":"eng","persons":["Tina Lorenz"],"tags":["23c3"," Culture"],"view_count":1847,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-22T11:30:10.120+01:00","length":2414,"duration":2414,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1422-en-pornography_and_technology.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1422-en-pornography_and_technology_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b59b49e433ecf74450-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b59b49e433ecf74450-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1422-en-pornography_and_technology","url":"https://api.media.ccc.de/public/events/import-b59b49e433ecf74450","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":49},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":18},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":42},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":3},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":3},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":3},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":6},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":9},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":4},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":4},{"event_id":1129,"event_guid":"import-7f89d23c34c725db07","weight":2},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":3},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":9},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":24},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":8},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":11},{"event_id":1176,"event_guid":"import-aeca1d442393997d98","weight":23},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":2},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":29},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":9},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":35},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":8},{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":9},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":27},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":29},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":13},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":26},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":26},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":8},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":9},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":7},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":8},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":28},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":15},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":24},{"event_id":6369,"event_guid":"6a7286f8-e028-5a16-85d9-9a4fb04f76ba","weight":8},{"event_id":6370,"event_guid":"15cf6e43-dc3a-5126-9fdb-0cf729e2ddcf","weight":10},{"event_id":6375,"event_guid":"42542e40-f237-11e8-9af6-7fb90298b852","weight":22},{"event_id":6376,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb895","weight":25}]},{"guid":"import-278b33c334c7d98406","title":"Hackerspaces","subtitle":"How we built ours - How you can build yours","slug":"23C3-1500-en-hackerspaces","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1500.en.html","description":"Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon.\n","original_language":"eng","persons":["bruder","t","Jens Ohlig","Paul Böhm"],"tags":["23c3"," Community"],"view_count":94,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-21T21:00:07.271+01:00","length":3380,"duration":3380,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1500-en-hackerspaces.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1500-en-hackerspaces_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-278b33c334c7d98406-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-278b33c334c7d98406-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1500-en-hackerspaces","url":"https://api.media.ccc.de/public/events/import-278b33c334c7d98406","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":75,"event_guid":"import-9c86bf00cf2942b092","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1202,"event_guid":"import-1d64518c2e5554b342","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":1},{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":1},{"event_id":1764,"event_guid":"PuDWTZPratvP-gVrrPScWQ","weight":1},{"event_id":2482,"event_guid":"46d21af4-3f70-4024-b7bd-52d40634b891","weight":1},{"event_id":2515,"event_guid":"b8a7511e-143d-45c5-b974-2e91dab18814","weight":1},{"event_id":2533,"event_guid":"c1f34fda-54f2-407c-b68c-44dafc820282","weight":1},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1}]},{"guid":"import-79ae19c603ca8c97ea","title":"Überwachen und Strafen in Entenhausen","subtitle":null,"slug":"23C3-1651-de-ueberwachen_und_strafen_in_entenhausen","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1651.en.html","description":"Mit Michel Foucault in Entenhausen: Der Vortrag wird einen Blick auf die Überwachungsmethoden und die Strafpraxis in der Gumpenmetropole werfen.\n","original_language":"eng","persons":["Henriette Fiebig"],"tags":["23c3"," Culture"],"view_count":496,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T02:30:03.413+01:00","length":2942,"duration":2942,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-79ae19c603ca8c97ea-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-79ae19c603ca8c97ea-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen","url":"https://api.media.ccc.de/public/events/import-79ae19c603ca8c97ea","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":2},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":4},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":6},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":8},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":3},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":8},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":5},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":3},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":2},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":6},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":9},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":2},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":9},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":2},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":2},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":2},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":2},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":2},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":2},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":2},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":2}]},{"guid":"import-823765436f0318a89b","title":"CSRF, the Intranet and You","subtitle":"Causes, Attacks and Countermeasures","slug":"23C3-1560-en-csrf","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1560.en.html","description":"A detailed introduction to Cross Site Request Forgery. This talk presents the fundamental cause of this vulnerability class and examples of potential attack consequences. The second half of the talk is devoted to avoiding and countering CSRF: Implementing CSRF proof session handling, transparent retrofitting of legacy applications and methods for client side protection.\n","original_language":"eng","persons":["Justus Winter","Martin Johns"],"tags":["23c3"," Hacking"],"view_count":58,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-08-12T04:45:02.532+02:00","length":3682,"duration":3682,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1560-en-csrf.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1560-en-csrf_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-823765436f0318a89b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-823765436f0318a89b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1560-en-csrf","url":"https://api.media.ccc.de/public/events/import-823765436f0318a89b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1075,"event_guid":"import-278b33c334c7d98406","weight":1},{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1162,"event_guid":"import-d8ab7a89bd5682b6d7","weight":1},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":1199,"event_guid":"import-33d008be85a0548e56","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1202,"event_guid":"import-1d64518c2e5554b342","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1239,"event_guid":"import-27fa6e2b6bb6fbc64d","weight":1},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":1},{"event_id":1243,"event_guid":"import-14815d5b90a0058d10","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1780,"event_guid":"hWph2wdjII5XK6nCL_1kWA","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":1},{"event_id":1805,"event_guid":"z2_SbAXdwSQnezj6oPTuIg","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2515,"event_guid":"b8a7511e-143d-45c5-b974-2e91dab18814","weight":1},{"event_id":2533,"event_guid":"c1f34fda-54f2-407c-b68c-44dafc820282","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":1},{"event_id":4323,"event_guid":"df804417-58b7-42fa-a626-83ed1663677f","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":2},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":1},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":1},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":1},{"event_id":5636,"event_guid":"ba118e5f-1c35-585c-91f6-9477b0c64897","weight":1},{"event_id":5707,"event_guid":"37a90809-5147-5662-bbce-c669c810fec9","weight":1},{"event_id":5708,"event_guid":"138ff0ac-a12c-5211-aeaf-722cc072ea07","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1}]},{"guid":"import-f1078d534b35506b91","title":"OpenPCD / OpenPICC","subtitle":"Free RFID reader and emulator","slug":"23C3-1566-en-openpcd_openpicc","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1566.en.html","description":"This presentation will introduce and demonstrate OpenPCD and OpenPICC.  The purpose of those projects is to develop free hardware designs and software for 13.56MHz RFID reader and transponder simulator. OpenPICC can be used to e.g. simulate ISO 14443 or ISO 15693 transponders, such as those being used in biometric passports and FIFA worldcup tickets.\n","original_language":"eng","persons":["Milosch Meriac","Harald Welte"],"tags":["23c3"," Hacking"],"view_count":106,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-13T12:30:08.062+01:00","length":4746,"duration":4746,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1566-en-openpcd_openpicc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1566-en-openpcd_openpicc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-f1078d534b35506b91-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-f1078d534b35506b91-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1566-en-openpcd_openpicc","url":"https://api.media.ccc.de/public/events/import-f1078d534b35506b91","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":2},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":2},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":2},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":1},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1},{"event_id":3790,"event_guid":"6575fcac-cfae-4286-b464-67842ae6842d","weight":1}]},{"guid":"import-aa1a4dc28be69ad7a8","title":"Freie Software - Eine Chance für Afrika?","subtitle":"Ein Erfahrungsbericht aus Malawi","slug":"23C3-1638-de-freie_software","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1638.en.html","description":"In einem Dokumentationsbericht über ein \"Free Software Projekt\" erzählt Alex Antener von seinen Reisen nach Malawi in Zentralafrika und berichtet über die Erfahrungen des kulturübergreifenden Engagements an der Universität in Malawi. Der Erfahrungsbericht zeigt Möglichkeiten, Einflüsse und mögliche Alternativlösungen zu den neoimperialistischen Machenschaften der Monopolisten in der dritten Welt.\n","original_language":"eng","persons":["Alex Antener"],"tags":["23c3"," Community"],"view_count":72,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-06T00:30:20.591+01:00","length":2808,"duration":2808,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1638-de-freie_software.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1638-de-freie_software_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-aa1a4dc28be69ad7a8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-aa1a4dc28be69ad7a8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1638-de-freie_software","url":"https://api.media.ccc.de/public/events/import-aa1a4dc28be69ad7a8","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":1},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1411,"event_guid":"import-c6222a12f8ee22d1e4","weight":1},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":1},{"event_id":1477,"event_guid":"import-633bd84860f65db047","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":2},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":2954,"event_guid":"62a79191-ca6a-48ea-b747-8cf13faa75cb","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":5719,"event_guid":"2ea0582f-bf75-52bc-a5c5-d0914db47c52","weight":1},{"event_id":5721,"event_guid":"2d47325d-cd7b-542e-bf9e-98d333003965","weight":1},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":1},{"event_id":5998,"event_guid":"c445b6d8-546e-534d-9964-63751761769a","weight":1},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":1},{"event_id":6004,"event_guid":"49976f12-75cd-447d-8dd0-1157b399e3e9","weight":1},{"event_id":6010,"event_guid":"19db5e82-9317-437d-8ea6-7788f7872c84","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":1},{"event_id":6025,"event_guid":"6d52b06c-1295-4983-84e1-d0fb807af357","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1},{"event_id":6547,"event_guid":"089b7fec-3ee1-493c-9b90-782c0514ffb4","weight":1},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1},{"event_id":6784,"event_guid":"950cdf1d-1792-5e8d-a3d8-3eb9954711c9","weight":1},{"event_id":6804,"event_guid":"95f8217e-9bca-5745-a051-d88775aa8d56","weight":1},{"event_id":6811,"event_guid":"2269ec4c-1051-5461-afc0-26b7d510ad3a","weight":1},{"event_id":6814,"event_guid":"996808fc-63d8-5355-87fd-10d5db20dd30","weight":1},{"event_id":6820,"event_guid":"fea9cb1a-1a08-5c16-9fe9-35d58a0ef028","weight":1},{"event_id":6822,"event_guid":"6a104867-934e-5f43-bb1a-3985a94bdfdd","weight":1},{"event_id":6824,"event_guid":"23f76151-30dc-57b1-a715-87abd35ad53f","weight":1},{"event_id":6826,"event_guid":"4f371d85-941f-5dba-8f47-e9a6b5fed1de","weight":1},{"event_id":6829,"event_guid":"b3103e19-49b6-5e7e-a9a1-4bad97564c3b","weight":1},{"event_id":6835,"event_guid":"fb217d91-a4c8-50e0-a909-b92d7280d58c","weight":1},{"event_id":6840,"event_guid":"677cd97d-966a-5427-a2c6-57d143a4390c","weight":1},{"event_id":6842,"event_guid":"6a5edf11-752b-5bd6-be6b-67acb66265c4","weight":1},{"event_id":6845,"event_guid":"970f3841-709b-5087-bbbd-6dbbdb0fa166","weight":1},{"event_id":6848,"event_guid":"cc332190-83d2-51a5-96a5-0e471d74c928","weight":1},{"event_id":6854,"event_guid":"a5e7fac1-d33a-5679-bee9-1d08a06f5196","weight":1}]},{"guid":"import-e7ef1b335f3993af93","title":"Powerpoint Karaoke","subtitle":null,"slug":"23C3-1683-de-powerpoint_karaoke","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1683.en.html","description":"Dieser Wettbewerb hat ein einfaches Prinzip: der Vortragende sieht die Folien seiner Präsentation bei Beginn seines Vortrages zum ersten Mal.\n","original_language":"eng","persons":["Verena Hafner","Constanze Kurz"],"tags":["23c3"," Culture"],"view_count":1656,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-04T20:00:07.687+01:00","length":5623,"duration":5623,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1683-de-powerpoint_karaoke.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1683-de-powerpoint_karaoke_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-e7ef1b335f3993af93-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-e7ef1b335f3993af93-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1683-de-powerpoint_karaoke","url":"https://api.media.ccc.de/public/events/import-e7ef1b335f3993af93","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":4},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":5},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":3},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":14},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":6},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":9},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":7},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":7},{"event_id":4590,"event_guid":"50415938-4b52-2020-2020-202020202020","weight":2},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":3}]},{"guid":"import-802f5484cabc4b8027","title":"Hacker Jeopardy","subtitle":"The one and only hacker quizshow","slug":"23C3-1567-en-hacker_jeopardy","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1567.en.html","description":"The well known quizshow format, but of course covering topics not usually seen on television\n","original_language":"eng","persons":["Stefan 'Sec' Zehl","Ray"],"tags":["23c3"," Community"],"view_count":556,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-30T13:15:08.163+02:00","length":6470,"duration":6470,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1567-en-hacker_jeopardy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1567-en-hacker_jeopardy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-802f5484cabc4b8027-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-802f5484cabc4b8027-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1567-en-hacker_jeopardy","url":"https://api.media.ccc.de/public/events/import-802f5484cabc4b8027","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":781,"event_guid":"import-777375527796871e60","weight":19},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":21},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":28},{"event_id":1338,"event_guid":"import-a19180493d3c82f29b","weight":19},{"event_id":1426,"event_guid":"import-65c32b95bca41915d5","weight":12},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":7},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":8},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":7},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":7},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7}]},{"guid":"import-760f3fe02dd1e65e6b","title":"Lightning Talks Day 2","subtitle":null,"slug":"23C3-1515-en-lightning_talks_day_2","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1515.en.html","description":"Definition: Lightning Talks is a daily event. which consists in one\nhour of several short talks. Each talk is limited to five minutes.\n\nGoal: There is one slot for Lightning Talks each day of the\ncongress.  The goal is to present 10 talks within each slot.\nSo this might be up to 40 interesting talks in total.\n\nSee the Wiki page for current info.\n","original_language":"eng","persons":["Sven Guckes","b9punk"],"tags":["23c3"],"view_count":33,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-22T10:30:09.065+01:00","length":3554,"duration":3554,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1515-en-lightning_talks_day_2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1515-en-lightning_talks_day_2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-760f3fe02dd1e65e6b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-760f3fe02dd1e65e6b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1515-en-lightning_talks_day_2","url":"https://api.media.ccc.de/public/events/import-760f3fe02dd1e65e6b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1119,"event_guid":"import-519513c2cae6de84b6","weight":1},{"event_id":1125,"event_guid":"import-5e422c2c63c5cffb01","weight":2},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":2}]},{"guid":"import-dac1df77a68351eb84","title":"TV-B-Gone","subtitle":"Better Living Through Inventing","slug":"23C3-1708-en-tv_b_gone","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1708.en.html","description":"It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place?  My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports...\n","original_language":"eng","persons":["Mitch"],"tags":["23c3"," Hacking"],"view_count":129,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-27T11:45:06.293+01:00","length":3669,"duration":3669,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1708-en-tv_b_gone.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1708-en-tv_b_gone_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-dac1df77a68351eb84-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-dac1df77a68351eb84-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1708-en-tv_b_gone","url":"https://api.media.ccc.de/public/events/import-dac1df77a68351eb84","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2930,"event_guid":"31331405-a243-48ba-9536-83285542400a","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1}]},{"guid":"import-ed88ca5ebf2520ebf0","title":"Analysis of a strong Random Number Generator","subtitle":"by anatomizing Linux' CPRNG","slug":"23C3-1420-en-strong_random_number_generator","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1420.en.html","description":"This paper (and slides) will descibe the inner workings of the the random number generator (/dev/{u}random) of Linux. Additionally some possible security flaws are shown (entropy overestimation, zero'izing the pool, etc.)\n","original_language":"eng","persons":["Thomas Biege"],"tags":["23c3"," Hacking"],"view_count":123,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-11-17T07:00:02.179+01:00","length":5731,"duration":5731,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1420-en-strong_random_number_generator.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1420-en-strong_random_number_generator_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-ed88ca5ebf2520ebf0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-ed88ca5ebf2520ebf0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1420-en-strong_random_number_generator","url":"https://api.media.ccc.de/public/events/import-ed88ca5ebf2520ebf0","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1122,"event_guid":"import-a24ed08b895b751d60","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1743,"event_guid":"i5TMBRf_-3TiDrceuY3osQ","weight":2},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":1},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":1},{"event_id":3521,"event_guid":"dd19a740-1dc0-5a76-8b8d-2bdbe292b8cc","weight":1},{"event_id":3616,"event_guid":"e4fbbb8d-0b74-4129-83b7-bda2247175bc","weight":1},{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3699,"event_guid":"0d02bd82-f771-471c-b4bb-5e24b755b169","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":1}]},{"guid":"import-8f7bed0042eb4f1860","title":"23C3 Network Review","subtitle":null,"slug":"23C3-1728-en-23c3_network_review","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1728.en.html","description":"An Introduction into the structure and design of the congress network -\nfeaturing a description of hardware setup and focusing on the Backbone Network infrastructure and Wireless LAN.\n","original_language":"eng","persons":["Stefan Wahl","Niels Bakker","Maxim Salomon","Elisa Jasinska"],"tags":["23c3"," Community"],"view_count":252,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-06T21:15:18.742+01:00","length":3496,"duration":3496,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1728-en-23c3_network_review.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1728-en-23c3_network_review_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-8f7bed0042eb4f1860-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-8f7bed0042eb4f1860-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1728-en-23c3_network_review","url":"https://api.media.ccc.de/public/events/import-8f7bed0042eb4f1860","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":105,"event_guid":"import-699c2f9e58bb11f2d6","weight":3},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":2},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":5},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":5},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1081,"event_guid":"import-579aacb878d51bf5c4","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":4},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":5},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":3},{"event_id":1763,"event_guid":"WbqegbTKG5YheKse8X4ZUw","weight":2},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":2204,"event_guid":"78e2d419-0adc-43ff-989e-95a78ac9ddd4","weight":1},{"event_id":2208,"event_guid":"T7Ta13fUuQaAbv1JlO4-Qg","weight":1},{"event_id":2218,"event_guid":"1hSKsR-r9B0BnpLfUvpDAg","weight":1},{"event_id":2221,"event_guid":"defd3b01-c39d-433f-b3c4-dbea1ea2fe00","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2953,"event_guid":"7bf4c7a5-779e-4591-8d9b-f5f38d3dc879","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":3}]},{"guid":"import-b6012b5b50d2444d03","title":"sFlow","subtitle":"I can feel your traffic","slug":"23C3-1644-en-sflow","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1644.en.html","description":"The explosion of internet traffic is leading to higher bandwidths and an increased need for high speed networks. To analyze and optimize such networks an efficient monitoring system is required. The sFlow standard describes a mechanism to capture traffic data in switched or routed networks. It uses a sampling technology to collect statistics from the device and is for this reason applicable to high speed connections (at gigabit speeds or higher).\n","original_language":"eng","persons":["Elisa Jasinska"],"tags":["23c3"," Science"],"view_count":133,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-18T19:30:11.404+01:00","length":2919,"duration":2919,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1644-en-sflow.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1644-en-sflow_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b6012b5b50d2444d03-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b6012b5b50d2444d03-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1644-en-sflow","url":"https://api.media.ccc.de/public/events/import-b6012b5b50d2444d03","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":2},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":2},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":3},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":2},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":2},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1188,"event_guid":"import-9e2018993a7386c3b2","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":2},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1478,"event_guid":"import-b434c1bed6ba5d62df","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1763,"event_guid":"WbqegbTKG5YheKse8X4ZUw","weight":1},{"event_id":1835,"event_guid":"xdX27wLbHpeOU_dSgBO4Hg","weight":1},{"event_id":1939,"event_guid":"86gdYqujKG3bAf2NaRWeRQ","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":1},{"event_id":2232,"event_guid":"vw7sldBf_2ldlwNWTOF93A","weight":2},{"event_id":2253,"event_guid":"uMGv2XJJqkQodKm0_Mtr_A","weight":2},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2260,"event_guid":"V_yKfMGBUgnu6g90YF-iBA","weight":1},{"event_id":2268,"event_guid":"87b8f1ba-1f05-46c2-93ac-b575bbc9fb4f","weight":2},{"event_id":2290,"event_guid":"e604e540-90d0-4910-920a-1c23ea83e341","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2299,"event_guid":"KJiq3wTS9cMLTTrgJ8PqHA","weight":2},{"event_id":2528,"event_guid":"6393a33b-889d-4850-b0e3-cbc7caeab1cb","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2797,"event_guid":"d934d3e2-9de8-11e5-8a67-5b7bcd9fe77d","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":2953,"event_guid":"7bf4c7a5-779e-4591-8d9b-f5f38d3dc879","weight":1},{"event_id":3461,"event_guid":"8e19cc1e-42d7-4832-a787-e9d81c717751","weight":1},{"event_id":3605,"event_guid":"61f9d4c6-a3de-4958-a57c-efcf941668fa","weight":1},{"event_id":3619,"event_guid":"84ce6d72-3f4f-445b-801e-37f6a1331bed","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3666,"event_guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","weight":1},{"event_id":3678,"event_guid":"47eedd9d-adf7-40d6-80fa-40f560fd3794","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":3772,"event_guid":"e89c168d-dc51-4de1-8aa0-26743ee5c815","weight":1},{"event_id":3850,"event_guid":"ae999450-3893-11e7-890f-9f81551c7b53","weight":1},{"event_id":4242,"event_guid":"c17484f2-79e0-11e7-8a66-afa7f271c231","weight":1},{"event_id":4460,"event_guid":"ad372d74-01bf-4e6a-8376-883298d9015f","weight":1},{"event_id":4590,"event_guid":"50415938-4b52-2020-2020-202020202020","weight":1},{"event_id":4618,"event_guid":"544e7dec-a9a6-11e7-9649-6f2a45a76afd","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1}]},{"guid":"import-c3b0ca4630d7507e90","title":"Counter-Development","subtitle":"The Accessibility of Technology as an Addendum to Engineering Ethics in the Knowledgeable Society","slug":"23C3-1520-en-counter_development","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1520.en.html","description":"Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone.\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["23c3"," Society"],"view_count":12,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-01-02T23:15:04.817+01:00","length":3802,"duration":3802,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1520-en-counter_development.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1520-en-counter_development_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c3b0ca4630d7507e90-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c3b0ca4630d7507e90-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1520-en-counter_development","url":"https://api.media.ccc.de/public/events/import-c3b0ca4630d7507e90","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-d09b45ac831b75ea90","title":"Rootkits as Reversing Tools","subtitle":"An Anonymous Talk","slug":"23C3-1688-en-rootkits_as_reversing_tools","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1688.en.html","description":"This talk will cover two rootkits used as reverse engineering tools, one rootkit support library, one IDA plugin, and talk setup material. The talk itself will be given over VOIP and VNC running over the Tor network to demonstrate a proof of concept on anonymous public speech.\n","original_language":"eng","persons":["Alan Bradley"],"tags":["23c3"," Hacking"],"view_count":23,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-03-28T18:00:06.375+01:00","length":3795,"duration":3795,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1688-en-rootkits_as_reversing_tools.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1688-en-rootkits_as_reversing_tools_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d09b45ac831b75ea90-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d09b45ac831b75ea90-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1688-en-rootkits_as_reversing_tools","url":"https://api.media.ccc.de/public/events/import-d09b45ac831b75ea90","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":2},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1719,"event_guid":"import-1975766c6d4f873c2c","weight":1},{"event_id":1965,"event_guid":"WBJGKVQxGRFSjHRdIIQEtA","weight":1},{"event_id":2075,"event_guid":"og51ww-R2NDBGuA6LeTfRA","weight":1},{"event_id":2420,"event_guid":"02b7f942-d9e9-468e-85cd-12837f48bc16","weight":1},{"event_id":2526,"event_guid":"e8f03c57-f500-492a-9028-b91acffe7695","weight":1},{"event_id":3073,"event_guid":"deadbcbf-a450-4005-99d1-054b38e58b86","weight":1}]},{"guid":"import-6809edc70e003b4ece","title":"RFID hacking","subtitle":null,"slug":"23C3-1576-en-rfid_hacking","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1576.en.html","description":"This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.\n","original_language":"eng","persons":["Karsten Nohl","Henryk Plötz","z0ccor"],"tags":["23c3"," Hacking"],"view_count":411,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T12:00:06.614+01:00","length":3502,"duration":3502,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1576-en-rfid_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1576-en-rfid_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-6809edc70e003b4ece-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-6809edc70e003b4ece-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1576-en-rfid_hacking","url":"https://api.media.ccc.de/public/events/import-6809edc70e003b4ece","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":118,"event_guid":"import-1f4121511842b31d10","weight":4},{"event_id":656,"event_guid":"import-be8c7f62fda931eaa6","weight":9},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":6},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":23},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":6},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":15},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":5},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":8}]},{"guid":"import-519513c2cae6de84b6","title":"Lightning Talks Day 4","subtitle":null,"slug":"23C3-1517-en-lightning_talks_day_4","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1517.en.html","description":"Definition: Lightning Talks is a daily event. which consists in one\nhour of several short talks. Each talk is limited to five minutes.\n\nGoal: There is one slot for Lightning Talks each day of the\ncongress.  The goal is to present 10 talks within each slot.\nSo this might be up to 40 interesting talks in total.\n\nSee the Wiki page for current info.\n","original_language":"eng","persons":["Sven Guckes","b9punk"],"tags":["23c3"],"view_count":40,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-22T10:30:07.238+01:00","length":8362,"duration":8362,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1517-en-lightning_talks_day_4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1517-en-lightning_talks_day_4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-519513c2cae6de84b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-519513c2cae6de84b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1517-en-lightning_talks_day_4","url":"https://api.media.ccc.de/public/events/import-519513c2cae6de84b6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1101,"event_guid":"import-760f3fe02dd1e65e6b","weight":1},{"event_id":1125,"event_guid":"import-5e422c2c63c5cffb01","weight":2},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":2}]},{"guid":"import-a1a87b23e3d9657c68","title":"Detecting temperature through clock skew","subtitle":"Hot or Not: Defeating anonymity by monitoring clock skew to remotely detect the temperature of a PC","slug":"23C3-1513-en-detecting_temperature_through_clock_skew","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html","description":"By requesting timestamps from a computer, a remote adversary can find out the precise speed of its system clock. As each clock crystal is slightly different, and varies with temperature, this can act as a fingerprint of the computer and its location.\n","original_language":"eng","persons":["Steven J. Murdoch"],"tags":["23c3"," Hacking"],"view_count":57,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-03-16T11:00:03.449+01:00","length":3768,"duration":3768,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1513-en-detecting_temperature_through_clock_skew.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1513-en-detecting_temperature_through_clock_skew_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a1a87b23e3d9657c68-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a1a87b23e3d9657c68-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1513-en-detecting_temperature_through_clock_skew","url":"https://api.media.ccc.de/public/events/import-a1a87b23e3d9657c68","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1045,"event_guid":"import-0a063c79bad4fefe45","weight":1},{"event_id":3678,"event_guid":"47eedd9d-adf7-40d6-80fa-40f560fd3794","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4266,"event_guid":"06e40660-7a3c-11e7-9e41-5fd1dc78dc8f","weight":1},{"event_id":4540,"event_guid":"55585442-5342-2020-2020-202020202020","weight":1},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":1},{"event_id":4590,"event_guid":"50415938-4b52-2020-2020-202020202020","weight":1}]},{"guid":"import-6f018026ae6f6434fa","title":"CCC Jahresrückblick","subtitle":"Ein Überblick über die Aktivitäten des Clubs 2006","slug":"23C3-1487-de-ccc_jahresrueckblick","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1487.en.html","description":"Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.\n","original_language":"eng","persons":["Constanze Kurz","Frank Rosengart","Lars Weiler","Andreas Lehner","Andy Müller-Maguhn"],"tags":["23c3"," Community"],"view_count":130,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-11T12:45:05.578+01:00","length":3583,"duration":3583,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1487-de-ccc_jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1487-de-ccc_jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-6f018026ae6f6434fa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-6f018026ae6f6434fa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1487-de-ccc_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-6f018026ae6f6434fa","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":3},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":6},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":3},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":5},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":2},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":4},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":2},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":2},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":2},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":4},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":2},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":2}]},{"guid":"import-0b0bb700744d6dcda6","title":"Void the warranty!","subtitle":"How to start analyzing blackboxes","slug":"23C3-1622-en-void_the_warranty","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1622.en.html","description":"We're surrounded by blackboxes containing digital technology nowadays.\nThere are complex devices like cell phones as well as more simple ones that don't look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.\n","original_language":"eng","persons":["Hunz"],"tags":["23c3"," Hacking"],"view_count":81,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-08-18T21:45:05.003+02:00","length":3171,"duration":3171,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1622-en-void_the_warranty.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1622-en-void_the_warranty_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-0b0bb700744d6dcda6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-0b0bb700744d6dcda6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1622-en-void_the_warranty","url":"https://api.media.ccc.de/public/events/import-0b0bb700744d6dcda6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":140,"event_guid":"import-f7fb9bcdd441658463","weight":3},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1394,"event_guid":"import-a01a7c6e4a1181923b","weight":2},{"event_id":2496,"event_guid":"54159b05-db61-4055-b2ae-f4a16559ccfe","weight":7},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":2},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":7},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2}]},{"guid":"import-a2f76e0e6e36e4f021","title":"SIP Security","subtitle":"Status Quo and Future Issues","slug":"23C3-1459-en-sip_security","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1459.en.html","description":"The presentation will give an overview on SIP security issues and show possible weaknesses in current implementations using SIP (Hardphones, Softphones, Gateways). Further, an outlook on the security of future, serverless SIP systems (P2P-SIP) will be given.\n","original_language":"eng","persons":["Jan Seedorf"],"tags":["23c3"," Science"],"view_count":65,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-28T20:45:06.548+01:00","length":3759,"duration":3759,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1459-en-sip_security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1459-en-sip_security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a2f76e0e6e36e4f021-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a2f76e0e6e36e4f021-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1459-en-sip_security","url":"https://api.media.ccc.de/public/events/import-a2f76e0e6e36e4f021","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":568,"event_guid":"import-8b10c385a6751fd71f","weight":1},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1143,"event_guid":"import-dac1df77a68351eb84","weight":1},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":1},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1411,"event_guid":"import-c6222a12f8ee22d1e4","weight":1},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":1},{"event_id":1446,"event_guid":"import-fb68993411e5ae2493","weight":1},{"event_id":1676,"event_guid":"import-d5a95005e665b332d7","weight":1},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":2},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":5719,"event_guid":"2ea0582f-bf75-52bc-a5c5-d0914db47c52","weight":1},{"event_id":5721,"event_guid":"2d47325d-cd7b-542e-bf9e-98d333003965","weight":1},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":1},{"event_id":5998,"event_guid":"c445b6d8-546e-534d-9964-63751761769a","weight":1},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":1},{"event_id":6004,"event_guid":"49976f12-75cd-447d-8dd0-1157b399e3e9","weight":1},{"event_id":6010,"event_guid":"19db5e82-9317-437d-8ea6-7788f7872c84","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":1},{"event_id":6025,"event_guid":"6d52b06c-1295-4983-84e1-d0fb807af357","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6545,"event_guid":"400622c5-3754-43fd-aaf3-0ca00e9ad551","weight":1},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1}]},{"guid":"import-2f2cce0079d30b15b0","title":"Jabber-Showcase","subtitle":"XMPP ist viel mehr als nur Instant Messaging","slug":"23C3-1667-de-jabber_showcase","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1667.en.html","description":"Jabber wird von vielen nur als \"Open-Source\"-ICQ-Ersatz wahrgenommen. Dabei kann Jabber bzw. XMPP noch deutlich mehr, es existieren weit über 100 Protokollerweiterungen, und es werden täglich mehr.\n\nDer Vortrag stellt einige interessante Protokoll-Teile sowie Implementationen vor.\n","original_language":"eng","persons":["fh"],"tags":["23c3"," Hacking"],"view_count":307,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-03T11:15:06.651+02:00","length":2059,"duration":2059,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1667-de-jabber_showcase.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1667-de-jabber_showcase_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-2f2cce0079d30b15b0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-2f2cce0079d30b15b0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1667-de-jabber_showcase","url":"https://api.media.ccc.de/public/events/import-2f2cce0079d30b15b0","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1082,"event_guid":"import-d11d50d901f7d39189","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1481,"event_guid":"import-987c6816969fd0c10c","weight":1},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":1},{"event_id":2013,"event_guid":"_1gVt5y_RrWJMx4P36Virw","weight":1},{"event_id":2106,"event_guid":"JLh_ecvn744ro0dQFWD_jA","weight":1},{"event_id":2113,"event_guid":"HqRtO6NaLxsJOokKOydoKA","weight":1},{"event_id":2123,"event_guid":"CiTCK-gb6Mio3mpYu4sJ2g","weight":1},{"event_id":2318,"event_guid":"6b440884-c0db-4716-be3a-fb223c351665","weight":1},{"event_id":2326,"event_guid":"870e6541-0633-4a92-a1a6-7f9b5480c838","weight":1},{"event_id":2567,"event_guid":"b00d2076-e6e7-4556-b691-6cba06d83b78","weight":4},{"event_id":3070,"event_guid":"9a153e36-2653-4927-a47b-78351a0f79d7","weight":1},{"event_id":3486,"event_guid":"5922d022-17b9-446a-b6f6-958b1d706e7e","weight":2},{"event_id":3497,"event_guid":"13dd8dc0-2c01-46cf-87e0-1b659c04d4e3","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":2},{"event_id":3859,"event_guid":"7920bbee-a683-4fdd-863d-fa77062a39b2","weight":1},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":1},{"event_id":4436,"event_guid":"0a5c2a3a-aae3-47c6-97e8-c28af5efc466","weight":1},{"event_id":4538,"event_guid":"41484e52-4847-2020-2020-202020202020","weight":7},{"event_id":4539,"event_guid":"384d5955-3745-2020-2020-202020202020","weight":1},{"event_id":4554,"event_guid":"48595951-4733-2020-2020-202020202020","weight":2},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":1},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":5265,"event_guid":"a4b6d7b8-48ae-47e4-a348-ce7ba14fdb65","weight":1},{"event_id":5282,"event_guid":"c32f7e51-6c54-490b-bd4d-6745aca48f51","weight":1},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":1},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":1},{"event_id":6249,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb894","weight":5}]},{"guid":"import-22db6c85faa2782a96","title":"Information Operations","subtitle":"Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures","slug":"23C3-1439-en-information_operations","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1439.en.html","description":"The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.\n","original_language":"eng","persons":["Sebastian Schroeder"],"tags":["23c3"," Science"],"view_count":15,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-11-05T22:45:04.009+01:00","length":4564,"duration":4564,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1439-en-information_operations.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1439-en-information_operations_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-22db6c85faa2782a96-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-22db6c85faa2782a96-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1439-en-information_operations","url":"https://api.media.ccc.de/public/events/import-22db6c85faa2782a96","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":2},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2}]},{"guid":"import-a114fda3b438854fec","title":"On Free, and the Differences between Culture and Code","subtitle":null,"slug":"23C3-1760-en-on_free","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1760.en.html","description":"\n","original_language":"eng","persons":["Lawrence Lessig"],"tags":["23c3"," Society"],"view_count":306,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-20T09:00:09.375+01:00","length":4584,"duration":4584,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1760-en-on_free.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1760-en-on_free_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a114fda3b438854fec-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a114fda3b438854fec-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1760-en-on_free","url":"https://api.media.ccc.de/public/events/import-a114fda3b438854fec","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":568,"event_guid":"import-8b10c385a6751fd71f","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1446,"event_guid":"import-fb68993411e5ae2493","weight":1},{"event_id":1646,"event_guid":"import-3f6920f8040f18da31","weight":1},{"event_id":1676,"event_guid":"import-d5a95005e665b332d7","weight":1},{"event_id":1753,"event_guid":"0i_XOY92eUOxB3jQO_Zj4g","weight":3},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":2},{"event_id":2078,"event_guid":"7156e245-d372-44d9-af0f-cbaa2e089f2c","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":3596,"event_guid":"b8e0eb47-4832-4726-bc9b-9015bd96becf","weight":1},{"event_id":7025,"event_guid":"c127467f-82bf-4896-b473-cd81bf055fc5","weight":1}]},{"guid":"import-9a29d7fecce7ac000e","title":"Virtuelle Sicherheit","subtitle":"Mandatory Access Control und TPM in Xen","slug":"23C3-1493-de-virtuelle_sicherheit","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1493.en.html","description":"Xen bietet aufregende neue Sicherheitsfunktionen: Mandatory Access Control und virtuelle TPMs. Der Vortrag stellt diese Funktionen vor, berichtet von ersten Erfahrungen und zeigt ihre Grenzen auf.\n","original_language":"eng","persons":["Ralf Spenneberg"],"tags":["23c3"," Hacking"],"view_count":73,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-02-03T16:45:06.203+01:00","length":3831,"duration":3831,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1493-de-virtuelle_sicherheit.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1493-de-virtuelle_sicherheit_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-9a29d7fecce7ac000e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-9a29d7fecce7ac000e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1493-de-virtuelle_sicherheit","url":"https://api.media.ccc.de/public/events/import-9a29d7fecce7ac000e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":2},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2}]},{"guid":"import-a60aea0b597609400e","title":"The Grim Meathook Future","subtitle":"How The Tech Culture Can Maintain Relevance In The 21st Century","slug":"23C3-1461-en-the_grim_meathook_future","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1461.en.html","description":"Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there's also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.\n","original_language":"eng","persons":["Joshua Ellis"],"tags":["23c3"," Culture"],"view_count":47,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-21T09:15:04.090+02:00","length":5890,"duration":5890,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1461-en-the_grim_meathook_future.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1461-en-the_grim_meathook_future_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a60aea0b597609400e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a60aea0b597609400e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1461-en-the_grim_meathook_future","url":"https://api.media.ccc.de/public/events/import-a60aea0b597609400e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":798,"event_guid":"import-1c79c2ce56e02c06d9","weight":1},{"event_id":916,"event_guid":"import-34c9c7ca1b95d58b9a","weight":1},{"event_id":1008,"event_guid":"import-3879979ffb75b723f8","weight":1},{"event_id":1058,"event_guid":"import-20a6b9aac8f72f4d2c","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1134,"event_guid":"import-1c9d472a2babaafdf2","weight":1},{"event_id":1145,"event_guid":"import-909ed6ab4ce1e0379c","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":1}]},{"guid":"import-106c6a69092efb9c66","title":"JSON RPC","subtitle":"Cross Site Scripting and Client Side Web Services","slug":"23C3-1568-en-json_rpc","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1568.en.html","description":"JSON RPC is a recently fashionable buzzword in the AJAX context. This lecture explains its principles, specifically the same origin policy for cross site scripting and its relation to JSON RPC, and demonstrates the essential implementation details using the example of the geocoding service in the google maps API.\n","original_language":"eng","persons":["(mesch) Steffen Meschkat"],"tags":["23c3"," Science"],"view_count":42,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-05-12T05:30:03.191+02:00","length":3760,"duration":3760,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1568-en-json_rpc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1568-en-json_rpc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-106c6a69092efb9c66-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-106c6a69092efb9c66-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1568-en-json_rpc","url":"https://api.media.ccc.de/public/events/import-106c6a69092efb9c66","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1162,"event_guid":"import-d8ab7a89bd5682b6d7","weight":1},{"event_id":1167,"event_guid":"import-f1078d534b35506b91","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":1},{"event_id":2867,"event_guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":3452,"event_guid":"12707664-5781-4eb3-a702-ce3a029e042b","weight":1},{"event_id":4379,"event_guid":"406d9e92-690e-4a35-97cd-49af5fe33764","weight":1},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":1},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":1},{"event_id":5707,"event_guid":"37a90809-5147-5662-bbce-c669c810fec9","weight":1},{"event_id":5708,"event_guid":"138ff0ac-a12c-5211-aeaf-722cc072ea07","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":6927,"event_guid":"9463b562-8353-562e-8484-f9cac7749407","weight":1}]},{"guid":"import-f6a6c03237ef52248e","title":"Chaos und Kritische Theorie","subtitle":"Adorno, Wilson und Diskordianismus","slug":"23C3-1452-de-critical_theory_and_chaos","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1452.en.html","description":"Kritische Theorie, wie sie sich vor allem an Adorno festmachen lässt, und Diskordianismus, der als Philosophie des Chaos zum Namensgeber des veranstaltenden Vereins wurde, gehören zu den am weistesten verbreiteten Elementen des 'social hacking'. Jedoch ist gerade in den letzten Jahren des Adbusting und des Hacktivism unübersehbar geworden, daß von beiden Denktraditionen in der Hauptsache stark vereinfachte und oft auch ideologisch abgeschlossene Formen Verwendung finden: Kritische Theorie wird zumeist auf ein unbestimmtes Unbehagen an der Kulturindustrie, der Globalisierung und den technologischen Entwickungen reduziert, während Diskordianismus zur Illustration oft bedenklicher Parteinahmen für irrationale politische Auffassungen dient. Im Vortrag wird der Versuch unternommen, die Kritische Theorie dem diskordischen Witz auszusetzen und den Diskordianismus der Ideologiekritik.\n","original_language":"eng","persons":["Daniel Kulla","Oona Leganovic"],"tags":["23c3"," Community"],"view_count":405,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-22T21:45:05.703+01:00","length":2865,"duration":2865,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1452-de-critical_theory_and_chaos.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1452-de-critical_theory_and_chaos_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-f6a6c03237ef52248e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-f6a6c03237ef52248e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1452-de-critical_theory_and_chaos","url":"https://api.media.ccc.de/public/events/import-f6a6c03237ef52248e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":212,"event_guid":"import-6934edc539ff86b236","weight":2},{"event_id":504,"event_guid":"import-ab8dbcc7631a1e4932","weight":5},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":4},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":9},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":10},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":4},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":3},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":3},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":5},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":7},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":3},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":6},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":6},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":4},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":4},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":9},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":3},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":4},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":2},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":4},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":2},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":2},{"event_id":5223,"event_guid":"4647424c-5553-2020-2020-202020202020","weight":2},{"event_id":5247,"event_guid":"48454348-4e44-2020-2020-202020202020","weight":2}]},{"guid":"import-c515ec9dc323e5bdd3","title":"A 10GE monitoring system","subtitle":"Hacking a 10 Gigabit Intrusion detection and prevention system into a network troubleshooting tool.","slug":"23C3-1640-en-10ge_monitoring_system","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1640.en.html","description":"Capturing network packets is a valuable technique for troubleshooting network problems. Capturing at network speeds less, or up to one gigabit per second is feasible with a fast general purpose computer hardware. \n\nBut that hardware is to slow for Ten gigabit per second ethernet (10GE). Hence, special hardware is required. \n\nThis topic describes the modification of a commercially available 10GE  networks security system, into a network analyser.\n","original_language":"eng","persons":["Arien Vijn"],"tags":["23c3"," Hacking"],"view_count":94,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-04-17T21:15:03.010+02:00","length":3168,"duration":3168,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1640-en-10ge_monitoring_system.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1640-en-10ge_monitoring_system_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c515ec9dc323e5bdd3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c515ec9dc323e5bdd3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1640-en-10ge_monitoring_system","url":"https://api.media.ccc.de/public/events/import-c515ec9dc323e5bdd3","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":839,"event_guid":"import-5ee13c48e9859449de","weight":1},{"event_id":843,"event_guid":"import-a6e12dabd1d28df5ea","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":2},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1069,"event_guid":"import-5d344713a4331b21b2","weight":1},{"event_id":1081,"event_guid":"import-579aacb878d51bf5c4","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1660,"event_guid":"import-87fe91710bd736fc78","weight":1},{"event_id":1740,"event_guid":"0IuyfNlW5fXVnrMIgEXesw","weight":1},{"event_id":1778,"event_guid":"7abembel5Nwrd3h_pRjeOQ","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1}]},{"guid":"import-d92bb58ed116334bd1","title":"Revenge of the Female Nerds","subtitle":"Busting Myths about Why Women Can't Be Technical","slug":"23C3-1709-en-revenge_of_the_female_nerds","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1709.en.html","description":"Why do media and industry lag behind reality when it comes to estimating\nwomen's technical and scientific abilities? That women have these\nabilities is obvious. The question is how to change social expectations\nabout them. What are women doing, and what can they do, to combat\npervasive myths about their inferiority as engineers and scientists?\n","original_language":"eng","persons":["Annalee Newitz"],"tags":["23c3"," Culture"],"view_count":53,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-02T18:30:12.547+01:00","length":3222,"duration":3222,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1709-en-revenge_of_the_female_nerds.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1709-en-revenge_of_the_female_nerds_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d92bb58ed116334bd1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d92bb58ed116334bd1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1709-en-revenge_of_the_female_nerds","url":"https://api.media.ccc.de/public/events/import-d92bb58ed116334bd1","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":754,"event_guid":"import-f4e0b835ae0c12299f","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1051,"event_guid":"import-4cc0be04257f4b5318","weight":1},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1205,"event_guid":"import-857941dfbc4586b4f7","weight":1},{"event_id":1232,"event_guid":"import-f7c7fc84bd71238e67","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1274,"event_guid":"import-b24e96b14b74162533","weight":1},{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":1},{"event_id":1350,"event_guid":"import-bbaef39cd440f712fd","weight":1},{"event_id":1440,"event_guid":"import-69d30793d3113152d9","weight":1},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":1},{"event_id":1503,"event_guid":"import-019cfe6488a1c1abe9","weight":1},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2472,"event_guid":"e8d65b1e-ce8a-4307-b056-e8b60461c825","weight":1},{"event_id":2519,"event_guid":"c61636b5-c011-4404-8caa-28ea1aae2804","weight":2},{"event_id":2636,"event_guid":"4b3a0d41-165f-42f1-a96b-ce8a29598bb8","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2864,"event_guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","weight":1},{"event_id":2874,"event_guid":"5f57ffa9-631c-429d-a11b-5b51bebe0f0f","weight":2},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":2},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":2},{"event_id":3729,"event_guid":"56ec19c0-9844-46d6-b728-7a8217b8ed38","weight":1},{"event_id":4119,"event_guid":"4b01cdf9-a9c9-5fc8-8b8a-44ba1c17f22e","weight":2},{"event_id":4542,"event_guid":"56484c54-534e-2020-2020-202020202020","weight":1},{"event_id":4694,"event_guid":"39e1e8bd-418b-4463-b105-abcd086a4eb3","weight":1}]},{"guid":"import-4db021b498e759c3e0","title":"Software Reliability in Aerospace","subtitle":"An overview on design and generation of safe and reliable Software","slug":"23C3-1627-en-software_reliability","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1627.en.html","description":"The challenge of designing reliable is managed different in every\nindustry. This lecture will give an overview how safety critical and\nreliable software is designed and produced in the area of aerospace\nindustry and why this could also be interesting for other\napplications (like web-design)\n","original_language":"eng","persons":["Erwin Erkinger"],"tags":["23c3"," Hacking"],"view_count":35,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-22T19:45:09.870+01:00","length":3428,"duration":3428,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1627-en-software_reliability.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1627-en-software_reliability_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4db021b498e759c3e0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4db021b498e759c3e0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1627-en-software_reliability","url":"https://api.media.ccc.de/public/events/import-4db021b498e759c3e0","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1068,"event_guid":"import-cef704a060af9873ef","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":4968,"event_guid":"f588fca0-d2c1-45e2-ba34-4b055a369b2a","weight":1}]},{"guid":"import-a8982b9c792b3df8d3","title":"Warum wir uns so gerne überwachen lassen…","subtitle":"Erhellendes aus Philosophie und Soziologie zur Klärung des Phänomens steigender Kontrolle und Überwachung","slug":"23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1714.en.html","description":"Das Phänomen steigender Überwachung und Kontrolle ist vielfach beschrieben und diskutiert wurden. Klagen werden allerorts laut und verklingen meist genauso schnell wieder. Innerhalb des Vortrags soll das Phänomen - jenseits einer bloßen Zustandsbeschreibung - soziologisch-philosophisch betrachtet und auf aktuelle internationale Forschungsergebnisse eingegangen werden.\n","original_language":"eng","persons":["Christine Ketzer"],"tags":["23c3"," Society"],"view_count":75,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2024-09-25T10:45:03.505+02:00","length":3743,"duration":3743,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a8982b9c792b3df8d3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a8982b9c792b3df8d3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen","url":"https://api.media.ccc.de/public/events/import-a8982b9c792b3df8d3","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":2},{"event_id":1068,"event_guid":"import-cef704a060af9873ef","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":2},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":4},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":4},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":3},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":2}]},{"guid":"import-3c00fc2cd16ed6e9f9","title":"DVB-T - From Pixeldata to COFDM Transmission","subtitle":"How to build a complete FPGA-based DVB-T transmitter","slug":"23C3-1646-en-dvb_t","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1646.en.html","description":"As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter.\n-\u003e For that we plan to stream the content of the 23C3 lectures locally on Alexanderplatz using TV channel 22. Don't forget to bring your DVB-T stick. For more information look at \u003ca href=\"http://events.ccc.de/congress/2006/DVB-T\"\u003ethe DVB-T project description.\u003c/a\u003e\n","original_language":"eng","persons":["Thomas Kleffel","Christian Daniel"],"tags":["23c3"," Science"],"view_count":153,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-25T03:15:03.449+02:00","length":3488,"duration":3488,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1646-en-dvb_t.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1646-en-dvb_t_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-3c00fc2cd16ed6e9f9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-3c00fc2cd16ed6e9f9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1646-en-dvb_t","url":"https://api.media.ccc.de/public/events/import-3c00fc2cd16ed6e9f9","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":2},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1081,"event_guid":"import-579aacb878d51bf5c4","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":2},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":2332,"event_guid":"c8fe75dc-bc24-4bf7-8b6d-a5ac76c48d0e","weight":1},{"event_id":2338,"event_guid":"e51a1062-c2e2-487c-9d94-f97b47a894af","weight":1},{"event_id":2624,"event_guid":"178dd5ac-6f92-4cd9-a99c-8a1b0e83bce8","weight":1},{"event_id":2911,"event_guid":"60ba43d2-a9c8-42ab-a434-8772cb182675","weight":1},{"event_id":3325,"event_guid":"cb824f02-1810-5f6b-8928-54c26f985efa","weight":1},{"event_id":3452,"event_guid":"12707664-5781-4eb3-a702-ce3a029e042b","weight":1},{"event_id":3624,"event_guid":"600ca67d-e18d-49d8-8e5d-08d5b38ec528","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3693,"event_guid":"90c2f1c6-c32e-4bb2-b8a0-db6b4e24e4b3","weight":1}]},{"guid":"import-63fd9556269ebc5a94","title":"Güter und Personen \"tracken\" - Lokalisierung im Pizzamann-Universum","subtitle":"Technische Mittel und soziale Aspekte des \"Tracking \u0026 Tracing\"","slug":"23C3-1663-de-tracking_goods_and_tracing_people","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1663.en.html","description":"Dieser Vortrag gibt einen Überblick und geht auf Details von\nunterschiedlichen Tracking \u0026 Tracing-Technologien ein. Aufbau und\nFunktionsweise von solchen Verfolgungssystemen werden kategorisiert\nund aufgezeigt; zudem schafft der Vortrag einen Überblick darüber, \nwo solche Tracking-Systeme heute verwendet werden. Dabei werden\ninsbesondere diverse Sicherheitsaspekte au detail behandelt.\n\nNachdem aufgezeigt wurde, was alles stattfindet, werden die sozialen\nKonsequenzen solcher Systeme beleuchtet. Dabei wird sowohl auf kommerzielle\nAspekte (Änderungen in der Marktmacht) als auch auf den Aspekt der\nKonsumentenverfolgung eingegangen, da Konsumenten üblicherweise zwar\nwissen sollten, was mit ihren Daten geschieht, das aber höchst selten\nder Fall ist.\n\nDer zweite Teil des Vortrags beschäftigt sich dann mit lokalisierenden\nÜberwachungssystemen der Staaten, und welche Gefahren des Missbrauchs\nhierbei entstehen.\n","original_language":"eng","persons":["Volker Birk"],"tags":["23c3"," Society"],"view_count":52,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T14:00:16.613+01:00","length":3809,"duration":3809,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1663-de-tracking_goods_and_tracing_people.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1663-de-tracking_goods_and_tracing_people_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-63fd9556269ebc5a94-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-63fd9556269ebc5a94-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1663-de-tracking_goods_and_tracing_people","url":"https://api.media.ccc.de/public/events/import-63fd9556269ebc5a94","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1069,"event_guid":"import-5d344713a4331b21b2","weight":1},{"event_id":1075,"event_guid":"import-278b33c334c7d98406","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1202,"event_guid":"import-1d64518c2e5554b342","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":2},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":2},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":3},{"event_id":2515,"event_guid":"b8a7511e-143d-45c5-b974-2e91dab18814","weight":1},{"event_id":2533,"event_guid":"c1f34fda-54f2-407c-b68c-44dafc820282","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1}]},{"guid":"import-0a063c79bad4fefe45","title":"Mining Search Queries","subtitle":"How to discover additional knowledge in the AOL query logs","slug":"23C3-1498-en-mining_aol_search_queries","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1498.en.html","description":"AOL recently published over 34M weakly anonymized search queries from their users by intension. This lecture gives an overview on the results of an extensive statistical analysis and data mining procedure on this dataset. Thereby, a methodology for frequency analysis, search trend mining, topic detection and even user profiling and identification will be presented.\n","original_language":"eng","persons":["Robert"],"tags":["23c3"," Science"],"view_count":14,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-08T23:30:10.165+01:00","length":2978,"duration":2978,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1498-en-mining_aol_search_queries.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1498-en-mining_aol_search_queries_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-0a063c79bad4fefe45-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-0a063c79bad4fefe45-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1498-en-mining_aol_search_queries","url":"https://api.media.ccc.de/public/events/import-0a063c79bad4fefe45","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1130,"event_guid":"import-a1a87b23e3d9657c68","weight":1},{"event_id":3678,"event_guid":"47eedd9d-adf7-40d6-80fa-40f560fd3794","weight":1},{"event_id":4266,"event_guid":"06e40660-7a3c-11e7-9e41-5fd1dc78dc8f","weight":1},{"event_id":4540,"event_guid":"55585442-5342-2020-2020-202020202020","weight":1},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":1},{"event_id":4590,"event_guid":"50415938-4b52-2020-2020-202020202020","weight":1}]},{"guid":"import-b6c7f097823adf3c6e","title":"MMORPGs","subtitle":"The state and future of the World of Warcraft","slug":"23C3-1738-en-mmorpgs","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1738.en.html","description":"This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed.\n","original_language":"eng","persons":["Joi Ito"],"tags":["23c3"," Society"],"view_count":72,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-06T15:45:09.654+01:00","length":3536,"duration":3536,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1738-en-mmorpgs.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1738-en-mmorpgs_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b6c7f097823adf3c6e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b6c7f097823adf3c6e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1738-en-mmorpgs","url":"https://api.media.ccc.de/public/events/import-b6c7f097823adf3c6e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1250,"event_guid":"import-c3383908932523295b","weight":2},{"event_id":2151,"event_guid":"SXxWu-U4pNjjFZLl9XXDDA","weight":1},{"event_id":2436,"event_guid":"83b785ad-0882-4552-9ad4-0cde123f3837","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3998,"event_guid":"4DPy_rTjcx8v3-qpU0VcmQ","weight":1},{"event_id":5765,"event_guid":"cc58e79c-5a9f-43cf-80da-6dca94b402c4","weight":1},{"event_id":6184,"event_guid":"78e07e27-053d-55f5-92d1-16956900e402","weight":1}]},{"guid":"import-d6e0964fb93469b332","title":"Unusual bugs","subtitle":null,"slug":"23C3-1456-en-unusual_bugs","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1456.en.html","description":"In this presentation I'll present a series of unusual security bugs. Things that I've ran into at some point and went \"There's gotta be some security consequence here\". None of these are really a secret, and most of them are even documented somewhere. But apparently most people don't seem to know about them.\n","original_language":"eng","persons":["Ilja"],"tags":["23c3"," Hacking"],"view_count":426,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-12T19:45:04.813+01:00","length":3995,"duration":3995,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1456-en-unusual_bugs.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1456-en-unusual_bugs_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d6e0964fb93469b332-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d6e0964fb93469b332-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1456-en-unusual_bugs","url":"https://api.media.ccc.de/public/events/import-d6e0964fb93469b332","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":157,"event_guid":"import-0ac93750a395b0f59f","weight":1},{"event_id":686,"event_guid":"import-b93ce60268c2d2302a","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":2},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1211,"event_guid":"import-476a1a21f28a910dbd","weight":1},{"event_id":2205,"event_guid":"gRbk7OprwZBqF3cv0NddMQ","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":6530,"event_guid":"83bf042d-7382-4975-a3f8-92229944b8fc","weight":1}]},{"guid":"import-ce6e6cb99ffa1eeecb","title":"An Introduction to Traffic Analysis","subtitle":"Attacks, Defences and Public Policy Issues...","slug":"23C3-1478-en-traffic_analysis","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1478.en.html","description":"This talk will present an overview of traffic analysis techniques, and\nhow they can be used to extract data from 'secure' systems. We will\nconsider both state of the art attacks in the academic literature,\nbut also practical attacks against fielded systems.\n","original_language":"eng","persons":["George Danezis"],"tags":["23c3"," Hacking"],"view_count":122,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-29T21:00:19.062+01:00","length":3628,"duration":3628,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1478-en-traffic_analysis.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1478-en-traffic_analysis_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-ce6e6cb99ffa1eeecb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-ce6e6cb99ffa1eeecb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1478-en-traffic_analysis","url":"https://api.media.ccc.de/public/events/import-ce6e6cb99ffa1eeecb","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1408,"event_guid":"import-b7cf56b6bbe50e728c","weight":1},{"event_id":1462,"event_guid":"import-b9197fb95bae24cee3","weight":1},{"event_id":1477,"event_guid":"import-633bd84860f65db047","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":2},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1552,"event_guid":"import-c0e9ee0d0ffbfc6e2b","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":1668,"event_guid":"import-d52f066cf03458c746","weight":1},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":1},{"event_id":1777,"event_guid":"tEudCvm8e6XS2VQP3BR5yw","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":1},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":1},{"event_id":2204,"event_guid":"78e2d419-0adc-43ff-989e-95a78ac9ddd4","weight":1},{"event_id":2499,"event_guid":"fc4e6338-452d-48c3-a21b-ecdcb658bce7","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":2862,"event_guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":3551,"event_guid":"96de15c5-a017-4fb6-a3a0-09cdf8addd09","weight":1},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":1},{"event_id":4627,"event_guid":"b4b35a2e-dc10-0435-43a9-66521c933088","weight":1},{"event_id":4848,"event_guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":5254,"event_guid":"83235eb6-ce2d-4f4d-8124-1d38010a2076","weight":1},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":1},{"event_id":6076,"event_guid":"68c30487-d434-4b4e-8df0-fb06aa4e8cdf","weight":1},{"event_id":6157,"event_guid":"b512a4cb-3c13-4065-076f-94039f987bf8","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1}]},{"guid":"import-68c94579cb323fe39d","title":"Automated Exploit Detection in Binaries","subtitle":"Finding exploitable vulnerabilities in binaries","slug":"23C3-1694-en-automated_exploit_detection_in_binaries","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1694.en.html","description":"In this talk, we will introduce the audience to the concepts\ninvolved in static analysis, and different implementations of those concepts\nwith advantages and disadvantages of each. We will show how the open source\ntool bugreport (http://bugreport.sf.net) implements these concepts and will\ndemonstrate the tool finding exploitable bugs in real-world binaries.\n","original_language":"eng","persons":["Luis Miras"],"tags":["23c3"," Hacking"],"view_count":105,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-05-31T15:15:03.810+02:00","length":2810,"duration":2810,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1694-en-automated_exploit_detection_in_binaries.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1694-en-automated_exploit_detection_in_binaries_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-68c94579cb323fe39d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-68c94579cb323fe39d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1694-en-automated_exploit_detection_in_binaries","url":"https://api.media.ccc.de/public/events/import-68c94579cb323fe39d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":3},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1080,"event_guid":"import-ed88ca5ebf2520ebf0","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1141,"event_guid":"import-c9f7320f170642feee","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":4945,"event_guid":"540aaf40-03b5-11e8-8b91-e7b5e3e254af","weight":1}]},{"guid":"import-bb84670204b0b48b3f","title":"We don't trust voting computers","subtitle":"The story of the dutch campaign against black-box voting to date","slug":"23C3-1423-en-we_dont_trust_voting_computers","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1423.en.html","description":"This talk covers the dutch campaign against unverifiable voting on computers, which is part of a growing movement world-wide to reject these computers. Successes in Ireland and (surprise) the US seem to indicate that media, law-makers and the general public are beginning to wake up.\n","original_language":"eng","persons":["Rop Gonggrijp"],"tags":["23c3"," Society"],"view_count":142,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-03T05:45:03.444+02:00","length":8297,"duration":8297,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1423-en-we_dont_trust_voting_computers.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1423-en-we_dont_trust_voting_computers_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-bb84670204b0b48b3f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-bb84670204b0b48b3f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1423-en-we_dont_trust_voting_computers","url":"https://api.media.ccc.de/public/events/import-bb84670204b0b48b3f","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":3},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":2},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1185,"event_guid":"import-3f3079b556a96366d4","weight":2},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1}]},{"guid":"import-1c9d472a2babaafdf2","title":"Mobile phone call encryption","subtitle":"Encrypting (GSM) mobile phone calls  over VPN with an Asterisk PBX","slug":"23C3-1495-en-green_phone","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1495.en.html","description":"To encrypt all your mobile phones to protect it from overzealous eavesdroppers, you are currently limited to using special hardware such as the Cryptophone. The disadvantage of cryptophone is that it only works with other cryptophones. To work around this, we turn mobile phones from \"voice\" phones into VOIP phones. Using the SIP protocol for VOIP and IPsec/L2TP or Openvpn as our VPN, Leigh Honeywell and Paul Wouters connect their mobile phones fully encrypted to an Asterisk PBX server.\n","original_language":"eng","persons":["Paul Wouters","Leigh Honeywell"],"tags":["23c3"," Hacking"],"view_count":136,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-26T19:15:07.584+01:00","length":4140,"duration":4140,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1495-en-green_phone.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1495-en-green_phone_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-1c9d472a2babaafdf2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-1c9d472a2babaafdf2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1495-en-green_phone","url":"https://api.media.ccc.de/public/events/import-1c9d472a2babaafdf2","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":406,"event_guid":"import-e053b6572092de17d3","weight":1},{"event_id":426,"event_guid":"import-d5ed7e29ab1153d0cf","weight":1},{"event_id":762,"event_guid":"import-b09161bd0e821fd4fc","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":957,"event_guid":"import-fa398718f4c3eec297","weight":1},{"event_id":1072,"event_guid":"import-a60aea0b597609400e","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1369,"event_guid":"import-60706e285c5680928f","weight":1},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":1},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":1},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":1},{"event_id":5621,"event_guid":"6c03170f-fc25-55f7-801b-587e5336145c","weight":1},{"event_id":6519,"event_guid":"5a8097ad-15c2-492e-8bc4-6b634fd8e963","weight":1}]},{"guid":"import-73f7a87aafc447fa0b","title":"Sie haben das Recht zu schweigen","subtitle":"Durchsuchung, Beschlagnahme, Vernehmung - Strategien für den Umgang mit Polizei und Staatsanwalt","slug":"23C3-1346-de-sie_haben_das_recht_zu_schweigen","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1346.en.html","description":"Wer online lebt und arbeitet, tut dies unter den Augen der Strafverfolger. Der Vortrag schildert, wie Durchsuchungen, Vernehmungen und Ermittlungsverfahren ablaufen. Er erklärt, wie man sich gegenüber Polizei und Staatsanwaltschaft richtig verhält.\n","original_language":"eng","persons":["Udo Vetter"],"tags":["23c3"," Society"],"view_count":8050,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-03T09:30:04.558+02:00","length":4276,"duration":4276,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1346-de-sie_haben_das_recht_zu_schweigen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1346-de-sie_haben_das_recht_zu_schweigen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-73f7a87aafc447fa0b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-73f7a87aafc447fa0b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1346-de-sie_haben_das_recht_zu_schweigen","url":"https://api.media.ccc.de/public/events/import-73f7a87aafc447fa0b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":510,"event_guid":"import-7dd468401a516b773e","weight":12},{"event_id":569,"event_guid":"import-742ccaffbef719715b","weight":11},{"event_id":609,"event_guid":"import-3cf81cc3f1f6d963b9","weight":69},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":4},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":16},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":14},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":7},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":7},{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":24},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":4},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":7},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":4},{"event_id":1162,"event_guid":"import-d8ab7a89bd5682b6d7","weight":4},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":9},{"event_id":1176,"event_guid":"import-aeca1d442393997d98","weight":9},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":23},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":15},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":13},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":8},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":7},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":17},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":22},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":8},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":13},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":7},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":5},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":7},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":7},{"event_id":3741,"event_guid":"725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":22},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":6},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":24},{"event_id":3854,"event_guid":"ed3285e0-9140-4a8b-9ee3-3c083f7babce","weight":3},{"event_id":4188,"event_guid":"56713ec1-d05b-5f3d-aacc-40724c90aea5","weight":10},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":4},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":3},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":8},{"event_id":5229,"event_guid":"53464646-4151-2020-2020-202020202020","weight":15},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":7},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":4},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":37},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":9},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":7},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":8},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":40},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":10}]},{"guid":"import-7f22cde4ed072fc5b9","title":"Design and Implementation of an object-oriented, secure TCP/IP Stack","subtitle":"Ethereal^W Wireshark without remote exploits - a proof of concept","slug":"23C3-1656-en-dylan_network_security","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1656.en.html","description":"We present a domain-specific language (DSL) capable to describe ad-hoc defined protocols like TCP/IP.\nAdditionally we developed other libraries, like a flow graph for packet processing and a layering mechanism for protocol stacking, to get a complete TCP/IP stack.\n","original_language":"eng","persons":["Andreas Bogk","Hannes Mehnert"],"tags":["23c3"," Hacking"],"view_count":78,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-26T21:30:04.932+01:00","length":3695,"duration":3695,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1656-en-dylan_network_security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1656-en-dylan_network_security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-7f22cde4ed072fc5b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-7f22cde4ed072fc5b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1656-en-dylan_network_security","url":"https://api.media.ccc.de/public/events/import-7f22cde4ed072fc5b9","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":476,"event_guid":"import-76f8d3a6991dcf7f03","weight":2},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":996,"event_guid":"import-38c2dd9d642c6ca79a","weight":3},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":1},{"event_id":1796,"event_guid":"z7M48Tb_4vtI0BBFVqe_ag","weight":1},{"event_id":2300,"event_guid":"mzNAGavKy2KOcwOjGqC8pw","weight":1},{"event_id":2674,"event_guid":"42e8e9f8-4e9c-4845-b871-bf8ce525594d","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":3},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":2},{"event_id":5233,"event_guid":"4a433356-4456-2020-2020-202020202020","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":3}]},{"guid":"import-d11d50d901f7d39189","title":"Know Your Citizens","subtitle":"State Authorities' Access to Sensitive Information","slug":"23C3-1537-en-know_your_citizens","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1537.en.html","description":"The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities'?\n","original_language":"eng","persons":["Marco Gercke"],"tags":["23c3"," Science"],"view_count":20,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2023-03-22T17:15:02.291+01:00","length":3442,"duration":3442,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1537-en-know_your_citizens.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1537-en-know_your_citizens_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d11d50d901f7d39189-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d11d50d901f7d39189-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1537-en-know_your_citizens","url":"https://api.media.ccc.de/public/events/import-d11d50d901f7d39189","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1455,"event_guid":"import-524e41ae54d3230bb9","weight":1}]},{"guid":"import-951bd3b975cd6a7f7e","title":"Body hacking","subtitle":"Functional body modification","slug":"23C3-1629-en-body_hacking","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1629.en.html","description":"What happens when we leave behind cosmetics and start to modify our bodies and minds to enhance who we are and what we can do? In this talk, journalist Quinn Norton explores how technology and flesh are coming together.\n","original_language":"eng","persons":["Quinn Norton"],"tags":["23c3"," Society"],"view_count":297,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-24T20:45:05.818+01:00","length":3939,"duration":3939,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1629-en-body_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1629-en-body_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-951bd3b975cd6a7f7e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-951bd3b975cd6a7f7e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1629-en-body_hacking","url":"https://api.media.ccc.de/public/events/import-951bd3b975cd6a7f7e","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":212,"event_guid":"import-6934edc539ff86b236","weight":1},{"event_id":658,"event_guid":"import-e8c6d414f23a3f454d","weight":3},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1101,"event_guid":"import-760f3fe02dd1e65e6b","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1119,"event_guid":"import-519513c2cae6de84b6","weight":1},{"event_id":1125,"event_guid":"import-5e422c2c63c5cffb01","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":1},{"event_id":1287,"event_guid":"import-555a982abc9d8b293e","weight":1},{"event_id":1523,"event_guid":"import-831af8d32e6e76f52c","weight":8},{"event_id":1756,"event_guid":"a-xJCEtToBTndlcjWvCAKQ","weight":4},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1},{"event_id":1820,"event_guid":"glr14-wGaYxsV63N4TJZDQ","weight":1},{"event_id":2008,"event_guid":"zLQRrJi05bpzgkLweZJT1Q","weight":1},{"event_id":3291,"event_guid":"600fd387-0789-5cae-ba0b-844d84aca816","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":2},{"event_id":3752,"event_guid":"fc56c971-c65e-43ca-a92c-d98c7fb47bd6","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1}]},{"guid":"import-1a4080ee807514e9de","title":"Bluetooth Hacking Revisited","subtitle":null,"slug":"23C3-1733-en-bluetooth_hacking_revisited","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1733.en.html","description":"Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we'll show attacks on every possible bluetooth layer including Application Layer, lower layers. We'll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It's not only for toys.\n\nOn the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough.\n","original_language":"eng","persons":["Kevin Finistere","Thierry Zoller"],"tags":["23c3"," Hacking"],"view_count":175,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-14T05:15:02.532+01:00","length":3748,"duration":3748,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1733-en-bluetooth_hacking_revisited.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1733-en-bluetooth_hacking_revisited_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-1a4080ee807514e9de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-1a4080ee807514e9de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1733-en-bluetooth_hacking_revisited","url":"https://api.media.ccc.de/public/events/import-1a4080ee807514e9de","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":5},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1139,"event_guid":"import-81fb5c39090d6797a6","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1719,"event_guid":"import-1975766c6d4f873c2c","weight":1},{"event_id":1752,"event_guid":"T1NjW3fn1odK53hiQSAFKw","weight":1},{"event_id":1965,"event_guid":"WBJGKVQxGRFSjHRdIIQEtA","weight":1},{"event_id":2075,"event_guid":"og51ww-R2NDBGuA6LeTfRA","weight":1},{"event_id":2089,"event_guid":"F4PROIwL9VVgBhW7SqnWNQ","weight":1},{"event_id":2399,"event_guid":"a3e3ee7d1804d36b8ef255365a7f2d07","weight":1},{"event_id":2420,"event_guid":"02b7f942-d9e9-468e-85cd-12837f48bc16","weight":1},{"event_id":2526,"event_guid":"e8f03c57-f500-492a-9028-b91acffe7695","weight":1},{"event_id":2643,"event_guid":"5098bd46-1d93-4d43-b453-5686b68c09b3","weight":1},{"event_id":3073,"event_guid":"deadbcbf-a450-4005-99d1-054b38e58b86","weight":2},{"event_id":3252,"event_guid":"3c8a53c9-bf68-5739-801c-0f0d2207fd50","weight":3},{"event_id":3529,"event_guid":"a5991386-5a5e-53b0-b24e-3b24e1eee36a","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":1},{"event_id":4365,"event_guid":"7b8075fb-aafa-4037-beb9-168b5461c831","weight":4},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1}]},{"guid":"import-0ff5380c0b7ca9062b","title":"Barrierefreies Web","subtitle":null,"slug":"23C3-1670-de-barrierefreies_web","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1670.en.html","description":"In diesem Vortrag geht es um die Problematik des barrierefreien Webs. Der Vortragende ist selber blind und hat somit die notwendige Praxiserfahrung. Es wird nicht auf festgeschriebene Normen und Gesetze eingegangen, vielmehr werden Tips aus der Praxis gegeben und anhand von verschiedenen Internetseiten verdeutlicht. Es wird auf bekannte Internet-Angebote wie Bankingportale usw. zurückgegriffen.\n","original_language":"eng","persons":["Sebastian Andres"],"tags":["23c3"," Hacking"],"view_count":37,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2022-02-25T10:00:05.112+01:00","length":3370,"duration":3370,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1670-de-barrierefreies_web.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1670-de-barrierefreies_web_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-0ff5380c0b7ca9062b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-0ff5380c0b7ca9062b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1670-de-barrierefreies_web","url":"https://api.media.ccc.de/public/events/import-0ff5380c0b7ca9062b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":2},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":2},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1}]},{"guid":"import-33fb0d803b5b408751","title":"Router and Infrastructure Hacking","subtitle":"\"First we take Manhattan, then we take Berlin...\"","slug":"23C3-1700-en-router_and_infrastructure_hacking","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1700.en.html","description":"The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in\ntheir infancy and are still not even used in most penetration tests.\nThis talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary.\n","original_language":"eng","persons":["Raven"],"tags":["23c3"," Hacking"],"view_count":107,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-13T13:45:07.725+02:00","length":2744,"duration":2744,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1700-en-router_and_infrastructure_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1700-en-router_and_infrastructure_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-33fb0d803b5b408751-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-33fb0d803b5b408751-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1700-en-router_and_infrastructure_hacking","url":"https://api.media.ccc.de/public/events/import-33fb0d803b5b408751","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":169,"event_guid":"import-3eee1d460ed0c3da7c","weight":1},{"event_id":285,"event_guid":"import-5d8463d97be4c6d378","weight":1},{"event_id":663,"event_guid":"import-b698bd8cf5e4d19ef1","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":2},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":941,"event_guid":"import-521402fa4a05486425","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":2},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":2},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1051,"event_guid":"import-4cc0be04257f4b5318","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1102,"event_guid":"import-d92bb58ed116334bd1","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":3},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1188,"event_guid":"import-9e2018993a7386c3b2","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1462,"event_guid":"import-b9197fb95bae24cee3","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":1801,"event_guid":"I1Wkt7x8Yy2ZnP2kOGAuXA","weight":1},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":1},{"event_id":2289,"event_guid":"a02daeb8-034a-45bb-998e-65d74ac29ea1","weight":1},{"event_id":2351,"event_guid":"94e1281c-b1c8-46b3-82ad-6d6df6fe3580","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2972,"event_guid":"e328de69-f963-4bff-9018-ffc5501ce1bf","weight":1},{"event_id":2978,"event_guid":"1e7ea0be-38c8-47f2-99bb-9f0ce71a53ee","weight":1},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":1},{"event_id":3669,"event_guid":"7ef9172a-e2c7-4e78-9316-08449bd582c6","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":6375,"event_guid":"42542e40-f237-11e8-9af6-7fb90298b852","weight":1},{"event_id":6608,"event_guid":"46b7c5d8-318d-4f6c-a17e-73f2638ab46a","weight":1},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6758,"event_guid":"8c7fcb7a-e250-5af0-8da3-f5f4c0845895","weight":1},{"event_id":7025,"event_guid":"c127467f-82bf-4896-b473-cd81bf055fc5","weight":1},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":1},{"event_id":7388,"event_guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","weight":1},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":1},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":1},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":1},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":1}]},{"guid":"import-6208bdaf46f4c64c2b","title":"How to implement bignum arithmetic","subtitle":"A short look at my pet project implementation","slug":"23C3-1658-en-bignum_arithmetic","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1658.en.html","description":"Assembly language skills are a bonus, but not strictly required. This lecture will explain how software like OpenSSL and GnuPG do their arithmetic on 1024 bit numbers.  This is not about how RSA works, or about how AES works. This is just about how to add and multiply big numbers. I will explain the algorithms, show some code, and give some timings.\n","original_language":"eng","persons":["Felix von Leitner"],"tags":["23c3"," Hacking"],"view_count":492,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-16T13:30:08.500+01:00","length":2863,"duration":2863,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1658-en-bignum_arithmetic.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1658-en-bignum_arithmetic_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-6208bdaf46f4c64c2b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-6208bdaf46f4c64c2b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1658-en-bignum_arithmetic","url":"https://api.media.ccc.de/public/events/import-6208bdaf46f4c64c2b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":89,"event_guid":"import-3de147fa3727b16db9","weight":1},{"event_id":106,"event_guid":"import-c6b33fcb2523d7b8e4","weight":6},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":5},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":2},{"event_id":1265,"event_guid":"import-e12b39e63d03acfbf4","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":4},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":5},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":1},{"event_id":2198,"event_guid":"1NE5joYD0o-gaf5SqL-1Nw","weight":1},{"event_id":2403,"event_guid":"d542eb645157198eb09eaf63efc7914c","weight":1},{"event_id":2406,"event_guid":"680d0aea18aa6ba03f104efcd2bac2f3","weight":8},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":4298,"event_guid":"95bd9e9a-af19-4a77-9dad-25bff9069b5c","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":3},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":2}]},{"guid":"import-28470ad4e077177a78","title":"Fnord Jahresrückblick","subtitle":"Wir helfen Euch, die Fnords zu sehen","slug":"23C3-1429-de-fnord_jahresrueckblick","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1429.en.html","description":"This talk will be held in German.\n\nDer Fnord-Jahresrückblick widmet sich der politischen und sozialen Entwicklung der Welt im letzten Jahr im Zeitraffer. Mainstream-Nachrichten finden dabei nur Beachtung, wenn sie besonders schöne Fnords enthalten. Strukturen, Verschwörungen und lustige neue Trends, die Euch sonst entgangen wären oder schon wieder vergessen sind.\n","original_language":"eng","persons":["Frank Rieger","Felix von Leitner"],"tags":["23c3"," Community"],"view_count":1546,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-27T10:15:05.586+01:00","length":3709,"duration":3709,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1429-de-fnord_jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1429-de-fnord_jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-28470ad4e077177a78-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-28470ad4e077177a78-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1429-de-fnord_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-28470ad4e077177a78","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":8},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":7},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":7},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":33},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":4},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":61},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":15},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":4},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":7},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":7},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":4},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":11},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":4},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":42},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":27},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":18},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":10},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":8},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":9},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":10},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":14}]},{"guid":"import-f7d402ba7e693a8783","title":"Krypta: DIY Serverhousing","subtitle":null,"slug":"23C3-1593-de-krypta","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1593.en.html","description":"Funkfeuer (0xFF), als freie Netzwerkinitiative in Wien eine Schwester von Freifunk, begann vor 2 Jahren damit ein \"Community Serverhousing\" aufzubauen. Wie beim Aufstellen von WLan Router, stoesst man dabei auf logistische, technische und soziale Aufgaben, die es zu loesen gilt um erfolgreich kostendeckend in Betrieb gehen zu koennen.\n","original_language":"eng","persons":["Chris Kummerer","Markus Sulzbacher","Andreas Marksteiner","Teemu Schaabl"],"tags":["23c3"," Community"],"view_count":99,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-02T11:30:11.326+01:00","length":3829,"duration":3829,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1593-de-krypta.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1593-de-krypta_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-f7d402ba7e693a8783-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-f7d402ba7e693a8783-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1593-de-krypta","url":"https://api.media.ccc.de/public/events/import-f7d402ba7e693a8783","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":3},{"event_id":1097,"event_guid":"import-d58db20dbd73783f0e","weight":2},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":2}]},{"guid":"import-95d8bc2858a58621e6","title":"A not so smart card","subtitle":"How bad security decisions can ruin a debit card design","slug":"23C3-1449-en-not_so_smart_card","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1449.en.html","description":"This lecture will introduce you to the the Postcard, a widely used debit card issued by FostFinance in Switzerland. As other debit cards like the \"EC\" card it is used for shopping payments at POS terminals or to draw money from ATMs in Switzerland and many other countries. It's widely used by its 2'000'000 users, producing a total transaction volume of around 8'000'000'000 Swiss Francs a year.\n","original_language":"eng","persons":["Bernd R. Fix"],"tags":["23c3"," Hacking"],"view_count":173,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-09T09:30:08.450+01:00","length":2846,"duration":2846,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1449-en-not_so_smart_card.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1449-en-not_so_smart_card_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-95d8bc2858a58621e6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-95d8bc2858a58621e6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1449-en-not_so_smart_card","url":"https://api.media.ccc.de/public/events/import-95d8bc2858a58621e6","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":26,"event_guid":"import-7546b8f6ee2d14b2e6","weight":1},{"event_id":124,"event_guid":"import-4ef0accbc71134a330","weight":4},{"event_id":744,"event_guid":"import-889a1b50b1e3adc8f5","weight":3},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":1027,"event_guid":"import-e73b28a79b20ba52f4","weight":1},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":2},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":2},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":2},{"event_id":1128,"event_guid":"import-599ee41bb3c5d7aa87","weight":1},{"event_id":1145,"event_guid":"import-909ed6ab4ce1e0379c","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1199,"event_guid":"import-33d008be85a0548e56","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":3},{"event_id":1221,"event_guid":"import-28f2251a0a4fa316f6","weight":5},{"event_id":1239,"event_guid":"import-27fa6e2b6bb6fbc64d","weight":2},{"event_id":1243,"event_guid":"import-14815d5b90a0058d10","weight":1},{"event_id":1287,"event_guid":"import-555a982abc9d8b293e","weight":1},{"event_id":1302,"event_guid":"import-ec1c4bafaa3e2f5449","weight":3},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":2},{"event_id":1780,"event_guid":"hWph2wdjII5XK6nCL_1kWA","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":1},{"event_id":1805,"event_guid":"z2_SbAXdwSQnezj6oPTuIg","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":2481,"event_guid":"61faba33-5bfa-4c58-a864-d527c6f31b7d","weight":1},{"event_id":2535,"event_guid":"2ac1138c-ab29-419a-b8e2-39353fde0a9b","weight":1},{"event_id":2539,"event_guid":"b0be37e7-88fd-4f5c-bbd1-14b7e5f9a78d","weight":1},{"event_id":2759,"event_guid":"ff3dc349-f733-4ba6-bc83-d4373fcc981d","weight":1},{"event_id":2844,"event_guid":"b753dbd8-32bb-437c-9f15-db0d7ac1811a","weight":1},{"event_id":3638,"event_guid":"c06dd4c2-c637-445d-9c72-92204a35eeff","weight":1},{"event_id":3645,"event_guid":"2a9ac911-1072-4672-8fbc-2887f4fd7aec","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":1},{"event_id":3706,"event_guid":"3f76be27-6ff5-4a23-a6c6-512eaff00f28","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3721,"event_guid":"b092a437-b612-4887-ba55-f08ddfe333b9","weight":1},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":1},{"event_id":3732,"event_guid":"8270c91a-d6e2-4f1c-9ebb-cdf10708d921","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":1},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":1},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":1}]},{"guid":"import-a3c03c2aa98ac4efdc","title":"Nerds und Geeks zwischen Stereotyp und Subkultur","subtitle":"Eine kulturanthropologische Untersuchung","slug":"23C3-1616-de-nerds_und_geeks","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1616.en.html","description":"In dem Vortrag sollen die Ergebnisse einer kulturwissenschaftlichen Forschungsarbeit vorgestellt und diskutiert werden. Dabei wird der Begriff Nerd eher als Konstrukt, und weniger als gegeben betrachtet. Vorgestellt werden vor allem die Ergebnisse aus Interviews, teilnehmender Beobachtung und einer qualitativen Umfrage.\n","original_language":"eng","persons":["Mareike Glöß"],"tags":["23c3"," Culture"],"view_count":102,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-28T20:45:19.667+01:00","length":3193,"duration":3193,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1616-de-nerds_und_geeks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1616-de-nerds_und_geeks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a3c03c2aa98ac4efdc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a3c03c2aa98ac4efdc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1616-de-nerds_und_geeks","url":"https://api.media.ccc.de/public/events/import-a3c03c2aa98ac4efdc","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":1},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1144,"event_guid":"import-2f2cce0079d30b15b0","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1411,"event_guid":"import-c6222a12f8ee22d1e4","weight":1},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":1},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":4546,"event_guid":"57545943-4844-2020-2020-202020202020","weight":1},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":5719,"event_guid":"2ea0582f-bf75-52bc-a5c5-d0914db47c52","weight":1},{"event_id":5721,"event_guid":"2d47325d-cd7b-542e-bf9e-98d333003965","weight":1},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":1},{"event_id":5998,"event_guid":"c445b6d8-546e-534d-9964-63751761769a","weight":1},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":1},{"event_id":6004,"event_guid":"49976f12-75cd-447d-8dd0-1157b399e3e9","weight":1},{"event_id":6010,"event_guid":"19db5e82-9317-437d-8ea6-7788f7872c84","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":1},{"event_id":6025,"event_guid":"6d52b06c-1295-4983-84e1-d0fb807af357","weight":1},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1}]},{"guid":"import-7ec4d5ccef835f7fdf","title":"A Natural Language Database Interface using Fuzzy Semantics","subtitle":null,"slug":"23C3-1454-en-natural_language_database_interface","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1454.en.html","description":"We give a thorough exposition of our natural language database interface that\nproduces result sets ranked according to the degree to which database records\nfulfill our intuitions about vague expressions in natural language such as\n`a small rainy city near San Francisco'. We present our toolset supporting the\nrapid prototyping of such database interfaces by means of a meta-level\ndescription of a data model and a lexicon for a query language.\n","original_language":"eng","persons":["Richard Bergmair"],"tags":["23c3"," Science"],"view_count":69,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2022-01-24T20:45:33.516+01:00","length":3748,"duration":3748,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1454-en-natural_language_database_interface.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1454-en-natural_language_database_interface_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-7ec4d5ccef835f7fdf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-7ec4d5ccef835f7fdf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1454-en-natural_language_database_interface","url":"https://api.media.ccc.de/public/events/import-7ec4d5ccef835f7fdf","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":191,"event_guid":"import-8a2821babcd0049f1b","weight":1},{"event_id":229,"event_guid":"import-84ac09898882828ddb","weight":1},{"event_id":231,"event_guid":"import-ec9dc0988e70eb0bd7","weight":1},{"event_id":593,"event_guid":"import-d5d8add3bc284763a8","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":2},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1052,"event_guid":"import-22db6c85faa2782a96","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1081,"event_guid":"import-579aacb878d51bf5c4","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":1},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":1},{"event_id":1952,"event_guid":"e7ca6d029c833227","weight":1},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":2236,"event_guid":"xnYRHWIRybr3subP-h_1Wg","weight":1},{"event_id":2248,"event_guid":"SNW-UDgMBlqvbRHVTwhxpg","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":3075,"event_guid":"703aa5ef-1a1d-4209-8251-1e9218f900a4","weight":1},{"event_id":3225,"event_guid":"8ded6890-b77e-4969-9d2c-06240f008528","weight":1},{"event_id":3227,"event_guid":"0fd77819-0594-4127-bee3-a1d2fe7b1dd3","weight":1},{"event_id":3238,"event_guid":"4d9f8523-f2e2-470b-9729-b1c7245ab4e9","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3698,"event_guid":"994082de-ef8e-4f8e-8c46-ec0eb110b845","weight":1},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":1},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":1},{"event_id":6196,"event_guid":"7116cc1b-3e28-569d-8c87-2c46715f9382","weight":1}]},{"guid":"import-c1d9076bebc9186722","title":"Culture Jamming \u0026 Discordianism","subtitle":"Illegal Art \u0026 Religious Bricolage","slug":"23C3-1698-en-culture_jamming_discordianism","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1698.en.html","description":"Discordianism is somewhere between a joke and a religion, and at the same time manages to be something else entirely: social bricolage. This presentation will cover the roots of culture jamming in early art and theatrical movements, and then move through the history of prankster groups and on to Discordianism where the pranksters are prophets.\n","original_language":"eng","persons":["Autumn Tyr-Salvia","Fox Magrathea"],"tags":["23c3"," Culture"],"view_count":121,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-25T09:45:03.266+01:00","length":3074,"duration":3074,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1698-en-culture_jamming_discordianism.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1698-en-culture_jamming_discordianism_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c1d9076bebc9186722-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c1d9076bebc9186722-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1698-en-culture_jamming_discordianism","url":"https://api.media.ccc.de/public/events/import-c1d9076bebc9186722","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":941,"event_guid":"import-521402fa4a05486425","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":3},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":3},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1124,"event_guid":"import-ecb0e5ebfd05aa20b9","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1152,"event_guid":"import-a3c03c2aa98ac4efdc","weight":1},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1808,"event_guid":"QQSVk4IwhteVQcAB1CKVpA","weight":1},{"event_id":2873,"event_guid":"28efa221-42ce-4e2c-aa2c-1b52c87ddeb1","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1}]},{"guid":"import-74174aec9e7f633fc0","title":"Who can you trust?","subtitle":"Opening Ceremony and Keynote","slug":"23C3-1256-en-who_can_you_trust","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1256.en.html","description":"Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3's keynote will be delivered.\n","original_language":"eng","persons":["Tim Pritlove","John Perry Barlow"],"tags":["23c3"," General"],"view_count":165,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-08T19:30:10.847+01:00","length":3889,"duration":3889,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1256-en-who_can_you_trust.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1256-en-who_can_you_trust_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-74174aec9e7f633fc0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-74174aec9e7f633fc0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1256-en-who_can_you_trust","url":"https://api.media.ccc.de/public/events/import-74174aec9e7f633fc0","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":2},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":4},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":2},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":2},{"event_id":2738,"event_guid":"d4b2f5e6-417f-454c-981e-df75465d956d","weight":2},{"event_id":3753,"event_guid":"f79171fd-67ca-4b74-90c8-9dd382103eb0","weight":2},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":2}]},{"guid":"import-909ed6ab4ce1e0379c","title":"Funkerspuk","subtitle":"radio politics in the USA and Germany in the first half of the 20th century","slug":"23C3-1563-en-funkerspuk","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1563.en.html","description":"The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is \"everybody can listen in\" a scary thing?\n","original_language":"eng","persons":["Oona Leganovic"],"tags":["23c3"," Society"],"view_count":80,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-29T18:00:08.219+01:00","length":3156,"duration":3156,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1563-en-funkerspuk.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1563-en-funkerspuk_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-909ed6ab4ce1e0379c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-909ed6ab4ce1e0379c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1563-en-funkerspuk","url":"https://api.media.ccc.de/public/events/import-909ed6ab4ce1e0379c","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":3},{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":1065,"event_guid":"import-c872b9c2f9c5b49694","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":3},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":1},{"event_id":3248,"event_guid":"f20fe948-cd33-535d-b7dd-00938781e212","weight":1}]},{"guid":"import-08b5f79a93224f180b","title":"How To Design A Decent User Interface","subtitle":"Take a look at software from a user's point of view and improve your applications","slug":"23C3-1433-en-design_a_decent_user_interface","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1433.en.html","description":"Prepare to be brainwashed! This talk wants you to switch from the developer's perspective to that of an average user to design better UIs.\n","original_language":"eng","persons":["pallas (Corinna Habets)"],"tags":["23c3"," Hacking"],"view_count":79,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-08T00:00:08.599+01:00","length":3461,"duration":3461,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1433-en-design_a_decent_user_interface.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1433-en-design_a_decent_user_interface_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-08b5f79a93224f180b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-08b5f79a93224f180b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1433-en-design_a_decent_user_interface","url":"https://api.media.ccc.de/public/events/import-08b5f79a93224f180b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":162,"event_guid":"import-c103a561a60405ea5c","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1051,"event_guid":"import-4cc0be04257f4b5318","weight":1},{"event_id":1073,"event_guid":"import-48b970c65ea1ddb27b","weight":1},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":1},{"event_id":1102,"event_guid":"import-d92bb58ed116334bd1","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1120,"event_guid":"import-6208bdaf46f4c64c2b","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1126,"event_guid":"import-642660b4ee88817288","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1217,"event_guid":"import-92bdbf3754ee00fffc","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1265,"event_guid":"import-e12b39e63d03acfbf4","weight":1},{"event_id":1292,"event_guid":"import-67317fc1b3b5c3dc8c","weight":1},{"event_id":1308,"event_guid":"import-ec9465f980d4610552","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1350,"event_guid":"import-bbaef39cd440f712fd","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1564,"event_guid":"import-6719b9183f1139890a","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1794,"event_guid":"Wb85jYb3IJr8B11bubfibA","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":1948,"event_guid":"3QioQqB0iLfI0WUwkTtsQg","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":2504,"event_guid":"d0042aa3-5e7a-4a64-8bb5-c0cf4d639b1a","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3639,"event_guid":"d138ab48-768b-4303-87d2-e31bfbf4eef3","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":3685,"event_guid":"5c9003b7-543d-476a-89f0-eee5ed36327c","weight":1},{"event_id":3743,"event_guid":"72e44333-c59a-47a4-9ef3-d5e8c9637eb6","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4281,"event_guid":"271f3623-a772-4052-81da-04872d9651ce","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":1},{"event_id":4627,"event_guid":"b4b35a2e-dc10-0435-43a9-66521c933088","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":2},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1},{"event_id":5254,"event_guid":"83235eb6-ce2d-4f4d-8124-1d38010a2076","weight":1},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":1},{"event_id":6076,"event_guid":"68c30487-d434-4b4e-8df0-fb06aa4e8cdf","weight":1},{"event_id":6088,"event_guid":"2b62cf68-340d-47d3-a6e3-ac63f4c4e564","weight":1},{"event_id":6157,"event_guid":"b512a4cb-3c13-4065-076f-94039f987bf8","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":1}]},{"guid":"import-c5bd70ae7c91327ae4","title":"Nintendo DS","subtitle":"Introduction and hacking","slug":"23C3-1552-en-nintendo_ds","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1552.en.html","description":"The Nintendo DS is a mobile gaming console. It was first introduced in\n2004. Our talk will give a short introduction of the hardware and\navailable games. The main focus however lies on homebrew software,\nDSLinux, alternative firmware, copy protection, flash cards and online\ngaming protocols.\n","original_language":"eng","persons":["Tobias Gruetzmacher","Marcel Klein","mm"],"tags":["23c3"," Hacking"],"view_count":318,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-11T22:30:09.640+01:00","length":2628,"duration":2628,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1552-en-nintendo_ds.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1552-en-nintendo_ds_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c5bd70ae7c91327ae4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c5bd70ae7c91327ae4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1552-en-nintendo_ds","url":"https://api.media.ccc.de/public/events/import-c5bd70ae7c91327ae4","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":262,"event_guid":"import-f71239d01ea7c2d353","weight":5},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":2},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":5},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":9},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":8},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":10},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":13},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":5},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":4}]},{"guid":"import-5e422c2c63c5cffb01","title":"Lightning Talks Day 3","subtitle":null,"slug":"23C3-1516-en-lightning_talks_day_3","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1516.en.html","description":"Definition: Lightning Talks is a daily event. which consists in one\nhour of several short talks. Each talk is limited to five minutes.\n\nGoal: There is one slot for Lightning Talks each day of the\ncongress.  The goal is to present 10 talks within each slot.\nSo this might be up to 40 interesting talks in total.\n\nSee the Wiki page for current info.\n","original_language":"eng","persons":["b9punk","Sven Guckes"],"tags":["23c3"],"view_count":13,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-22T10:15:05.628+01:00","length":4148,"duration":4148,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1516-en-lightning_talks_day_3.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1516-en-lightning_talks_day_3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-5e422c2c63c5cffb01-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-5e422c2c63c5cffb01-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1516-en-lightning_talks_day_3","url":"https://api.media.ccc.de/public/events/import-5e422c2c63c5cffb01","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1101,"event_guid":"import-760f3fe02dd1e65e6b","weight":2},{"event_id":1119,"event_guid":"import-519513c2cae6de84b6","weight":2},{"event_id":1154,"event_guid":"import-c50f2b33dd2c1a31d6","weight":3}]},{"guid":"import-a05afcf3d77e5f5471","title":"Überwachungsdruck - einige Experimente","subtitle":"Wie wirkt Überwachung?","slug":"23C3-1679-de-ueberwachungsdruck","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1679.en.html","description":"Wie wirkt Überwachung? Was ändert es am Verhalten von Passanten? Wir haben Experimente im öffentlichen Raum durchgeführt und präsentieren die Ergebnisse.\n","original_language":"eng","persons":["Adrian Dabrowski","Martin Slunsky"],"tags":["23c3"," Society"],"view_count":111,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-23T16:15:08.099+01:00","length":4103,"duration":4103,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1679-de-ueberwachungsdruck.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1679-de-ueberwachungsdruck_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a05afcf3d77e5f5471-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a05afcf3d77e5f5471-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1679-de-ueberwachungsdruck","url":"https://api.media.ccc.de/public/events/import-a05afcf3d77e5f5471","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":3},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":3},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":3},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":5},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":3},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":3},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":4},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":6},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":4},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":3}]},{"guid":"import-db810b7b54ae90e958","title":"Konrad Zuse - Der rechnende Raum","subtitle":"Ein audiovisuelles Live-Feature","slug":"23C3-1555-de-konrad_zuse_der_rechnende_raum","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1555.en.html","description":"Er gilt als der deutsche Pionier der frühen Rechentechnik: Konrad Zuse. Sein Leben, seine Rechenmaschinen und seine Firma Zuse KG werden in diesem live gesprochenen dokumentarischen Feature der Hörspielwerkstatt der Humboldt-Universität zu Berlin porträtiert.\n","original_language":"eng","persons":["Marcus Richter","Constanze Kurz","Ina Kwasniewski","Jens-Martin Loebel","Kai Kittler"],"tags":["23c3"," Culture"],"view_count":471,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-03T22:30:05.190+02:00","length":3105,"duration":3105,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1555-de-konrad_zuse_der_rechnende_raum.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1555-de-konrad_zuse_der_rechnende_raum_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-db810b7b54ae90e958-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-db810b7b54ae90e958-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1555-de-konrad_zuse_der_rechnende_raum","url":"https://api.media.ccc.de/public/events/import-db810b7b54ae90e958","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":2},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":2},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":2},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":2},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":3},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":2},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":3},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":3},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":2},{"event_id":1936,"event_guid":"sFcFSET0pjiHc_P__4uQNQ","weight":2},{"event_id":4623,"event_guid":"49c234de-3276-b71c-89d7-0b3c6d276d6c","weight":2}]},{"guid":"import-ed295055914a8eea4a","title":"Elektronische Reisedokumente","subtitle":"Neue Entwicklungen beim ePass","slug":"23C3-1655-de-elektronische_reisedokumente","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1655.en.html","description":"Auch dieses Jahr gab es wieder eine Menge Wirbel um den ePass. Neue Studien wurden durchgeführt, Entscheidungen wurden getroffen und immer mehr Länder haben begonnen, elektronische Reisedokumente einzusetzen. Der Vortrag wird den neuesten Stand der Diskussion aufzeigen.\n","original_language":"eng","persons":["starbug","Constanze Kurz"],"tags":["23c3"," Science"],"view_count":93,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-02-05T11:30:07.761+01:00","length":3411,"duration":3411,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1655-de-elektronische_reisedokumente.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1655-de-elektronische_reisedokumente_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-ed295055914a8eea4a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-ed295055914a8eea4a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1655-de-elektronische_reisedokumente","url":"https://api.media.ccc.de/public/events/import-ed295055914a8eea4a","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":20,"event_guid":"import-fed2b99f66d42a8f9a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":198,"event_guid":"import-b962abe26523d75e2c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":2},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1069,"event_guid":"import-5d344713a4331b21b2","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1155,"event_guid":"import-f7d402ba7e693a8783","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":4},{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":2},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1268,"event_guid":"import-2d1502d5b973b7f55d","weight":1},{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":2},{"event_id":1329,"event_guid":"import-5d3fe535916c811ae9","weight":1},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":1},{"event_id":1713,"event_guid":"import-4f8250d931be212cab","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":1},{"event_id":2086,"event_guid":"1q4jAFZgpy0xvFH-XpS70g","weight":1},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":2},{"event_id":2281,"event_guid":"7f270061-0231-41d4-b50c-f1017231c534","weight":2},{"event_id":2289,"event_guid":"a02daeb8-034a-45bb-998e-65d74ac29ea1","weight":1},{"event_id":2294,"event_guid":"9ba6d9cc-76ac-4e6d-9f2d-9e8c6e9a0c08","weight":2},{"event_id":2303,"event_guid":"4c9d3345-7fed-4d90-ba86-bd9437898c53","weight":1},{"event_id":2305,"event_guid":"4acca0b6-29a2-4a92-9872-11917d49c365","weight":1},{"event_id":2307,"event_guid":"98a685a2-2334-495d-b54a-23f5a6b317b8","weight":1},{"event_id":2308,"event_guid":"f0cdbbeb-2478-4f17-b50e-ec584b44bffe","weight":1},{"event_id":2309,"event_guid":"d0c4283e-2627-49f7-807d-13c96da8a8dd","weight":1},{"event_id":2351,"event_guid":"94e1281c-b1c8-46b3-82ad-6d6df6fe3580","weight":1},{"event_id":2365,"event_guid":"157510b7-5154-4f7d-ac20-a680e45f53c1","weight":1},{"event_id":2437,"event_guid":"42a28f85-89af-48f9-acef-345c8b2e1183","weight":2},{"event_id":2528,"event_guid":"6393a33b-889d-4850-b0e3-cbc7caeab1cb","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":2961,"event_guid":"ab8d2f00-69a9-4c9d-979a-9d8cd19c1f88","weight":1},{"event_id":2984,"event_guid":"950ed6a2-a367-43c4-a046-022d37bfc039","weight":1},{"event_id":3110,"event_guid":"b7935ff9-54e1-4b97-9ce4-1febd50e6f82","weight":1},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":2},{"event_id":3753,"event_guid":"f79171fd-67ca-4b74-90c8-9dd382103eb0","weight":1},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":1},{"event_id":3790,"event_guid":"6575fcac-cfae-4286-b464-67842ae6842d","weight":1},{"event_id":3793,"event_guid":"a48cf7af-c38e-4a19-8713-13facdbc0fd9","weight":1},{"event_id":3802,"event_guid":"a588243f-a16e-4298-9e66-d26fb949aaea","weight":1},{"event_id":3805,"event_guid":"d5565688-a086-42e6-b8eb-17fa54e6fc3b","weight":2},{"event_id":3806,"event_guid":"d64cae15-a142-41ca-b659-df10fafbb297","weight":1},{"event_id":3818,"event_guid":"adb3ca92-d333-4a8d-b44a-09b3bbb75656","weight":2},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":4356,"event_guid":"1a7df7a4-a1c0-4cca-975b-3cb52424c874","weight":1},{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":1},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":1}]},{"guid":"import-5d344713a4331b21b2","title":"Das neue gesetzliche Verbot des Hackings","subtitle":"Praktische Auswirkungen des neuen Strafrechtes, das in wenigen Monaten in Kraft treten wird","slug":"23C3-1680-de-neues_gesetzliches_verbot_des_hackings","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1680.en.html","description":"Entwickler, Administratoren und gewisse Internet-Nutzer treffen die Auswirkungen eines aktuellen Gesetzesvorhabens auf dem kaltem Fuß. Eine ganze Klasse von Systemwerkzeugen, die \"Hackertools\", soll verboten werden.\n","original_language":"eng","persons":["Peter Voigt"],"tags":["23c3"," Society"],"view_count":26,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-01-02T15:00:13.220+01:00","length":3885,"duration":3885,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1680-de-neues_gesetzliches_verbot_des_hackings_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-5d344713a4331b21b2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-5d344713a4331b21b2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1680-de-neues_gesetzliches_verbot_des_hackings","url":"https://api.media.ccc.de/public/events/import-5d344713a4331b21b2","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":1},{"event_id":3756,"event_guid":"6796635e-2dd6-4f91-8f23-ba1bea7e2994","weight":1}]},{"guid":"import-c27ad5734973ec4439","title":"Geschichte der Automaten, Androiden und Homunculi","subtitle":null,"slug":"23C3-1652-de-geschichte_der_automaten","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1652.en.html","description":"Die Schachspieler und Musikautomaten des 18. Jahrhunderts sind bekannt: Weniger bekannt sind die Automaten der Antike und des Mittelalters.\n","original_language":"eng","persons":["Henriette Fiebig"],"tags":["23c3"," Science"],"view_count":217,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-18T19:30:11.371+01:00","length":3220,"duration":3220,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1652-de-geschichte_der_automaten.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1652-de-geschichte_der_automaten_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c27ad5734973ec4439-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c27ad5734973ec4439-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1652-de-geschichte_der_automaten","url":"https://api.media.ccc.de/public/events/import-c27ad5734973ec4439","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":3},{"event_id":994,"event_guid":"import-d02b5f19d4a0061e94","weight":2},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":2},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1150,"event_guid":"import-c14923d592d05db823","weight":3},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":2},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":3745,"event_guid":"97570300-6590-45c9-a477-ab629f92a3b1","weight":1},{"event_id":4627,"event_guid":"b4b35a2e-dc10-0435-43a9-66521c933088","weight":1},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":1},{"event_id":5254,"event_guid":"83235eb6-ce2d-4f4d-8124-1d38010a2076","weight":1},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":1},{"event_id":6076,"event_guid":"68c30487-d434-4b4e-8df0-fb06aa4e8cdf","weight":1},{"event_id":6157,"event_guid":"b512a4cb-3c13-4065-076f-94039f987bf8","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1}]},{"guid":"import-54c4b43eca648fcd38","title":"Subverting AJAX","subtitle":"Next generation vulnerabilities in 2.0 Web Applications","slug":"23C3-1602-en-subverting_ajax","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1602.en.html","description":"Ajax and the new dynamic extensions leverage new threats that lead to innovative attack scenarios against web applications.\n","original_language":"eng","persons":["Stefano Di Paola","Giorgio Fedon"],"tags":["23c3"," Hacking"],"view_count":23,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2023-12-27T15:30:04.697+01:00","length":3229,"duration":3229,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1602-en-subverting_ajax.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1602-en-subverting_ajax_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-54c4b43eca648fcd38-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-54c4b43eca648fcd38-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1602-en-subverting_ajax","url":"https://api.media.ccc.de/public/events/import-54c4b43eca648fcd38","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-b30b82b19634b974d9","title":"Automated Botnet Detection and Mitigation","subtitle":"How to find, invade and kill botnets automated and effectively","slug":"23C3-1342-en-botnet_detection","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1342.en.html","description":"Botnets are one of the most buzzy buzzwords out there today in the computer security world. The presented approach allows us to take reliably care of these, such that managers hopefully will not react on ``botnet'' in 2008 any more. This technology allows for automated catching of malware with the now somewhat known nepenthes daemon, automated analysis with CWSandbox and other sandboxes, automated botnet snooping with the botsnoopd daemon and finally (semi-)automated mitigation using various weapons. Hopefully, our autonomous approach will never turn against the human race and begin the final war...\n","original_language":"eng","persons":["Georg 'oxff' Wicherski"],"tags":["23c3"," Hacking"],"view_count":93,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-08-17T22:00:06.050+02:00","length":3201,"duration":3201,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1342-en-botnet_detection.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1342-en-botnet_detection_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-b30b82b19634b974d9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-b30b82b19634b974d9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1342-en-botnet_detection","url":"https://api.media.ccc.de/public/events/import-b30b82b19634b974d9","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":418,"event_guid":"import-9930bb4b04bad35bcc","weight":1},{"event_id":619,"event_guid":"import-441f6211ee783d472a","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":1},{"event_id":1080,"event_guid":"import-ed88ca5ebf2520ebf0","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1139,"event_guid":"import-81fb5c39090d6797a6","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1341,"event_guid":"import-a8f4cba930451edf37","weight":2},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":1},{"event_id":1634,"event_guid":"import-fc1f688f0d31a70bc7","weight":1},{"event_id":1763,"event_guid":"WbqegbTKG5YheKse8X4ZUw","weight":1},{"event_id":2760,"event_guid":"2cddcb2a-8f50-41bd-9a55-9691b6abc4bc","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1}]},{"guid":"import-1ef82994c3216bacbc","title":"Dying Giraffe Recordings: A non-evil recordlabel","subtitle":"Using the power of creative commons to create an alternative system which is fair for musicians and their fans","slug":"23C3-1492-en-dying_giraffe_recordings","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1492.en.html","description":"Todays music industry has created a system that is unfair for both the musicians and the music lover. Combined with an agressive prosecution of downloaders, this causes a very strong polarisation between the industry on one hand and music lovers on the other. Nobody wins. We at dying giraffe recordings are trying to break this impasse and create a system where musicans are rewarded for their work and talent, and where music lovers can enjoy music in a fair way. The key element in this is a breakaway from traditional copyright laws and the use of the creative commons license. This combined with new technologies in the field of internet, audio recording and compression gives us the potency to change te system. Thus building a fighting force of extraordinary magnitude we believe that we can beat the system.\n","original_language":"eng","persons":["Christian Tan"],"tags":["23c3"," Culture"],"view_count":23,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-07T06:00:04.540+01:00","length":3385,"duration":3385,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1492-en-dying_giraffe_recordings.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1492-en-dying_giraffe_recordings_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-1ef82994c3216bacbc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-1ef82994c3216bacbc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1492-en-dying_giraffe_recordings","url":"https://api.media.ccc.de/public/events/import-1ef82994c3216bacbc","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-c39609eaa4f8ce253f","title":"A Hacker's Toolkit for RFID Emulation and Jamming","subtitle":null,"slug":"23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1597.en.html","description":"Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a \"computer of the future\", bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, and kids.\n","original_language":"eng","persons":["Melanie Rieback"],"tags":["23c3"," Hacking"],"view_count":251,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-21T08:15:08.421+01:00","length":3922,"duration":3922,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c39609eaa4f8ce253f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c39609eaa4f8ce253f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming","url":"https://api.media.ccc.de/public/events/import-c39609eaa4f8ce253f","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":2},{"event_id":118,"event_guid":"import-1f4121511842b31d10","weight":2},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":2},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":6},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":2},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":2},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":3},{"event_id":1713,"event_guid":"import-4f8250d931be212cab","weight":2},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":6},{"event_id":1980,"event_guid":"05u2_WazMrfvEJ8KqmwsXA","weight":2},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":2}]},{"guid":"import-4d0f52c0d863e63b49","title":"Tap the Electronic Frontier Foundation","subtitle":"EFF staffers answer your questions!","slug":"23C3-1710-en-tap_the_eff","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1710.en.html","description":"EFF staffers answer your questions about American wiretapping, the\nlatest moves of the *AA, the spread of the DMCA through free trade\nagreements, what's up at WIPO, and other dispatches from the US and\nelsewhere.\n","original_language":"eng","persons":["Peter Eckersley","Seth Schoen","Danny O'Brien"],"tags":["23c3"," Society"],"view_count":21,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-17T23:45:10.498+01:00","length":5836,"duration":5836,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1710-en-tap_the_eff.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1710-en-tap_the_eff_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4d0f52c0d863e63b49-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4d0f52c0d863e63b49-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1710-en-tap_the_eff","url":"https://api.media.ccc.de/public/events/import-4d0f52c0d863e63b49","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":697,"event_guid":"import-6e41e3f78f87e167ab","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1615,"event_guid":"import-a12ea6cce80bbfdbef","weight":1},{"event_id":1721,"event_guid":"BRHpBVii4wmCt1nd94vCYg","weight":1},{"event_id":1983,"event_guid":"HvR3MGqT1NqC3G3aIZJv7A","weight":1},{"event_id":1990,"event_guid":"APxc5qnadHeafxzU1z7FXw","weight":1},{"event_id":2087,"event_guid":"Q6L18QbEioigZeg3rGDRCA","weight":1},{"event_id":2090,"event_guid":"c4gbQ38eY2kXHUabLC33uA","weight":1},{"event_id":2091,"event_guid":"T8J_lgEMOIf-ArYXZCguQQ","weight":1},{"event_id":2351,"event_guid":"94e1281c-b1c8-46b3-82ad-6d6df6fe3580","weight":1},{"event_id":2520,"event_guid":"c992aea0-c7b2-4b8b-ae5e-758cabd0ca47","weight":1},{"event_id":2552,"event_guid":"32ff3348-9b9e-4d92-9e9b-7f6b81868d9c","weight":1},{"event_id":2676,"event_guid":"b1ef9c05-4ad8-4258-8fd7-9d937b630d1b","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":1},{"event_id":3043,"event_guid":"79e60f58-b2e7-4910-be32-f0a8896569e0","weight":1},{"event_id":3227,"event_guid":"0fd77819-0594-4127-bee3-a1d2fe7b1dd3","weight":1}]},{"guid":"import-cef704a060af9873ef","title":"Trust Your Eyes","subtitle":"Grundlagen der Visualisierung und wie man mit Visualisierungen „faken“ kann","slug":"23C3-1418-de-trust_your_eyes","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1418.en.html","description":"Vorgestellt werden theoretische Grundlagen der Visualisierung und der menschlichen Wahrnehmung sowie einige Visualisierungstechniken. Im Anschluss wird exemplarisch dargestellt, wie leicht man durch geschickt gewählte Visualisierungen verfälschte Eindrücke suggerieren kann.\n","original_language":"eng","persons":["Sonja"],"tags":["23c3"," Science"],"view_count":31,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-05-29T16:00:03.920+02:00","length":2194,"duration":2194,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1418-de-trust_your_eyes.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1418-de-trust_your_eyes_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-cef704a060af9873ef-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-cef704a060af9873ef-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1418-de-trust_your_eyes","url":"https://api.media.ccc.de/public/events/import-cef704a060af9873ef","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":2},{"event_id":3624,"event_guid":"600ca67d-e18d-49d8-8e5d-08d5b38ec528","weight":2}]},{"guid":"import-22ec4cc95bcb201ed0","title":"Faster PwninG Assured","subtitle":"Hardware Hacks and Cracks with FPGAs","slug":"23C3-1735-en-faster_pwning_assured","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1735.en.html","description":"This talk will go in depth into methods for breaking crypto faster using FPGAs.\n","original_language":"eng","persons":["David Hulton"],"tags":["23c3"," Hacking"],"view_count":16,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-04-23T05:15:02.412+02:00","length":3622,"duration":3622,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1735-en-faster_pwning_assured.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1735-en-faster_pwning_assured_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-22ec4cc95bcb201ed0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-22ec4cc95bcb201ed0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1735-en-faster_pwning_assured","url":"https://api.media.ccc.de/public/events/import-22ec4cc95bcb201ed0","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[]},{"guid":"import-a4d9fc832b17c561de","title":"Security Nightmares 2007","subtitle":"Oder: worüber wir nächstes Jahr lachen werden","slug":"23C3-1682-de-security_nightmares","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1682.en.html","description":"Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für's nächste Jahr.\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["23c3"," Hacking"],"view_count":618,"promoted":false,"date":"2006-12-30T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T05:15:04.330+01:00","length":4331,"duration":4331,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1682-de-security_nightmares.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1682-de-security_nightmares_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-a4d9fc832b17c561de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-a4d9fc832b17c561de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1682-de-security_nightmares","url":"https://api.media.ccc.de/public/events/import-a4d9fc832b17c561de","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":9},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":15},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":25},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":4},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":9},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":15},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":7},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":8},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":26},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":12},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":4},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":9},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":6},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":4}]},{"guid":"import-c14923d592d05db823","title":"Go - Das Spiel für die Menschen","subtitle":"Auch für Computer? - Nicht beim Go!","slug":"23C3-1685-de-go_menschen","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1685.en.html","description":"Primitiv einfache Spielregeln aber komplexeste Zusammenhänge, bei denen Computerprogramme kläglich versagen während Menschen auf wundersame Weise (Denk-)Muster erkennen und diese zu genialen Strategien umzusetzen vermögen - das ist Go. Kann uns umgekehrt Go auch Stärken des menschlichen Intellekts aufzeigen? Es werden Parallelen zur Softwareentwicklung gezogen und den Entscheidungsprozessen, denen sich Entwickler dort ausgesetzt sehen.\n","original_language":"eng","persons":["Christoph Gerlach"],"tags":["23c3"," Culture"],"view_count":121,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-24T21:30:13.193+01:00","length":3493,"duration":3493,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1685-de-go_menschen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1685-de-go_menschen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c14923d592d05db823-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c14923d592d05db823-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1685-de-go_menschen","url":"https://api.media.ccc.de/public/events/import-c14923d592d05db823","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":1},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":2},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":3},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":2},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1118,"event_guid":"import-a2f76e0e6e36e4f021","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":2},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":1},{"event_id":4617,"event_guid":"79c30c06-b3c5-5754-bb76-91489995d24b","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1}]},{"guid":"import-80ef475e269e070ff8","title":"Fudging with Firmware","subtitle":"Firmware reverse-engineering tactics","slug":"23C3-1610-en-fudging_with_firmware","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1610.en.html","description":"This lecture aims at providing ideas and practical techniques about the reverse-engineering process of equipment firmware images. It touches upon data encoding, compression, bootstraps, deciphering, disassembly, and emulation.\n","original_language":"eng","persons":["khorben"],"tags":["23c3"," Hacking"],"view_count":83,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-10-11T14:30:08.903+02:00","length":2585,"duration":2585,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1610-en-fudging_with_firmware.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1610-en-fudging_with_firmware_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-80ef475e269e070ff8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-80ef475e269e070ff8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1610-en-fudging_with_firmware","url":"https://api.media.ccc.de/public/events/import-80ef475e269e070ff8","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":1},{"event_id":1219,"event_guid":"import-c1b343dc3dc4828a06","weight":1},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":3793,"event_guid":"a48cf7af-c38e-4a19-8713-13facdbc0fd9","weight":1},{"event_id":4880,"event_guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","weight":1},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":1},{"event_id":6418,"event_guid":"dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861","weight":1}]},{"guid":"import-811a4a998765dd6d06","title":"A Probabilistic Trust Model for GnuPG","subtitle":"A new way of evaluating a PGP web of trust by using a probabilistic trust metric","slug":"23C3-1607-de-probabilistic_trust_model_for_gnupg","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1607.en.html","description":"Ein Vertrauensnetz beschreibt einen typischen dezentralen PKI-Ansatz, welcher in der Verschlüsselungssoftware PGP sowie GnuPG umgesetzt worden ist. Es werden einige Nachteile und Schwächen des aktuellen PGP-Vertrauensmodells erläutert. Gleichermaßen wird ein neuer Ansatz sowohl für den Umgang mit Vertrauen, als auch für die Evaluation der Schlüssel-Authentizität präsentiert.\n","original_language":"eng","persons":["Markus Wüthrich","Jacek Jonczy"],"tags":["23c3"," Science"],"view_count":91,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-12-16T22:00:09.160+01:00","length":3332,"duration":3332,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1607-de-probabilistic_trust_model_for_gnupg.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1607-de-probabilistic_trust_model_for_gnupg_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-811a4a998765dd6d06-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-811a4a998765dd6d06-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1607-de-probabilistic_trust_model_for_gnupg","url":"https://api.media.ccc.de/public/events/import-811a4a998765dd6d06","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":2},{"event_id":1080,"event_guid":"import-ed88ca5ebf2520ebf0","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1096,"event_guid":"import-951bd3b975cd6a7f7e","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":2},{"event_id":2243,"event_guid":"lE9xGxC7-9DQGljZOWg_Sw","weight":1},{"event_id":2744,"event_guid":"7c933d1d-6a52-48ac-9417-601e529bcddc","weight":1},{"event_id":2759,"event_guid":"ff3dc349-f733-4ba6-bc83-d4373fcc981d","weight":1},{"event_id":3032,"event_guid":"a92fdc4b-370b-4700-86ea-e5dbf22d778e","weight":1},{"event_id":3589,"event_guid":"79720795-6ae6-50ef-ab4b-a1ef4472ab1d","weight":1},{"event_id":3590,"event_guid":"8edd7c4d-0b8e-57d9-8e38-df11f1434e22","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":1},{"event_id":3848,"event_guid":"e6746e7f-dca9-4265-86c7-0bef863d83a9","weight":1},{"event_id":4219,"event_guid":"527ad2fe-4899-11e7-a279-77a36f66fc30","weight":1},{"event_id":4435,"event_guid":"9645858e-a653-4811-9400-5f5e390b0fd7","weight":1},{"event_id":4459,"event_guid":"723dbee1-a73a-469c-bbb0-6bc90b21ebae","weight":1},{"event_id":4481,"event_guid":"63c911f5-aefe-4295-bcb7-18677c3efc6e","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1},{"event_id":4993,"event_guid":"0aba4941-a853-4bb6-82e9-b169a892357e","weight":1},{"event_id":5637,"event_guid":"d9898c2f-fd78-4d04-b5d3-683df6895fa3","weight":1},{"event_id":5677,"event_guid":"665b51de-acd6-4fea-ae58-dd780a5437c2","weight":1}]},{"guid":"import-48b970c65ea1ddb27b","title":"In the Absence of Trust","subtitle":null,"slug":"23C3-1740-en-in_the_absence_of_trust","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1740.en.html","description":"In 1996, The Surveillance Camera Players started manifesting their\nopposition to the culture of surveillance by performing silent, specially\nadapted plays directly in front of CCTV cameras. 10 years after, their\nwork is more relevant than ever. This talk will take you through artists'\nstrategies to raise the debate on privacy, the society of the spectacle,\nthe aftermath of September 11th, face recognition software, panopticism,\nelectronic tagging, etc.\n","original_language":"eng","persons":["Régine Débatty"],"tags":["23c3"," Culture"],"view_count":42,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-11-04T23:15:04.430+01:00","length":2657,"duration":2657,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1740-en-in_the_absence_of_trust.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1740-en-in_the_absence_of_trust_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-48b970c65ea1ddb27b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-48b970c65ea1ddb27b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1740-en-in_the_absence_of_trust","url":"https://api.media.ccc.de/public/events/import-48b970c65ea1ddb27b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":388,"event_guid":"import-1ba5da4c1314b41741","weight":1},{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":2},{"event_id":410,"event_guid":"import-ec05f2b312ee438d99","weight":2},{"event_id":411,"event_guid":"import-669f7f97f2f1709469","weight":1},{"event_id":533,"event_guid":"import-76dca07be1cc11bf12","weight":1},{"event_id":534,"event_guid":"import-87e0643a40bcaeecd8","weight":1},{"event_id":545,"event_guid":"import-99caba0a95f3e2bb7b","weight":1},{"event_id":576,"event_guid":"import-b5dafc00b677681209","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":939,"event_guid":"import-af4384252d9f0d7190","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1767,"event_guid":"BK1ziXHv5du-_NJN24p9lA","weight":1},{"event_id":1825,"event_guid":"juhvY3wvW_i3TTb8KDEyeQ","weight":1},{"event_id":1829,"event_guid":"n4vgYDc2e8tbtF6g9mZIlA","weight":1},{"event_id":2253,"event_guid":"uMGv2XJJqkQodKm0_Mtr_A","weight":1},{"event_id":2485,"event_guid":"10864b98-db0f-4184-a71a-55ec5942d837","weight":1},{"event_id":2543,"event_guid":"a406971d-76aa-464c-9ce2-2e7c4a63fab5","weight":1},{"event_id":2857,"event_guid":"b9b2c371-417c-45c4-a47f-faf7eeb11fbf","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2901,"event_guid":"b4339927-6780-4881-a342-e7a262078dce","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":3097,"event_guid":"ffa36a68-67e0-4b5d-a932-a2250f725080","weight":1},{"event_id":3216,"event_guid":"01H23TDL3mlx2AJYrrz2yw","weight":1},{"event_id":3277,"event_guid":"7867bb2d-a04b-5e94-96d4-127f7b385a13","weight":1},{"event_id":3295,"event_guid":"4b7e9594-629b-54a9-993e-c621425bd0e0","weight":1},{"event_id":3297,"event_guid":"19af4dbd-a234-530e-88c1-1db1c6d82228","weight":1},{"event_id":3672,"event_guid":"c45fa431-69f9-47db-a90c-fb596efdcb55","weight":1},{"event_id":3795,"event_guid":"fe6af5ce-7bba-4aa6-af9e-dea7a176ec3c","weight":1},{"event_id":3842,"event_guid":"385033fe-d217-0100-aca6-28dd05677c66","weight":1},{"event_id":6553,"event_guid":"a667d070-483e-4e2b-9bf9-d9a5475b6356","weight":1}]},{"guid":"import-d93f6f776ff5e0bf3d","title":"The worst part of censorship is XXXXX","subtitle":"Investigating large-scale Internet content filtering","slug":"23C3-1473-en-large_scale_internet_content_filtering","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1473.en.html","description":"This talk analyzes large-scale, countrywide Internet content filtering from a technical point of view and investigates the current situation in the People’s Republic of China. Additionally it discusses techniques to effectively defeat censorship and based on various tests conducted by the author, comments on their applicability in the Chinese part of the Internet.\n","original_language":"eng","persons":["Sebastian Wolfgarten"],"tags":["23c3"," Society"],"view_count":44080,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-04T13:30:06.201+02:00","length":3607,"duration":3607,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1473-en-large_scale_internet_content_filtering.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1473-en-large_scale_internet_content_filtering_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-d93f6f776ff5e0bf3d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-d93f6f776ff5e0bf3d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1473-en-large_scale_internet_content_filtering","url":"https://api.media.ccc.de/public/events/import-d93f6f776ff5e0bf3d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":27},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":33},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":42},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":12},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":15},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":177},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":25},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":14},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":11},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":8},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":10},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":21},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":11},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":20},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":9},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":79},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":57},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":21},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":12},{"event_id":3702,"event_guid":"5fb5e620-383a-4679-b37a-beef20bcd4fe","weight":11},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":21},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":63},{"event_id":4230,"event_guid":"2764cdfd-49ab-4463-a809-198dec7abdf6","weight":21},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":9},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":9},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":12},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":33},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":19},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":10},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":13},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":17},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":15},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":13},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":30},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":79},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":23},{"event_id":5603,"event_guid":"1d09e62a-d833-5ef3-800a-836d61167bc2","weight":13},{"event_id":5610,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb889","weight":10},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":36},{"event_id":5723,"event_guid":"224592ec-929c-11e8-b455-93e846fe9ece","weight":23},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":24},{"event_id":6058,"event_guid":"7fe2a84b-bbed-4a4e-80fb-85b581c14b13","weight":15},{"event_id":6078,"event_guid":"8a3c7006-ba7f-451c-a555-3a9ca4af5f2f","weight":31},{"event_id":6114,"event_guid":"02a2a813-6981-438c-ad51-a1b55d79e613","weight":11},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":27},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":30},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":28},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":21},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":13},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":18},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":11},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":34},{"event_id":6503,"event_guid":"d0d6d058-f117-4ccb-ba6a-c41d9290a287","weight":9},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":33},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":39},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":8},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":18},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":9},{"event_id":6888,"event_guid":"045ff617-c5e1-57f9-8307-572da7412733","weight":8},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":16},{"event_id":6932,"event_guid":"3ac46290-51e0-5ee2-93a0-8fb4b99cf67c","weight":8},{"event_id":6954,"event_guid":"39151e7e-9ca2-594c-8888-7faa6504e32d","weight":10},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":11},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":15},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":12},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":13},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":11},{"event_id":7245,"event_guid":"f681a9f2-7d22-5e8a-be3c-8d4faaf15062","weight":10}]}]}