{"acronym":"28c3","aspect_ratio":"16:9","updated_at":"2026-04-08T11:00:04.425+02:00","title":"28C3: behind enemy lines","schedule_url":"","slug":"congress/2011","event_last_released_at":"2012-01-04T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2011","logo_url":"https://static.media.ccc.de/media/congress/2011/folder-28c3.png","images_url":"https://static.media.ccc.de/media/congress/2011","recordings_url":"https://cdn.media.ccc.de/congress/2011","url":"https://api.media.ccc.de/public/conferences/28c3","events":[{"guid":"import-b0589b01247d699e04","title":"Lightning Talks Day 4","subtitle":null,"slug":"28c3-4907-en-lightning_talks_day_4","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4907.en.html","description":"\n","original_language":"eng","persons":["Nick Farr"],"tags":["28c3"," Community"],"view_count":28,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-09-04T21:30:04.784+02:00","length":8452,"duration":8452,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4907-en-lightning_talks_day_4_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4907-en-lightning_talks_day_4_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b0589b01247d699e04-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b0589b01247d699e04-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4907-en-lightning_talks_day_4","url":"https://api.media.ccc.de/public/events/import-b0589b01247d699e04","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":622,"event_guid":"import-a244dfe0921ddbc139","weight":1},{"event_id":1598,"event_guid":"import-95d2940001b2300805","weight":3},{"event_id":1614,"event_guid":"import-a7f1f1ee62ed2fc9b9","weight":4},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1}]},{"guid":"import-2ee39c5fea857aeb23","title":"Pentanews Game Show 2k11/3","subtitle":"42 new questions, new jokers, same concept, more fun than last year!","slug":"28c3-4721-en-pentanews_game_show_2k11","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4721.en.html","description":"The Penta News Game Show rehashes a collection of absurd, day-to-day\nnews items of 2011 to entertain the audience, let the Net participate,\nand make it's winners heroes.\n","original_language":"eng","persons":["Alien8","_john","klobs"],"tags":["28c3"," Show"],"view_count":73,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-10T17:30:24.795+01:00","length":6425,"duration":6425,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4721-en-pentanews_game_show_2k11_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4721-en-pentanews_game_show_2k11_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-2ee39c5fea857aeb23-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-2ee39c5fea857aeb23-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4721-en-pentanews_game_show_2k11","url":"https://api.media.ccc.de/public/events/import-2ee39c5fea857aeb23","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":785,"event_guid":"import-5a1d49359193696c0a","weight":1},{"event_id":1281,"event_guid":"import-0e7756e1cf99f3e1c5","weight":1},{"event_id":1311,"event_guid":"import-ca6f5d093629dafe46","weight":1},{"event_id":1338,"event_guid":"import-a19180493d3c82f29b","weight":1},{"event_id":1346,"event_guid":"import-e9df7801eb432bf49e","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1545,"event_guid":"import-7c99fae19428fdbf5c","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1588,"event_guid":"import-c8025284c9938a2c87","weight":1},{"event_id":1593,"event_guid":"import-b0589b01247d699e04","weight":1},{"event_id":1594,"event_guid":"import-1c44de8b5aa0256538","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1614,"event_guid":"import-a7f1f1ee62ed2fc9b9","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1638,"event_guid":"import-edaa0ada3bc5a12d59","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1676,"event_guid":"import-d5a95005e665b332d7","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1736,"event_guid":"VFu55BmcslSk-0RC0SZioA","weight":1},{"event_id":2117,"event_guid":"0ERAPHSzFzk2amdkw3aGTA","weight":2},{"event_id":2350,"event_guid":"433e598a-4a96-4be5-90f1-014b4be7b3ec","weight":1},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3968,"event_guid":"24923407-2fd3-4042-bc94-dd42083d5c1a","weight":1},{"event_id":4242,"event_guid":"c17484f2-79e0-11e7-8a66-afa7f271c231","weight":1},{"event_id":4754,"event_guid":"6882d1d0-ba41-4fc1-a579-1f665659e960","weight":1}]},{"guid":"import-708b15f151751c94c5","title":"Introducing Osmo-GMR","subtitle":"Building a sniffer for the GMR satphones","slug":"28c3-4688-en-introducing_osmo_gmr","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4688.en.html","description":"The latest member of the Osmocom-family projects, osmo-gmr focuses on the GMR-1 (GEO Mobile Radio) air interface used in some satellite Phones. This talk will shortly present the GMR protocol, the Thuraya network that uses this protocol in the Eurasian/African and Australian continents and finally details how you can capture samples and process them for analysis using osmo-gmr.\n","original_language":"eng","persons":["Sylvain Munaut"],"tags":["28c3"," Hacking"],"view_count":570,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-29T05:45:02.866+02:00","length":3320,"duration":3320,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4688-en-introducing_osmo_gmr_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4688-en-introducing_osmo_gmr_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-708b15f151751c94c5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-708b15f151751c94c5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4688-en-introducing_osmo_gmr","url":"https://api.media.ccc.de/public/events/import-708b15f151751c94c5","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":164,"event_guid":"import-36dbb5c49c18934cd7","weight":1},{"event_id":236,"event_guid":"import-17d6a5439f69d41e5e","weight":1},{"event_id":985,"event_guid":"import-c0c97d7b572b39d4f7","weight":1},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":3},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1587,"event_guid":"import-a54618b083eeb9fc4d","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":2},{"event_id":1835,"event_guid":"xdX27wLbHpeOU_dSgBO4Hg","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":2154,"event_guid":"E95sP8WH8tLiiJj2SBAA1A","weight":24},{"event_id":2281,"event_guid":"7f270061-0231-41d4-b50c-f1017231c534","weight":1},{"event_id":2302,"event_guid":"rHjqtfbslD_ucUr8kW5wcQ","weight":1},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":2508,"event_guid":"ed4bcb3b-fe2d-4728-812d-a45dbd4d01db","weight":1},{"event_id":3244,"event_guid":"6a272039-1cce-5108-8c6c-6f993f74a524","weight":5},{"event_id":3274,"event_guid":"cec2c1dd-88ab-5fa8-80c1-686188641cc3","weight":2},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":2},{"event_id":3831,"event_guid":"3fbcc011-9ccb-53bf-beae-75e0235f90e5","weight":1}]},{"guid":"import-2dc039fa73eabade8b","title":"EU-Datenschutz und das Internet der Dinge (english translation)","subtitle":null,"slug":"28c3-4844-de-eu_datenschutz_internet_der_dinge","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4844.en.html","description":"Derzeit arbeitet die EU-Kommission an der Modernisierung der Datenschutzrichtlinie. Dieser Beitrag informiert über den Stand der Dinge.\n","original_language":"eng","persons":["Andreas Krisch"],"tags":["28c3"," Society and Politics"],"view_count":31,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-04-15T16:15:04.431+02:00","length":3230,"duration":3230,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-2dc039fa73eabade8b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-2dc039fa73eabade8b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4844-de-eu_datenschutz_internet_der_dinge","url":"https://api.media.ccc.de/public/events/import-2dc039fa73eabade8b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1581,"event_guid":"import-950ce3bbed73872ac6","weight":2},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2}]},{"guid":"import-d05f362a5a58b95e00","title":"Electronic money: The road to Bitcoin and a glimpse forward","subtitle":"How the e-money systems can be made better","slug":"28c3-4668-en-electronic_money","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4668.en.html","description":"The proposed talk provides a definition of the problem of creating e-money and after a review of the state of the art points out possible solutions and proposes questions for discussion for the properties of electronic money system.\n","original_language":"eng","persons":["peio"],"tags":["28c3"," Society and Politics"],"view_count":62,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-08T02:30:09.273+01:00","length":3687,"duration":3687,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4668-en-electronic_money_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4668-en-electronic_money_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d05f362a5a58b95e00-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d05f362a5a58b95e00-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4668-en-electronic_money","url":"https://api.media.ccc.de/public/events/import-d05f362a5a58b95e00","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":136,"event_guid":"import-3b7a6a721fea3ac23d","weight":3},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":1},{"event_id":1502,"event_guid":"import-4aa02978eff75860c4","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":2},{"event_id":1583,"event_guid":"import-11d95d8eb06a7bb8eb","weight":2},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1982,"event_guid":"r7eKRmXhvzxdnpzkR3szlg","weight":2},{"event_id":2021,"event_guid":"xkSveT8eNqH8U3woDjR-eA","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":2}]},{"guid":"import-9013654b84fc374d59","title":"Ooops I hacked my PBX","subtitle":"Why auditing proprietary protocols matters","slug":"28c3-4656-en-ooops_i_hacked_my_pbx","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4656.en.html","description":"This talk is cautionary tale about developers forgetting to remove debug interfaces from finished products and the need of repetitive system reviews. A midrange PBX systems (non web) configuration interface is used as an example of what flaws you can actually find in commercial systems.\n","original_language":"eng","persons":["pt"],"tags":["28c3"," Hacking"],"view_count":128,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-08-14T12:45:05.908+02:00","length":1699,"duration":1699,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4656-en-ooops_i_hacked_my_pbx_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4656-en-ooops_i_hacked_my_pbx_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-9013654b84fc374d59-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-9013654b84fc374d59-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4656-en-ooops_i_hacked_my_pbx","url":"https://api.media.ccc.de/public/events/import-9013654b84fc374d59","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1258,"event_guid":"import-37514cebcac18da418","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":1},{"event_id":1479,"event_guid":"import-6973e270e772374508","weight":1},{"event_id":1525,"event_guid":"import-3cee03a88415287c1b","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1754,"event_guid":"NzP8F_rnRMmXIbb6zl1H8Q","weight":1},{"event_id":2153,"event_guid":"HLDDEFxCxCrQryx8fEacZw","weight":1},{"event_id":2161,"event_guid":"oI8n77eKy3Uz2Fklmk4hVQ","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2385,"event_guid":"b55ec10e-b12f-40e0-bb25-4fee2f13ad86","weight":1},{"event_id":2548,"event_guid":"df27b8d8-cd90-4127-8952-cd4cfe756e38","weight":1},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":1},{"event_id":2904,"event_guid":"8b01d636-d39b-44b8-8d6f-fc03e47eae1b","weight":1},{"event_id":2940,"event_guid":"48219ef6-24b8-41ca-8cc0-ec309e4148e6","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3543,"event_guid":"e6edf7c1-007f-477b-811f-8f24e70ded87","weight":1}]},{"guid":"import-dd7f992024a421b675","title":"Reverse-engineering a Qualcomm baseband","subtitle":null,"slug":"28c3-4735-en-reverse_engineering_a_qualcomm_baseband","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4735.en.html","description":"Despite their wide presence in our lives, baseband chips are still nowadays\npoorly known and understood from a system point of view. Some presentations\nhave hilighted vulnerabilities in GSM stacks across various models of\nbasebands (cf. 27c3: _All your baseband are belong to us_ by R-P.  Weinmann).\nHowever none of them actually focused on the details of how a baseband\noperating system really works. This is the focus of our presentation.  From\nthe study of a simple 3G USB stick equipped with a Qualcomm baseband, we will\ndiscuss how to dump the volatile memory, reverse-engineer the proprietary\nRTOS, and ultimately execute and debug code while trying to preserve the\nreal-time system constraints.\n","original_language":"eng","persons":["Guillaume Delugré"],"tags":["28c3"," Hacking"],"view_count":618,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-28T10:30:07.873+01:00","length":3774,"duration":3774,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-dd7f992024a421b675-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-dd7f992024a421b675-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4735-en-reverse_engineering_a_qualcomm_baseband","url":"https://api.media.ccc.de/public/events/import-dd7f992024a421b675","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":2},{"event_id":693,"event_guid":"import-b55a825bce0ede19d7","weight":2},{"event_id":1303,"event_guid":"import-8a69e7b1ee3f8cc625","weight":7},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":3},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":6},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1803,"event_guid":"c3Q-MbMX7FDXWv6rYj2bFw","weight":6},{"event_id":1835,"event_guid":"xdX27wLbHpeOU_dSgBO4Hg","weight":2},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":8}]},{"guid":"import-c8025284c9938a2c87","title":"Hacker Jeopardy Translation","subtitle":null,"slug":"28c3-4934-en-hacker_jeopardy_translation","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4934.en.html","description":"\n","original_language":"eng","persons":[],"tags":["28c3"," Show"],"view_count":59,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-09-18T22:15:11.466+02:00","length":7051,"duration":7051,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4934-en-hacker_jeopardy_translation_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4934-en-hacker_jeopardy_translation_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c8025284c9938a2c87-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c8025284c9938a2c87-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4934-en-hacker_jeopardy_translation","url":"https://api.media.ccc.de/public/events/import-c8025284c9938a2c87","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":156,"event_guid":"import-c7e7d888608d4936d1","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":4},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":2},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":3},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":2},{"event_id":3604,"event_guid":"1275f046-e52e-4b0b-9f5b-7eb2008b2ec4","weight":1}]},{"guid":"import-c0e9ee0d0ffbfc6e2b","title":"What is WhiteIT and what does it aim for?","subtitle":"Why you probably want to be concerned about it and similiar alliances.","slug":"28c3-4700-en-what_is_whiteit","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4700.en.html","description":"This talk will be about the WhiteIT project, initiated by Mr Schünemann, German Minister of Interior in the state of Lower Saxony.\n\nThe WhiteIT project is concerned with combating the online-distribution of child abuse material. WhiteIT tries to develop tools and processes to cooperatively suppress the disemination and (re-)distribution of said material.\n\nDuring the Talk the lecturer will try to encourage some open source intelligence. So please consider bringing a laptop, netbook or tablet with you to help gather and collect certain informations right away.\n","original_language":"eng","persons":["Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft"],"tags":["28c3"," Society and Politics"],"view_count":37,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-14T13:30:05.280+01:00","length":3612,"duration":3612,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4700-en-what_is_whiteit_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4700-en-what_is_whiteit_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c0e9ee0d0ffbfc6e2b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c0e9ee0d0ffbfc6e2b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4700-en-what_is_whiteit","url":"https://api.media.ccc.de/public/events/import-c0e9ee0d0ffbfc6e2b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":1},{"event_id":1408,"event_guid":"import-b7cf56b6bbe50e728c","weight":1},{"event_id":1477,"event_guid":"import-633bd84860f65db047","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1668,"event_guid":"import-d52f066cf03458c746","weight":1},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":1},{"event_id":1777,"event_guid":"tEudCvm8e6XS2VQP3BR5yw","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":1},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":1},{"event_id":2499,"event_guid":"fc4e6338-452d-48c3-a21b-ecdcb658bce7","weight":1},{"event_id":2862,"event_guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":4848,"event_guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":6246,"event_guid":"4e314886-d08c-4660-8dca-2ab5443c2b52","weight":1}]},{"guid":"import-d8314b471f27e20439","title":"r0ket++","subtitle":"The CCC-Badge","slug":"28c3-4777-en-r0ket","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4777.en.html","description":"Now you've got that r0ket thing. What to do with it?\n","original_language":"eng","persons":["lilafisch","Stefan 'Sec' Zehl"],"tags":["28c3"," Hacking"],"view_count":161,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-10T17:30:23.006+01:00","length":2965,"duration":2965,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4777-en-r0ket_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4777-en-r0ket_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d8314b471f27e20439-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d8314b471f27e20439-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4777-en-r0ket","url":"https://api.media.ccc.de/public/events/import-d8314b471f27e20439","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":187,"event_guid":"import-294b8bec99b645a668","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":777,"event_guid":"import-b6ee8eeadb87d2384c","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1455,"event_guid":"import-524e41ae54d3230bb9","weight":4},{"event_id":1471,"event_guid":"import-d05c31100d29c24e95","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1511,"event_guid":"import-50d23406ba6bbed62d","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":2},{"event_id":1595,"event_guid":"import-b00e23ddd70d2f59fb","weight":1},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1646,"event_guid":"import-3f6920f8040f18da31","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":1753,"event_guid":"0i_XOY92eUOxB3jQO_Zj4g","weight":1},{"event_id":1779,"event_guid":"0OMMJkoMY79GCUUx9LULgA","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1849,"event_guid":"qU7LRRIvEiZBJAvAY5z_Ig","weight":1},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":1},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2916,"event_guid":"6063a86c-6703-4402-a7a1-074f18377b1a","weight":2},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1}]},{"guid":"import-d5e915f712036ff928","title":"Print Me If You Dare","subtitle":"Firmware Modification Attacks and the Rise of Printer Malware","slug":"28c3-4780-en-print_me_if_you_dare","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4780.en.html","description":"Network printers are ubiquitous fixtures within the modern IT infrastructure. Residing within sensitive networks and lacking in security, these devices represent high-value targets that can theoretically be used not only to manipulate and exfiltrate the sensitive information such as network credentials and sensitive documents, but also as fully functional general-purpose bot-nodes which give attackers a stealthy, persistent foothold inside the victim network for further recognizance, exploitation and exfiltration. \n","original_language":"eng","persons":["Ang Cui","Jonathan Voris"],"tags":["28c3"," Hacking"],"view_count":370,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-13T14:15:08.569+01:00","length":3816,"duration":3816,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4780-en-print_me_if_you_dare_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4780-en-print_me_if_you_dare_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d5e915f712036ff928-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d5e915f712036ff928-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4780-en-print_me_if_you_dare","url":"https://api.media.ccc.de/public/events/import-d5e915f712036ff928","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":4},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1590,"event_guid":"import-6e9147236a7cb3f1ce","weight":2},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":2},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":2},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":6},{"event_id":2167,"event_guid":"1116a02b-0312-4949-9921-d605148bfccb","weight":2},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":2},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":2}]},{"guid":"import-9bd054fef6a2a0b358","title":"Echtes Netz ","subtitle":"Kampagne für Netzneutralität","slug":"28c3-4738-de-echtes_netz","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4738.en.html","description":"Anfang 2012 startet \"Echtes Netz\", die Kampagne für Netzneutralität, die vom Digitale Gesellschaft e.V. initiert und von der stiftung bridge gefördert wird. Die Kampagne macht sich zur Aufgabe, das Bewusstsein für den Wert eines echten Netzes zu steigern und mit Offline- und Onlineaktionen für eine gesetzliche Verankerung der Netzneutralität zu werben.\n\nDer Vortrag gibt einen Überblick auf die Debatte rund um die Netzneutralität in Deutschland und der EU und einen einen Ausblick auf die Kampagne.\n","original_language":"eng","persons":["Falk Lüke","Markus Beckedahl"],"tags":["28c3"," Society and Politics"],"view_count":70,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-03-07T16:15:05.262+01:00","length":3580,"duration":3580,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4738-de-echtes_netz_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4738-de-echtes_netz_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-9bd054fef6a2a0b358-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-9bd054fef6a2a0b358-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4738-de-echtes_netz","url":"https://api.media.ccc.de/public/events/import-9bd054fef6a2a0b358","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1572,"event_guid":"import-4eec3a43cb7ad04ee9","weight":3},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":3},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":2},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2}]},{"guid":"import-ad556a07ac6390b289","title":"Closing Event","subtitle":null,"slug":"28c3-4899-en-closing_event","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4899.en.html","description":"\n","original_language":"eng","persons":[],"tags":["28c3"," Community"],"view_count":40,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-22T12:00:09.516+01:00","length":772,"duration":772,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4899-en-closing_event_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4899-en-closing_event_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ad556a07ac6390b289-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ad556a07ac6390b289-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4899-en-closing_event","url":"https://api.media.ccc.de/public/events/import-ad556a07ac6390b289","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1409,"event_guid":"import-d226c92ea5f3884368","weight":3},{"event_id":1516,"event_guid":"import-7a231e34c3be021873","weight":4},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":4},{"event_id":1715,"event_guid":"import-91fa9b308b32d15504","weight":6},{"event_id":1792,"event_guid":"HsPfR-yh7Zg-N6kQo58UIQ","weight":3},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":3},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":3}]},{"guid":"import-9aca5e310039f09031","title":"Does Hacktivism Matter?","subtitle":"How the Btx hack changed computer law-making in Germany","slug":"28c3-4749-en-does_hacktivism_matter","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4749.en.html","description":"Do you remember those days when hackers were “real men?” When hacking was not yet a crime and the cyberspace an undiscovered land? Just before anti-hacking laws were introduced in Germany? Back in these days, the famous founding father of the CCC made the Bundespost (Germany's Federal Mail Service) meet its Waterloo, when they hacked Bildschirmtext (Btx)—the epitome of both technological utopias and dystopias at that time. But soon, hackers suffered a setback: new laws criminalized hacking in the name of fighting white-collar crimes. Simultaneously to the laws, things were getting rougher in the media and the public opinion. While being seen as a weird vanguard of technology before, hackers soon became pranksters and outlaws. Apparently hacktivism, the portmanteau word for hacking activism, had failed to shape the policies in the dawning information society. However, there are evidences that hacktivism had an impact on the new computer crime legislation—not in terms of having more, but less restrictions implemented in the law.\n","original_language":"eng","persons":["Kai Denker"],"tags":["28c3"," Society and Politics"],"view_count":295,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-10-21T05:45:03.649+02:00","length":2966,"duration":2966,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4749-en-does_hacktivism_matter_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4749-en-does_hacktivism_matter_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-9aca5e310039f09031-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-9aca5e310039f09031-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4749-en-does_hacktivism_matter","url":"https://api.media.ccc.de/public/events/import-9aca5e310039f09031","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":1},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":1},{"event_id":1603,"event_guid":"import-f1c3534cc5613af9ac","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":1612,"event_guid":"import-708b15f151751c94c5","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":1},{"event_id":1710,"event_guid":"import-23969f74f61375b2c6","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":2197,"event_guid":"qRQclNxyOV7ZYPwbrXrw1Q","weight":1},{"event_id":2212,"event_guid":"4aOXU9cdQYbirV0Q-k5usw","weight":1},{"event_id":2238,"event_guid":"0hwHwiTLCTkE94bpOBOcVg","weight":1},{"event_id":2266,"event_guid":"4_Q4s48yg8FV08kvf9lbpQ","weight":1},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":1},{"event_id":2928,"event_guid":"7504eeb1-1665-47fd-b21a-601d2641c41c","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1}]},{"guid":"import-68a1981706215efc82","title":"Don't scan, just ask","subtitle":"A new approach of identifying vulnerable web applications","slug":"28c3-4770-en-dont_scan_just_ask","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4770.en.html","description":"For years, we tried to identify vulnerable systems in company networks by getting all the companies netblocks / ip addresses and scanning them for vulnerable services. Then with the growing importance of web applications and of course search engines, a new way of identifying vulnerable systems was introduced: \"Google hacking\". \n\nHowever this approach of identifying and scanning companies ip addresses as well as doing some Google hacking for the (known) URLs of the company doesn't take all aspects into account and has some limitations. At first we just check the systems which are obvious, the ones that are in the companies netblocks, the IP addresses that were provided by the company and the URLs that are known or can be resolved using reverse DNS. However how about URLs and systems that aren't obvious? Systems maybe even the company in focus forgot? Second, the current techniques are pretty technical. They don't take the business view into account at any point.\n\nTherefore we developed a new technique as well as framework to identify companies’ web pages based on a scored keyword list. In other words: From zero to owning all of a company’s existing web pages, even the pages not hosted by the company itself, with just a scored keyword list as input.\n","original_language":"eng","persons":["Fabian Mihailowitsch"],"tags":["28c3"," Hacking"],"view_count":106,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-07-25T00:00:04.439+02:00","length":1583,"duration":1583,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4770-en-dont_scan_just_ask_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4770-en-dont_scan_just_ask_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-68a1981706215efc82-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-68a1981706215efc82-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4770-en-dont_scan_just_ask","url":"https://api.media.ccc.de/public/events/import-68a1981706215efc82","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":4},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":2},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":2},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":3},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":2},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":5},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":4},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":3},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":2},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":2},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":2},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":2},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":2},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2}]},{"guid":"import-0a4b167b1f0882d707","title":"Automatic Algorithm Invention with a GPU","subtitle":"Hell Yeah, it's rocket science","slug":"28c3-4764-en-automatic_algorithm_invention_with_a_gpu","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4764.en.html","description":"You write software. You test software. You know how to tell if the software is working. Automate your software testing sufficiently and you can let the computer do the writing for you! \"Genetic Programming\", especially \"Cartesian Genetic Programming\" (CGP), is a powerful tool for creating software and designing physical objects. See how to do CGP as we invent image filters for the Part Time Scientists' 3D cameras. Danger: Actual code will be shown!\n","original_language":"eng","persons":["Wes Faler"],"tags":["28c3"," Hacking"],"view_count":181,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-29T21:45:12.737+01:00","length":3724,"duration":3724,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-0a4b167b1f0882d707-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-0a4b167b1f0882d707-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4764-en-automatic_algorithm_invention_with_a_gpu","url":"https://api.media.ccc.de/public/events/import-0a4b167b1f0882d707","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":2},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":3},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1683,"event_guid":"import-780e90a537db52bc88","weight":1},{"event_id":1794,"event_guid":"Wb85jYb3IJr8B11bubfibA","weight":1},{"event_id":2140,"event_guid":"fKCiplTF234pJmlsO9BXyw","weight":1},{"event_id":2325,"event_guid":"44a73803-a941-49bd-95b5-3268a1b27b9b","weight":1},{"event_id":2596,"event_guid":"8d33483e-7993-47fa-8561-e8da14e39374","weight":1},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":3138,"event_guid":"74759911-47d9-4c60-878e-595cf08dd412","weight":1},{"event_id":3589,"event_guid":"79720795-6ae6-50ef-ab4b-a1ef4472ab1d","weight":1},{"event_id":3590,"event_guid":"8edd7c4d-0b8e-57d9-8e38-df11f1434e22","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3768,"event_guid":"babc1d56-c3b9-4a21-bfae-af4190c05e93","weight":1},{"event_id":3773,"event_guid":"769872ac-3efa-4101-ae95-bdedfc829c49","weight":1},{"event_id":4219,"event_guid":"527ad2fe-4899-11e7-a279-77a36f66fc30","weight":1}]},{"guid":"import-4ca4182224f147e99b","title":"What is in a name?","subtitle":"Identity-Regimes from 1500 to the 2000s","slug":"28c3-4713-en-what_is_in_a_name","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4713.en.html","description":"Starting with the history of birth-registration an overview on the historical regimes of naming and identifying people from the 15th to the 20th century is given. the talk will show examples of the different identity media through time and their standardization with the rise of the westphalian nation state and the subsequent developments after the french revolution and during the 20th century. the goal of the talk is to show the complexity of the phenomenon of personal names and their media and the need for an informed debate on who and how naming and identification in the digital age is achieved.\n","original_language":"eng","persons":["Christoph Engemann"],"tags":["28c3"," Society and Politics"],"view_count":140,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-03-16T03:15:02.015+01:00","length":3872,"duration":3872,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4713-en-what_is_in_a_name_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4713-en-what_is_in_a_name_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4ca4182224f147e99b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4ca4182224f147e99b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4713-en-what_is_in_a_name","url":"https://api.media.ccc.de/public/events/import-4ca4182224f147e99b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":647,"event_guid":"import-5d278cc14212d74a4b","weight":1},{"event_id":1269,"event_guid":"import-bb214036a3c1c15d6c","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1576,"event_guid":"import-7cd9b55eb4bc8147cb","weight":1},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":1},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1676,"event_guid":"import-d5a95005e665b332d7","weight":1},{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":2881,"event_guid":"4b81e057-d17d-4108-90c4-8b0b162cf6c0","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4621,"event_guid":"1742b794-0e16-6fdf-d35c-3264e549d11c","weight":1},{"event_id":5256,"event_guid":"c2474049-40f0-4d92-935e-e22090e3d343","weight":1},{"event_id":5274,"event_guid":"c38c514b-99f4-4906-a0e5-189df72dbd9e","weight":1},{"event_id":5287,"event_guid":"5d5e3275-0f1a-41ae-a1ad-a98ba66f1390","weight":1},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":1},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":1},{"event_id":6005,"event_guid":"67dbfc12-f4ad-4a4d-8370-118f1c72e98b","weight":1},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":1}]},{"guid":"import-006ecab1019284581b","title":"Politik hacken","subtitle":"Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation","slug":"28c3-4804-de-politik_hacken","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4804.en.html","description":"Klassischer Protest, konventionelle Demos, Online-Petitionen und Bürgerinitiativen werden seit einiger Zeit durch neue Instrumente der politischen Partizipation ergänzt. Deren Stärke liegt in dezentraler Organisation, Kommunikationsguerilla-Aktionen, diskursiver Intervention und kollaborativer Spontaneität. Der Vortrag stellt anhand von Beispielen ein Toolset an Möglichkeiten des regelverletzenden und gewaltfreien Mitmischens und Einmischens in Politik vor.\n","original_language":"eng","persons":["Alexander Müller","Bärwulf Kannitschreiber","Montserrat Graupenschläger"],"tags":["28c3"," Society and Politics"],"view_count":4703,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-16T21:30:06.638+01:00","length":3459,"duration":3459,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4804-de-politik_hacken_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4804-de-politik_hacken_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-006ecab1019284581b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-006ecab1019284581b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4804-de-politik_hacken","url":"https://api.media.ccc.de/public/events/import-006ecab1019284581b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":4},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":4},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":5},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":6},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":5},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":4},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":5},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":6},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":5},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":4},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":5},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":8},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":7},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":9},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":30},{"event_id":2477,"event_guid":"cb9bc487-84aa-4f9c-931a-6de0bdf25e43","weight":13},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":6},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":4},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":4},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":9},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":7},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":4},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":4},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":3},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":3},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":5},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":6},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":5}]},{"guid":"import-f1c3534cc5613af9ac","title":"Eating in the Anthropocene","subtitle":"Transgenic Fish, Mutagenic Grapefruits and Space Potatoes","slug":"28c3-4768-en-eating_in_the_anthropocene","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4768.en.html","description":"Over the last few years hackers have begun to take a larger interest in food, gastronomy and agriculture.  For many in the community the ability to create DIY molecular gastronomy hardware and recipes is an obvious entry point.  This talk extends some of these early investigations beyond the kitchen and the chemical properties of food by looking at specific cultivars, food technology organizations, and connections between food systems, ecosystems and planetary change.\n\nPart 1 of the talk explores some of the more bizarre and interesting biotechnologies and genomes that make up the human food system on planet earth, including Chinese Space Potatoes, Mutagenic Grapefruits and Glowing Sushi.  \n\nPat 2 of the talk presents ideas of food system redesign particularly relevant to hackers and food explorers: utopian cuisines, resilient biotechnologies and eaters as agents of selection.\n\nIn Part 3 we provide access to resources and propose interesting projects for black hat food hackers, DIY BIO foodies, and prospective food security researchers, such as mining the IAEA's database of radiation breeding, eating things that weren't meant to be eaten and defending agricultural biodiversity.\n\nBy introducing less known stories from the history of food and technology, and providing access to resources we hope to get more hackers curious about exploring, questioning and redesigning our human food systems.\n\nBIO: Zack Denfeld \u0026 Cathrine Kramer run the Center for Genomic Gastronomy an independent research institute that studies the genomes and biotechnologies that make up the human food systems on the planet.  They are currently in residence at Art Science Bangalore and a curating a show on the future of food at the Science Gallery in Dublin Ireland.  \n","original_language":"eng","persons":["Cathrine Kramer","Zack Denfeld"],"tags":["28c3"," Culture"],"view_count":47,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-02-27T14:45:07.352+01:00","length":3429,"duration":3429,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4768-en-eating_in_the_anthropocene_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4768-en-eating_in_the_anthropocene_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-f1c3534cc5613af9ac-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-f1c3534cc5613af9ac-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4768-en-eating_in_the_anthropocene","url":"https://api.media.ccc.de/public/events/import-f1c3534cc5613af9ac","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1601,"event_guid":"import-9aca5e310039f09031","weight":1},{"event_id":2197,"event_guid":"qRQclNxyOV7ZYPwbrXrw1Q","weight":1},{"event_id":2212,"event_guid":"4aOXU9cdQYbirV0Q-k5usw","weight":1},{"event_id":2238,"event_guid":"0hwHwiTLCTkE94bpOBOcVg","weight":1},{"event_id":2266,"event_guid":"4_Q4s48yg8FV08kvf9lbpQ","weight":1},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":1}]},{"guid":"import-f5ab96c8c21f4de278","title":"Counterlobbying EU institutions","subtitle":"How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet","slug":"28c3-4755-en-counterlobbying_eu_institutions","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4755.en.html","description":"Return of experience about opposing #censorship #ACTA #censilia #copywrong\nand promoting #openness and #netneutrality to the EU institutions.\n\nStrategic and tactical perspectives by two old and tired activists.\n","original_language":"eng","persons":["Christian Bahls - MOGiS e.V.","Jérémie Zimmermann"],"tags":["28c3"," Society and Politics"],"view_count":41,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-14T14:30:05.804+01:00","length":3519,"duration":3519,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4755-en-counterlobbying_eu_institutions_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4755-en-counterlobbying_eu_institutions_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-f5ab96c8c21f4de278-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-f5ab96c8c21f4de278-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4755-en-counterlobbying_eu_institutions","url":"https://api.media.ccc.de/public/events/import-f5ab96c8c21f4de278","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":1},{"event_id":1592,"event_guid":"import-890456a925714fed6b","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":3636,"event_guid":"a1a52c4c-8233-403b-8f04-db981df016c1","weight":1},{"event_id":6492,"event_guid":"bc545b26-8319-43fb-abc2-f624ef414ee8","weight":1},{"event_id":6693,"event_guid":"68eef21a-279b-5ac7-9a22-0d6e43c1d97f","weight":1},{"event_id":7242,"event_guid":"c156dd9a-f4f5-5374-8683-0f0a170063f8","weight":1}]},{"guid":"import-890456a925714fed6b","title":"Quantified-Self and OpenBCI Neurofeedback Mind-Hacking","subtitle":"Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers","slug":"28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4756.en.html","description":"Hacking Mind and Body – self knowledge through numbers and mental reprogramming\n\nSince ancient times humans were trying to improve themselves. Today we have open-source computer technology that helps us.\n\n","original_language":"eng","persons":["Christian Kleineidam","MetaMind Evolution"],"tags":["28c3"," Hacking"],"view_count":153,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-10-25T18:00:05.258+02:00","length":3942,"duration":3942,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-890456a925714fed6b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-890456a925714fed6b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking","url":"https://api.media.ccc.de/public/events/import-890456a925714fed6b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":200,"event_guid":"import-e6e7597a0d663e48ca","weight":1},{"event_id":1610,"event_guid":"import-f5ab96c8c21f4de278","weight":1},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":2089,"event_guid":"F4PROIwL9VVgBhW7SqnWNQ","weight":1},{"event_id":2196,"event_guid":"1J0sEDUwTplMXgNU2Q7hrw","weight":2},{"event_id":3752,"event_guid":"fc56c971-c65e-43ca-a92c-d98c7fb47bd6","weight":1},{"event_id":7294,"event_guid":"e442db46-0a05-4439-9bcf-21bca6f714a0","weight":1},{"event_id":7341,"event_guid":"7100ad0c-e4f3-4784-b707-46759cd3cb6a","weight":1},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":1},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":1}]},{"guid":"import-77160932cc8cb0a44f","title":"Hacker Jeopardy","subtitle":"Number guessing for geeks","slug":"28c3-4775-de-hacker_jeopardy","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4775.en.html","description":"The Hacker Jeopardy is a quiz show.\n","original_language":"eng","persons":["Ray","Stefan 'Sec' Zehl"],"tags":["28c3"," Show"],"view_count":2216,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-13T14:00:22.316+01:00","length":6976,"duration":6976,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4775-de-hacker_jeopardy_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4775-de-hacker_jeopardy_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-77160932cc8cb0a44f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-77160932cc8cb0a44f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4775-de-hacker_jeopardy","url":"https://api.media.ccc.de/public/events/import-77160932cc8cb0a44f","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":156,"event_guid":"import-c7e7d888608d4936d1","weight":8},{"event_id":781,"event_guid":"import-777375527796871e60","weight":8},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":6},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":5},{"event_id":1338,"event_guid":"import-a19180493d3c82f29b","weight":9},{"event_id":1426,"event_guid":"import-65c32b95bca41915d5","weight":12},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":18},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":5},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":4},{"event_id":1588,"event_guid":"import-c8025284c9938a2c87","weight":4},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":38},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":25},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":20}]},{"guid":"import-7cd9b55eb4bc8147cb","title":"Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies","subtitle":null,"slug":"28c3-4897-en-keynote","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4897.en.html","description":"While it's old news that authoritarian regimes regularly rely on censorship and surveillance technology supplied to them by Western companies, 2011 was a year (thanks, in part, to the Arab Spring) when it became a hot issue in the public debate. While politicians on both sides of the Atlantic have recently committed to ban the sale of such technologies to dictators, it's not clear whether such measures would prove effective (or merely drive the sale of such technologies underground) or simply stimulate the growth of Chinese, Russian and Indian companies. More disturbingly, there is still very little awareness – at least among the general public – that many of the tools that are currently exported to authoritarian states have been designed to help fight \"The Global War On Terror\" and are thus inextricably linked to domestic policies of Western states.\n","original_language":"eng","persons":["Evgeny Morozov"],"tags":["28c3"," Society and Politics"],"view_count":69,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-12-26T09:30:03.566+01:00","length":3652,"duration":3652,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4897-en-keynote_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4897-en-keynote_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-7cd9b55eb4bc8147cb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-7cd9b55eb4bc8147cb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4897-en-keynote","url":"https://api.media.ccc.de/public/events/import-7cd9b55eb4bc8147cb","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":587,"event_guid":"import-b20e9d3ca688a824a2","weight":2},{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":1},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1721,"event_guid":"BRHpBVii4wmCt1nd94vCYg","weight":1},{"event_id":2489,"event_guid":"3c63452c-e0ae-4375-88f3-d9c16029487a","weight":1},{"event_id":2499,"event_guid":"fc4e6338-452d-48c3-a21b-ecdcb658bce7","weight":1},{"event_id":2509,"event_guid":"0db2a162-8c2c-41cb-b027-15a243bede43","weight":1},{"event_id":2532,"event_guid":"b1e09252-9961-43ad-a4c5-3d19d798c9dd","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":4371,"event_guid":"509a87d3-75dd-4ea1-b2ca-79b03ff90749","weight":1},{"event_id":5771,"event_guid":"226378b4-80f1-4bd5-bf02-49ec5a3ac34c","weight":1}]},{"guid":"import-7ff6454ab2125d8918","title":"Implementation of MITM Attack on HDCP-Secured Links","subtitle":"A non-copyright circumventing application of the HDCP master key","slug":"28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4686.en.html","description":"A man-in-the-middle attack on HDCP-secured video links is demonstrated. The attack is implemented on an embedded Linux platform, with the help of a Spartan-6 FPGA, and is capable of operating real-time on HD video links. It utilizes the HDCP master key to derive the corresponding private keys of the video source and sink through observation and computation upon the exchanged public keys. The man-in-the-middle then genlocks its raster and cipher state to the incoming video stream, enabling it to do pixel by pixel swapping of encrypted data. Since the link does no CRC or hash verification of the data, one is able to forge video using this method.\n","original_language":"eng","persons":["bunnie"],"tags":["28c3"," Hacking"],"view_count":258,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-16T23:15:07.224+01:00","length":2737,"duration":2737,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-7ff6454ab2125d8918-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-7ff6454ab2125d8918-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links","url":"https://api.media.ccc.de/public/events/import-7ff6454ab2125d8918","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":2},{"event_id":1764,"event_guid":"PuDWTZPratvP-gVrrPScWQ","weight":7},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":2},{"event_id":2205,"event_guid":"gRbk7OprwZBqF3cv0NddMQ","weight":7},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":20},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":6},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":2},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":2},{"event_id":3758,"event_guid":"14590762-b249-463b-9617-46d0f0d3f5b3","weight":3},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":5},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":2}]},{"guid":"import-37c1600436b10d0770","title":"Antiforensik","subtitle":"Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors","slug":"28c3-4828-de-antiforensik","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4828.en.html","description":"Antiforensik ist ein noch eher neues Thema und bekommt zunehmend mehr Bedeutung. IT-Forensik als Mittel zur Aufklärung von Sachverhalten kann vor Gericht aber auch in internen Ermittlungen maßgeblich für Freisprüche oder Schuldsprüche sorgen. Daher ist es besonders schlimm, wenn die dazu verwendeten Programme nicht korrekt arbeiten und sogar mit präparierten antiforensischen Aktionen angegriffen werden können. Der Vortrag zeigt eine bisher unbekannte und dennoch technisch einfache Sicherheitslücke in mindestens einer weltweit verwendeten Forensik-Suite und wie diese ausgenutzt werden kann: Hinzufügen von Ermittlungsergebnissen, Löschen/Verändern von Ermittlungsergebnissen, Infektion des Auswertesystems mit Malware.\n","original_language":"eng","persons":["Martin Wundram"],"tags":["28c3"," Hacking"],"view_count":663,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-18T13:30:08.361+01:00","length":1966,"duration":1966,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4828-de-antiforensik_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4828-de-antiforensik_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-37c1600436b10d0770-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-37c1600436b10d0770-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4828-de-antiforensik","url":"https://api.media.ccc.de/public/events/import-37c1600436b10d0770","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":7},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":7},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":6},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":4},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":4},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":5},{"event_id":1589,"event_guid":"import-b5560c445565b9f4d6","weight":3},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":3},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":5},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":3},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":2},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":3},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":4},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":3},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":4},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":3},{"event_id":1808,"event_guid":"QQSVk4IwhteVQcAB1CKVpA","weight":3},{"event_id":2281,"event_guid":"7f270061-0231-41d4-b50c-f1017231c534","weight":3},{"event_id":2395,"event_guid":"62b038eb-2975-4065-95ee-09a068dbfb81","weight":2},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":2},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":2},{"event_id":3009,"event_guid":"0bffe7b2-a0db-4827-9a64-33434bdc98e6","weight":2},{"event_id":3059,"event_guid":"fdf7190b-554d-49d8-bc51-4c7bafca0032","weight":2},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":3},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":3},{"event_id":3655,"event_guid":"04418c92-8483-4db1-b019-d3981270a625","weight":3},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":2},{"event_id":3709,"event_guid":"919752c2-5d10-4543-b4be-1b8178a14618","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":3},{"event_id":3744,"event_guid":"9039efe4-3282-47d2-a0b5-630843e23304","weight":2},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":3770,"event_guid":"e3a9504b-8286-47ec-84cd-04a26af55ce9","weight":2},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":4},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":2}]},{"guid":"import-c3facc3aa246520845","title":"Deceiving Authorship Detection","subtitle":"Tools to Maintain Anonymity Through Writing Style \u0026 Current Trends in Adversarial Stylometry","slug":"28c3-4781-en-deceiving_authorship_detection","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4781.en.html","description":"Stylometry is the art of detecting authorship of a document based on the linguistic style present in the text. As authorship recognition methods based on machine learning have improved, they have also presented a threat to privacy and anonymity. We have developed two open-source tools, Stylo and Anonymouth, which we will release at 28C3 and introduce in this talk. Anonymouth aids individuals in obfuscating documents to protect identity from authorship analysis. Stylo is a machine-learning based authorship detection research tool that provides the basis for Anonymouth's decision making. We will also review the problem of stylometry and the privacy implications and present new research related to detecting writing style deception, threats to anonymity in short message services like Twitter, examine the implications for languages other than English, and release a large adversarial stylometry corpus for linguistic and privacy research purposes.\n","original_language":"eng","persons":["Michael Brennan","Rachel Greenstadt"],"tags":["28c3"," Hacking"],"view_count":117,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-10-20T16:15:04.428+02:00","length":3587,"duration":3587,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4781-en-deceiving_authorship_detection_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4781-en-deceiving_authorship_detection_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c3facc3aa246520845-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c3facc3aa246520845-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4781-en-deceiving_authorship_detection","url":"https://api.media.ccc.de/public/events/import-c3facc3aa246520845","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":229,"event_guid":"import-84ac09898882828ddb","weight":1},{"event_id":658,"event_guid":"import-e8c6d414f23a3f454d","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":2},{"event_id":1387,"event_guid":"import-5c5387aa75445aa216","weight":1},{"event_id":1397,"event_guid":"import-2b1382637728002976","weight":5},{"event_id":1398,"event_guid":"import-4cd820d77b40b4b492","weight":1},{"event_id":1400,"event_guid":"import-9e294baeb1da0041c3","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1475,"event_guid":"import-6494b3c268a64f31b0","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1528,"event_guid":"import-369383af4e5cdd7892","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1564,"event_guid":"import-6719b9183f1139890a","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":1},{"event_id":1663,"event_guid":"import-82881c96ab640740a1","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":2236,"event_guid":"xnYRHWIRybr3subP-h_1Wg","weight":5},{"event_id":2248,"event_guid":"SNW-UDgMBlqvbRHVTwhxpg","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2332,"event_guid":"c8fe75dc-bc24-4bf7-8b6d-a5ac76c48d0e","weight":1},{"event_id":2508,"event_guid":"ed4bcb3b-fe2d-4728-812d-a45dbd4d01db","weight":1},{"event_id":2587,"event_guid":"89b01590-66cd-4804-9235-f63f073da68d","weight":1},{"event_id":2606,"event_guid":"1a5e38be-fc45-4fdc-bac2-ef17824a4358","weight":1},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":1},{"event_id":2945,"event_guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","weight":1},{"event_id":3075,"event_guid":"703aa5ef-1a1d-4209-8251-1e9218f900a4","weight":1},{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":1},{"event_id":3104,"event_guid":"b2bc162c-1745-4f45-ba56-766b4174095b","weight":1},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3606,"event_guid":"1aa7a4c5-1a3f-444f-99fb-e9c7b4744794","weight":1},{"event_id":3698,"event_guid":"994082de-ef8e-4f8e-8c46-ec0eb110b845","weight":1},{"event_id":3724,"event_guid":"7deb971d-1768-4a56-93ed-fe0192a13025","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":3935,"event_guid":"MyOZv8w2nxuAu-7rgmsPnw","weight":1},{"event_id":3963,"event_guid":"f3fce63e-de39-5628-8725-02a461132428","weight":1},{"event_id":4244,"event_guid":"28840060-781a-4143-a9b3-fe19a0eaf06d","weight":1},{"event_id":4327,"event_guid":"afd789c4-9ac1-4b27-adcc-b4c2bad950d3","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":1},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":1},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":2},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":1},{"event_id":6196,"event_guid":"7116cc1b-3e28-569d-8c87-2c46715f9382","weight":1},{"event_id":6380,"event_guid":"e9095f5f-a38a-48da-b3d7-20da141b8b14","weight":1},{"event_id":6388,"event_guid":"4cc5cf9a-214f-4e7d-991f-199e9f0db8cc","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1},{"event_id":6512,"event_guid":"25c54ce3-598c-42ee-8832-52fe9deae7ad","weight":1}]},{"guid":"import-974e41c3857176ef9f","title":"String Oriented Programming","subtitle":"Circumventing ASLR, DEP, and Other Guards","slug":"28c3-4817-en-string_oriented_programming","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4817.en.html","description":"The protection landscape is changing and exploits are getting more and more sophisticated. Exploit generation toolkits can be used to construct exploits for specific applications using well-defined algorithms. We present such an algorithm for leveraging format strings and introduce string oriented programming.\n","original_language":"eng","persons":["Mathias Payer"],"tags":["28c3"," Hacking"],"view_count":113,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-09T00:00:10.245+01:00","length":2879,"duration":2879,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4817-en-string_oriented_programming_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4817-en-string_oriented_programming_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-974e41c3857176ef9f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-974e41c3857176ef9f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4817-en-string_oriented_programming","url":"https://api.media.ccc.de/public/events/import-974e41c3857176ef9f","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":1},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1546,"event_guid":"import-5066545b91f6a498b5","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":1},{"event_id":1588,"event_guid":"import-c8025284c9938a2c87","weight":1},{"event_id":1593,"event_guid":"import-b0589b01247d699e04","weight":2},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":1614,"event_guid":"import-a7f1f1ee62ed2fc9b9","weight":2},{"event_id":1615,"event_guid":"import-a12ea6cce80bbfdbef","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2227,"event_guid":"H1GEe9l64eUbo1oZXtLkEg","weight":2},{"event_id":2246,"event_guid":"5hkhmuwi5J8ZHMfd5k7veg","weight":1},{"event_id":2250,"event_guid":"Q41efHdmmnBkM5G8p6Wf_w","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2838,"event_guid":"777ec642-2866-4617-9789-91cba4a2b313","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":1},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":1},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3641,"event_guid":"b9ca38ea-fa88-48c4-8083-9415eee93fcb","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":1},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":1},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":2},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":2},{"event_id":4853,"event_guid":"7f293cf6-6d19-43ed-8aa7-7371e008bd45","weight":1},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":1}]},{"guid":"import-42e5588aaaf6ad5db2","title":"KinectFusion","subtitle":"Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera","slug":"28c3-4928-en-kinectfusion","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4928.en.html","description":"This project investigates techniques to track the 6DOF position of handheld depth sensing cameras, such as Kinect, as they move through space and perform high quality 3D surface reconstructions for interaction.\n","original_language":"eng","persons":["David Kim"],"tags":["28c3"," Science"],"view_count":142,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-08-02T11:45:03.573+02:00","length":3990,"duration":3990,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4928-en-kinectfusion_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4928-en-kinectfusion_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-42e5588aaaf6ad5db2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-42e5588aaaf6ad5db2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4928-en-kinectfusion","url":"https://api.media.ccc.de/public/events/import-42e5588aaaf6ad5db2","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1371,"event_guid":"import-f0dd38629978185349","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1685,"event_guid":"import-3e4a92a7169b065ca1","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":2256,"event_guid":"z84bCyzZ-xiYlyM83L5dig","weight":1},{"event_id":2276,"event_guid":"XGhOde-ujLyDS1gsvpebMg","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1}]},{"guid":"import-1c44de8b5aa0256538","title":"SCADA and PLC Vulnerabilities in Correctional Facilities","subtitle":"Tiffany Rad, Teague Newman, John Strauchs","slug":"28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4661.en.html","description":"Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publically available exploits along with evaluating vulnerabilities in electronic and physical security designs, Newman, Rad and Strauchs have discovered significant vulnerabilities in PLCs used in correctional facilities by being able to remotely flip the switches to “open” or “locked closed” on cell doors and gates. This talk will evaluate and demo SCADA systems and PLC vulnerabilities in correctional and government secured facilities while recommending solutions. \n","original_language":"eng","persons":["Teague","Tiffany Rad"],"tags":["28c3"," Hacking"],"view_count":125,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-29T20:15:16.498+01:00","length":3066,"duration":3066,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-1c44de8b5aa0256538-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-1c44de8b5aa0256538-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities","url":"https://api.media.ccc.de/public/events/import-1c44de8b5aa0256538","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":1},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":1},{"event_id":3272,"event_guid":"e2fff38d-16eb-52b0-872a-ef9f4489ed5c","weight":1},{"event_id":3705,"event_guid":"b8d9fac7-bbe6-40da-aa80-aed27f77a708","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":7}]},{"guid":"import-8fd39363e733cd1101","title":"Bitcoin - An Analysis","subtitle":null,"slug":"28c3-4746-en-bitcoin_an_analysis","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4746.en.html","description":"Bitcoin is the first distributed, digital currency.\nIt received a lot of attention recently as it questions\nthe state monopoly to issue legal tender. It relies\non distributed proof-of-work concepts to ensure \nmoney-like characteristics.\n","original_language":"eng","persons":["Kay Hamacher","Stefan Katzenbeisser"],"tags":["28c3"," Hacking"],"view_count":478,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-08T11:00:04.416+02:00","length":3755,"duration":3755,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4746-en-bitcoin_an_analysis_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4746-en-bitcoin_an_analysis_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-8fd39363e733cd1101-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-8fd39363e733cd1101-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4746-en-bitcoin_an_analysis","url":"https://api.media.ccc.de/public/events/import-8fd39363e733cd1101","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":701,"event_guid":"import-57e66dffd1c89bdcdb","weight":4},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":3},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":5},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":4},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":2},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":2},{"event_id":1982,"event_guid":"r7eKRmXhvzxdnpzkR3szlg","weight":2},{"event_id":2021,"event_guid":"xkSveT8eNqH8U3woDjR-eA","weight":2},{"event_id":2365,"event_guid":"157510b7-5154-4f7d-ac20-a680e45f53c1","weight":4},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":2},{"event_id":3564,"event_guid":"3dc712b9-9051-4005-8948-56d6344a2f41","weight":5},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":6},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":2},{"event_id":3783,"event_guid":"f31ced73-ec4f-4138-948e-0c2803af21de","weight":2},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":2}]},{"guid":"import-f08408f6dd676d9b53","title":"The future of cryptology: which 3 letters algorithm(s) could be our Titanic?","subtitle":"RMS Olympic, RMS Titanic, HMHS Britannic  vs Discrete Logarithm, Integer factorization, Conjectured hard problems","slug":"28c3-4710-en-the_future_of_cryptology","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4710.en.html","description":"The lessons and best practices of the titanic will be extracted. Are we ready?\n\nThis will be a co-presentation (Jean-Jacques Quisquater / David Samyde) and occasional friendly exchange, with point and counter-point of different contrasting views on the impact of solving integer factorization and some other difficult problem in cryptography.\n\nThe idea is to perform a provocative comparison between the 'unbreakable' RSA algorithm and the unsinkable Titanic.\n\nReceiving his RSA Conference Lifetime Achievement Award, Rivest said that it has not been demonstrated mathematically that factorization into primes is difficult. So “Factoring could turn out to be easy,” and according to him “maybe someone here will find the method”.\n\nSince 1994 and Shor's algorithm, the danger of quantum computer is known: breaking RSA in polynomial time. Factoring large numbers is conjectured to be computationally infeasible on classic non quantum computers. No efficient algorithm is known and the research in the last 30 years did not show enormous progress.\n\nIceberg existence is predicted but not shown yet.\n\nAccording to Rivest a variety of alternative schemes have been developed in the decades since RSA was published, and a new system could probably be adopted quickly.\n\nThis relies on solving factorization only, but several other cases can be considered, in some of them the action to replace RSA with a new algorithm could require more work than initially planned (solution to discrete logarithm).\n\nManaging the risk and the threat of the resolution of any major problem used in cryptography is crucial. This presentation challenges the conventional thinking using lessons learned from history.\n\nRSA users are everywhere so what could be the consequences of a break in the real world? What were the errors made on the Titanic? Can the best practices used be improved or just translated into a new scheme? What would be the impact of solving the RSA assumption on cryptography?\n\nThe outline is:\nHistory of factorization\nTitanic primes and RSA keys\nComplexity, classes of algorithms and practical costs\nRisk analysis and Threat management\nProbability estimation and proactive monitoring\nFrom best to worst case\nBest methods and lessons learned\nMultiple scenari\n(Im)possibility of accurate prediction\nWhat to expect and how to be ready\nConclusion\n\nAndrew Grove, former CEO of Intel said \"Only the paranoid survive\". Forecasting the presence of a strategic inflection point is hard. What to expect at the time of the next major cryptanalysis breakthrough? What history teaches? What remains to be done? Are we ready?\n","original_language":"eng","persons":["Jean-Jacques Quisquater ","Renaud Devaliere"],"tags":["28c3"," Hacking"],"view_count":94,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-12-18T22:15:03.740+01:00","length":3397,"duration":3397,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4710-en-the_future_of_cryptology_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4710-en-the_future_of_cryptology_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-f08408f6dd676d9b53-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-f08408f6dd676d9b53-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4710-en-the_future_of_cryptology","url":"https://api.media.ccc.de/public/events/import-f08408f6dd676d9b53","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":370,"event_guid":"import-0ef7bf7a41328a88a4","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1483,"event_guid":"import-d37adcac32db0b17c2","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1546,"event_guid":"import-5066545b91f6a498b5","weight":1},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":2},{"event_id":1594,"event_guid":"import-1c44de8b5aa0256538","weight":1},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":2},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":1},{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":1},{"event_id":1754,"event_guid":"NzP8F_rnRMmXIbb6zl1H8Q","weight":1},{"event_id":1841,"event_guid":"wX415KPkBVf8zeBPWdqT2Q","weight":1},{"event_id":1964,"event_guid":"pNGiD11kb37bp1iyWbii0g","weight":1},{"event_id":2153,"event_guid":"HLDDEFxCxCrQryx8fEacZw","weight":1},{"event_id":2161,"event_guid":"oI8n77eKy3Uz2Fklmk4hVQ","weight":2},{"event_id":2164,"event_guid":"XGqu620EKR92-WUWMXNRvA","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2385,"event_guid":"b55ec10e-b12f-40e0-bb25-4fee2f13ad86","weight":1},{"event_id":2414,"event_guid":"b27fffbe-258a-4bc9-a27c-f7558bcba446","weight":1},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":1},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":1},{"event_id":2904,"event_guid":"8b01d636-d39b-44b8-8d6f-fc03e47eae1b","weight":1},{"event_id":2940,"event_guid":"48219ef6-24b8-41ca-8cc0-ec309e4148e6","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3423,"event_guid":"77e35271-243a-4e79-8401-f94dd1b5711a","weight":1},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":1},{"event_id":4336,"event_guid":"962f467f-8c6b-44cc-98cd-673128a9aef5","weight":1},{"event_id":4485,"event_guid":"da208942-2be8-4f14-9466-ba8e7b74fca8","weight":1},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":1},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":1},{"event_id":5844,"event_guid":"ebaad1c6-9a60-510a-807b-976a18541fcc","weight":1},{"event_id":5880,"event_guid":"19f5c422-6da6-5813-a6c2-5ed7762dcf67","weight":1},{"event_id":6492,"event_guid":"bc545b26-8319-43fb-abc2-f624ef414ee8","weight":2},{"event_id":6549,"event_guid":"a9504e38-7f8e-4e2d-bf50-6cd69dbb60f9","weight":1},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":1}]},{"guid":"import-db10023d490c5866ad","title":"NOC Review","subtitle":"NOC Review about the Camp 2011 and the 28C3","slug":"28c3-4927-en-noc_review_28c3_camp","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4927.en.html","description":"A review about the camp and the congress network. Network layout, planning, setup, operation and finally the teardown.\n","original_language":"eng","persons":["Kay","Will Hargrave"],"tags":["28c3"," Hacking"],"view_count":209,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-01T15:15:16.279+01:00","length":2073,"duration":2073,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4927-en-noc_review_28c3_camp_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4927-en-noc_review_28c3_camp_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-db10023d490c5866ad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-db10023d490c5866ad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4927-en-noc_review_28c3_camp","url":"https://api.media.ccc.de/public/events/import-db10023d490c5866ad","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":16,"event_guid":"import-539bcb7fe84721a1b5","weight":1},{"event_id":31,"event_guid":"import-a05a76991aa031db49","weight":1},{"event_id":105,"event_guid":"import-699c2f9e58bb11f2d6","weight":3},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":4},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":3},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":5},{"event_id":1180,"event_guid":"import-5fa00c37cb75885d36","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1607,"event_guid":"import-ad556a07ac6390b289","weight":4},{"event_id":1638,"event_guid":"import-edaa0ada3bc5a12d59","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":5},{"event_id":1715,"event_guid":"import-91fa9b308b32d15504","weight":1},{"event_id":1763,"event_guid":"WbqegbTKG5YheKse8X4ZUw","weight":3},{"event_id":1792,"event_guid":"HsPfR-yh7Zg-N6kQo58UIQ","weight":1},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2274,"event_guid":"eddb2328-37c3-4e86-86cc-c8541d14b4d7","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3628,"event_guid":"4de841b2-0f34-494e-ba5b-0b79ba2c88cd","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":2},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":2},{"event_id":4372,"event_guid":"01d07c5c-8a4e-4dbf-acf5-126d738a1ddf","weight":3},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":3}]},{"guid":"import-c61c6c2185e39fe0a2","title":"From Press Freedom to the Freedom of information","subtitle":"Why every citizen should be concerned","slug":"28c3-4742-en-from_press_freedom_to_the_freedom_of_information","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4742.en.html","description":"This talk is about:\n- Information freedom and the issues for the citizens\n- RWB ressources: a “human network” \n- RWB needs: Get involved!\n","original_language":"eng","persons":["Reporters Without Borders"],"tags":["28c3"," Society and Politics"],"view_count":30,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-10-27T20:45:02.966+01:00","length":3148,"duration":3148,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c61c6c2185e39fe0a2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c61c6c2185e39fe0a2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4742-en-from_press_freedom_to_the_freedom_of_information","url":"https://api.media.ccc.de/public/events/import-c61c6c2185e39fe0a2","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":2},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":2},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":2}]},{"guid":"import-1343b743a0a62d96cf","title":"Your Disaster/Crisis/Revolution just got Pwned","subtitle":"Telecomix and Geeks without Bounds on Security and Crisis Response","slug":"28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4707.en.html","description":"Software is becoming more and more important in organizing response to all kinds of crises, whether that means activists responding to an unjust government or aid workers helping with the aftermath of a disaster.  Security often isn't the first thing people think about in these situations -- they have work to get done, just like the rest of us, and many of these tools are built in the heat of the moment.  In a crisis, a lack of security can make a small disaster into a big one.  In this talk, we'll look at real world experiences of the security and privacy problems in the field, and how to fix them, at both large and small levels.\n","original_language":"eng","persons":["Herr Urbach","willowbl00"],"tags":["28c3"," Hacking"],"view_count":62,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-11T12:30:15.000+01:00","length":2703,"duration":2703,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-1343b743a0a62d96cf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-1343b743a0a62d96cf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned","url":"https://api.media.ccc.de/public/events/import-1343b743a0a62d96cf","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":159,"event_guid":"import-ab478ca0d3df4201d0","weight":2},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":2},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":2}]},{"guid":"import-95d2940001b2300805","title":"Lightning Talks Day 3","subtitle":"Pecha Kucha Round!","slug":"28c3-4906-en-lightning_talks_day_3_pecha_kucha","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4906.en.html","description":"\n","original_language":"eng","persons":["Nick Farr"],"tags":["28c3"," Community"],"view_count":17,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-09-09T18:45:05.542+02:00","length":7691,"duration":7691,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-95d2940001b2300805-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-95d2940001b2300805-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4906-en-lightning_talks_day_3_pecha_kucha","url":"https://api.media.ccc.de/public/events/import-95d2940001b2300805","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1593,"event_guid":"import-b0589b01247d699e04","weight":3},{"event_id":1614,"event_guid":"import-a7f1f1ee62ed2fc9b9","weight":1},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":2777,"event_guid":"3d7c3f51-7e31-11e5-b91e-e74da05edcc2","weight":1},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":1},{"event_id":2822,"event_guid":"4c070a2c-0558-48b8-b612-b8507a51154e","weight":1},{"event_id":2828,"event_guid":"aa5412e2-c20a-4c4a-b4d7-fd97184a87fe","weight":1},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":5551,"event_guid":"1cde6c4f-3c96-5b27-ba65-a02fbe4138a3","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1}]},{"guid":"import-6e9147236a7cb3f1ce","title":"Power gadgets with your own electricity","subtitle":"escape the basement and make the sun work for you","slug":"28c3-4706-en-power_gadgets_with_your_own_electricity","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4706.en.html","description":"This talk, consisting of five distinct parts, is intended to show the audience how to get electricity without needing a grid connection.\nIt will give information on\n* Which energy sources to use\n* What to power with them\n* What equipment to get\n* How to wire it up\n* And some wishful thinking\nParticipants should be able to assemble their own small-scale energy-generating systems after listening.\n","original_language":"eng","persons":["Gunnar Thüle","Jörg Dürre"],"tags":["28c3"," Hacking"],"view_count":162,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-23T14:30:06.023+01:00","length":3791,"duration":3791,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4706-en-power_gadgets_with_your_own_electricity_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4706-en-power_gadgets_with_your_own_electricity_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6e9147236a7cb3f1ce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6e9147236a7cb3f1ce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4706-en-power_gadgets_with_your_own_electricity","url":"https://api.media.ccc.de/public/events/import-6e9147236a7cb3f1ce","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1352,"event_guid":"import-e99e455606bf183fcf","weight":1},{"event_id":1396,"event_guid":"import-75b2d58a4dc12e1a88","weight":1},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":2},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1545,"event_guid":"import-7c99fae19428fdbf5c","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":2},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":1},{"event_id":1717,"event_guid":"import-414f4552e787b88b7c","weight":1},{"event_id":1736,"event_guid":"VFu55BmcslSk-0RC0SZioA","weight":2},{"event_id":1744,"event_guid":"0eXymhGD4B5LSOSwUFnPfg","weight":1},{"event_id":2207,"event_guid":"lEFQRUU823FUOPqKG85vWg","weight":1},{"event_id":2228,"event_guid":"Rm1YndV-p_f5_NFEyPZMNA","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2252,"event_guid":"Lt7ABZNFLzAgdiGcpHPHUQ","weight":1},{"event_id":2918,"event_guid":"f4da28f8-1e28-45d4-9fab-d1d36d20ca7b","weight":1},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":1},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":1},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":1},{"event_id":7107,"event_guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","weight":1}]},{"guid":"import-dce44ea8bd3c4c8a82","title":"Not your Grandfathers moon landing","subtitle":"Hell yeah, it's Rocket Science 3.1415926535897932384626!","slug":"28c3-4821-en-not_your_grandfathers_moon_landing","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4821.en.html","description":"We got a new rover and it's much more awesome than last year!\nOk, there's a bit more to it :-)\n\nThe basics, we are team of part-time scientists and engineers who want to send a rover to the moon before the end of the year 2013.\nThere is a lot to be done towards this first private moon landing and we want to take the chance to explore what we want to do and show what we already accomplished in the past 12 months. The talk will feature important technical milestone like our very first R3 rover prototype and great events like the CCCamp11. \nThere is also be a live demonstration of the very first R3A rover right in the presentation.\n","original_language":"eng","persons":["Karsten Becker","Robert Böhme"],"tags":["28c3"," Making"],"view_count":58,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-24T20:00:09.479+01:00","length":3572,"duration":3572,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4821-en-not_your_grandfathers_moon_landing_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4821-en-not_your_grandfathers_moon_landing_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-dce44ea8bd3c4c8a82-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-dce44ea8bd3c4c8a82-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4821-en-not_your_grandfathers_moon_landing","url":"https://api.media.ccc.de/public/events/import-dce44ea8bd3c4c8a82","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":155,"event_guid":"import-0b5b1fe8443b7a4274","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":1074,"event_guid":"import-80ef475e269e070ff8","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":1},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":1},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1704,"event_guid":"import-a9812440f38232930c","weight":1},{"event_id":1762,"event_guid":"iGUI8vSrFaU8uQiDfjNt2w","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1797,"event_guid":"T9xtagBQuxQqbYH-xXXA2Q","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":1},{"event_id":2161,"event_guid":"oI8n77eKy3Uz2Fklmk4hVQ","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2440,"event_guid":"ebb6cc1d-59ee-415b-8077-7016a7242452","weight":1},{"event_id":2626,"event_guid":"ec53c07b-2519-4c4d-a23a-a4f3cfa67883","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":3723,"event_guid":"f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7","weight":1},{"event_id":3793,"event_guid":"a48cf7af-c38e-4a19-8713-13facdbc0fd9","weight":1},{"event_id":3805,"event_guid":"d5565688-a086-42e6-b8eb-17fa54e6fc3b","weight":1}]},{"guid":"import-ec49201b9a28338359","title":"Sovereign Keys","subtitle":"A proposal for fixing attacks on CAs and DNSSEC","slug":"28c3-4798-en-sovereign_keys","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4798.en.html","description":"This talk will describe the Sovereign Key system, an EFF proposal for improving the security of SSL/TLS connections against attacks that involve Certificate Authorities (CAs) or portions of the DNSSEC hierarchy.\n","original_language":"eng","persons":["Peter Eckersley"],"tags":["28c3"," Hacking"],"view_count":31,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-28T09:45:10.595+01:00","length":3879,"duration":3879,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4798-en-sovereign_keys_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4798-en-sovereign_keys_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ec49201b9a28338359-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ec49201b9a28338359-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4798-en-sovereign_keys","url":"https://api.media.ccc.de/public/events/import-ec49201b9a28338359","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1265,"event_guid":"import-e12b39e63d03acfbf4","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1508,"event_guid":"import-013a0ed46953531289","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1583,"event_guid":"import-11d95d8eb06a7bb8eb","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1683,"event_guid":"import-780e90a537db52bc88","weight":1},{"event_id":1768,"event_guid":"Fp5SK2hqNSDN6KeYzLwIRw","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1823,"event_guid":"iDmPzetx6AuUFOlW1qFWig","weight":1},{"event_id":2395,"event_guid":"62b038eb-2975-4065-95ee-09a068dbfb81","weight":1},{"event_id":2446,"event_guid":"725d37fb-0e6c-4ac0-9106-4cefa8e898ea","weight":1}]},{"guid":"import-883c7975dfe4f8c174","title":"ChokePointProject - Quis custodiet ipsos custodes?","subtitle":"Aggregating and Visualizing (lack of) Transparancy Data in near-realtime","slug":"28c3-4760-en-chokepointproject","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4760.en.html","description":"The object of the lecture is to present and discuss the chokepointproject. How it (will) attempt(s) to aggregate and visualize near-realtime global internetwork data and augment this visualisation with legislative, commercial(ownership) and circumvention information.\n","original_language":"eng","persons":["Ruben Bloemgarten"],"tags":["28c3"," Hacking"],"view_count":69,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-13T09:30:05.809+01:00","length":1605,"duration":1605,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4760-en-chokepointproject_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4760-en-chokepointproject_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-883c7975dfe4f8c174-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-883c7975dfe4f8c174-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4760-en-chokepointproject","url":"https://api.media.ccc.de/public/events/import-883c7975dfe4f8c174","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1545,"event_guid":"import-7c99fae19428fdbf5c","weight":1},{"event_id":1587,"event_guid":"import-a54618b083eeb9fc4d","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1690,"event_guid":"import-064796b399907c0283","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1701,"event_guid":"import-033a8737829e937cdb","weight":1},{"event_id":1707,"event_guid":"import-637333afe02a1de8d8","weight":1},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":5069,"event_guid":"84639ed6-fb5d-584a-a879-84e60b0cafd5","weight":1},{"event_id":5070,"event_guid":"a87a0521-6b12-5dca-851a-c32a13cc4581","weight":1},{"event_id":5075,"event_guid":"759bcf8b-b8d8-5087-9c02-0c2faa0ab8b4","weight":1},{"event_id":5083,"event_guid":"e340f48d-a241-5296-aea5-821917671506","weight":1},{"event_id":5085,"event_guid":"f64deec6-e13f-54e8-8afa-22cdcf9d8f81","weight":1},{"event_id":5088,"event_guid":"7a9b5382-8a68-5969-8891-045996c9870a","weight":1}]},{"guid":"import-5fe6dab8530ac65492","title":"CCC Camp 2011 Video Impressions","subtitle":"Reviving a nice summer dream","slug":"28c3-4932-de-camp_review_2011","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4932.en.html","description":"All of us who did attend are still dreaming. All of us who did not attend are still weeping. The CCCamp 2011. \n\nThis film recapitulates all the great moments that took place during summer this year. All the great moments. Really. All of them.\n\nEnglish and German with English subs (still improvable, though).\n","original_language":"eng","persons":[],"tags":["28c3"," Culture"],"view_count":1017,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-10T17:15:11.955+01:00","length":2580,"duration":2580,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4932-de-camp_review_2011_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4932-de-camp_review_2011_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-5fe6dab8530ac65492-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-5fe6dab8530ac65492-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4932-de-camp_review_2011","url":"https://api.media.ccc.de/public/events/import-5fe6dab8530ac65492","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":3},{"event_id":1476,"event_guid":"import-18ff532f1aae2ba415","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":2},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":3},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":2},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":3},{"event_id":1612,"event_guid":"import-708b15f151751c94c5","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1664,"event_guid":"import-1f512e050ec4558192","weight":1},{"event_id":1679,"event_guid":"import-48b0cf47c506fc757f","weight":1},{"event_id":1785,"event_guid":"GqBcTbWHQclHwDW_kI9yBQ","weight":1},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1},{"event_id":1838,"event_guid":"d9mVPvxx94qGILfKtmCAwA","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":2244,"event_guid":"a7cde3ca-46a8-4f0b-be61-f60e77f3418e","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2281,"event_guid":"7f270061-0231-41d4-b50c-f1017231c534","weight":1},{"event_id":2471,"event_guid":"a26b9be9-36ce-4a7f-9baa-4612251615c5","weight":1},{"event_id":2525,"event_guid":"55a2a1d7-f022-4e5a-8d24-568e42b8da23","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":2550,"event_guid":"3064add4-ab1e-4d05-84b8-d753b9733097","weight":2},{"event_id":2759,"event_guid":"ff3dc349-f733-4ba6-bc83-d4373fcc981d","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":2},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2888,"event_guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2898,"event_guid":"13789a83-1028-40a6-ac32-827b57ec3f8e","weight":1},{"event_id":2941,"event_guid":"56126bd1-f1b3-4bc7-81be-304b6b681cde","weight":1},{"event_id":2945,"event_guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","weight":1},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3746,"event_guid":"88cc14c0-8962-4906-9b37-06ff82ce159c","weight":3},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":1},{"event_id":3800,"event_guid":"aad42966-21c3-11e7-9b07-b7ec1ca97360","weight":1},{"event_id":3862,"event_guid":"7f97fb44-f121-4f16-8bf7-05800fb37bdf","weight":1},{"event_id":3933,"event_guid":"3c930882-c4ad-4b8d-985d-0157d33986df","weight":1},{"event_id":3963,"event_guid":"f3fce63e-de39-5628-8725-02a461132428","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":1},{"event_id":4210,"event_guid":"yFEJDQ5WlbBl5Y5cd3TCrw","weight":1},{"event_id":4217,"event_guid":"8da84e68-73c0-11e7-ac71-d3b143ff9640","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":6929,"event_guid":"76f25555-9427-5509-aa8a-9f7f8e4be83f","weight":3},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":2}]},{"guid":"import-bd2328a813340989bc","title":"Rootkits in your Web application","subtitle":"Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.","slug":"28c3-4811-en-rootkits_in_your_web_application","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4811.en.html","description":"XSS bugs are the most widely known and commonly occurring Web vulnerability,\nbut their impact has often been limited to cookie theft and/or simple actions,\nsuch as setting malicious email filters, stealing some data, or\nself-propagation via an XSS worm. In this work, I discuss practical approaches\nfor exploiting XSS and other client-side script injection attacks, and introduce\nnovel techniques for maintaining and escalating access within the victim's\nbrowser. In particular, I introduce the concept of _resident XSS_ where\nattacker-supplied code is running in the context of an affected user's main\napplication window and describe its consequences. I also draw analogies between\nsuch persistent Web threats and the traditional rootkit model, including\nsimilarities in the areas of embedding malicious code, maintaining access,\nstealthy communication with a C\u0026C server, and the difficulty of detecting and\nremoving attacker-supplied code.\n","original_language":"eng","persons":["Artur Janc"],"tags":["28c3"," Hacking"],"view_count":134,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-06-23T21:15:09.688+02:00","length":3382,"duration":3382,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4811-en-rootkits_in_your_web_application_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4811-en-rootkits_in_your_web_application_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-bd2328a813340989bc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-bd2328a813340989bc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4811-en-rootkits_in_your_web_application","url":"https://api.media.ccc.de/public/events/import-bd2328a813340989bc","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":31,"event_guid":"import-a05a76991aa031db49","weight":1},{"event_id":1166,"event_guid":"import-106c6a69092efb9c66","weight":1},{"event_id":1332,"event_guid":"import-35fc7dfee5f7a75c5f","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1710,"event_guid":"import-23969f74f61375b2c6","weight":1},{"event_id":1726,"event_guid":"w9UU1iDfP18QvWJ5i2VDsg","weight":1},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2199,"event_guid":"MBpSOQzfPD4ky0hqL6B-hg","weight":1},{"event_id":2227,"event_guid":"H1GEe9l64eUbo1oZXtLkEg","weight":2},{"event_id":2246,"event_guid":"5hkhmuwi5J8ZHMfd5k7veg","weight":1},{"event_id":2250,"event_guid":"Q41efHdmmnBkM5G8p6Wf_w","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2544,"event_guid":"2cce4d76-619d-4f60-b7e9-28e8ee9d6483","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":1},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":1},{"event_id":3093,"event_guid":"1682d8d8-6446-4629-ba26-3a5cd7157c67","weight":1},{"event_id":3366,"event_guid":"46647784-a003-5e87-9fcf-881d1c42efb6","weight":1},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":1},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3641,"event_guid":"b9ca38ea-fa88-48c4-8083-9415eee93fcb","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":4267,"event_guid":"e02b1946-a7ce-4779-a4c2-d120a43edd19","weight":1},{"event_id":6927,"event_guid":"9463b562-8353-562e-8484-f9cac7749407","weight":1}]},{"guid":"import-6a3a996a7bf3732340","title":"NPC - Nerds’ Pissing Contest","subtitle":"Mein Ruby ist besser als dein urxvt!","slug":"28c3-4722-de-dick_size_war_for_nerds","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4722.en.html","description":"Hier geht es um die Gretchenfrage: „Welches Tool ist das beste?“ Dabei treten zwei Teams gegeneinander an und müssen live verschiedene $RANDOM\\_NERD\\_TASK auf ihren eigenen Rechnern lösen. Wer dabei zeigt, dass sein Tool das schnellere, schlankere, mächtigere, längere, größere^w^w^w^wist, gewinnt. Durch das Programm führen Jan „git-zsh-keynote-firefox“ Wulfes und Benjamin „bzr-fish-latexbeamer-chrome“ Kellermann.\n","original_language":"eng","persons":["Benjamin Kellermann","klobs"],"tags":["28c3"," Show"],"view_count":887,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-17T13:15:05.897+01:00","length":6043,"duration":6043,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4722-de-dick_size_war_for_nerds_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4722-de-dick_size_war_for_nerds_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6a3a996a7bf3732340-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6a3a996a7bf3732340-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4722-de-dick_size_war_for_nerds","url":"https://api.media.ccc.de/public/events/import-6a3a996a7bf3732340","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":3},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":2},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":2},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":3},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":4},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":2},{"event_id":1646,"event_guid":"import-3f6920f8040f18da31","weight":2},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":2},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":2},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":2},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":2},{"event_id":2888,"event_guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","weight":4},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":2},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":3},{"event_id":2978,"event_guid":"1e7ea0be-38c8-47f2-99bb-9f0ce71a53ee","weight":4},{"event_id":3624,"event_guid":"600ca67d-e18d-49d8-8e5d-08d5b38ec528","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":2},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":2},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":3},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":2},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":2}]},{"guid":"import-7cc65ec6f710a801aa","title":"Behind the scenes of a C64 demo","subtitle":null,"slug":"28c3-4814-en-behind_the_scenes_of_a_c64_demo","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4814.en.html","description":"C64 \"demos\" were the root of the whole demo-scene-thing and they are still the main force keeping the C64 alive today. Audiovisual pleasure, still pushing hardware limits, still exploring different ways of expression. But what is typically happening inside the machine when you watch a demo? What effort is needed to entertain the audience? This talk will give you an inside look at the steps taken for the award winning demo \"Error 23\" given first hand by one of its main programmers.\n","original_language":"eng","persons":["Ninja / The Dreams"],"tags":["28c3"," Hacking"],"view_count":587,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-04T22:30:08.192+01:00","length":3792,"duration":3792,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-7cc65ec6f710a801aa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-7cc65ec6f710a801aa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4814-en-behind_the_scenes_of_a_c64_demo","url":"https://api.media.ccc.de/public/events/import-7cc65ec6f710a801aa","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":5},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":2},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":9},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":4},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":4},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":3},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":5},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":3},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":3},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":3},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":4},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":11},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":5},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":3},{"event_id":2162,"event_guid":"_lVlmBO98KMg4M-n-_A3FA","weight":3},{"event_id":2199,"event_guid":"MBpSOQzfPD4ky0hqL6B-hg","weight":4},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":3},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":3},{"event_id":3403,"event_guid":"ca11e7f4-633d-4ae8-aff6-b1b90e15fc12","weight":6}]},{"guid":"import-c42d9394e53b2def7c","title":"Macro dragnets: Why trawl the river when you can do the whole ocean","subtitle":"What happens when data collection goes awry in the 21st century","slug":"28c3-4813-en-macro_dragnets","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4813.en.html","description":"As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next.   \n","original_language":"eng","persons":["Redbeard"],"tags":["28c3"," Hacking"],"view_count":59,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-25T20:30:10.873+01:00","length":3624,"duration":3624,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4813-en-macro_dragnets_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4813-en-macro_dragnets_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c42d9394e53b2def7c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c42d9394e53b2def7c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4813-en-macro_dragnets","url":"https://api.media.ccc.de/public/events/import-c42d9394e53b2def7c","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1371,"event_guid":"import-f0dd38629978185349","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1592,"event_guid":"import-890456a925714fed6b","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":1685,"event_guid":"import-3e4a92a7169b065ca1","weight":1},{"event_id":1736,"event_guid":"VFu55BmcslSk-0RC0SZioA","weight":1},{"event_id":1750,"event_guid":"jFlUl2VQF7jfm3M4V2Iuiw","weight":1},{"event_id":1767,"event_guid":"BK1ziXHv5du-_NJN24p9lA","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":2256,"event_guid":"z84bCyzZ-xiYlyM83L5dig","weight":1},{"event_id":2276,"event_guid":"XGhOde-ujLyDS1gsvpebMg","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2514,"event_guid":"045e7aa9-5e12-4baf-98b2-e3fd31159851","weight":1},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":1},{"event_id":3312,"event_guid":"1a1e0a43-8fb7-5149-baa4-64725600a6c4","weight":2},{"event_id":3596,"event_guid":"b8e0eb47-4832-4726-bc9b-9015bd96becf","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3648,"event_guid":"8aaa55ad-b426-4d7a-8d46-f4b34a906eda","weight":1},{"event_id":3661,"event_guid":"599ef527-fc3f-4474-8137-cf0e49cf118f","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3723,"event_guid":"f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3728,"event_guid":"094b6119-b261-4750-89cf-43fed50eb679","weight":1},{"event_id":3732,"event_guid":"8270c91a-d6e2-4f1c-9ebb-cdf10708d921","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3745,"event_guid":"97570300-6590-45c9-a477-ab629f92a3b1","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3749,"event_guid":"e26852ae-9efe-47a0-9e65-3bbd120f7422","weight":1},{"event_id":3752,"event_guid":"fc56c971-c65e-43ca-a92c-d98c7fb47bd6","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":3963,"event_guid":"f3fce63e-de39-5628-8725-02a461132428","weight":1},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":1},{"event_id":5279,"event_guid":"baef3860-9786-4917-a46c-5ddd4fdac22e","weight":1}]},{"guid":"import-950ce3bbed73872ac6","title":"EU-Datenschutz und das Internet der Dinge (english translation)","subtitle":null,"slug":"28c3-4935-en-eu_datenschutz_internet_der_dinge","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4935.en.html","description":"Derzeit arbeitet die EU-Kommission an der Modernisierung der Datenschutzrichtlinie. Dieser Beitrag informiert über den Stand der Dinge.\n","original_language":"eng","persons":["Andreas Krisch"],"tags":["28c3"," Society and Politics"],"view_count":24,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-01-31T21:15:04.566+01:00","length":3243,"duration":3243,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4935-en-eu_datenschutz_internet_der_dinge_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4935-en-eu_datenschutz_internet_der_dinge_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-950ce3bbed73872ac6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-950ce3bbed73872ac6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4935-en-eu_datenschutz_internet_der_dinge","url":"https://api.media.ccc.de/public/events/import-950ce3bbed73872ac6","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":126,"event_guid":"import-176ad1853fc7e8cdd1","weight":1},{"event_id":1014,"event_guid":"import-2d921a0dfd44909fdd","weight":1},{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":2},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1562,"event_guid":"import-9bd054fef6a2a0b358","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":1},{"event_id":1570,"event_guid":"import-52fc6549033f1e7535","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1635,"event_guid":"import-6759f85503c389e44a","weight":1},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":1},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":1},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":1},{"event_id":1761,"event_guid":"DFXp3YBOM-2eU3_D89TSfQ","weight":1},{"event_id":1820,"event_guid":"glr14-wGaYxsV63N4TJZDQ","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3527,"event_guid":"32168b3e-a6b1-568e-ad2f-fff1f255789b","weight":1},{"event_id":3573,"event_guid":"61913062-cf39-57ad-9edb-79fce0898bda","weight":1},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3714,"event_guid":"6caf962e-8a5e-4dba-ab7e-d3b6a71dc376","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":1},{"event_id":3751,"event_guid":"3226a81b-dd11-42cc-8c14-ae9f95c01bbd","weight":1},{"event_id":3757,"event_guid":"9d6db804-1074-4116-8210-cca78b335a1a","weight":1}]},{"guid":"import-6e1975ef73fbf52e06","title":"How governments have tried to block Tor","subtitle":null,"slug":"28c3-4800-en-how_governments_have_tried_to_block_tor","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4800.en.html","description":"Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January\n2011 and September 2011. Bluecoat tested out a Tor handshake filter in\nSyria in June 2011. China has been harvesting and blocking IP addresses\nfor both public Tor relays and private Tor bridges for years.\n","original_language":"eng","persons":["Jacob Appelbaum","Roger Dingledine"],"tags":["28c3"," Hacking"],"view_count":551,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-07T18:45:05.533+02:00","length":5139,"duration":5139,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4800-en-how_governments_have_tried_to_block_tor_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6e1975ef73fbf52e06-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6e1975ef73fbf52e06-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4800-en-how_governments_have_tried_to_block_tor","url":"https://api.media.ccc.de/public/events/import-6e1975ef73fbf52e06","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":977,"event_guid":"import-7066236907169c00ee","weight":3},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":4},{"event_id":1175,"event_guid":"import-292594cb78d63e1b71","weight":4},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":2},{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":4},{"event_id":1496,"event_guid":"import-19a0b1ea628b75e61a","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":2},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":2},{"event_id":1595,"event_guid":"import-b00e23ddd70d2f59fb","weight":3},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1618,"event_guid":"import-160908ea0f2a12fad8","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":3},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1683,"event_guid":"import-780e90a537db52bc88","weight":1},{"event_id":1710,"event_guid":"import-23969f74f61375b2c6","weight":4},{"event_id":1716,"event_guid":"import-15e4361b2ab005ddb4","weight":4},{"event_id":1726,"event_guid":"w9UU1iDfP18QvWJ5i2VDsg","weight":2},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":2},{"event_id":1743,"event_guid":"i5TMBRf_-3TiDrceuY3osQ","weight":2},{"event_id":1776,"event_guid":"bucvwuHzaSgt7x_L06ZcFA","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":5},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":5},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":2},{"event_id":2165,"event_guid":"hnRe8t6JYI_8PYnFh-dsug","weight":1},{"event_id":2192,"event_guid":"lWgvj2btOjK-_XxUtIs-qw","weight":1},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":8},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":7},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":2},{"event_id":2927,"event_guid":"f6149460-a278-4600-bf9d-61ea737c46de","weight":1},{"event_id":2928,"event_guid":"7504eeb1-1665-47fd-b21a-601d2641c41c","weight":1},{"event_id":2941,"event_guid":"56126bd1-f1b3-4bc7-81be-304b6b681cde","weight":1},{"event_id":2943,"event_guid":"969bee9e-d0bf-4d24-a649-15f93747d608","weight":1},{"event_id":2995,"event_guid":"23135566-f6b9-4e08-b7a0-c7454a8e0b23","weight":1},{"event_id":3260,"event_guid":"57da1a0c-b6c4-5f9a-b2ad-9bc87b5c456f","weight":1},{"event_id":3517,"event_guid":"f7ae6cb1-a660-59a3-9e86-e61f8b903c1c","weight":1},{"event_id":3554,"event_guid":"84e9ccad-5efe-49ac-b117-b382ae6fac1f","weight":1},{"event_id":3598,"event_guid":"f75d0531-ac47-4edd-99bd-9eadd836982a","weight":1},{"event_id":3612,"event_guid":"c92203a0-9158-4111-ab52-5dacd0e46c73","weight":1},{"event_id":3626,"event_guid":"c3844820-b5ed-4b12-9094-cfc67aff60be","weight":2},{"event_id":3666,"event_guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3698,"event_guid":"994082de-ef8e-4f8e-8c46-ec0eb110b845","weight":1},{"event_id":3699,"event_guid":"0d02bd82-f771-471c-b4bb-5e24b755b169","weight":1},{"event_id":3703,"event_guid":"65833373-6cae-4f9d-947b-c93a83ff1ba1","weight":1},{"event_id":3706,"event_guid":"3f76be27-6ff5-4a23-a6c6-512eaff00f28","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4264,"event_guid":"9b45fac3-3ccb-4778-abf1-cc564467ede1","weight":1},{"event_id":4378,"event_guid":"9354a78d-e3e6-430c-ad22-4101401d9ecd","weight":2},{"event_id":4971,"event_guid":"bac4a0c4-8ee0-485d-8fc8-92ea06357881","weight":2}]},{"guid":"import-ffd70d7435e43e1a5e","title":"Smart Hacking For Privacy","subtitle":null,"slug":"28c3-4754-en-smart_hacking_for_privacy","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4754.en.html","description":"Advanced metering devices (aka smart meters) are nowadays being installed throughout electric networks in Germany, in other parts of Europe and in the United States. Due to a recent amendment especially in Germany they become more and more popular and are obligatory for new and refurbished buildings.\n","original_language":"eng","persons":["Dario Carluccio","Stephan Brinkhaus"],"tags":["28c3"," Hacking"],"view_count":376,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-28T21:30:04.915+01:00","length":3616,"duration":3616,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4754-en-smart_hacking_for_privacy_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4754-en-smart_hacking_for_privacy_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ffd70d7435e43e1a5e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ffd70d7435e43e1a5e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4754-en-smart_hacking_for_privacy","url":"https://api.media.ccc.de/public/events/import-ffd70d7435e43e1a5e","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":2},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":2},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":2},{"event_id":1717,"event_guid":"import-414f4552e787b88b7c","weight":3},{"event_id":1934,"event_guid":"tFBTD_3Ih6LzwUZFnvCYqA","weight":6},{"event_id":3612,"event_guid":"c92203a0-9158-4111-ab52-5dacd0e46c73","weight":2},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":2},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":3},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":6},{"event_id":3880,"event_guid":"da855d30-e440-49f1-b811-afac8cd3ed43","weight":10},{"event_id":4115,"event_guid":"f83ea741-df6d-5ca3-8869-43d3ba51bd8e","weight":5}]},{"guid":"import-6942ef79beefffaaf3","title":"The coming war on general computation","subtitle":"The copyright war was just the beginning","slug":"28c3-4848-en-the_coming_war_on_general_computation","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4848.en.html","description":"The last 20 years of Internet policy have been dominated by the copyright war, but the war turns out only to have been a skirmish. The coming century will be dominated by war against the general purpose computer, and the stakes are the freedom, fortune and privacy of the entire human race.\n","original_language":"eng","persons":["Cory Doctorow"],"tags":["28c3"," Society and Politics"],"view_count":2648,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-07T16:30:07.564+02:00","length":3274,"duration":3274,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4848-en-the_coming_war_on_general_computation_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4848-en-the_coming_war_on_general_computation_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6942ef79beefffaaf3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6942ef79beefffaaf3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4848-en-the_coming_war_on_general_computation","url":"https://api.media.ccc.de/public/events/import-6942ef79beefffaaf3","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":19},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":34},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":12},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":9},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":11},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":5},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":6},{"event_id":1664,"event_guid":"import-1f512e050ec4558192","weight":1},{"event_id":1679,"event_guid":"import-48b0cf47c506fc757f","weight":1},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":2},{"event_id":1785,"event_guid":"GqBcTbWHQclHwDW_kI9yBQ","weight":2},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":75},{"event_id":2504,"event_guid":"d0042aa3-5e7a-4a64-8bb5-c0cf4d639b1a","weight":3},{"event_id":2867,"event_guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2888,"event_guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2898,"event_guid":"13789a83-1028-40a6-ac32-827b57ec3f8e","weight":4},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":3},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":4},{"event_id":2941,"event_guid":"56126bd1-f1b3-4bc7-81be-304b6b681cde","weight":1},{"event_id":2942,"event_guid":"269e7320-2133-4981-9238-e5fc8305a3e4","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3641,"event_guid":"b9ca38ea-fa88-48c4-8083-9415eee93fcb","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3741,"event_guid":"725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c","weight":1},{"event_id":3757,"event_guid":"9d6db804-1074-4116-8210-cca78b335a1a","weight":1},{"event_id":3758,"event_guid":"14590762-b249-463b-9617-46d0f0d3f5b3","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":5},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":5},{"event_id":6009,"event_guid":"a8945808-334b-4383-809a-d80d9be6e07f","weight":3},{"event_id":6078,"event_guid":"8a3c7006-ba7f-451c-a555-3a9ca4af5f2f","weight":6},{"event_id":6358,"event_guid":"bc8c2220-646b-4f45-86d9-5b2dd07f920f","weight":2},{"event_id":6360,"event_guid":"d640c62b-d4c1-4d31-bc97-63e5747f1424","weight":2},{"event_id":6365,"event_guid":"249fbe57-2fe1-4a79-98f3-e4ff160dfb2b","weight":4}]},{"guid":"import-11d95d8eb06a7bb8eb","title":"Taking control over the Tor network","subtitle":null,"slug":"28c3-4581-en-taking_control_over_the_tor_network","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4581.en.html","description":"This talk deals with weaknesses identified in the TOR network protocol and cryptography implementation. We manage to take control over users using this network and to access all your information and data exchanged despite cryptography.\n","original_language":"eng","persons":["Eric Filiol","Seun Omosowon"],"tags":["28c3"," Hacking"],"view_count":134,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-05-23T17:30:04.721+02:00","length":4053,"duration":4053,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4581-en-taking_control_over_the_tor_network_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4581-en-taking_control_over_the_tor_network_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-11d95d8eb06a7bb8eb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-11d95d8eb06a7bb8eb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4581-en-taking_control_over_the_tor_network","url":"https://api.media.ccc.de/public/events/import-11d95d8eb06a7bb8eb","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":387,"event_guid":"import-5826ba55fcf1c9c37c","weight":1},{"event_id":401,"event_guid":"import-1b04c3cadf7986cda5","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":1},{"event_id":1413,"event_guid":"import-15e012cd8c759b0240","weight":1},{"event_id":1502,"event_guid":"import-4aa02978eff75860c4","weight":1},{"event_id":1533,"event_guid":"import-d05f362a5a58b95e00","weight":2},{"event_id":1540,"event_guid":"import-bee058f77897330ce0","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1559,"event_guid":"import-ec49201b9a28338359","weight":1},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1661,"event_guid":"import-f96ec72f41d4dca7d6","weight":1},{"event_id":1714,"event_guid":"import-b660dec4d932230337","weight":1},{"event_id":1716,"event_guid":"import-15e4361b2ab005ddb4","weight":1},{"event_id":1768,"event_guid":"Fp5SK2hqNSDN6KeYzLwIRw","weight":1},{"event_id":1801,"event_guid":"I1Wkt7x8Yy2ZnP2kOGAuXA","weight":1},{"event_id":1823,"event_guid":"iDmPzetx6AuUFOlW1qFWig","weight":1},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3703,"event_guid":"65833373-6cae-4f9d-947b-c93a83ff1ba1","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3818,"event_guid":"adb3ca92-d333-4a8d-b44a-09b3bbb75656","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":1},{"event_id":7910,"event_guid":"b0b3fa50-d9db-511a-9fb1-9edb96bd3401","weight":1},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":1}]},{"guid":"import-54bf3922b45e891012","title":"DC+, The Protocol","subtitle":"Technical defense against data retention law","slug":"28c3-4723-en-dc_plus_the_protocol","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4723.en.html","description":"The idea of Dining Cryptographers-Networks (DC) offers a much better anonymity compared to MIX-Networks: Defined anonymity sets, no need to trust in a central service, no possible attack for data retention.\n","original_language":"eng","persons":["klobs"],"tags":["28c3"," Hacking"],"view_count":105,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-06-18T16:15:05.942+02:00","length":2512,"duration":2512,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4723-en-dc_plus_the_protocol_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4723-en-dc_plus_the_protocol_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-54bf3922b45e891012-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-54bf3922b45e891012-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4723-en-dc_plus_the_protocol","url":"https://api.media.ccc.de/public/events/import-54bf3922b45e891012","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":2},{"event_id":1216,"event_guid":"import-4b94dd0c19479fda5f","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2}]},{"guid":"import-6719b9183f1139890a","title":"Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All","subtitle":null,"slug":"28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4741.en.html","description":"In his now (in)famous pamphlet \"Conspiracy as Governance\" Julian Assange (JA) argues about the need for leaking as an efficient way to destroy \"unjust\" groups as the neo-feudalistic ones - luring the conspiracy theory leaning hacker community into his belief system. Eventually, JA used a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for \"just\" and \"unjust\" systems, arriving at the conclusion that \"unjust\" systems are hurt more and thus will be less viable, essentially being destroyed by more \"just\" systems. While an innovative proposal, the underlying assumptions on complexity, network theory, and especially the evolutionary perspectives were never critically assessed. Some blogs and media raised questions on details and potential threats to innocent bystanders. Still, fundamental problems with the philosophy were never addressed.\n\nThis paper argues against the general validity of such theories. In particular, we will refute some of the biologistic arguments. Theoretical biology has long ago pointed out the hidden complexity in evolutionary processes and as such the envisioned \"leaking revolution\" might be a limited artifact: there might even arise situations where the leaking envisioned and encouraged by Wikileaks and the like can actually strengthen some \"conspiracies\". \n\nIn this paper I will describe some research questions, that should be answered before given the “leaking philosophy” an unconditioned “thumbs-up”. Empirically, for example, a potential strengthening is illustrated by the rise of a 'neo-feudalistic economy', which is linked closely to the paradigm of \"intellectual property\" as it is to the security-financial-political complex. The players have effectively created a closed network or a \"conspiracy\" and might be resilient towards Wikileaks-like attacks. The paper concludes with an alternative to that proposal; in particular, a way to deal with the 'conspiracy' that might be coined the rise of the neo-feudalistic society (which in itself is a self-sustainable, self-amplifying feedback loop, not necessarily a conscious conspiracy). \n","original_language":"eng","persons":["Kay Hamacher"],"tags":["28c3"," Society and Politics"],"view_count":166,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-26T19:15:16.814+01:00","length":3469,"duration":3469,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6719b9183f1139890a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6719b9183f1139890a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all","url":"https://api.media.ccc.de/public/events/import-6719b9183f1139890a","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":162,"event_guid":"import-c103a561a60405ea5c","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":5},{"event_id":1292,"event_guid":"import-67317fc1b3b5c3dc8c","weight":1},{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":1},{"event_id":1368,"event_guid":"import-2f5b6d9d75ad65da1d","weight":4},{"event_id":1402,"event_guid":"import-b74c9460d5dffcccb1","weight":1},{"event_id":1421,"event_guid":"import-a01119ee5cfeb211c5","weight":1},{"event_id":1449,"event_guid":"import-a3ee01baf33d719c1b","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1684,"event_guid":"import-563270facd1ec3ab80","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1766,"event_guid":"R5Vdbjtyg_hFVmSLcqSJfg","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":3},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":2851,"event_guid":"62290f8e-f515-416f-9c4a-b403474e94e6","weight":3},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3677,"event_guid":"46f1b3cf-5cd4-4a6c-bb07-6ead116c2475","weight":1},{"event_id":3679,"event_guid":"9381b4e6-65b2-4879-9f7e-aec5a91d12f3","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3745,"event_guid":"97570300-6590-45c9-a477-ab629f92a3b1","weight":1},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":2},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4281,"event_guid":"271f3623-a772-4052-81da-04872d9651ce","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":1},{"event_id":4676,"event_guid":"a3898a69-9035-48ec-8389-5ac7b3f12e7f","weight":1},{"event_id":4698,"event_guid":"87de639d-024d-48d7-8955-3f529befc9f5","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1},{"event_id":6159,"event_guid":"c5760137-e34b-5996-9896-47b4a3823f73","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1},{"event_id":6428,"event_guid":"6c44067f-a011-48ec-b302-fbaff1260b78","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1}]},{"guid":"import-0263d58196a112ebec","title":"Effective Denial of Service attacks against web application platforms","subtitle":"We are the 99% (CPU usage)","slug":"28c3-4680-en-effective_dos_attacks_against_web_application_platforms","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4680.en.html","description":"This talk will show how a common flaw in the implementation of most of the popular web\nprogramming languages and platforms (including PHP, ASP.NET, Java, etc.) can\nbe (ab)used to force web application servers to use 99% of CPU for several\nminutes to hours for a single HTTP request.\n\nThis attack is mostly independent of the underlying web application and just\nrelies on a common fact of how web application servers typically work.\n","original_language":"eng","persons":["Alexander ‘alech’ Klink","Julian | zeri"],"tags":["28c3"," Hacking"],"view_count":337,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-01T15:45:06.374+02:00","length":3416,"duration":3416,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-0263d58196a112ebec-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-0263d58196a112ebec-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4680-en-effective_dos_attacks_against_web_application_platforms","url":"https://api.media.ccc.de/public/events/import-0263d58196a112ebec","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":460,"event_guid":"import-a06deb348ba5dc5997","weight":2},{"event_id":1135,"event_guid":"import-3d147238f2f1434907","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":5},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":3},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":4},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2}]},{"guid":"import-bd4b532fec427e30cb","title":"Can trains be hacked?","subtitle":"Die Technik der Eisenbahnsicherungsanlagen","slug":"28c3-4799-de-can_trains_be_hacked","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4799.en.html","description":"Warum sind Züge sicher unterwegs? Wie werden Zusammenstöße trotz der Gefahr eines menschlichen Fehlverhaltens vermieden? Und was hat das alles mit IT-Sicherheit zu tun?\n","original_language":"eng","persons":["Stefan Katzenbeisser"],"tags":["28c3"," Hacking"],"view_count":1763,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-30T19:00:06.448+02:00","length":3876,"duration":3876,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4799-de-can_trains_be_hacked_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4799-de-can_trains_be_hacked_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-bd4b532fec427e30cb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-bd4b532fec427e30cb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4799-de-can_trains_be_hacked","url":"https://api.media.ccc.de/public/events/import-bd4b532fec427e30cb","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":2},{"event_id":1528,"event_guid":"import-369383af4e5cdd7892","weight":4},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":3},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":5},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":3},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":6},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":2},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":3},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2824,"event_guid":"27260dd7-65b6-40ec-8929-2b96b45aa368","weight":14},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":5},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":3},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":4},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":5},{"event_id":4531,"event_guid":"4a584e33-5551-2020-2020-202020202020","weight":2},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":4},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":3},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":3}]},{"guid":"import-b0554205945a09137e","title":"Black Ops of TCP/IP 2011","subtitle":null,"slug":"28c3-4930-en-black_ops_of_tcpip_2011","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4930.en.html","description":"Black Ops of TCP/IP 2011, a cleanup of the BH USA talk.\n\n","original_language":"eng","persons":["Dan Kaminsky"],"tags":["28c3"," Hacking"],"view_count":512,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-24T21:15:09.522+01:00","length":3970,"duration":3970,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4930-en-black_ops_of_tcpip_2011_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4930-en-black_ops_of_tcpip_2011_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b0554205945a09137e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b0554205945a09137e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4930-en-black_ops_of_tcpip_2011","url":"https://api.media.ccc.de/public/events/import-b0554205945a09137e","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":169,"event_guid":"import-3eee1d460ed0c3da7c","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":1124,"event_guid":"import-ecb0e5ebfd05aa20b9","weight":2},{"event_id":1389,"event_guid":"import-5e05e9fcc28e3e5161","weight":3},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":2},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":4},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":2},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":5},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2}]},{"guid":"import-324570bd16ebe02b27","title":"Security Nightmares","subtitle":null,"slug":"28c3-4898-de-security_nightmares","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4898.en.html","description":"\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["28c3"," Hacking"],"view_count":662,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-27T00:15:06.330+01:00","length":5593,"duration":5593,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4898-de-security_nightmares_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4898-de-security_nightmares_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-324570bd16ebe02b27-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-324570bd16ebe02b27-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4898-de-security_nightmares","url":"https://api.media.ccc.de/public/events/import-324570bd16ebe02b27","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":6},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":3},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":4},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":9},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":3},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":15},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":10},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":3},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":34},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":4},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":3},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":6},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":3},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":26},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":13},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":5},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":6},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":8}]},{"guid":"import-ae0af31316a495be6a","title":"7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles","subtitle":"Lessons learned from producing a weekly independent podcast on international conflicts and concerns.","slug":"28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4816.en.html","description":"In 2004 I started a weekly podcast on international under-reported news based on a feeling that this was something I enjoy doing and I could be good at. \n","original_language":"eng","persons":["Bicyclemark"],"tags":["28c3"," Community"],"view_count":58,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-29T21:00:05.127+02:00","length":3426,"duration":3426,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ae0af31316a495be6a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ae0af31316a495be6a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles","url":"https://api.media.ccc.de/public/events/import-ae0af31316a495be6a","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1589,"event_guid":"import-b5560c445565b9f4d6","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1610,"event_guid":"import-f5ab96c8c21f4de278","weight":2},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":2}]},{"guid":"import-a12ea6cce80bbfdbef","title":"Data Mining the Israeli Census","subtitle":"Insights into a publicly available registry","slug":"28c3-4652-en-data_mining_the_israeli_census","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4652.en.html","description":"The entire Israeli civil registry database has been leaked to the internet several times over the past decade.\nIn this talk, we examine interesting data that can be mined and extracted from such database.\nAdditionally, we will review the implications of such data being publicly available in light of the upcoming biometric database.\n","original_language":"eng","persons":["Yuval Adam"],"tags":["28c3"," Hacking"],"view_count":109,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-05T01:45:04.035+01:00","length":1562,"duration":1562,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4652-en-data_mining_the_israeli_census_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4652-en-data_mining_the_israeli_census_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a12ea6cce80bbfdbef-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a12ea6cce80bbfdbef-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4652-en-data_mining_the_israeli_census","url":"https://api.media.ccc.de/public/events/import-a12ea6cce80bbfdbef","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":697,"event_guid":"import-6e41e3f78f87e167ab","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1049,"event_guid":"import-4d0f52c0d863e63b49","weight":1},{"event_id":1463,"event_guid":"import-8448c8cb5ca414407b","weight":1},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1546,"event_guid":"import-5066545b91f6a498b5","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1721,"event_guid":"BRHpBVii4wmCt1nd94vCYg","weight":1},{"event_id":1770,"event_guid":"piiLuOpnx-bTwU28WOUQWA","weight":1},{"event_id":1772,"event_guid":"seTBwtIxwEedOMpITZG7EQ","weight":1},{"event_id":1983,"event_guid":"HvR3MGqT1NqC3G3aIZJv7A","weight":1},{"event_id":1990,"event_guid":"APxc5qnadHeafxzU1z7FXw","weight":1},{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":1},{"event_id":2087,"event_guid":"Q6L18QbEioigZeg3rGDRCA","weight":1},{"event_id":2090,"event_guid":"c4gbQ38eY2kXHUabLC33uA","weight":1},{"event_id":2091,"event_guid":"T8J_lgEMOIf-ArYXZCguQQ","weight":1},{"event_id":2242,"event_guid":"p6g2YacbVEfuPkJ01kvHAw","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2351,"event_guid":"94e1281c-b1c8-46b3-82ad-6d6df6fe3580","weight":1},{"event_id":2520,"event_guid":"c992aea0-c7b2-4b8b-ae5e-758cabd0ca47","weight":1},{"event_id":2552,"event_guid":"32ff3348-9b9e-4d92-9e9b-7f6b81868d9c","weight":1},{"event_id":2676,"event_guid":"b1ef9c05-4ad8-4258-8fd7-9d937b630d1b","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":1},{"event_id":3043,"event_guid":"79e60f58-b2e7-4910-be32-f0a8896569e0","weight":1},{"event_id":3227,"event_guid":"0fd77819-0594-4127-bee3-a1d2fe7b1dd3","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":4385,"event_guid":"894154c3-eda0-4b17-ad5d-5bd4c0fc72f0","weight":1},{"event_id":4824,"event_guid":"5d255692-ae5e-4f96-b10e-55929d570813","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":1},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":1},{"event_id":6089,"event_guid":"165016fb-55bf-4512-a240-ddee32a9436a","weight":1}]},{"guid":"import-6fdeaba494d8699165","title":"New Ways I'm Going to Hack Your Web App","subtitle":null,"slug":"28c3-4761-en-new_ways_im_going_to_hack_your_web_app","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4761.en.html","description":"Writing secure code is hard.  Even when people do it basically right there are sometimes edge cases that can be exploited. Most the time writing code that works isn’t even the hard part,  it’s keeping up with the changing attack techniques while still keeping an eye on all the old issues that can come back to bite you, straddling the ancient world of the 90’s RFCs and 2010’s HTML5 compatible browsers.  A lot like how Indiana Jones bridges the ancient and the modern...  Except for Indiana Jones 4. Let’s never talk about that again. Ever.\n \nTake Facebook, Office 365, Wordpress, Exchange, and Live. These are applications that had decent mitigations to standard threats, but they all had edge cases. Using a mix of old and new ingredients, we’ll provide a sampler plate of clickjacking protection bypasses, CSRF mitigation bypasses, \"non-exploitable\" XSS attacks that are suddenly exploitable and XML attacks where you can actually get a shell; and we'll talk about how to defend against these attacks.\n","original_language":"eng","persons":["Jesse Ou","Rich"],"tags":["28c3"," Hacking"],"view_count":206,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-08-11T12:30:08.495+02:00","length":3551,"duration":3551,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6fdeaba494d8699165-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6fdeaba494d8699165-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4761-en-new_ways_im_going_to_hack_your_web_app","url":"https://api.media.ccc.de/public/events/import-6fdeaba494d8699165","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":2},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":2},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":2},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":2},{"event_id":1545,"event_guid":"import-7c99fae19428fdbf5c","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":4},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":2},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":2},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":6},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":3},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":4},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":2},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":3},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":3},{"event_id":5636,"event_guid":"ba118e5f-1c35-585c-91f6-9477b0c64897","weight":3}]},{"guid":"import-743191fd7e877fb432","title":"The engineering part of social engineering","subtitle":"Why just lying your way in won't get you anywhere","slug":"28c3-4856-en-the_engineering_part_of_social_engineering","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4856.en.html","description":"All the talks i saw about SE so far just showed which good SE's the speakers are. I try to do another approach, what if i get in and don't know what to do then. The talk is about the reconn. before the assessment, the different approaches of SE. Which techniques can one use, how to do a proper intel. and what is useful. How things work and more important why. Which skill set should one have before entering a engagement. And last but not least how do one counter a SE attack.\n","original_language":"eng","persons":["Aluc"],"tags":["28c3"," Hacking"],"view_count":229,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-11T12:30:20.605+01:00","length":3145,"duration":3145,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4856-en-the_engineering_part_of_social_engineering_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4856-en-the_engineering_part_of_social_engineering_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-743191fd7e877fb432-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-743191fd7e877fb432-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4856-en-the_engineering_part_of_social_engineering","url":"https://api.media.ccc.de/public/events/import-743191fd7e877fb432","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":157,"event_guid":"import-0ac93750a395b0f59f","weight":7},{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":8},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":2},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":5},{"event_id":1590,"event_guid":"import-6e9147236a7cb3f1ce","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":4},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":4},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":3},{"event_id":2354,"event_guid":"85e042c6-c99a-4806-b458-3d2c9bcca279","weight":5},{"event_id":2643,"event_guid":"5098bd46-1d93-4d43-b453-5686b68c09b3","weight":2},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":2},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":2}]},{"guid":"import-a17dc159cb6895d8cd","title":"Fnord-Jahresrückblick","subtitle":"von Atomendlager bis Zensus","slug":"28c3-4866-de-fnord_jahresrueckblick","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4866.en.html","description":"Auch dieses Jahr werden wir euch wieder mit den Fnords des Jahres zu unterhalten suchen.\n","original_language":"eng","persons":["Felix von Leitner","Frank Rieger"],"tags":["28c3"," Community"],"view_count":1669,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-29T15:45:09.130+02:00","length":4531,"duration":4531,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4866-de-fnord_jahresrueckblick_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4866-de-fnord_jahresrueckblick_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a17dc159cb6895d8cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a17dc159cb6895d8cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4866-de-fnord_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-a17dc159cb6895d8cd","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":538,"event_guid":"import-7a8d7cd7685ff4574a","weight":4},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":4},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":9},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":13},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":10},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":23},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":4},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":25},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":7},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":48},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":10},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":4},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":4},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":7},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":57},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":60},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":4},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":4},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":33},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":26},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":15},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":20}]},{"guid":"import-5066545b91f6a498b5","title":"Quantum of Science","subtitle":"How quantum information differs from classical","slug":"28c3-4648-en-quantum_of_science","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4648.en.html","description":"Quantum systems can have very different properties from their classical analogues which allows them to have states that are not only correlated but entangled. This allows for quantum computers running algorithms more powerful than those on classical computers (represented by Turing machines) and for quantum cryptography whose safety is (in principle) guaranteed by the laws of nature. \n","original_language":"eng","persons":["Robert Helling"],"tags":["28c3"," Science"],"view_count":97,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-08T21:30:24.391+01:00","length":3564,"duration":3564,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4648-en-quantum_of_science_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4648-en-quantum_of_science_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-5066545b91f6a498b5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-5066545b91f6a498b5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4648-en-quantum_of_science","url":"https://api.media.ccc.de/public/events/import-5066545b91f6a498b5","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1438,"event_guid":"import-c4d094a86d6fdad7df","weight":1},{"event_id":1456,"event_guid":"import-ffedc66f28f81c9a2e","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1476,"event_guid":"import-18ff532f1aae2ba415","weight":1},{"event_id":1483,"event_guid":"import-d37adcac32db0b17c2","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1615,"event_guid":"import-a12ea6cce80bbfdbef","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1716,"event_guid":"import-15e4361b2ab005ddb4","weight":1},{"event_id":1852,"event_guid":"U-8wOAtiUft8JjHbW-HAEA","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":3087,"event_guid":"8374cf06-ca54-4c67-b450-d302295637c3","weight":1},{"event_id":3225,"event_guid":"8ded6890-b77e-4969-9d2c-06240f008528","weight":1},{"event_id":3288,"event_guid":"0b36ec47-6b04-53be-8ca4-c0b93bacd99d","weight":1},{"event_id":3498,"event_guid":"3cd1ad54-bede-444f-9339-9ed86e1836f6","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3683,"event_guid":"1b27dbeb-cffc-48a1-b2e6-b2011c338a50","weight":1},{"event_id":3696,"event_guid":"9d36932f-616a-4677-b924-60c1986fbbfc","weight":1},{"event_id":3723,"event_guid":"f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":1},{"event_id":3926,"event_guid":"e13686d9-2d53-4305-ba3d-57065b3db383","weight":1},{"event_id":4229,"event_guid":"6a40f977-5db3-4051-8257-3c30e84816a4","weight":1},{"event_id":4485,"event_guid":"da208942-2be8-4f14-9466-ba8e7b74fca8","weight":1},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":5122,"event_guid":"8c6ec15e-2d85-5bcf-a3ca-9f8e6fe5b03b","weight":1},{"event_id":5128,"event_guid":"d7b2ca0e-6c06-5de7-8bd7-374f6f39661a","weight":1},{"event_id":5132,"event_guid":"fe2b9e2b-defd-5f85-8dad-9543880e0bef","weight":1},{"event_id":5821,"event_guid":"d7d5d572-075e-475e-a9cd-53e4217d8b15","weight":1},{"event_id":5845,"event_guid":"0b16f931-d146-54d8-8114-bc28d56980b7","weight":1},{"event_id":5887,"event_guid":"2c8fac7f-38b0-57df-99b1-2dd60d97ddc2","weight":1},{"event_id":5930,"event_guid":"199e47bb-9812-5d7e-a23b-c978b030770c","weight":1},{"event_id":5934,"event_guid":"8769d3af-5098-515b-9197-24f80251a13a","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5964,"event_guid":"f5c4898d-68fb-5758-9ea1-717a099803dd","weight":1},{"event_id":5975,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb892","weight":1},{"event_id":6000,"event_guid":"db737a14-3b5c-590c-ab96-81cbe9d3a08e","weight":1},{"event_id":6021,"event_guid":"ac6568e2-ae17-43b6-b7ff-8fd9799c259f","weight":1}]},{"guid":"import-a110a31f1ffd593368","title":"Demokratie auf Sächsisch","subtitle":null,"slug":"28c3-4910-de-demokratie_auf_saechsisch","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4910.en.html","description":"Alles begann im Vorfeld des 13. Februar 2010. Nachdem sich der sogenannte rechte Trauermarsch am Jahrestag der Bombardierung Dresdens innerhalb weniger Jahre zum größten Naziaufmarsch Europas entwickelt hatte, gründete sich 2009 ein bundesweites Bündnis aus Antifa-Gruppen, Parteien und Zivilgesellschaft mit dem Ziel, diesen zu blockieren.\nSoviel Engagement gegen Rechts war den sächsischen Behörden jedoch von Anfang ein Dorn im Auge, so dass die Oberstaatsanwaltschaft Dresden bereits im Januar 2009 den Vorwurf des „Aufrufs zu Straftaten“ konstruierte, um Räumlichkeiten des Bündnisses zu durchsuchen, Plakate zu beschlagnahmen und so die Mobilisierung nach Dresden zu unterbinden. Die Taktik ging nicht auf: Am 13. Februar 2010 belagerten mehr als 10.000 Menschen den Aufmarschort, woraufhin der Naziaufmarsch nicht stattfand.\nEine solche Schlappe wollten LKA und Staatsanwaltschaft nicht noch einmal hinnehmen.\n","original_language":"eng","persons":["Josephine Fischer","Tobias Naumann"],"tags":["28c3"," Society and Politics"],"view_count":219,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-06-22T19:00:03.667+02:00","length":2501,"duration":2501,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4910-de-demokratie_auf_saechsisch_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4910-de-demokratie_auf_saechsisch_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a110a31f1ffd593368-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a110a31f1ffd593368-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4910-de-demokratie_auf_saechsisch","url":"https://api.media.ccc.de/public/events/import-a110a31f1ffd593368","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":2},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":2},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":4},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":11},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":8},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":2},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":3},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":3},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":2},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":2},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":5},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":3},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":2},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":2},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":2}]},{"guid":"import-160908ea0f2a12fad8","title":"The movements against state-controlled Internet in Turkey","subtitle":"A short account of its history and future challenges","slug":"28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4753.en.html","description":"We are members of Alternatif Bilişim Derneği (Alternative Informatics Association)**, one of many organizations that oppose the ongoing efforts for state-controlled Internet in Turkey. We see that the problems with media control in Turkey and in Europe are increasingly becoming part of a global problem. The governments are working on their own view of a 'secure' Internet, and we have to articulate and suggest an alternative.\n\nIn our talk we want to give an account of our anti-censorship movement and the challenges we face in Turkey. We will first provide an overview of the political events; sanctions, censorship regulations and attempts of resistance in the country. Then, we will point out the main problems we face in making use of laws and technology against state control. We would also like to use our presentation as an opportunity to meet people at the CCC with similar affinities and to learn from their experience. We see a great need to create global networks and communities to articulate an alternative message; the Internet as the peoples’ media. \n","original_language":"eng","persons":["Barış","seda"],"tags":["28c3"," Society and Politics"],"view_count":15,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-04-06T17:15:06.531+02:00","length":3775,"duration":3775,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-160908ea0f2a12fad8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-160908ea0f2a12fad8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey","url":"https://api.media.ccc.de/public/events/import-160908ea0f2a12fad8","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":1},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":1},{"event_id":2192,"event_guid":"lWgvj2btOjK-_XxUtIs-qw","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2927,"event_guid":"f6149460-a278-4600-bf9d-61ea737c46de","weight":1}]},{"guid":"import-4943bb5b62764ada53","title":"Hacking MFPs","subtitle":"Part2 - PostScript: Um, you've been hacked","slug":"28c3-4871-en-hacking_mfps","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4871.en.html","description":"We have decided to continue our research onto PostScript realms - an old, very powerful and nicely designed programming language, where (as a coincidence or not, given it's numerous security flaws) Adobe owns most PostScript interpreters instances.\n\nThis time we demonstrate that PostScript language, given it's power, elegance and Turing-completeness, can be used more than just for drawing dots, lines and circles - and to a certain extent it can be a hacker's sweet delight if fully mastered.\n\nWe will be presenting a real-life implementation of unusual PostScript APIs (along with it's dissection and reconstructed documentation) that interact with various levels of OS and HW, implementation we have found in a TOP10 printer vendor product line.\n\nAlso, we will investigate whether a PostScript-based (hence platform-independent) virus (18+ years after first proposals of such theory) can be acomplished, thus giving theoretical hints and few building blocks in this direction.\n\nWe will also present some very constructive uses of the PostScript language in the creative (i.e. non-destructive) hacking direction.\n\nIn the end, we will try to summarize our conclusions and possible solution for all parties involved (vendors, users, sysadmins, security experts).\n\nWith this research we hope we can prove that entire printer industry (devices, printing software/drivers/subsystems, publishing and managed services) have to be rethought security-wise, so that it can withstand in the long run the current security landscape and threats.\n","original_language":"eng","persons":["Andrei Costin"],"tags":["28c3"," Hacking"],"view_count":79,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-21T01:45:03.575+01:00","length":3478,"duration":3478,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4871-en-hacking_mfps_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4871-en-hacking_mfps_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4943bb5b62764ada53-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4943bb5b62764ada53-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4871-en-hacking_mfps","url":"https://api.media.ccc.de/public/events/import-4943bb5b62764ada53","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":1},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":1},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":1},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":1},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":1601,"event_guid":"import-9aca5e310039f09031","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":1},{"event_id":2879,"event_guid":"3f61827f-8b17-47b4-a43c-e0dce6532cbe","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3654,"event_guid":"ac80424a-f4dc-431d-95f3-3f85664ba2dc","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":1},{"event_id":3768,"event_guid":"babc1d56-c3b9-4a21-bfae-af4190c05e93","weight":1},{"event_id":3818,"event_guid":"adb3ca92-d333-4a8d-b44a-09b3bbb75656","weight":1},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":2},{"event_id":6245,"event_guid":"f2ed03d9-65fe-49ea-9c9a-2116499a6563","weight":1}]},{"guid":"import-a48e3c67373025c5ed","title":"The Science of Insecurity","subtitle":null,"slug":"28c3-4763-en-the_science_of_insecurity","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4763.en.html","description":"Why is the overwhelming majority of common networked software still not secure, despite all effort to the contrary? Why is it almost certain to get exploited so long as attackers can craft its inputs? Why is it the case that no amount of effort seems to be enough to fix software that must speak certain protocols?\n","original_language":"eng","persons":["Meredith L. Patterson","Sergey"],"tags":["28c3"," Hacking"],"view_count":1676,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-28T16:15:06.620+01:00","length":3562,"duration":3562,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4763-en-the_science_of_insecurity_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4763-en-the_science_of_insecurity_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a48e3c67373025c5ed-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a48e3c67373025c5ed-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4763-en-the_science_of_insecurity","url":"https://api.media.ccc.de/public/events/import-a48e3c67373025c5ed","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1368,"event_guid":"import-2f5b6d9d75ad65da1d","weight":1},{"event_id":1426,"event_guid":"import-65c32b95bca41915d5","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":2},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1590,"event_guid":"import-6e9147236a7cb3f1ce","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1651,"event_guid":"import-0effc299ee3daeeece","weight":1},{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1701,"event_guid":"import-033a8737829e937cdb","weight":1},{"event_id":1706,"event_guid":"import-a0d177ee5bd4d6e3fb","weight":1},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":1},{"event_id":1754,"event_guid":"NzP8F_rnRMmXIbb6zl1H8Q","weight":1},{"event_id":1821,"event_guid":"rSMcCR_40Gu8XhIBpMapxQ","weight":1},{"event_id":2153,"event_guid":"HLDDEFxCxCrQryx8fEacZw","weight":1},{"event_id":2161,"event_guid":"oI8n77eKy3Uz2Fklmk4hVQ","weight":1},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2378,"event_guid":"213f5667-d2b5-4f7c-b3f7-90ef3f6322a0","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":2},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":1},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":1},{"event_id":2904,"event_guid":"8b01d636-d39b-44b8-8d6f-fc03e47eae1b","weight":1},{"event_id":2940,"event_guid":"48219ef6-24b8-41ca-8cc0-ec309e4148e6","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3049,"event_guid":"f3711e08-9814-4426-b61b-41585f25d8ce","weight":1},{"event_id":3058,"event_guid":"56846834-12f4-495f-b92f-8cae32b8f1c2","weight":1},{"event_id":3624,"event_guid":"600ca67d-e18d-49d8-8e5d-08d5b38ec528","weight":1},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3718,"event_guid":"853f2681-504c-45bf-b9af-cbabd005c376","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":3874,"event_guid":"G6H3Uw0zdxfr2d_HHOIZHQ","weight":1},{"event_id":4212,"event_guid":"3e70713c-8276-4dfb-a028-67b83261c303","weight":1},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":1},{"event_id":4347,"event_guid":"24112c59-8a55-40ca-a30f-d42a4850a9c6","weight":1},{"event_id":4387,"event_guid":"9910a89c-ce50-4b0d-80a2-930e4bda8574","weight":1},{"event_id":4393,"event_guid":"726f6dc1-ff55-4bd7-bffa-56ae1a4596fc","weight":1},{"event_id":4397,"event_guid":"e3375df5-8ff8-425e-b877-213c6a920d78","weight":1},{"event_id":4411,"event_guid":"39b44e09-2ff8-4bca-aeb4-8a2f4bba42ca","weight":1},{"event_id":4421,"event_guid":"2f2fd9af-2c7f-4eea-bf6c-3e90176f3f75","weight":1},{"event_id":4422,"event_guid":"6e73c21d-0a11-45e7-bee9-073c0fa02118","weight":1},{"event_id":4423,"event_guid":"0f47094d-5824-48dd-b8b1-90eb4acbc35c","weight":1},{"event_id":4427,"event_guid":"dc4aad2d-4ba3-4881-bb90-9a7953bf789d","weight":1},{"event_id":4429,"event_guid":"3f680e84-b37d-40d7-8f54-529dfd5df504","weight":1},{"event_id":4444,"event_guid":"338b865c-b072-45f1-a8bc-54775999e794","weight":1},{"event_id":4450,"event_guid":"cb892f65-89b4-4c50-8ff6-e38725c67438","weight":4},{"event_id":4456,"event_guid":"33e0fc55-d0c3-4255-b754-c13bc5856867","weight":1},{"event_id":4459,"event_guid":"723dbee1-a73a-469c-bbb0-6bc90b21ebae","weight":1},{"event_id":4461,"event_guid":"489dc194-4c5d-45ee-a062-dd6098255ae0","weight":1},{"event_id":4467,"event_guid":"b73be6a0-292a-4a98-b9bf-f38755279f6e","weight":1},{"event_id":4472,"event_guid":"35abdd14-4469-4295-b3d1-0eba9f4015d2","weight":1},{"event_id":4475,"event_guid":"7fe1d23c-263d-4507-a56b-fa77f7700dda","weight":1},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":2},{"event_id":5081,"event_guid":"b41404a3-3f9b-55b3-8dee-e086fdd4f66d","weight":1},{"event_id":5229,"event_guid":"53464646-4151-2020-2020-202020202020","weight":1},{"event_id":5661,"event_guid":"fb43f374-958e-447c-ba13-a013113d44e3","weight":1},{"event_id":5678,"event_guid":"bbfbecf9-5c36-46bd-afd3-e1a76a58b56a","weight":1}]},{"guid":"import-7c99fae19428fdbf5c","title":"Bionic Ears","subtitle":"Introduction into State-of-the-Art Hearing Aid Technology","slug":"28c3-4669-en-bionic_ears","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4669.en.html","description":"In many social situations being hearing impaired is a serious handicap, not only for elderly people. Today's hearing aids are tiny computers that do a decent job in signal processing. During the last years, the progress in this technology was significant, amongst other things by switching from analog to digital devices. Since this field becomes more and more related to computer technology, there is even more improvement to be expected. In particular, it turns into a more and more interesting playground for hackers.\n","original_language":"eng","persons":["Helga Velroyen "],"tags":["28c3"," Hacking"],"view_count":271,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-13T22:00:08.573+01:00","length":3733,"duration":3733,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4669-en-bionic_ears_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4669-en-bionic_ears_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-7c99fae19428fdbf5c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-7c99fae19428fdbf5c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4669-en-bionic_ears","url":"https://api.media.ccc.de/public/events/import-7c99fae19428fdbf5c","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1574,"event_guid":"import-883c7975dfe4f8c174","weight":1},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":1},{"event_id":1587,"event_guid":"import-a54618b083eeb9fc4d","weight":1},{"event_id":1590,"event_guid":"import-6e9147236a7cb3f1ce","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1690,"event_guid":"import-064796b399907c0283","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1701,"event_guid":"import-033a8737829e937cdb","weight":1},{"event_id":1707,"event_guid":"import-637333afe02a1de8d8","weight":1},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":1},{"event_id":2824,"event_guid":"27260dd7-65b6-40ec-8929-2b96b45aa368","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3302,"event_guid":"036c801c-d1d2-5502-b40c-242eb9779b0a","weight":1},{"event_id":3316,"event_guid":"424860b0-8a98-5304-8e9a-928d41f38284","weight":1},{"event_id":4045,"event_guid":"0fbc1407-b190-50b6-9b3c-6f1a354028dc","weight":1},{"event_id":4629,"event_guid":"4dd99ace-1f61-1832-2e7f-d34394dba06e","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":5005,"event_guid":"944b4ee7-175e-435d-b6b4-5cca67211cda","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5069,"event_guid":"84639ed6-fb5d-584a-a879-84e60b0cafd5","weight":1},{"event_id":5070,"event_guid":"a87a0521-6b12-5dca-851a-c32a13cc4581","weight":1},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":2},{"event_id":5075,"event_guid":"759bcf8b-b8d8-5087-9c02-0c2faa0ab8b4","weight":1},{"event_id":5083,"event_guid":"e340f48d-a241-5296-aea5-821917671506","weight":1},{"event_id":5085,"event_guid":"f64deec6-e13f-54e8-8afa-22cdcf9d8f81","weight":1},{"event_id":5087,"event_guid":"efe82374-e0c2-5beb-a462-305df7dbec7a","weight":1},{"event_id":5088,"event_guid":"7a9b5382-8a68-5969-8891-045996c9870a","weight":1},{"event_id":5586,"event_guid":"caa261ba-e54d-5cf0-9d48-6882db26c89d","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6503,"event_guid":"d0d6d058-f117-4ccb-ba6a-c41d9290a287","weight":1},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":1}]},{"guid":"import-4eec3a43cb7ad04ee9","title":"Frag den Staat","subtitle":"Praktische Informationsfreiheit","slug":"28c3-4740-de-frag_den_staat","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4740.en.html","description":"\u003cp\u003eFragDenStaat.de startete am 1. August 2011 als Plattform zum Stellen von Anfragen nach dem Informationsfreiheitsgesetz und ver\u0026ouml;ffentlicht dort die Korrespondenz mit den Beh\u0026ouml;rden nach dem Vorbild von whatdotheyknow.com and befreite-dokumente.de. Der Vortrag wird die Plattform vorstellen, zeigen wie die Seite Antragssteller bei ihrem Recht auf Akteneinsicht unterst\u0026uuml;tzt und die interessantesten Vorf\u0026auml;lle genauer beleuchten.\u003c/p\u003e","original_language":"eng","persons":["Stefan Wehrmeyer"],"tags":["28c3","Society and Politics","Frag den Staat"],"view_count":222,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-19T14:30:16.542+01:00","length":1718,"duration":1718,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4740-de-frag_den_staat_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4740-de-frag_den_staat_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4eec3a43cb7ad04ee9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4eec3a43cb7ad04ee9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4740-de-frag_den_staat","url":"https://api.media.ccc.de/public/events/import-4eec3a43cb7ad04ee9","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1562,"event_guid":"import-9bd054fef6a2a0b358","weight":3},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":2},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":3},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":2},{"event_id":1643,"event_guid":"import-aa0a9b6e36df902726","weight":3},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":2},{"event_id":1692,"event_guid":"import-609c760ca5bea50d79","weight":2},{"event_id":2252,"event_guid":"Lt7ABZNFLzAgdiGcpHPHUQ","weight":5},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":2},{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":7},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":2}]},{"guid":"import-6816b7029c0aff79fc","title":"Evolving custom communication protocols","subtitle":"Hell Yeah, it's rocket science","slug":"28c3-4818-en-evolving_custom_communication_protocols","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4818.en.html","description":"Even after years of committee review, communication protocols can certainly be hacked, sometimes highly entertainingly. What about creating a protocol the opposite way?  Start with all the hacks that can be done and search for a protocol that gets around them all.  Is it even possible? Part Time Scientists has used a GPU to help design our moon mission protocols and we'll show you the what and how.  Danger: Real code will be shown!\n","original_language":"eng","persons":["Wes Faler"],"tags":["28c3"," Hacking"],"view_count":37,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-23T21:15:10.902+01:00","length":3430,"duration":3430,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4818-en-evolving_custom_communication_protocols_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4818-en-evolving_custom_communication_protocols_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6816b7029c0aff79fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6816b7029c0aff79fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4818-en-evolving_custom_communication_protocols","url":"https://api.media.ccc.de/public/events/import-6816b7029c0aff79fc","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":1},{"event_id":1542,"event_guid":"import-052f3eb3e03ca7685e","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":1},{"event_id":1576,"event_guid":"import-7cd9b55eb4bc8147cb","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2295,"event_guid":"e192e98a-90ca-44c8-9cfd-86b94a79f4d1","weight":1}]},{"guid":"import-c8bd08c1bba8ba6ff4","title":"Time is on my Side","subtitle":"Exploiting Timing Side Channel Vulnerabilities on the Web","slug":"28c3-4640-en-time_is_on_my_side","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4640.en.html","description":"Timing side channel attacks are non-intrusive attacks that are still widely ignored in day-to-day penetration testing, although they allow attackers to breach the confidentiality of sensitive information. The reason for this is, that timing attacks are still widely considered to be theoretical. In this talk, I present a toolkit for performing practical timing side channel attacks and showcase several timing attacks against real-world systems.\n","original_language":"eng","persons":["Sebastian Schinzel"],"tags":["28c3"," Hacking"],"view_count":220,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-15T15:30:04.048+01:00","length":3664,"duration":3664,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4640-en-time_is_on_my_side_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4640-en-time_is_on_my_side_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c8bd08c1bba8ba6ff4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c8bd08c1bba8ba6ff4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4640-en-time_is_on_my_side","url":"https://api.media.ccc.de/public/events/import-c8bd08c1bba8ba6ff4","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1338,"event_guid":"import-a19180493d3c82f29b","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":1},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1631,"event_guid":"import-ee5f21f5e79f77824c","weight":2},{"event_id":3605,"event_guid":"61f9d4c6-a3de-4958-a57c-efcf941668fa","weight":1},{"event_id":6355,"event_guid":"3b2b2a8d-2ac3-4977-820e-34e65a349b7a","weight":1},{"event_id":6359,"event_guid":"54c4d9c4-312c-4ed6-b642-be999b4bf74f","weight":2},{"event_id":6477,"event_guid":"c85de43e-107e-4247-b550-946f376e2ec4","weight":1},{"event_id":6487,"event_guid":"2536bba3-b95f-4cec-9a95-7aa756db7edb","weight":1},{"event_id":6590,"event_guid":"7ee42591-4f4d-481d-884b-44f5e18e1803","weight":1}]},{"guid":"import-def6598c84e42db15e","title":"Apple vs. Google Client Platforms","subtitle":"How you end up being the Victim.","slug":"28c3-4676-en-apple_vs_google_client_platforms","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4676.en.html","description":"We will discuss the two different approaches Apple and Google take for the\nclient platforms iPad and Chromebook, how they are similar and how they \nare not. \n","original_language":"eng","persons":["Bruhns","FX of Phenoelit","greg"],"tags":["28c3"," Hacking"],"view_count":245,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-17T13:45:09.955+01:00","length":3078,"duration":3078,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4676-en-apple_vs_google_client_platforms_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4676-en-apple_vs_google_client_platforms_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-def6598c84e42db15e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-def6598c84e42db15e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4676-en-apple_vs_google_client_platforms","url":"https://api.media.ccc.de/public/events/import-def6598c84e42db15e","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":2},{"event_id":1176,"event_guid":"import-aeca1d442393997d98","weight":2},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":6},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":3},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1577,"event_guid":"import-a48e3c67373025c5ed","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1746,"event_guid":"il4lmTSfWPAY3ks_KW7SHg","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2}]},{"guid":"import-c6b8001e6cb02d5992","title":"„Die Koalition setzt sich aber aktiv und ernsthaft dafür ein“","subtitle":"Sprachlicher Nebel in der Politik","slug":"28c3-4675-de-politik_neusprech_2011","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4675.en.html","description":"Aktuelle politische Texte (Reden, Interviews) werden auf Leerformeln, Füllsel und Übertreibungen untersucht, die den Text entlarven, selbst wenn der Autor versucht, die Hörer bzw. Leser einzulullen, bestimmte sprachliche Mittel verraten, welche eigentlichen Meinungen sich im Text verstecken. Auf diese Weise wird in den Texten sichtbar, was Wilson und Shea als „Fnord“ bezeichnen.\n","original_language":"eng","persons":["maha/Martin Haase"],"tags":["28c3"," Society and Politics"],"view_count":547,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-04T13:30:07.063+01:00","length":3893,"duration":3893,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4675-de-politik_neusprech_2011_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4675-de-politik_neusprech_2011_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c6b8001e6cb02d5992-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c6b8001e6cb02d5992-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4675-de-politik_neusprech_2011","url":"https://api.media.ccc.de/public/events/import-c6b8001e6cb02d5992","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":572,"event_guid":"import-57f029a26744e148e6","weight":6},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":9},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":8},{"event_id":1457,"event_guid":"import-56649e49ea2036bc5c","weight":13},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":4},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":4},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":3},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":3},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":5},{"event_id":1749,"event_guid":"YYw-34ht9mf83cFWsxTCAw","weight":3},{"event_id":2146,"event_guid":"HOqeNIb6G7M4hYFKFRkCmQ","weight":7},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":2},{"event_id":2880,"event_guid":"72ad2630-b736-4d4c-8ea1-d982076426bc","weight":13},{"event_id":3499,"event_guid":"f5f638dd-fccc-460c-8829-38f69f872ada","weight":3},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":8},{"event_id":3944,"event_guid":"c6b1fc76-2f70-4051-9767-46487ab457b3","weight":3}]},{"guid":"import-3670df5290697087d2","title":"Crowdsourcing Genome Wide Association Studies","subtitle":"Freeing Genetic Data from Corporate Vaults","slug":"28c3-4730-en-crowdsourcing_genome_wide_association_studies","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4730.en.html","description":"It was only a couple of years ago that generating genetic information about individuals was expensive and laborious work. Modern techniques have drastically cut cost and time needed to get an insight into one's genome and have ultimately led to the formation of personal genetics companies – like 23andMe, deCODEme and others – that now offer direct-to-customer genetic testing. With a price tag of those tests starting at about 100 €, the number of people that do such tests is on the rise. By now, 23andMe alone has over 100.000 paying customers, with over 60.000 of them willing to donate their genetic data and to actively participate in research projects by filling out surveys, e.g. on their medical histories. This has resulted in a high-quality dataset with genetic information of 60.000 individuals. The best part: The data has already been paid for by the participants in the research. \n\nWho would not love to get their hands on data like this? Unfortunately, the data sits locked away in corporate vaults, inaccessible to interested (citizen) scientists. But what if we could change this? \n\nWe've created openSNP, a central, open source, free-to-use repository which lets customers of genotyping companies upload their genotyping data and annotate them with phenotypes. OpenSNP provides its users with the latest scientific research on their genotypes and lets scientists download annotated genotypes to make science more open.\n","original_language":"eng","persons":["Bastian Greshake","Philipp Bayer"],"tags":["28c3"," Science"],"view_count":22,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2019-09-29T04:38:06.066+02:00","length":2741,"duration":2741,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-3670df5290697087d2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-3670df5290697087d2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4730-en-crowdsourcing_genome_wide_association_studies","url":"https://api.media.ccc.de/public/events/import-3670df5290697087d2","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":223,"event_guid":"import-30b3f90fd9c7a149dd","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":1},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":5768,"event_guid":"cbec40e2-8dfa-46c0-b3ae-3a991876cad7","weight":1},{"event_id":5991,"event_guid":"75707c38-b831-5512-a740-786ab8fcba57","weight":1},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1}]},{"guid":"import-c55c543fed3dbc291f","title":"Open source music: Tracking 2.0","subtitle":null,"slug":"28c3-4759-en-open_source_music_tracking_2_0","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4759.en.html","description":"Tracking is so 1990s.  Nowadays MP3 and other similar formats are\noverwhelmingly more popular.  But is this really a step forward?  A\n(very) brief history of computer music, where we are at now, and why I\nthink people are headed in the wrong direction.  And what we can do\nabout it. \n","original_language":"eng","persons":["Tom Hargreaves"],"tags":["28c3"," Hacking"],"view_count":59,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2024-12-27T20:15:06.640+01:00","length":1866,"duration":1866,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4759-en-open_source_music_tracking_2_0_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4759-en-open_source_music_tracking_2_0_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-c55c543fed3dbc291f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-c55c543fed3dbc291f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4759-en-open_source_music_tracking_2_0","url":"https://api.media.ccc.de/public/events/import-c55c543fed3dbc291f","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":2},{"event_id":1479,"event_guid":"import-6973e270e772374508","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":3},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":2},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":3},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":2},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":2}]},{"guid":"import-52fc6549033f1e7535","title":"Towards a Single Secure European Cyberspace?","subtitle":"What the European Union wants. What the hackerdom can do..","slug":"28c3-4802-en-towards_a_single_secure_european_cyberspace","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4802.en.html","description":"The \"European Great Firewall\" was the way that European civil rights organizations has addressed the proposal to create a \"single European cyberspace\". Surely other lectures will describe the technicalities of the proposal. This lecture will go beyond that, describing a vulnerability that the proposal reveals in the power structures of the European and world governance, that could be exploited by the hackerdom if the war is understood as a value to be avoided.\n","original_language":"eng","persons":["Suso Baleato"],"tags":["28c3"," Society and Politics"],"view_count":27,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-04-24T21:45:03.850+02:00","length":3235,"duration":3235,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4802-en-towards_a_single_secure_european_cyberspace_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4802-en-towards_a_single_secure_european_cyberspace_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-52fc6549033f1e7535-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-52fc6549033f1e7535-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4802-en-towards_a_single_secure_european_cyberspace","url":"https://api.media.ccc.de/public/events/import-52fc6549033f1e7535","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":126,"event_guid":"import-176ad1853fc7e8cdd1","weight":1},{"event_id":1014,"event_guid":"import-2d921a0dfd44909fdd","weight":1},{"event_id":1581,"event_guid":"import-950ce3bbed73872ac6","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":1},{"event_id":3757,"event_guid":"9d6db804-1074-4116-8210-cca78b335a1a","weight":1}]},{"guid":"import-a7f1f1ee62ed2fc9b9","title":"Lightning Talks Day 2","subtitle":null,"slug":"28c3-4905-en-lightning_talks_day_2","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4905.en.html","description":"\n","original_language":"eng","persons":["Nick Farr"],"tags":["28c3"," Community"],"view_count":34,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-05T11:00:04.858+01:00","length":6652,"duration":6652,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4905-en-lightning_talks_day_2_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4905-en-lightning_talks_day_2_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a7f1f1ee62ed2fc9b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a7f1f1ee62ed2fc9b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4905-en-lightning_talks_day_2","url":"https://api.media.ccc.de/public/events/import-a7f1f1ee62ed2fc9b9","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":622,"event_guid":"import-a244dfe0921ddbc139","weight":1},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1582,"event_guid":"import-2ee39c5fea857aeb23","weight":1},{"event_id":1588,"event_guid":"import-c8025284c9938a2c87","weight":1},{"event_id":1589,"event_guid":"import-b5560c445565b9f4d6","weight":1},{"event_id":1593,"event_guid":"import-b0589b01247d699e04","weight":4},{"event_id":1598,"event_guid":"import-95d2940001b2300805","weight":1},{"event_id":1607,"event_guid":"import-ad556a07ac6390b289","weight":1},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":2},{"event_id":2777,"event_guid":"3d7c3f51-7e31-11e5-b91e-e74da05edcc2","weight":1},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":1},{"event_id":2822,"event_guid":"4c070a2c-0558-48b8-b612-b8507a51154e","weight":1},{"event_id":2828,"event_guid":"aa5412e2-c20a-4c4a-b4d7-fd97184a87fe","weight":1},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":4967,"event_guid":"619f23dc-a31d-4aed-8860-7c87c3450082","weight":1},{"event_id":5551,"event_guid":"1cde6c4f-3c96-5b27-ba65-a02fbe4138a3","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1}]},{"guid":"import-04cbf6a2c645f0f640","title":"Ein Mittelsmannangriff auf ein digitales Signiergerät","subtitle":"Bachelorarbeit Informatik Uni Kiel SS 2011","slug":"28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4758.en.html","description":"In dieser Arbeit wird gezeigt, wie unter Ausnutzung einer ungesicherten Verbindung\nzwischen einer sicheren Signaturerstellungseinheit und einem Anwender-PC\neine qualifizierte elektronische Signatur gefälscht werden kann.\n","original_language":"eng","persons":["Alexander Koch"],"tags":["28c3"," Hacking"],"view_count":78,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-03T10:15:11.362+01:00","length":3347,"duration":3347,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-04cbf6a2c645f0f640-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-04cbf6a2c645f0f640-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet","url":"https://api.media.ccc.de/public/events/import-04cbf6a2c645f0f640","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":2},{"event_id":1562,"event_guid":"import-9bd054fef6a2a0b358","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1572,"event_guid":"import-4eec3a43cb7ad04ee9","weight":2},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":3},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":3},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":2},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2}]},{"guid":"import-6b95a8a622b3d95c87","title":"802.11 Packets in Packets","subtitle":"A Standard-Compliant Exploit of Layer 1","slug":"28c3-4766-en-802_11_packets_in_packets","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4766.en.html","description":"New to 2011, Packet-in-Packet exploits allow for injection of raw radio frames into remote wireless networks. In these exploits, an attacker crafts a string that when transmitted over the air creates the symbols of a complete and valid radio packet. When radio interference damages the beginning of the outer packet, the receiver is tricked into seeing only the inner packet, allowing a frame to be remotely injected. The attacker requires no radio, and injection occurs without a software or hardware bug.\n","original_language":"eng","persons":["Travis Goodspeed"],"tags":["28c3"," Hacking"],"view_count":301,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-18T11:30:12.141+01:00","length":3438,"duration":3438,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4766-en-802_11_packets_in_packets_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4766-en-802_11_packets_in_packets_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6b95a8a622b3d95c87-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6b95a8a622b3d95c87-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4766-en-802_11_packets_in_packets","url":"https://api.media.ccc.de/public/events/import-6b95a8a622b3d95c87","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":31,"event_guid":"import-a05a76991aa031db49","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":1},{"event_id":1465,"event_guid":"import-6c057cb9e23a38badd","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":1510,"event_guid":"import-5c41c1053cc25fb4b8","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":1},{"event_id":1536,"event_guid":"import-42e5588aaaf6ad5db2","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":2},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":5},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":4},{"event_id":1584,"event_guid":"import-c8bd08c1bba8ba6ff4","weight":1},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1620,"event_guid":"import-c42d9394e53b2def7c","weight":1},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":4},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":1},{"event_id":1638,"event_guid":"import-edaa0ada3bc5a12d59","weight":1},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":1},{"event_id":2395,"event_guid":"62b038eb-2975-4065-95ee-09a068dbfb81","weight":1},{"event_id":2704,"event_guid":"c4f1cabb-f667-46c5-9bfd-a5b07b6f67b5","weight":1},{"event_id":2760,"event_guid":"2cddcb2a-8f50-41bd-9a55-9691b6abc4bc","weight":1},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":2},{"event_id":3038,"event_guid":"cf873495-8beb-47f3-a303-4893400ecf30","weight":1},{"event_id":3468,"event_guid":"91c80405-d612-48f2-832f-2c42ffcfada6","weight":1},{"event_id":3479,"event_guid":"700cc235-cd49-4a33-9093-86f459d264e6","weight":1},{"event_id":3486,"event_guid":"5922d022-17b9-446a-b6f6-958b1d706e7e","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3606,"event_guid":"1aa7a4c5-1a3f-444f-99fb-e9c7b4744794","weight":1},{"event_id":3702,"event_guid":"5fb5e620-383a-4679-b37a-beef20bcd4fe","weight":2},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1}]},{"guid":"import-4a70b3c91995988e51","title":"Post Memory Corruption Memory Analysis","subtitle":"Automating exploitation of invalid memory writes","slug":"28c3-4660-en-post_memory_corruption_memory_analysis","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4660.en.html","description":"Pmcma is a tool aimed at automating the most time consuming taskes of\nexploitation. It for instance determine why an application is triggering\na segmentention fault, evaluate if the faulting instruction can be used\nto write to memory or execute arbitrary code, and list all the function\npointers potentially called from a given point in time by an application.\n\nPmcma is a totally new kind of debugger, which allows for easy\nexperimentation with a process in memory by forcing it to fork. The\nexact replicas of the process created in memory can then be intrumented\nwhile keeping the properties (eg: state of variables, ASLR,\npermissions...) of the original process.\n\nPmcma is an easily extensible framework available under the Apache 2.0\nlicense from http://www.pmcma.org/ .\n","original_language":"eng","persons":["endrazine"],"tags":["28c3"," Hacking"],"view_count":70,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-09T18:45:08.675+01:00","length":3763,"duration":3763,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4660-en-post_memory_corruption_memory_analysis_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4660-en-post_memory_corruption_memory_analysis_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4a70b3c91995988e51-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4a70b3c91995988e51-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4660-en-post_memory_corruption_memory_analysis","url":"https://api.media.ccc.de/public/events/import-4a70b3c91995988e51","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1818,"event_guid":"hsTftEgTn8vhPMLEZF2DVA","weight":1},{"event_id":2720,"event_guid":"zboXEMtoT7r3Aurvymmg5Q","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":4312,"event_guid":"d16501c8-374f-416c-896c-c50daadcc6bc","weight":1},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":1}]},{"guid":"import-1996db286bced17658","title":"Datenvieh oder Daten-Fee","subtitle":"Welchen Wert haben Trackingdaten?","slug":"28c3-4788-de-datenvieh_oder_daten_fee","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4788.en.html","description":"Eine nüchterne Untersuchung der Verfahren zum Nutzertracking und des wirtschaftlichen Wertes von Tracking- und Userdaten.\n","original_language":"eng","persons":["Rene Meissner"],"tags":["28c3"," Hacking"],"view_count":198,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-14T10:00:04.871+01:00","length":4077,"duration":4077,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4788-de-datenvieh_oder_daten_fee_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4788-de-datenvieh_oder_daten_fee_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-1996db286bced17658-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-1996db286bced17658-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4788-de-datenvieh_oder_daten_fee","url":"https://api.media.ccc.de/public/events/import-1996db286bced17658","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":4},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":4},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":3},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":7},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":2},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":2},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":2},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":4},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":2},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":3},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":2},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":7},{"event_id":5830,"event_guid":"1f3a0237-0515-4cdb-90ac-d57f7bc85586","weight":2}]},{"guid":"import-b7bf07eb250a05828e","title":"Cellular protocol stacks for Internet","subtitle":"GPRS, EDGE, UMTS, HSPA demystified","slug":"28c3-4663-en-cellular_protocol_stacks_for_internet","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4663.en.html","description":"Almost everyone uses the packet oriented transmission modes of cellular networks. However, unlike TCP/IP, Ethernet and Wifi, not many members of the hacker commnunity are familiar with the actual protocol stack for those services.\n\n","original_language":"eng","persons":["Harald Welte"],"tags":["28c3"," Hacking"],"view_count":256,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-16T12:00:08.817+01:00","length":3775,"duration":3775,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4663-en-cellular_protocol_stacks_for_internet_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b7bf07eb250a05828e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b7bf07eb250a05828e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4663-en-cellular_protocol_stacks_for_internet","url":"https://api.media.ccc.de/public/events/import-b7bf07eb250a05828e","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":1},{"event_id":656,"event_guid":"import-be8c7f62fda931eaa6","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":1},{"event_id":1471,"event_guid":"import-d05c31100d29c24e95","weight":1},{"event_id":1478,"event_guid":"import-b434c1bed6ba5d62df","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":1},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":1},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1576,"event_guid":"import-7cd9b55eb4bc8147cb","weight":1},{"event_id":1587,"event_guid":"import-a54618b083eeb9fc4d","weight":1},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1612,"event_guid":"import-708b15f151751c94c5","weight":1},{"event_id":1632,"event_guid":"import-0d984b8893f631f585","weight":1},{"event_id":1638,"event_guid":"import-edaa0ada3bc5a12d59","weight":1},{"event_id":1652,"event_guid":"import-e9ec231d916db35b29","weight":1},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":1},{"event_id":1663,"event_guid":"import-82881c96ab640740a1","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":1},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":1},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":1},{"event_id":1762,"event_guid":"iGUI8vSrFaU8uQiDfjNt2w","weight":1},{"event_id":1831,"event_guid":"shKT8wmGW3LurqOCDmbZyg","weight":1},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":1},{"event_id":2158,"event_guid":"n2DFvyl_lWjW-gm317vT3A","weight":1},{"event_id":2204,"event_guid":"78e2d419-0adc-43ff-989e-95a78ac9ddd4","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":1},{"event_id":2247,"event_guid":"iU5CnqxotZz_KK2P-uVMsQ","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2637,"event_guid":"cbb9db2e-a159-4bea-a2a3-eac73061d1f4","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":2},{"event_id":2862,"event_guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","weight":1},{"event_id":2874,"event_guid":"5f57ffa9-631c-429d-a11b-5b51bebe0f0f","weight":1},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":2},{"event_id":3091,"event_guid":"e5a914f1-2ad7-430b-b9f5-b0f0e9006456","weight":1},{"event_id":3244,"event_guid":"6a272039-1cce-5108-8c6c-6f993f74a524","weight":2},{"event_id":3254,"event_guid":"7eab2c8e-e7c8-5687-a77f-05ecd52f26cc","weight":1},{"event_id":3264,"event_guid":"2f0699a5-6a5e-586f-9b21-4e2f68e161ce","weight":1},{"event_id":3272,"event_guid":"e2fff38d-16eb-52b0-872a-ef9f4489ed5c","weight":1},{"event_id":3273,"event_guid":"d5bf7c1a-9a79-51ae-8578-dfbaea559f80","weight":1},{"event_id":3409,"event_guid":"3d6a998e-152d-41a3-897d-3d0d4bc0da28","weight":1},{"event_id":3466,"event_guid":"0c0c4f89-9004-4572-a3ce-db1bfe65a86a","weight":3},{"event_id":3590,"event_guid":"8edd7c4d-0b8e-57d9-8e38-df11f1434e22","weight":1},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":1},{"event_id":3626,"event_guid":"c3844820-b5ed-4b12-9094-cfc67aff60be","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3697,"event_guid":"a431b8a5-b8af-4ccf-bba2-7b1d88a782fb","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":2},{"event_id":3774,"event_guid":"a26a0d23-549d-5bd6-8f1e-9803628d5850","weight":1},{"event_id":3824,"event_guid":"25e57ee9-f207-552f-b4d0-1e302b08b88c","weight":1},{"event_id":3831,"event_guid":"3fbcc011-9ccb-53bf-beae-75e0235f90e5","weight":1},{"event_id":4222,"event_guid":"bfaf0024-a741-4015-85df-49663c462cf8","weight":1},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":1},{"event_id":5778,"event_guid":"c18d8138-d063-4f42-a5ba-d48c9e617714","weight":1},{"event_id":5871,"event_guid":"8ddfba5f-ae64-5d76-a1ba-67f420e6731e","weight":1}]},{"guid":"import-b00e23ddd70d2f59fb","title":"Defending mobile phones","subtitle":null,"slug":"28c3-4736-en-defending_mobile_phones","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4736.en.html","description":"Cell phone users face an increasing frequency and depth of privacy intruding attacks. Defense knowledge has not scaled at the same speed as attack capabilities. This talk intends to revert this imbalance.\n","original_language":"eng","persons":["Karsten Nohl","Luca Melette"],"tags":["28c3"," Hacking"],"view_count":443,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-19T10:15:04.398+01:00","length":3460,"duration":3460,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4736-en-defending_mobile_phones_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4736-en-defending_mobile_phones_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b00e23ddd70d2f59fb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b00e23ddd70d2f59fb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4736-en-defending_mobile_phones","url":"https://api.media.ccc.de/public/events/import-b00e23ddd70d2f59fb","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":3},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":2},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":2},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":2},{"event_id":1835,"event_guid":"xdX27wLbHpeOU_dSgBO4Hg","weight":5},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":9},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":4},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":2},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":4},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":2},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":2},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":2}]},{"guid":"import-ebb5f5ebcd563a0fe1","title":"TRESOR: Festplatten sicher verschlüsseln","subtitle":null,"slug":"28c3-4869-de-tresor","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4869.en.html","description":"Herkömmliche Festplattenverschlüsselungen legen notwendige Schlüssel im RAM ab. Dadurch sind sie schutzlos Angriffen wie Cold-Boot Attacken ausgeliefert, die auf den Arbeitsspeicher abzielen. TRESOR bietet Schutz gegen solche Angriffe.\n","original_language":"eng","persons":["tilo"],"tags":["28c3"," Hacking"],"view_count":537,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-25T15:00:11.073+01:00","length":2029,"duration":2029,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4869-de-tresor_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4869-de-tresor_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ebb5f5ebcd563a0fe1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ebb5f5ebcd563a0fe1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4869-de-tresor","url":"https://api.media.ccc.de/public/events/import-ebb5f5ebcd563a0fe1","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":559,"event_guid":"import-2c20624cc84bc563a2","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":4},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":5},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":3},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":2},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":6},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":4},{"event_id":6089,"event_guid":"165016fb-55bf-4512-a240-ddee32a9436a","weight":2},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":2}]},{"guid":"import-bee058f77897330ce0","title":"bup: Git for backups","subtitle":null,"slug":"28c3-4587-en-bup_git_for_backups","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4587.en.html","description":"bup is short for \"backup\". bup uses the file format of the distributed version control system Git. It solves Git's problems with big files. Deduplication is used to make backups space efficent (about five times smaller than rsnapshot's backups). Data is deduplicated globally across files and backups. If a small part of a big file is changed only little additional space is needed.\n","original_language":"eng","persons":["Zoran Zaric"],"tags":["28c3"," Hacking"],"view_count":196,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-13T16:15:06.610+01:00","length":1633,"duration":1633,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4587-en-bup_git_for_backups_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4587-en-bup_git_for_backups_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-bee058f77897330ce0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-bee058f77897330ce0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4587-en-bup_git_for_backups","url":"https://api.media.ccc.de/public/events/import-bee058f77897330ce0","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":1},{"event_id":1537,"event_guid":"import-bd2328a813340989bc","weight":1},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":1},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":1},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1559,"event_guid":"import-ec49201b9a28338359","weight":1},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":1},{"event_id":1583,"event_guid":"import-11d95d8eb06a7bb8eb","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1674,"event_guid":"import-0657639f3aaa512fd5","weight":1},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":1},{"event_id":1768,"event_guid":"Fp5SK2hqNSDN6KeYzLwIRw","weight":1},{"event_id":1823,"event_guid":"iDmPzetx6AuUFOlW1qFWig","weight":1},{"event_id":1915,"event_guid":"_O_wClK0WXa9WWkjJ228GQ","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":1},{"event_id":2227,"event_guid":"H1GEe9l64eUbo1oZXtLkEg","weight":1},{"event_id":2246,"event_guid":"5hkhmuwi5J8ZHMfd5k7veg","weight":1},{"event_id":2250,"event_guid":"Q41efHdmmnBkM5G8p6Wf_w","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":1},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":1},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":2},{"event_id":3099,"event_guid":"1af4bb7e-d722-4380-b890-3e0d8eda24b3","weight":1},{"event_id":3590,"event_guid":"8edd7c4d-0b8e-57d9-8e38-df11f1434e22","weight":1},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":1},{"event_id":3623,"event_guid":"b7e028fa-175f-464d-bc85-adf56e358626","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3641,"event_guid":"b9ca38ea-fa88-48c4-8083-9415eee93fcb","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":3805,"event_guid":"d5565688-a086-42e6-b8eb-17fa54e6fc3b","weight":1},{"event_id":3829,"event_guid":"f53f6877-7aec-57de-b317-a9c513d39fbd","weight":1},{"event_id":3849,"event_guid":"afcad2d0-34e7-11e7-b75a-bf6c18dd9a31","weight":1},{"event_id":3850,"event_guid":"ae999450-3893-11e7-890f-9f81551c7b53","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":3},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4136,"event_guid":"1a4cb9b4-ae19-5cbe-83cf-d425d2ebdd8a","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5229,"event_guid":"53464646-4151-2020-2020-202020202020","weight":1},{"event_id":5291,"event_guid":"81747e92-2676-40b9-86ff-09869b125d94","weight":1},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":1},{"event_id":5952,"event_guid":"17e98e8e-9c37-54b0-9738-f1004ca6d311","weight":1}]},{"guid":"import-0f193d0a307fc9b016","title":"Sachsen dreht frei","subtitle":"On- und Offline-Überwachung: Weil sie es können","slug":"28c3-4876-de-die_spinnen_die_sachsen","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4876.en.html","description":"Die Meldungen aus Sachsen in diesem Jahr wirkten für alle, die nicht dort wohnen, ein bisschen, als kämen sie von einem sehr weit entfernten Stern. In regelmäßigen Abständen werden Dinge bekannt, die jeweils einzeln früher zum Rücktritt von Ministern geführt hätten. Funkzellenabfrage, §129-Verfahren, die Durchsuchung eines Pfarrers, Aberkennung der Immunität eines Fraktionsvorsitzenden wegen Rädelführerschaft: umfassende Kriminalisierung von Protesten gegen Nazis, und zwar weit bis in die \"Mitte der Gesellschaft\". Offline-Überwachung und -Drangsalierung sind in Sachsen Alltag. Der Talk gibt einen Überblick über den Stand der Dinge und warnt davor, sich (außerhalb Sachsens) gemütlich schaudernd zurückzulehnen. Denn: Wenn Sachsen damit durchkommt, setzt das Maßstäbe für andere Bundesländer.\n","original_language":"eng","persons":["Anne Roth"],"tags":["28c3"," Society and Politics"],"view_count":266,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-09T14:45:24.548+01:00","length":3387,"duration":3387,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4876-de-die_spinnen_die_sachsen_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4876-de-die_spinnen_die_sachsen_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-0f193d0a307fc9b016-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-0f193d0a307fc9b016-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4876-de-die_spinnen_die_sachsen","url":"https://api.media.ccc.de/public/events/import-0f193d0a307fc9b016","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":683,"event_guid":"import-fb5fe4937619117a96","weight":3},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":2},{"event_id":1544,"event_guid":"import-9d9c56ae1d5816730b","weight":2},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":4},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":2},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":11},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":6},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":2},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":6},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":2},{"event_id":1701,"event_guid":"import-033a8737829e937cdb","weight":3},{"event_id":2893,"event_guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","weight":2},{"event_id":2931,"event_guid":"5f7d945f-872f-4951-a95d-8b78558159f8","weight":3},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":5738,"event_guid":"fafacf91-9842-4a5f-bb02-146250450001","weight":2},{"event_id":5788,"event_guid":"b6faaa05-454e-4a52-9cbe-4e52bd30ad80","weight":2}]},{"guid":"import-b5560c445565b9f4d6","title":"A Brief History of Plutocracy","subtitle":null,"slug":"28c3-4826-en-a_brief_history_of_plutocracy","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4826.en.html","description":"This whistlestop re-telling of world economic history squeezes 12,000 years of history into 18 slides. Its focus is the changing nature of money and the rise of the monied class in US and Europe.\n","original_language":"eng","persons":["Robin Upton"],"tags":["28c3"," Society and Politics"],"view_count":669,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-09T21:30:09.188+01:00","length":1600,"duration":1600,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4826-en-a_brief_history_of_plutocracy_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4826-en-a_brief_history_of_plutocracy_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b5560c445565b9f4d6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b5560c445565b9f4d6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4826-en-a_brief_history_of_plutocracy","url":"https://api.media.ccc.de/public/events/import-b5560c445565b9f4d6","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":682,"event_guid":"import-a459e40d704e748d02","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":2},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1556,"event_guid":"import-ae0af31316a495be6a","weight":2},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1614,"event_guid":"import-a7f1f1ee62ed2fc9b9","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":1},{"event_id":1643,"event_guid":"import-aa0a9b6e36df902726","weight":1},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":1},{"event_id":1758,"event_guid":"wJ8usABBu6mJXRNpmhr_SQ","weight":1},{"event_id":1837,"event_guid":"ZYk9lubJJBkqDWJBOZpWyw","weight":1},{"event_id":2836,"event_guid":"56e8d345-8c04-4281-9811-d4ed9da8603e","weight":1},{"event_id":3499,"event_guid":"f5f638dd-fccc-460c-8829-38f69f872ada","weight":1},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3626,"event_guid":"c3844820-b5ed-4b12-9094-cfc67aff60be","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3706,"event_guid":"3f76be27-6ff5-4a23-a6c6-512eaff00f28","weight":1},{"event_id":3740,"event_guid":"562ced0e-1be5-4912-b9a1-d79709ad324a","weight":1},{"event_id":3745,"event_guid":"97570300-6590-45c9-a477-ab629f92a3b1","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2}]},{"guid":"import-4d2d81506f045a92d3","title":"The best of The oXcars","subtitle":"the greatest free/Libre culture show of all times","slug":"28c3-4748-en-the_best_of_the_oxcars","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4748.en.html","description":"The Best of the oXcars!\n\nOXcars is fun. oXcars is empowering the people.\n\nPresentation and screening of the best of the oXcars 2011, 2010, 2009, 2008.\n\nBecause their business is not our business.\nEvery year, in Barcelona 1500 people gather for the biggest free/libre culture Show of all times ;-).\nArtists and performers from all areas of Spanish and international culture take part in a \"Gala\";-) in which artists say \"Not in my name\" to the commercialisation of culture, \"Not in my name\" to limiting the potential of digital media and to criminalization of the Internet. Civil society demands the 'lost profits' of all the knowledge that is being withheld and stolen from public use in the name of private profits.\n\nhttp://oxcars11.whois--x.net/en/\nhttp://oxcars10.whois--x.net/en/\nhttp://oxcars09.whois--x.net/en/\nhttp://whois--x.net/proyectos/oxcars-08\n","original_language":"eng","persons":["Simona Xnet"],"tags":["28c3"," Culture"],"view_count":15,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-01-13T12:15:20.121+01:00","length":3235,"duration":3235,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4748-en-the_best_of_the_oxcars_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4748-en-the_best_of_the_oxcars_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4d2d81506f045a92d3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4d2d81506f045a92d3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4748-en-the_best_of_the_oxcars","url":"https://api.media.ccc.de/public/events/import-4d2d81506f045a92d3","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1269,"event_guid":"import-bb214036a3c1c15d6c","weight":1},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":1},{"event_id":2156,"event_guid":"-n9QScyDLXMEwkqrCHASYw","weight":1},{"event_id":3686,"event_guid":"8bc5a09a-26c0-4cf7-ac6c-160a7e85e38a","weight":1},{"event_id":5218,"event_guid":"51454a55-534a-2020-2020-202020202020","weight":1}]},{"guid":"import-6b9d989911d88e19ca","title":"Jahresrückblick","subtitle":null,"slug":"28c3-4908-de-jahresrueckblick_2011","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4908.en.html","description":"Kaum hat es begonnen, da ist es auch schon wieder vorbei – das Jahr 2011. Also ist es wieder an der Zeit für den Rückblick auf Technikforschung und Nerd-Lobbyismus mit Hackerperspektive, der natürlich nie ohne Ausblick ist.\n","original_language":"eng","persons":["Andreas Bogk","Constanze Kurz","Erdgeist","Frank Rieger"],"tags":["28c3"," Society and Politics"],"view_count":144,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-11T03:30:04.646+01:00","length":7114,"duration":7114,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4908-de-jahresrueckblick_2011_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4908-de-jahresrueckblick_2011_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-6b9d989911d88e19ca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-6b9d989911d88e19ca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4908-de-jahresrueckblick_2011","url":"https://api.media.ccc.de/public/events/import-6b9d989911d88e19ca","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":629,"event_guid":"import-e8ee54170329e5e523","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":2},{"event_id":1329,"event_guid":"import-5d3fe535916c811ae9","weight":3},{"event_id":1358,"event_guid":"import-573de9e545c1cb82dd","weight":2},{"event_id":1476,"event_guid":"import-18ff532f1aae2ba415","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1562,"event_guid":"import-9bd054fef6a2a0b358","weight":2},{"event_id":1572,"event_guid":"import-4eec3a43cb7ad04ee9","weight":3},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":3},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":2},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":4},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":2},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":4},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":3},{"event_id":3038,"event_guid":"cf873495-8beb-47f3-a303-4893400ecf30","weight":3},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":3},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":3}]},{"guid":"import-e66c577d6e35b88f0c","title":"Changing techno-optimists by shaking up the bureaucrats","subtitle":null,"slug":"28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4903.en.html","description":"Meet the Netherlands: a nation filled with techno-optimists protecting\nour freedom by puting in place restrictions on what you can do, reducing\nour privacy and have technology as a solution for anything and\neverything. When you make a trip we store your details for two years,\nyour airplane meal selection from two years earlier is good data to test\nwith and when migrating the government website we keep the old website\nrunning in an unmaintained state. If you have nothing to hide nothing\ncan go wrong and there is nothing you can do.\n\nWell not quite. What would happen if you play the system? If you would\ntake the train and hack the card? What if you were to pick up the\nresistance you face and use it in your advantage. No matter what the\ncosts would carry on? If you would take some data and show the failures?\nNot just once but a full month long and call that month Leaktober. What\nif you would publicly call the failures with our personal data?\nUltimately you make a difference. You change the law, you changes the\nrules of the game and you really can raise the question if storing all\nthat data is really needed. Ultimately people really start to doubt if\nthis is the right way to go.\n\nThis is a strategic and tactical story on how you can regain some\nprivacy and data protection. Even though for a journalist this should be\nnormal work, thanks to some people these things become very personal. It\nends in criminal prosecution, legal threats, insults, a successful\ncounter hack and ultimately a lot of benefits. But standing up for a\ncause does work as long as you focus on the stories you want to bring.\nMy story is about hacking the system from the inside, overcoming fear\nand showing bureaucrats that hackers are people too. The talk is a\nlessons learnt how a few people can change a nation with hacker beliefs\nif they really want to. A guideline on how to make a difference by\nhacking the system you want to change. Where you can even make huge\nmistakes, but with some luck you can win a world. How you can make your\ncritical voice be heard. Zillions of lessons learnt.\n","original_language":"eng","persons":["Brenno de Winter"],"tags":["28c3"," Society and Politics"],"view_count":38,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-07-29T12:30:05.647+02:00","length":3112,"duration":3112,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-e66c577d6e35b88f0c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-e66c577d6e35b88f0c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats","url":"https://api.media.ccc.de/public/events/import-e66c577d6e35b88f0c","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":2},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":2},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":2},{"event_id":1627,"event_guid":"import-f578f04a483d452235","weight":2}]},{"guid":"import-a54618b083eeb9fc4d","title":"Building a Distributed Satellite Ground Station Network - A Call To Arms","subtitle":"Hackers need satellites.  Hackers need internet over satellites.  Satellites require ground stations.  Let's build them!","slug":"28c3-4699-en-building_a_distributed_satellite_ground_station_network","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4699.en.html","description":"As proposed by Nick Farr et al at CCCamp11, we - the hacker community - are in desperate need for our own communication infrastructure.  So here we are, answering the call for the Hacker Space Program with our proposal of a distributed satellite communications ground station network.  An affordable way to bring satellite communications to a hackerspace near you.\nWe're proposing a multi-step approach to work towards this goal by setting up a distributed network of ground stations which will ensure a 24/7 communication window - first tracking, then communicating with satellites.\nThe current state of a proof of concept implementation will be presented.\n","original_language":"eng","persons":["Andreas -horn- Hornig","hadez"],"tags":["28c3"," Hacking"],"view_count":187,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-14T16:45:10.638+01:00","length":3192,"duration":3192,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a54618b083eeb9fc4d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a54618b083eeb9fc4d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4699-en-building_a_distributed_satellite_ground_station_network","url":"https://api.media.ccc.de/public/events/import-a54618b083eeb9fc4d","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":757,"event_guid":"import-f0546db014bfefb027","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":985,"event_guid":"import-c0c97d7b572b39d4f7","weight":1},{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1545,"event_guid":"import-7c99fae19428fdbf5c","weight":1},{"event_id":1574,"event_guid":"import-883c7975dfe4f8c174","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1612,"event_guid":"import-708b15f151751c94c5","weight":1},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1677,"event_guid":"import-4b68a0b6bf95de3965","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1690,"event_guid":"import-064796b399907c0283","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1701,"event_guid":"import-033a8737829e937cdb","weight":1},{"event_id":1707,"event_guid":"import-637333afe02a1de8d8","weight":1},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":2},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":1},{"event_id":2154,"event_guid":"E95sP8WH8tLiiJj2SBAA1A","weight":1},{"event_id":2172,"event_guid":"ELK9-ZQeFcqKxBYW8eay8g","weight":1},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":1},{"event_id":2337,"event_guid":"78eefe47-3278-4259-8b03-26944b0bba7c","weight":1},{"event_id":2466,"event_guid":"882370ef-642d-43ba-b91d-22e9e87e9a1f","weight":1},{"event_id":2467,"event_guid":"89eb363f-e80f-4be8-941b-5b901724b999","weight":2},{"event_id":2508,"event_guid":"ed4bcb3b-fe2d-4728-812d-a45dbd4d01db","weight":2},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":1},{"event_id":2813,"event_guid":"7d2e79be-5d42-425b-a335-c41fd18431fb","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":1},{"event_id":2987,"event_guid":"9a2446e0-f287-4e92-9030-0df63edef025","weight":1},{"event_id":3078,"event_guid":"a46b1da6-60e5-42ea-b501-75e6e20f836d","weight":1},{"event_id":3274,"event_guid":"cec2c1dd-88ab-5fa8-80c1-686188641cc3","weight":1},{"event_id":3433,"event_guid":"da626bb9-5540-45e8-a13b-e5d8065755ea","weight":1},{"event_id":3598,"event_guid":"f75d0531-ac47-4edd-99bd-9eadd836982a","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3826,"event_guid":"78cf3095-ba39-52a4-b64a-28279355a7d3","weight":1},{"event_id":3831,"event_guid":"3fbcc011-9ccb-53bf-beae-75e0235f90e5","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4108,"event_guid":"a53b2bd1-2104-504f-8469-6eb198675c7b","weight":1},{"event_id":4372,"event_guid":"01d07c5c-8a4e-4dbf-acf5-126d738a1ddf","weight":1},{"event_id":4792,"event_guid":"6abb1f81-c163-4382-8838-8b684147d10c","weight":1},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":1},{"event_id":4806,"event_guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":1},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":1},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":1},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":1},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":1},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":1},{"event_id":5069,"event_guid":"84639ed6-fb5d-584a-a879-84e60b0cafd5","weight":1},{"event_id":5070,"event_guid":"a87a0521-6b12-5dca-851a-c32a13cc4581","weight":1},{"event_id":5075,"event_guid":"759bcf8b-b8d8-5087-9c02-0c2faa0ab8b4","weight":1},{"event_id":5083,"event_guid":"e340f48d-a241-5296-aea5-821917671506","weight":1},{"event_id":5085,"event_guid":"f64deec6-e13f-54e8-8afa-22cdcf9d8f81","weight":1},{"event_id":5088,"event_guid":"7a9b5382-8a68-5969-8891-045996c9870a","weight":1},{"event_id":5520,"event_guid":"xgeracUcSNLdmofWET4R6A","weight":1},{"event_id":5763,"event_guid":"e7828a90-6f0a-439b-a6a8-2e129a00b521","weight":1}]},{"guid":"import-20f1fedfeff9274553","title":"BuggedPlanet","subtitle":"Surveillance Industry \u0026 Country's Actings","slug":"28c3-4916-en-buggedplanet","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4916.en.html","description":"BuggedPlanet.Info is a small Wiki that tries to list and track down the activities of the surveillance industry in the fields of \"Lawful Interception\", Signals Intelligence (SIGINT), Communications Intelligence (COMINT) and related fields to gain access to data from telecommunication systems. In this talk I want to explain the idea behind the project and also discuss some observations made between industrial activites and governmental actings.\n","original_language":"eng","persons":["Andy Müller-Maguhn"],"tags":["28c3"," Society and Politics"],"view_count":156,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-07T11:45:04.859+01:00","length":3078,"duration":3078,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4916-en-buggedplanet_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4916-en-buggedplanet_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-20f1fedfeff9274553-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-20f1fedfeff9274553-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4916-en-buggedplanet","url":"https://api.media.ccc.de/public/events/import-20f1fedfeff9274553","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":85,"event_guid":"import-fd23a817a839cfdbd2","weight":1},{"event_id":1380,"event_guid":"import-88b547b1ad8db477bd","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":1},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":1}]},{"guid":"import-5df9e92b7e9a94d01d","title":"\"Neue Leichtigkeit\"","subtitle":"when unconditional artistic freedom happens","slug":"28c3-4832-de-neue_leichtigkeit","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4832.en.html","description":"Despite the vast new possibilities new medias offer to artists, musicians and composers, regulation authorities and governments are trimming creative minds in their freedom, introducing new laws, filters and limitations. On the example of \"Europa: Neue Leichtigkeit\" the immanence of unconditional artistic freedom in creativity is brought to the audience.\n","original_language":"eng","persons":["Alex Antener","Amelie  Boehm","Andrin Uetz","Jonas Bischof","ruedi tobler","Samuel Weniger"],"tags":["28c3"," Show"],"view_count":203,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-03T22:15:06.741+01:00","length":4203,"duration":4203,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4832-de-neue_leichtigkeit_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4832-de-neue_leichtigkeit_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-5df9e92b7e9a94d01d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-5df9e92b7e9a94d01d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4832-de-neue_leichtigkeit","url":"https://api.media.ccc.de/public/events/import-5df9e92b7e9a94d01d","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":194,"event_guid":"import-d042e285dfc7d821a1","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1156,"event_guid":"import-aa1a4dc28be69ad7a8","weight":2},{"event_id":1458,"event_guid":"import-d91ee307eb6ced5743","weight":2},{"event_id":1477,"event_guid":"import-633bd84860f65db047","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":2},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":3},{"event_id":1700,"event_guid":"import-badb660dc5d862b268","weight":2},{"event_id":1707,"event_guid":"import-637333afe02a1de8d8","weight":2},{"event_id":2078,"event_guid":"7156e245-d372-44d9-af0f-cbaa2e089f2c","weight":1},{"event_id":2138,"event_guid":"_cu7iZjLFBatSa21HCsJ0Q","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":3},{"event_id":2201,"event_guid":"xmlu4jFXkob2t8CUHi0Rng","weight":2},{"event_id":2252,"event_guid":"Lt7ABZNFLzAgdiGcpHPHUQ","weight":1},{"event_id":2256,"event_guid":"z84bCyzZ-xiYlyM83L5dig","weight":1},{"event_id":2309,"event_guid":"d0c4283e-2627-49f7-807d-13c96da8a8dd","weight":1},{"event_id":2388,"event_guid":"e9a54249-b4a7-4562-91fe-421a6bde0831","weight":1},{"event_id":2438,"event_guid":"ba45991d-6548-4a8f-90d8-da72fd417f89","weight":1},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":1},{"event_id":2449,"event_guid":"cd793876-8f18-46cf-a28e-304e290ca3fd","weight":1},{"event_id":2502,"event_guid":"a707951f-7f9c-4c8e-8f4f-b837f3581b7b","weight":2},{"event_id":2634,"event_guid":"c153ecc0-6ead-46ea-9bc7-8d2b774c4a3f","weight":1},{"event_id":2697,"event_guid":"cray","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2758,"event_guid":"aa45b26c-1669-44d0-b9bc-0b3064255597","weight":1},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":1},{"event_id":3034,"event_guid":"6e3c061e-495f-450b-ba96-c777c8669458","weight":1},{"event_id":3089,"event_guid":"f1c5a23a-8162-4a67-9605-60bbc83d98ec","weight":1},{"event_id":3092,"event_guid":"91d1c89b-2ffb-4e6d-ad94-3482edf11437","weight":1},{"event_id":3236,"event_guid":"3ed24374-7c3e-4d29-a13a-a0adb06e72f9","weight":1},{"event_id":3503,"event_guid":"6a75e5a6-3532-ff79-dca5-a6850e3991e6","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":3787,"event_guid":"f3358998-1465-4445-885e-74d880be57d0","weight":1},{"event_id":4756,"event_guid":"ff07fa0e-c32a-11e7-b8e4-fb6414355a49","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":2},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":1},{"event_id":4806,"event_guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","weight":1},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":1},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":3},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":2}]},{"guid":"import-a9c9273e3172d5e77c","title":"Der Staatstrojaner","subtitle":"Vom braunen Briefumschlag bis zur Publikation","slug":"28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4901.en.html","description":"0zapftis wird aus Sicht der Technik und unter juristischen Gesichtspunkten analysiert.\n","original_language":"eng","persons":["0zapfths","Constanze Kurz","Frank Rieger","Ulf Buermeyer"],"tags":["28c3"," Hacking"],"view_count":1153,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-04T21:30:07.016+02:00","length":7689,"duration":7689,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a9c9273e3172d5e77c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a9c9273e3172d5e77c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik","url":"https://api.media.ccc.de/public/events/import-a9c9273e3172d5e77c","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":585,"event_guid":"import-d94f5d200796e19ab4","weight":6},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":6},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":10},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":9},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":23},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":25},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":7},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":2},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":8},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":2},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":2},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":8},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":6},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":12},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":2},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":11},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":16},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":2},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":2},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":6},{"event_id":2134,"event_guid":"1__cd06WAoENTm6JjzMJVA","weight":2},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":8},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":23},{"event_id":2256,"event_guid":"z84bCyzZ-xiYlyM83L5dig","weight":2},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":12},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":13},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":2},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":2},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":3},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":11},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":3},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":19},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":3},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":15},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":2},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":6},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":2},{"event_id":6114,"event_guid":"02a2a813-6981-438c-ad51-a1b55d79e613","weight":7}]},{"guid":"import-a5bb0702e23237f62d","title":"Fnord-Jahresrückblick","subtitle":"von Atomendlager bis Zensus","slug":"28c3-4936-en-fnord_jahresrueckblick","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4936.en.html","description":"Auch dieses Jahr werden wir euch wieder mit den Fnords des Jahres zu unterhalten suchen.\n","original_language":"eng","persons":["Felix von Leitner","Frank Rieger"],"tags":["28c3"," Community"],"view_count":457,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-24T22:00:10.199+01:00","length":4547,"duration":4547,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4936-en-fnord_jahresrueckblick_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4936-en-fnord_jahresrueckblick_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-a5bb0702e23237f62d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-a5bb0702e23237f62d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4936-en-fnord_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-a5bb0702e23237f62d","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":6},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":11},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":22},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":4},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":57},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":30},{"event_id":1816,"event_guid":"SQ8Tgi8YgRRsHy76BWIJ3A","weight":13},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":11},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":14}]},{"guid":"import-f578f04a483d452235","title":"Almighty DNA?","subtitle":"Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat","slug":"28c3-4913-de-almighty_dna_and_beyond","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4913.en.html","description":"Die Erstellung von Personenprofilen aus DNA und ihre Speicherung in polizeilichen Datenbanken erfreut sich allgemeiner Akzeptanz. Die Annahme ist weitverbreitet, es ginge dabei allein um die Aufklärung von Mord und Totschlag. Tatsächlich speichert das Bundeskriminalamt hier aber Datensätze auf Vorrat und zwar aus immer geringfügigeren Anlässen und in immer größerer Zahl. Zudem werden die DNA-Datenbanken der europäischen Polizeien derzeit miteinander vernetzt. Das ist umso beunruhigender, als wir alle beständig DNA hinterlassen, ob nun in Haaren, Hautabrieb oder Speichel.\n","original_language":"eng","persons":["Susanne Schultz","Uta Wagenmann"],"tags":["28c3"," Society and Politics"],"view_count":85,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-12-31T16:30:12.540+01:00","length":3569,"duration":3569,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4913-de-almighty_dna_and_beyond_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4913-de-almighty_dna_and_beyond_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-f578f04a483d452235-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-f578f04a483d452235-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4913-de-almighty_dna_and_beyond","url":"https://api.media.ccc.de/public/events/import-f578f04a483d452235","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":1529,"event_guid":"import-2dc039fa73eabade8b","weight":2},{"event_id":1535,"event_guid":"import-e66c577d6e35b88f0c","weight":2},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":2},{"event_id":1613,"event_guid":"import-4ca4182224f147e99b","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1635,"event_guid":"import-6759f85503c389e44a","weight":2},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":2}]},{"guid":"import-11953790f175f05f25","title":"Security Nightmares","subtitle":null,"slug":"28c3-4937-en-security_nightmares","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4937.en.html","description":"\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["28c3"," Hacking"],"view_count":298,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-03T15:30:12.479+01:00","length":5591,"duration":5591,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4937-en-security_nightmares_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4937-en-security_nightmares_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-11953790f175f05f25-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-11953790f175f05f25-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4937-en-security_nightmares","url":"https://api.media.ccc.de/public/events/import-11953790f175f05f25","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":5},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":8},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":34},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":5},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":11},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":8},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":5},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":5}]},{"guid":"import-052f3eb3e03ca7685e","title":"Security Log Visualization with a Correlation Engine","subtitle":"What's inside your network?","slug":"28c3-4767-en-security_log_visualization_with_a_correlation_engine","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4767.en.html","description":"This brief session focuses on the visualization of actual security incidents, network forensics and counter surveillance of covert criminal communications utilizing large data sets from various security logs and a very brief introduction to correlation engine logic. Visually displaying security or network issues can express the risk or urgency in a way a set of dry logs or other methods might not be able to. Additionally, many organizations rely on a more singular approach and react to security events, many times from a high false positive rate source such as isolated intrusion prevention or firewall alerts, or relying only on anti-virus alerts. Utilizing a correlation engine (especially open source) or similar applications could offer a method of discovering or in some cases proactively detecting issues.  The research discussed involves analysis and interrogation of firewall, intrusion detection and prevention systems, web proxy logs and available security research. What does a compromised server infected with spam malware look like or cyber warfare?  \n","original_language":"eng","persons":["Chris Kubecka"],"tags":["28c3"," Hacking"],"view_count":143,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-29T21:00:05.268+02:00","length":1552,"duration":1552,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-052f3eb3e03ca7685e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-052f3eb3e03ca7685e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4767-en-security_log_visualization_with_a_correlation_engine","url":"https://api.media.ccc.de/public/events/import-052f3eb3e03ca7685e","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":563,"event_guid":"import-ef2be2cea3b7d868a1","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":1},{"event_id":1334,"event_guid":"import-999159d42d326f39e3","weight":1},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":1549,"event_guid":"import-6816b7029c0aff79fc","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":3},{"event_id":1553,"event_guid":"import-dce44ea8bd3c4c8a82","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":1},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":1},{"event_id":1678,"event_guid":"import-499496e1f8d0dc96ab","weight":2},{"event_id":2008,"event_guid":"zLQRrJi05bpzgkLweZJT1Q","weight":2},{"event_id":2189,"event_guid":"0T8GTXjwMVJLM_n5VEuE0A","weight":1},{"event_id":2809,"event_guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","weight":1},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":1},{"event_id":3009,"event_guid":"0bffe7b2-a0db-4827-9a64-33434bdc98e6","weight":1},{"event_id":3112,"event_guid":"c01432ad-d78f-4e16-9e19-22469af9050a","weight":1},{"event_id":3617,"event_guid":"cb67ad7f-7e12-4f34-aec0-748a61f3f958","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":4217,"event_guid":"8da84e68-73c0-11e7-ac71-d3b143ff9640","weight":1},{"event_id":4505,"event_guid":"2ed7a74e-13b3-585a-a307-8480d9e52255","weight":1},{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":1},{"event_id":4673,"event_guid":"dc224041-cb12-4890-bbb5-f7931e2f21d8","weight":1},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":1},{"event_id":4811,"event_guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","weight":1},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":1},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":1},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":1},{"event_id":5872,"event_guid":"312d822c-3eb4-5f9d-8be4-6b86eb7bc133","weight":1},{"event_id":5891,"event_guid":"3e438374-852f-5e6b-874f-629316167593","weight":1},{"event_id":6027,"event_guid":"566feb76-ea6c-4448-a161-fae24b66344c","weight":1},{"event_id":6248,"event_guid":"a142251b-81f2-4195-95ba-c0f3818ce884","weight":1}]},{"guid":"import-d31b8d9b757884b585","title":"Reverse Engineering USB Devices","subtitle":null,"slug":"28c3-4847-en-reverse_engineering_usb_devices","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4847.en.html","description":"While USB devices often use standard device classes, some do not. This talk is about reverse engineering the protocols some of these devices use, how the underlying USB protocol gives us some help, and some interesting patterns to look for. I'll also detail the thought processes that went into reverse engineering the Kinect's audio protocol.\n","original_language":"eng","persons":["Drew Fisher"],"tags":["28c3"," Hacking"],"view_count":406,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-13T18:30:07.114+01:00","length":1562,"duration":1562,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4847-en-reverse_engineering_usb_devices_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4847-en-reverse_engineering_usb_devices_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d31b8d9b757884b585-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d31b8d9b757884b585-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4847-en-reverse_engineering_usb_devices","url":"https://api.media.ccc.de/public/events/import-d31b8d9b757884b585","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1226,"event_guid":"import-ed5bb2398b87bd6661","weight":2},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":2},{"event_id":1443,"event_guid":"import-efd5abc0c512df9166","weight":3},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":2},{"event_id":1530,"event_guid":"import-6fdeaba494d8699165","weight":3},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":5},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":3},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":3},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":2},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":2},{"event_id":1578,"event_guid":"import-dd7f992024a421b675","weight":2},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":5},{"event_id":1591,"event_guid":"import-a110a31f1ffd593368","weight":2},{"event_id":1595,"event_guid":"import-b00e23ddd70d2f59fb","weight":2},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":5},{"event_id":1608,"event_guid":"import-9013654b84fc374d59","weight":2},{"event_id":1611,"event_guid":"import-04cbf6a2c645f0f640","weight":3},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":2},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":2},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":3},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":2},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":2},{"event_id":1806,"event_guid":"IE5aOu8FUaPfpFv5v4rtJg","weight":2},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":2},{"event_id":3254,"event_guid":"7eab2c8e-e7c8-5687-a77f-05ecd52f26cc","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3765,"event_guid":"1e162894-cf1d-4670-934f-1909e52fc4ac","weight":2},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":2},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":3},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":2}]},{"guid":"import-d1a493606dd9ac5007","title":"Privacy Invasion or Innovative Science?","subtitle":"Academia, social media data, and privacy","slug":"28c3-4712-en-mining_your_geotags","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4712.en.html","description":"A practical discussion of how potentially revolutionary, yet ethically questionable data---such as that from facebook---is currently being handled in academia.\n","original_language":"eng","persons":["Conrad Lee"],"tags":["28c3"," Society and Politics"],"view_count":16,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-08-24T08:45:03.304+02:00","length":2446,"duration":2446,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4712-en-mining_your_geotags_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4712-en-mining_your_geotags_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d1a493606dd9ac5007-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d1a493606dd9ac5007-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4712-en-mining_your_geotags","url":"https://api.media.ccc.de/public/events/import-d1a493606dd9ac5007","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":2492,"event_guid":"2b4f6479-8241-4ede-b025-328d476c52ba","weight":1}]},{"guid":"import-dc19512cf9bb9158fd","title":"The Atari 2600 Video Computer System: The Ultimate Talk","subtitle":"The history, the hardware and how to write programs","slug":"28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4711.en.html","description":"Going more retro than the Commodore C=64: The Atari 2600 VCS was the breakthrough for video games in your own living room. This lecture will cover a bit of the history on how it came to live, describes the hardware used and shows how to write your own code for it.\n","original_language":"eng","persons":["Sven Oliver ('SvOlli') Moll"],"tags":["28c3"," Hacking"],"view_count":815,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-05T03:45:03.179+02:00","length":3659,"duration":3659,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-dc19512cf9bb9158fd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-dc19512cf9bb9158fd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk","url":"https://api.media.ccc.de/public/events/import-dc19512cf9bb9158fd","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":42},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":10},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":15},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":5},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":11},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":23},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":31},{"event_id":3403,"event_guid":"ca11e7f4-633d-4ae8-aff6-b1b90e15fc12","weight":4},{"event_id":3508,"event_guid":"b55b6342-e094-8cb0-c445-1d6a1be2e552","weight":12},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":7},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":36},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":27},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":4},{"event_id":6532,"event_guid":"94447a62-a3ba-4f6d-a3b7-b5318a954651","weight":4}]},{"guid":"import-9d9c56ae1d5816730b","title":"Datamining for Hackers","subtitle":"Encrypted Traffic Mining","slug":"28c3-4732-en-datamining_for_hackers","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4732.en.html","description":"This talk presents Traffic Mining (TM) particularly in regard to VoiP applications such as Skype. TM is a method to digest and understand large quantities of data.\n","original_language":"eng","persons":["Stefan Burschka"],"tags":["28c3"," Hacking"],"view_count":178,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-10-19T07:45:03.831+02:00","length":3286,"duration":3286,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4732-en-datamining_for_hackers_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4732-en-datamining_for_hackers_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-9d9c56ae1d5816730b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-9d9c56ae1d5816730b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4732-en-datamining_for_hackers","url":"https://api.media.ccc.de/public/events/import-9d9c56ae1d5816730b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":3},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1772,"event_guid":"seTBwtIxwEedOMpITZG7EQ","weight":3},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":3}]}]}