{"acronym":"DS2019","aspect_ratio":"16:9","updated_at":"2026-03-26T16:45:07.836+01:00","title":"Datenspuren 2019","schedule_url":"https://www.datenspuren.de/2019/fahrplan/schedule.xml","slug":"conferences/datenspuren/2019","event_last_released_at":"2019-09-22T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/datenspuren/2019","logo_url":"https://static.media.ccc.de/media/events/datenspuren/2019/logo.png","images_url":"https://static.media.ccc.de/media/events/datenspuren/2019","recordings_url":"https://cdn.media.ccc.de/events/datenspuren/2019","url":"https://api.media.ccc.de/public/conferences/DS2019","events":[{"guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","title":"A!Live in Dresden","subtitle":"Aufwachen! \u0026 Nachrichten gucken mit Tilo und Stefan","slug":"ds19-10470-a_live_in_dresden","link":"https://datenspuren.de/2019/fahrplan/events/10470.html","description":"Tilo Jung, Stefan Schulz und Hans Jessen kommen nach Dresden und machen den zweiten A!Live außerhalb Berlins.\n\nhttps://aufwachen-podcast.de/termine/alive-in-dresden/","original_language":"deu","persons":["Stefan Schulz","Tilo Jung"],"tags":["DS2019","10470","2019","Datenspuren"],"view_count":290,"promoted":false,"date":"2019-09-20T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2025-04-27T14:30:02.635+02:00","length":7569,"duration":7569,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10470-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10470-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10470-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10470-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10470-a_live_in_dresden","url":"https://api.media.ccc.de/public/events/f1e4f555-53f0-40b9-9c70-eb7034b9e675","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":6902,"event_guid":"1679ccc6-2020-53b0-aaa5-670302ae881f","weight":1},{"event_id":7875,"event_guid":"21aca390-bc0c-5eef-a867-1b57a7ee36ab","weight":1},{"event_id":7927,"event_guid":"2be638a0-b0ff-5114-a1f2-5bcee3af5a91","weight":1},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":22},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":6},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":10},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":11},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":7},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":6},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":13},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":7},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":6},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":18},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":27}]},{"guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","title":"Our enemies in blue - Kristian Williams","subtitle":null,"slug":"ds19-10398-our_enemies_in_blue_-_kristian_williams","link":"https://datenspuren.de/2019/fahrplan/events/10398.html","description":"Sometimes things in our society can look as if they were always there.\nTake for example police. Today majority of the people living next to us\ncan’t imagine the world without police in our neighborhood. However it\nwas not always like that.\nKristian Williams, anarchist and author of Our Enemies in Blue and Fire\nthe Cops, will talk about the history of policing in the United States,\nfrom its origin in slave patrols to the present era of militarization\nand community policing.\nParticular attention will be given to the role of police in repression\nmovement fighting for social justice and greater equality.","original_language":"eng","persons":["Kristian Williams"],"tags":["DS2019","10398","2019","Libertäre Tage"],"view_count":221,"promoted":false,"date":"2019-09-20T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-02-03T22:15:12.319+01:00","length":3383,"duration":3383,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10398-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10398-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10398-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10398-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10398-our_enemies_in_blue_-_kristian_williams","url":"https://api.media.ccc.de/public/events/3dfebbb5-eb33-4779-9440-c9c902983b82","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7856,"event_guid":"d7c44ea4-ca2c-51d1-b5b1-87aa7c6a1253","weight":5},{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":5},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":7},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":8},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":5},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":5},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":7}]},{"guid":"312797c4-bcc5-4113-bcee-e331da77774a","title":"Bits und Bäume","subtitle":"Eine nachhaltige Digitalisierung wär^W ist möglich!","slug":"ds19-10452-bits_und_baume","link":"https://datenspuren.de/2019/fahrplan/events/10452.html","description":"Digitalisierung und Nachhaltigkeit sind die entscheidenden, existenziellen Herausforderungen des 21. Jahrhunderts. Obwohl beide Themen stark miteinander wechselwirken, werden sie bislang noch viel zu wenig gemeinsam gedacht und diskutiert. Die Bits\u0026Bäume-Bewegung möchte das ändern! Gemeinsam wollen Menschen aus der Nachhaltigkeitsbewegung und der Tech-Szene aufzeigen, was Digitalisierung und Nachhaltigkeit verbindet und rufen dazu auf, die Grenzen der eigenen Filterblase zu erweitern. Die zentrale Frage lautet dabei: \"Wie kann Digitalisierung vom Brandbeschleuniger sozialer und ökologischer Probleme zu einem Teil der Lösung werden?\" Der Vortrag gibt - basierend auf den bisherigen Veranstaltungen - einen Überblick, was theoretisch getan werden müsste und stellt andererseits Maßnahmen zur Diskussion, die tatsächlich getan werden können.\n\n\nDie auf der 1. Bits-und-Bäume-Konferenz 2018 in Berlin erarbeiteten \u003ca href=\"https://bits-und-baeume.org/forderungen/info/de\"\u003eForderungen\u003c/a\u003e umfassen die Themenfelder Gemeinwohlorientierung, Demokratie, Datenschutz und Kontrolle von Monopolen, Bildung, Entwicklungs- und Handeslpolitk, IT-Sicherheit, sowie die Langlebigkeit von Software und Hardware. Zum Beispiel wird von Unternehmen gefordert, in Produktionsländern menschenrechtliche und ökologische Sorgfaltspflichten einzuhalten oder dass Software-Hersteller die Verantwortung für Sicherheitslücken in ihren Produkten tragen. Diese Forderungen sind einerseits also sehr naheliegend und in ihrer Plausibilität schon fast trivial. Andererseits verdeutlicht ein Abgleich mit der aktuellen Realität doch, wie groß die Missstände tatsächlich sind. Der Wert der elf Forderungen liegt darin, das große Ganze im Blick zu haben. Papier - auch digitales - ist aber geduldig und vom Aufschreiben der Forderungen allein werden diese nicht umgesetzt.\u003cbr\u003e\u003cbr\u003e\n\nDie Herausforderung besteht nun darin, Maßnahmen auf individueller, zivilgesellschaftlicher, unternehmerischer und politischer Ebene zu finden und umzusetzen, welche die Digitalisierung im Sinne der B\u0026B-Forderungen umgestalten - Schritt für Schritt und voraussichtlich gegen Widerstände und Beharrungskräfte. ","original_language":"deu","persons":["Carsten Knoll","mcnesium"],"tags":["DS2019","10452","2019","Datenspuren"],"view_count":256,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-01-22T10:45:13.600+01:00","length":2457,"duration":2457,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10452-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10452-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10452-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10452-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10452-bits_und_baume","url":"https://api.media.ccc.de/public/events/312797c4-bcc5-4113-bcee-e331da77774a","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":8},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":8},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":6},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":6},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":6},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":9},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":7},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":9}]},{"guid":"e8a3d7ca-e4f4-40b4-9c60-9d52696fc674","title":"Warum rechte Politik die KI-Entwicklung in die Irre führt","subtitle":null,"slug":"ds19-10491-warum_rechte_politik_die_ki-entwicklung_in_die_irre_fuhrt","link":"https://datenspuren.de/2019/fahrplan/events/10491.html","description":"Der Talk bietet einen aktuellen Einblick zum Statua Quo zum\nThema Entwicklung und Anwendung von Algorithmen und KI, den damit\nbeteiligten Akteuren und den Bugs …\n\nDer Talk bietet einen aktuellen Einblick zum Statua Quo zum\nThema Entwicklung und Anwendung von Algorithmen und KI, den damit beteiligten Akteuren und den Bugs. Der Schwerpunkt liegt aber auf der Frage, welche KI brauchen und wollen wir. Und stellt zur Debatte die Frage: \"Sollen alle überleben oder keiner\" bzw. \"Betrachten wir den Menschen als Sicherheitsrisiko oder den Klimawandel?\" Am Ende werden Ansätze skizziert für eine KI-Entwicklung, die dem Menschen dient.","original_language":"deu","persons":["@phaenomen"],"tags":["DS2019","10491","2019","Datenspuren"],"view_count":140,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2025-07-20T01:00:03.967+02:00","length":2189,"duration":2189,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10491-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10491-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10491-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10491-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10491-warum_rechte_politik_die_ki-entwicklung_in_die_irre_fuhrt","url":"https://api.media.ccc.de/public/events/e8a3d7ca-e4f4-40b4-9c60-9d52696fc674","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":1},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":1},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":1},{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":4},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":2},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":4},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":2},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":4},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":8},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":5},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":5},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":7},{"event_id":8041,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb8103","weight":4}]},{"guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","title":"Am Anfang war die Information","subtitle":"Digitalisierung als Religion","slug":"ds19-10458-am_anfang_war_die_information","link":"https://datenspuren.de/2019/fahrplan/events/10458.html","description":"Alternative Fakten? Wie konnte es passieren, dass Gerücht, Lüge, Fakt und Wahrheit ununterscheidbar wurden?\n\nRobert Feustel untersucht die Wissensgeschichte von der Industrialisierung bis zur Digitalisierung und zeigt, wie im sogenannten Informationszeitalter ebenjene „Information“ zum Heiligen Geist mutierte und den Unterschied zwischen Wahrheit und Lüge einebnet: Hauptsache sie zirkulieren möglichst reibungslos und in Echtzeit. Schließlich gerät auch das Bild des Menschen in den Sog der Digitalisierung. Was unterscheidet das menschliche Denken vom prozessierenden Computer?\n\n\nDie neue Illusion vom allein Informationen verarbeitenden Menschen reduziere ihn auf sein Gehirn und übergehe Gefühle, Intuition, Vorstellungskraft und alles Seelische. Das gehe nicht ohne Kollateralschäden ab, stellt Robert Feustel fest.\nBodo Morshäuser / Deutschlandfunk Kultur\n\nMit popkulturellen Bezügen geht er dem Kult hinter dem „Konzept Information“ auf den Grund und analysiert die Unschärfe des Informationsbegriffs, der im Zuge der Digitalisierung laut Feustel eine neutrale und objektive Kontur bekam.\nPaul Hafner / Buchkultur","original_language":"deu","persons":["Robert Feustel"],"tags":["DS2019","10458","2019","Datenspuren"],"view_count":133,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2025-01-05T01:30:09.803+01:00","length":3210,"duration":3210,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10458-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10458-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10458-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10458-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10458-am_anfang_war_die_information","url":"https://api.media.ccc.de/public/events/fc47f807-2b7a-4409-b980-3e12322fe6d5","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7923,"event_guid":"19b2b529-d037-53ac-8e5e-81028aea4827","weight":2},{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":4},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":5},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":4},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":3},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":5},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":7},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":5},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":5},{"event_id":7967,"event_guid":"e8a3d7ca-e4f4-40b4-9c60-9d52696fc674","weight":3},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":5},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":4},{"event_id":7984,"event_guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","weight":3},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":2},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":5},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":8}]},{"guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","title":"Patch your Passwords","subtitle":"Ein Plädoyer für einen digital mündigen Bürger","slug":"ds19-10455-patch_your_passwords","link":"https://datenspuren.de/2019/fahrplan/events/10455.html","description":"Nachdem der Verlag Heise in der C'T schon GnuPG für tot und unbrauchbar erklärt hat, wird nun der Abschied vom Passwort gefordert und FIDO2 als Nachfolger präsentiert. FIDO2 bietet endlich Schutz vor Phishing und identitätsdiebstahl.\nWas ist davon zu halten?\nEs gibt bereits seit vielen Jahren nutzbare und wirklich sichere Alternativen zu unsicheren Passworten; allerdings lässt die Nutzung und Verbreitung dieser Alternativen zu wünschen übrig.\nIn meinem Vortrag werde ich im Detail einige dieser Alternativen, dazu gehört auch der \"Neue Personalausweis\" (nPA), aufzeigen und auch auf Hindernisse und Hürden dieser Alternativen verweisen.\nIm Kern sollten die Endnutzer über soviel Fachwissen verfügen, dass sie die vielen Alternativen einschätzen können und sich für die in ihrem jeweiligen Fall angemessen Lösung entscheiden können.\nDaraus ergibt sich für die Community die Forderung, IT Security Awareness Schulungen durchzuführen.\nAnhand diverser Beispiele wird das bisher gesagte vertieft.\nIn dem Vortrag wird auf die Verwendung von Zertifikaten eingegangen.\n\nBeispiele, die in dem Vortrag genannt werden: \n1. Tracking Cookies und die DSGVO. Letztere verlangt die explizite Zustimmung und Einwilligung. Der Endanwender wird aber nur sehr selten über den Verarbeitungszweck ausführlich informiert.\n2. Banken und ihre Art der Identifizierung ihrer Kunden. Identitätsdiebstahl hat für die Betroffenen teils schwerwiegende Folgen. Oftmals sind hier zivilrechtliche Ansprüche zu prüfen und die Beweislage ist für die Betroffenen äußerst ungünstig. Was tun?\n3. Hatespeech im Namen anderer zu versenden ist schon schlimm. Wenn aber der Empfänger solcher Nachrichten den vermeintlichen Absender öffentlich attackiert, wird es für die Betroffenen hart.\n\nEs wird bis zum Tag der Datenspuren bestimmt mehr aktuelle Beispiele geben. da bin ich mir sicher. ","original_language":"deu","persons":["Reinhard Mutz"],"tags":["DS2019","10455","2019","Datenspuren"],"view_count":297,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-01-27T13:15:09.043+01:00","length":3343,"duration":3343,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10455-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10455-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10455-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10455-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10455-patch_your_passwords","url":"https://api.media.ccc.de/public/events/aa7eeb68-2328-48b9-af5f-25e7d98333d6","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":12},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":10},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":13},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":16},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":12},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":18},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":36}]},{"guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","title":"IT-Sicherheit für Verbraucher stärken","subtitle":"Entwicklung eines IT-Sicherheitsbewertungssystems für \"intelligente\" Produkte: Auf dem Weg zu einem sicheren Internet der Dinge für Verbraucher","slug":"ds19-10437-it-sicherheit_fur_verbraucher_starken","link":"https://datenspuren.de/2019/fahrplan/events/10437.html","description":"Wie ist der Stand der IT-Sicherheit bei Verbraucherprodukten? Wie könnten europaweit verbindliche Vorgaben zur IT-Sicherheit gemacht werden? Wie lässt sich die IT-Sicherheit eines Produkts transparenter machen? Informatikerin Anja Hirschel und der Europaabgeordnete Patrick Breyer schlagen ein Bewertungssystem zur IT-Sicherheit von Produkten vor und haben einen entsprechenden Antrag eingereicht.\nWie nützlich wäre eine „IT-Sicherheitsampel“ (ähnlich Ernährungsampel) oder bestimmte Icons, die klar zeigen, ob ein Produkt aktualisierbar ist, verschlüsseln kann usw.?\n\nEinreichungstext des Forschungsprojektes:\n\nWhen buying goods with embedded digital technology, like smart products\n(e.g. connected cars, mobile phones, 'Smart TVs' or any other ‘smart’\nproducts that make up the Internet of Things), which IT security\nfeatures are to be subject to the contract? The answer should be clear for the consumer.\n\nWith the Internet of things, 'smart' devices start affecting the world\nin a direct and physical manner (e.g. car technology). IT devices that\nare insecure and vulnerable to integrity and availability threats\nincreasingly risk our lives and property.\n\nConsumers will get more and more familiar with the digital world, and in particular with 'smart' goods. Such growing digital literacy will favour\nthe demand for easy access to more detailed information about smart\ngoods and about how to facilitate their use.\n\nThe Pilot Project will aim to make the new 'Digital Contract' rules\neasily readable for consumers thanks to the development of an IT\nsecurity rating system for smart goods. This IT rating system could for instance consist in 'traffic lights' or icons that would show whether a device will be automatically updated, whether encryption will be applied\nto stored data, or other security features. This information will\ntrigger the consumer's rights and the manufacturer's liability.\n\nAccording to the Digital Content Directive, suppliers of digital goods\nand services will have to provide updates to smart goods, which is not\njust important to make them function longer, but also to increase\ncybersecurity. The Directive provides for objective requirements for the\nconformity of the goods and services, including performance features\nsuch as those related to security, which the consumer may reasonably\nexpect. Thanks to the rating system in 'smart' goods, consumers will for\ninstance know whether such updates happen automatically.\n\nIn order to foster EU innovation in the highly competitive field of the\nInternet of Things (IoT), the European industry needs to attract EU\nconsumers with consumer friendly features in the development of their\nproducts. The legal protection of consumers, and the legal certainty\nabout such protection, are key in developing future markets and make the\nEU compete worldwide, while keeping high level EU standards of consumer\nprotection. Defining a common set of standard rules to rate smart goods\nand their contractual mechanisms could be an asset for European SMEs\nwishing to make their products consumer friendly. This can also support\nthe EU-level development of 'legal design' tools on contract rules to be\nfurther developed by industry players in the field of IoT products, in\npartnership with lawyers and data protection experts.\n\nJUSTIFICATION:\n\nThe European legislator has endeavoured to bring clear legal solutions\nfor consumers, especially when buying 'smart goods', with a Directive on\nContracts for the Supply of Digital Content and Digital Services, and\nwith a Directive on the Sale of Goods, both adopted in 2019. However,\npractical solutions are needed to make sure that consumers can identify\nand compare the IT security features of 'smart goods' and exercise their\ncontractual rights in this respect.","original_language":"deu","persons":["Anja Hirschel","Patrick Breyer"],"tags":["DS2019","10437","2019","Datenspuren"],"view_count":120,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2025-12-17T13:15:08.548+01:00","length":2289,"duration":2289,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10437-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10437-it-sicherheit_fur_verbraucher_starken","url":"https://api.media.ccc.de/public/events/da46e33d-bcf4-4d5b-88f9-e5715a6190f6","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":6},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":7},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":8},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":13},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":14}]},{"guid":"1401efe8-8951-4097-81c3-bedc789a12c2","title":"Angewandter Datenschutz","subtitle":null,"slug":"ds19-10467-angewandter_datenschutz","link":"https://datenspuren.de/2019/fahrplan/events/10467.html","description":"Dieser Vortrag gibt einen Überblick wie Datenschutz in der Praxis umgesetzt werden kann.","original_language":"deu","persons":["Martin Christian"],"tags":["DS2019","10467","2019","Datenspuren"],"view_count":334,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-02-11T17:00:07.777+01:00","length":2490,"duration":2490,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10467-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10467-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10467-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10467-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10467-angewandter_datenschutz","url":"https://api.media.ccc.de/public/events/1401efe8-8951-4097-81c3-bedc789a12c2","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":5},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":10},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":5},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":20},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":9},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":7},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":9},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":13},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":9},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":10},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":18},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":29}]},{"guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","title":"Who needs money? – Cash for FOSS","subtitle":"Bewerbt euch zur siebten Runde des Prototype Funds!","slug":"ds19-10379-who_needs_money_cash_for_foss","link":"https://datenspuren.de/2019/fahrplan/events/10379.html","description":"Wir stellen unser Förderprogramm für Open-Source-Softwareentwicklung vor und laden zur Bewerbung für die aktuelle Förderrunde ein.\n\nDer Prototype Fund ist ein Förderprogramm für selbständige Software-Entwickler*innen und kleine Teams, die innovative Ideen prototypisch umsetzen wollen. Sie bekommen dafür fast 50.000 Euro Förderung vom Bundesministerium für Bildung und Forschung. Wir unterstützen die Projekte nicht nur finanziell, sondern auch ideell, mit Weiterbildungen, Zugang zu Netzwerken und Coachings.\n\nMit dem Prototype Fund fördern wir Public Interest Tech in Deutschland, wir fördern Talente und helfen ihnen dabei, sich zu professionalisieren. Wir schaffen damit ein positives Klima für neue Ideen und mehr Experimentierfreudigkeit.\n\nUns ist besonders wichtig, dass die Bewerbung und die Förderung möglichst unbürokratisch sind. Damit sprechen wir eine neue Zielgruppe an, die besonders engagiert und agil ist und die sich bisher im Fördersystem nicht wiedergefunden hat. Es geht hier um anwendungsnahe Projekte an der Schnittstelle von Technologie und gesellschaftlichen Herausforderungen. Mit ihnen wollen wir die Technikentwicklung vorantreiben.\n\nBis zum 30.9. könnt ihr euch für unsere siebte Bewerbungsrunde bewerben.","original_language":"deu","persons":["Thomas Friese","Marie Gutbub"],"tags":["DS2019","10379","2019","Datenspuren"],"view_count":118,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2025-11-16T11:30:08.566+01:00","length":1858,"duration":1858,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10379-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10379-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10379-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10379-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10379-who_needs_money_cash_for_foss","url":"https://api.media.ccc.de/public/events/71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":5809,"event_guid":"68e5d6b9-b0cb-4317-b724-5f45145c7eba","weight":1},{"event_id":7878,"event_guid":"dcabb3af-fcac-5e83-a77d-5aa655cd95b3","weight":3},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":5},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":3},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":6},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":4},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":4},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":8},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":5},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":4},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":3},{"event_id":7967,"event_guid":"e8a3d7ca-e4f4-40b4-9c60-9d52696fc674","weight":3},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":7},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":3},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":3},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":3},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":5}]},{"guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","title":"SDR – Was ist eigentlich sonst noch im Äther?","subtitle":"Sicherheit von Zutrittssystemen am Beispiel eines UHF-Tags.","slug":"ds19-10441-sdr_was_ist_eigentlich_sonst_noch_im_ather","link":"https://datenspuren.de/2019/fahrplan/events/10441.html","description":"Hacker tüfteln mit verspielter Hingabe. Hacker machen Angst, indem sie ihr Wissen für Machtspielchen oder zur Machtdemonstration nutzen. Hacker mit entsprechenden ethisch moralischen Grundmoralvorstellungen klären auf, damit kein Raum für Machtspielchen bleibt. Mit diesem Vortrag möchten wir speziell bei funkbasierten Zutrittssystem aufklären. Wir zeigen anhand eines Beispiels im 900MHz-Band Signalanalysen und was man bei der Funkkommunikation beachten sollte. Dazu verwenden wir Software Defined Radio (SDR). Darin werden komplexe Verarbeitungsschritte in der Signalverarbeitung mittels Software gelöst. Das ist zwar langsam, bietet hingegen unglaubliche Flexibilität.\n\n?","original_language":"deu","persons":["Stephan Radke"],"tags":["DS2019","10441","2019","Datenspuren"],"view_count":327,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-03-04T01:45:03.180+01:00","length":1826,"duration":1826,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10441-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10441-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10441-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10441-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10441-sdr_was_ist_eigentlich_sonst_noch_im_ather","url":"https://api.media.ccc.de/public/events/6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":5},{"event_id":7846,"event_guid":"dc8b3e8c-0831-5725-a64a-2c8cd7737580","weight":7},{"event_id":7864,"event_guid":"3d439f1d-e67a-5e92-96b6-3a9c5ad30965","weight":5},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":5},{"event_id":7873,"event_guid":"bc369d82-ced8-535d-a824-32b2efdf9528","weight":3},{"event_id":7882,"event_guid":"a738a107-7051-544d-98cf-b6c3adce4a3f","weight":5},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":13},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":11},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":9},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":5},{"event_id":7942,"event_guid":"3f45e2b8-06ce-5377-ae86-c26ab64197dd","weight":2},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":17},{"event_id":7973,"event_guid":"696a345a-9ef1-5985-8dd6-84c9ef22950c","weight":6},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":12},{"event_id":7984,"event_guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","weight":5},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":8},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":20},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":24}]},{"guid":"065e7cc8-56d7-4e84-8df8-a593248e6ae8","title":"BOLSONARO IS AN ENVIRONMENTAL CATASTROPH!","subtitle":"How the rise of bolsonsarism culminate in the Burning of Amazon Forest","slug":"ds19-10473-bolsonaro_is_an_environmental_catastroph","link":"https://datenspuren.de/2019/fahrplan/events/10473.html","description":"Bolsonaro is the most well know Face of brasilian Fascism and the so\ncalled “new right”.  Although he is famous by his, lets say, bizzars\ndeclarations - what gave him the title of “The brasilian Trump” and a\nreputation of a crazy character - Bolsonaro is not just an excentric\nexception. On the contrary, he represents a strategy of Capitalism and a\nnew fascist fog which is covering the planet. To understand it, we are\ngoing to review the political and historical roots of anti-comunism, the\ntraumas of a military dictatorship, the effects of racist violence and\nthe continuing struggles to land autonomy. Before the fog of fascism\ncover the complete Amazon Forest, we have to act!\n","original_language":"eng","persons":[],"tags":["DS2019","10473","2019","Libertäre Tage"],"view_count":37,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2021-10-11T04:00:04.895+02:00","length":3994,"duration":3994,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10473-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10473-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10473-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10473-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10473-bolsonaro_is_an_environmental_catastroph","url":"https://api.media.ccc.de/public/events/065e7cc8-56d7-4e84-8df8-a593248e6ae8","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":2},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":2},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":2}]},{"guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","title":"re:claimID","subtitle":"A GNUnet Application for Self-sovereign, Decentralised Identity Management and Personal Data Sharing","slug":"ds19-10383-re_claimid","link":"https://datenspuren.de/2019/fahrplan/events/10383.html","description":"re:claimID is a decentralised service for self-sovereign personal data sharing. It allows users to reclaim their privacy and control over their digital identities and data while at the same time offering standard compliant protocol support through OpenID Connect.\nIn this lecture, we present the motivation behind the technology and the technical foundations.\n\n\u003cp\u003e\nToday, users are often required to share personal data, like email addresses, to use services on the web. As part of normal service operation, such as notifications or billing, services require access to -- ideally fresh and correct -- user data.\nSharing attributes in the Web today is often done via centralised service providers to reduce data redundancy and to give services access to current, up-to-date information even if the user is currently offline.\nAbuse of this power is theoretically limited by local laws and regulations.\nBut, the past has shown that even well-meaning identity providers struggle to keep user data safe as they become major targets for hackers and nation state actors while striving for monetising anonymised statistics from these data.\nWe advocate for a new, decentralised way for users to manage their identities for the following reasons:\n\u003c/p\u003e\n\u003cul\u003e\n  \u003cli\u003e The current state of omniscient identity providers is a significant threat to the users' privacy.\u003c/li\u003e\n  \u003cli\u003eUsers must completely trust the service provider with respect to protecting the integrity and confidentiality of their identity in their interest.\u003c/li\u003e\n  \u003cli\u003eThe service provider itself is facing substantial liability risks given the responsibility of securely managing potentially sensitive personal data of millions of users.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003ere:claimID is built as a service on top of the peer-to-peer framework \u003ca href=\"https://gnunet.org\"\u003eGNUnet\u003c/a\u003e.\u003cbr/\u003e\nIt emerged from research conducted by the research group \"Secure\nApplications and Services\" at the \u003ca href=\"https://www.aisec.fraunhofer.de/de/fields-of-expertise/projekte/reclaim.html\"\u003eFraunhofer AISEC\u003c/a\u003e research institute.\u003cbr/\u003e\nA scientific, peer-reviewed paper on the theoretical foundations of re:claimID\nwas published at \u003ca href=\"https://ieeexplore.ieee.org/document/8456003\"\u003eTrustCom 2018\u003c/a\u003e\n(\u003ca href=\"https://arxiv.org/abs/1805.06253v1\"\u003eArxiv\u003c/a\u003e).\u003cbr/\u003e re:claimID is\nprimarily developed in the\n\u003ca href=\"https://git.gnunet.org/gnunet.git/tree/src/reclaim\"\u003eGNUnet source tree\u003c/a\u003e as Free Software.\nAccompanying tools and sources can be found in the\n\u003ca href=\"https://gitlab.com/reclaimid\"\u003eGitlab project\u003c/a\u003e.\n\u003c/p\u003e","original_language":"deu","persons":["schanzen"],"tags":["DS2019","10383","2019","Datenspuren"],"view_count":265,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-02-12T03:15:03.314+01:00","length":2096,"duration":2096,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10383-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10383-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10383-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10383-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10383-re_claimid","url":"https://api.media.ccc.de/public/events/6238c286-33b4-4388-9637-9c4024f0d9e8","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":4},{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":6},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":3},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":3},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":6},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":5},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":6},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":6},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":2},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":5},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":5}]},{"guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","title":"Abschluss DS19","subtitle":null,"slug":"ds19-10469-abschluss_ds19","link":"https://datenspuren.de/2019/fahrplan/events/10469.html","description":"Abschlussveranstaltung der Datenspuren 2019","original_language":"deu","persons":["Nerd Norbert"],"tags":["DS2019","10469","2019","Datenspuren"],"view_count":36,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2022-09-27T23:30:04.393+02:00","length":606,"duration":606,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10469-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10469-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10469-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10469-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10469-abschluss_ds19","url":"https://api.media.ccc.de/public/events/da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7864,"event_guid":"3d439f1d-e67a-5e92-96b6-3a9c5ad30965","weight":2},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":3},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":3},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":3},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":3},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":5},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":6},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":3}]},{"guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","title":"Mit Ava und Alan im Patriarchatscode hacken ","subtitle":"Turing Test und Ex Machina","slug":"ds19-10484-mit_ava_und_alan_im_patriarchatscode_hacken","link":"https://datenspuren.de/2019/fahrplan/events/10484.html","description":"Den \"Turingtest\" zu erwähnen kann ebenso vielsagend wie irreführend sein - allzu verbreitet ist die Einschätzung, da \"wisse man schon worum's geht\". Der Aufsatz hinter dem populären Turingtest ist hingegen gemeinhin viel weniger vertraut. Schade eigentlich, denn die dezent-provokante Schreibe macht nicht nur Spaß beim Lesen, sondern wirft auch spannende Fragen auf.\n\n\nDieser explorative Input schnappt sich eine populäre Verhandlung des Turing-Tests - Alan Garlands Film Ex Machina - und setzt diese in Bezug zur Debatte um künstliche Intelligenz sowie zu Turings Aufsatz - und damit automatisch auch zu unserem gesellschaftlichen System und dessen Denktraditionen. Von dort aus lässt sich prima drüber sinnieren, wie wir selbst eigentlich programmiert wurden, als wir meinten einfach nur so \"aufgewachsen\" zu sein - und ob und wo wir den Code für die Zukunft vielleicht umschreiben wollen.","original_language":"deu","persons":["3lisa","Polaris"],"tags":["DS2019","10484","2019","Datenspuren"],"view_count":177,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-02-28T02:00:03.567+01:00","length":3230,"duration":3230,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10484-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10484-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10484-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10484-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10484-mit_ava_und_alan_im_patriarchatscode_hacken","url":"https://api.media.ccc.de/public/events/a6a44328-e573-4606-ab8f-b12c746b76ce","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7930,"event_guid":"71c8ae1e-b22d-4576-9ec8-cc0920ac61a4","weight":3},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":7},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":9},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":5},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":3},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":5},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":3},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":5},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":6},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":9}]},{"guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","title":"Gehackt. Und nu?","subtitle":"Wie reagiert man, wenn man gehackt wurde?","slug":"ds19-10393-gehackt_und_nu","link":"https://datenspuren.de/2019/fahrplan/events/10393.html","description":"Wer etwas auf sich hält, wird heutzutage auch mal gehackt. Das gilt insbesondere für Unternehmen.\nDoch wie geht es dann weiter? \n\nDieser Vortrag beschreibt die unterschiedlichen Phasen eines Hackerangriffs und wie man als gehackter professionell reagiert, neudeutsch \"Incident Response\" betreibt. ","original_language":"deu","persons":["klobs"],"tags":["DS2019","10393","2019","Datenspuren"],"view_count":496,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-01-22T13:45:10.290+01:00","length":2661,"duration":2661,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10393-gehackt_und_nu","url":"https://api.media.ccc.de/public/events/134a9ee0-53b5-4a62-81d8-9406c85767c9","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":5792,"event_guid":"f5c68cea-eb34-49ae-bb15-d0fc1085985b","weight":1},{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":9},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":8},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":7},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":22},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":1},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":6},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":20},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":15},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":6},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":9},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":23},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":11},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":12},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":7},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":20},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":65},{"event_id":8011,"event_guid":"c8dc6567-0601-4489-b38d-49f6553890b0","weight":9}]},{"guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","title":"Möglichkeiten der Enttarnung steganographischer Kommunikation im Medium natürlicher Sprachen","subtitle":"Einsichten in die Forensik klandestiner Kommunikation","slug":"ds19-10373-moglichkeiten_der_enttarnung_steganographischer_kommunikation_im_medium_naturlicher_sprachen","link":"https://datenspuren.de/2019/fahrplan/events/10373.html","description":"Wer sich gegen Überwachung von Kommunikation wehren will, kann sich entweder kryptographischer oder steganographischer Methoden bedienen. Der Vortrag diskutiert die Möglichkeiten und Grenzen der Enttarnung steganographischer Kommunikation im Medium natürlicher Sprachen.\n\nSteganographische Kommunikation ist die Kunst des Versendens von Nachrichten über einen offenen Kanal, so dass niemand außer den intendierten Empfänger/innen überhaupt von der Existenz der Nachricht weiß, geschweige denn ihren Inhalt dekodieren kann. Dies unterscheidet sie von der Kryptographie, bei der die Existenz der verborgenen Botschaft prinzipiell wahrnehmbar ist. \n\nHäufig werden Bilder als Trägermedien steganographischer Botschaften gewählt. Doch ebenso häufig ist das Verbergen von Nachrichten in unscheinbaren natürlichsprachlichen Nachrichten, etwa wenn Jihadisten Anleitungen zum Bombenbau als Kochrezepte tarnen. \n\nNach einem Überblick über unterschiedliche Spielarten der klandestinen Kommunikation diskutiert der Vortrag die folgenden Fragen: \n- Was sind typische Merkmale steganographischer Kommunikation im Medium natürlicher Sprachen?\n- Welche Ansätze zu ihrer Enttarnung gibt es?\n- Lassen sich überhaupt zuverlässige maschinelle Methoden für die Enttarnung entwickeln?\n- Mit welchen Maßnahmen kann man eine Enttarnung schwieriger machen?\n","original_language":"deu","persons":["josch"],"tags":["DS2019","10373","2019","Datenspuren"],"view_count":270,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-02-05T23:15:07.872+01:00","length":2623,"duration":2623,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10373-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10373-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10373-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10373-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10373-moglichkeiten_der_enttarnung_steganographischer_kommunikation_im_medium_naturlicher_sprachen","url":"https://api.media.ccc.de/public/events/1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":5},{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":1},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":5},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":11},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":15},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":7},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":5},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":13},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":5},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":6},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":13},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":17}]},{"guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","title":"QUBES OS - Eine Einführung","subtitle":"Ein Patch für die sichere Nutzung Deines Rechners ","slug":"ds19-10456-qubes_os_-_eine_einfuhrung","link":"https://datenspuren.de/2019/fahrplan/events/10456.html","description":"Eine kurze Einführung in Qubes-OS - einem vernünftig sicherem\nBetriebssystem - und ein Erfahrungsbericht über die private Nutzung des selbigen. \n\nDer Vortrag beschreibt die Herausforderungen mit klassischen Betriebssystemen und die Gründe für Qubes OS. Es folgt ein Überblick über die Architektur und ein paar Live-Beispiele. Zum Abschluss gibt es noch ein paar Informationen aus meiner Erfahrung mit Qubes OS.","original_language":"deu","persons":["Alexander Kulbartsch"],"tags":["DS2019","10456","2019","Datenspuren"],"view_count":1379,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-03-24T03:45:02.895+01:00","length":2739,"duration":2739,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10456-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10456-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10456-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10456-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10456-qubes_os_-_eine_einfuhrung","url":"https://api.media.ccc.de/public/events/f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":15},{"event_id":7729,"event_guid":"9d030aa8-27aa-509b-913f-ee9eff97257b","weight":16},{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":11},{"event_id":7864,"event_guid":"3d439f1d-e67a-5e92-96b6-3a9c5ad30965","weight":10},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":19},{"event_id":7882,"event_guid":"a738a107-7051-544d-98cf-b6c3adce4a3f","weight":10},{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":15},{"event_id":7914,"event_guid":"53354cbe-c92f-5c48-82e3-194690b28f0c","weight":10},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":18},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":20},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":18},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":13},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":4},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":14},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":31},{"event_id":7973,"event_guid":"696a345a-9ef1-5985-8dd6-84c9ef22950c","weight":20},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":20},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":18},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":97},{"event_id":8011,"event_guid":"c8dc6567-0601-4489-b38d-49f6553890b0","weight":11}]},{"guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","title":"Lightningtalks","subtitle":"5 minutes for your project!","slug":"ds19-10459-lightningtalks","link":"https://datenspuren.de/2019/fahrplan/events/10459.html","description":"Blitzgespräche - stelle dein Projekt in 5 Minuten vor und gewinne neue Interessierte!\n\nEinreichungen bitte vorab an \u003ca href=\"mailto:honky@c3d2.de\"\u003ehonky@c3d2.de\u003c/a\u003e senden.\n\nWeitere Informationen findest Du auf:\n\n\u003ca href=\"https://hackmd.c3d2.de/DS2019_LT\"\u003ehttps://hackmd.c3d2.de/DS2019_LT\u003c/a\u003e ","original_language":"deu","persons":["honky"],"tags":["DS2019","10459","2019","Datenspuren"],"view_count":168,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2025-12-07T18:15:06.054+01:00","length":3394,"duration":3394,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10459-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10459-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10459-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10459-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10459-lightningtalks","url":"https://api.media.ccc.de/public/events/f2b0193d-0eea-4aa6-a3cb-e05252a65577","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":6},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":7},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":5},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":6},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":8},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":7},{"event_id":7984,"event_guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","weight":6},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":19},{"event_id":8011,"event_guid":"c8dc6567-0601-4489-b38d-49f6553890b0","weight":5}]},{"guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","title":"Digitale Befreiung","subtitle":"Entwicklungshilfe für kritisches Bewusstsein in der Technik- und Medienwelt","slug":"ds19-10450-digitale_befreiung","link":"https://datenspuren.de/2019/fahrplan/events/10450.html","description":"\u003cp\u003e... ein gesellschaftliches und solidarisches Patch \u003cbr\u003e \u003cstrong\u003eTL;DR\u003c/strong\u003e\u003cbr\u003e Was können wir in einer Umgebung der Anpassung tun, um kritisches Bewusstsein zu fördern und die Abhängigkeit von Expert*innen zu mindern?\u003c/p\u003e\n\n\n\u003cp\u003e\u003cstrong\u003eAusgangslage:\u003c/strong\u003e\u003cbr\u003e\nStaatliche und Konzerninteressen prägen längst die Art, wie wir Technik nutzen und Medien konsumieren. Es wird uns leicht gemacht, uns mit den vorherrschenden Verhältnissen zu arrangieren. Spaß am Gerät und Medien, reichen heute nicht mehr aus, um auch kritisches Bewusstsein zu fördern und aus der Konsumentenrolle auszubrechen!\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eInhalt des Vortrags:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eWarum finden sich so viele Menschen mit der \u003cs\u003eunterdrückten\u003c/s\u003e angepassten USER-Rolle ab?\u003c/li\u003e\n\u003cli\u003eWas können wir gegen die vorherrschende Passivität und Resignation machen?\u003c/li\u003e\n\u003cli\u003eWie können wir die Abhängigkeit von Expert*innen mindern?\u003c/li\u003e\n\u003cli\u003eWie können wir gezielt ein \u003cstrong\u003ekritisches Bewusstsein\u003c/strong\u003e fördern, das auch zu einer \u003cstrong\u003ekritischen und solidarischen Praxis\u003c/strong\u003e führt?\u003c/li\u003e\n\u003cli\u003eWarum sind wir in der Gefahr, \u003cstrong\u003eselbst zu Unterdrücker*innen\u003c/strong\u003e zu werden?\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/br\u003e\u003c/br\u003e\n\u003cp\u003e\u003cstrong\u003eAnschließend Meetup für Fragen/Diskussion:\u003c/strong\u003e\u003cbr\u003e14:15 im Seminarraum\u003c/p\u003e","original_language":"deu","persons":["Jens Möller (msm)"],"tags":["DS2019","10450","2019","Datenspuren"],"view_count":165,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2024-04-20T13:30:05.590+02:00","length":2265,"duration":2265,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10450-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10450-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10450-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10450-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10450-digitale_befreiung","url":"https://api.media.ccc.de/public/events/cdaff6bf-7759-46b5-ac16-4bf7e22106c2","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":5},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":4},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":7},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":5},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":6},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":5},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":14},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":24}]},{"guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","title":"Ich habe doch nichts zu verbergen","subtitle":"\"Die Gedanken sind frei!\" Denkste","slug":"ds19-10190-ich_habe_doch_nichts_zu_verbergen","link":"https://datenspuren.de/2019/fahrplan/events/10190.html","description":"Ein paar Denkanstösse über den Umgang mit persönlichen Daten\n\nEine kleine Einführung in die Problematik des Datenschutzes. Wie Daten gesammelt und analysiert werden, wielche Schlüsse sich daraus ziehen lassen am Beispiel der Rasterfahndung., Terrorismusbekämpfungsgesetz, Datenfallen im Netz, Verteidigungsstrategien","original_language":"deu","persons":["uek@ukleemann-bw.de"],"tags":["DS2019","10190","2019","Datenspuren"],"view_count":2139,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-03-26T16:45:07.833+01:00","length":2194,"duration":2194,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10190-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10190-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10190-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10190-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10190-ich_habe_doch_nichts_zu_verbergen","url":"https://api.media.ccc.de/public/events/a75f727b-b87b-4e64-a8c0-a80a20325b94","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":35},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":15},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":24},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":20},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":58},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":26},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":10},{"event_id":7729,"event_guid":"9d030aa8-27aa-509b-913f-ee9eff97257b","weight":16},{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":29},{"event_id":7846,"event_guid":"dc8b3e8c-0831-5725-a64a-2c8cd7737580","weight":22},{"event_id":7856,"event_guid":"d7c44ea4-ca2c-51d1-b5b1-87aa7c6a1253","weight":25},{"event_id":7864,"event_guid":"3d439f1d-e67a-5e92-96b6-3a9c5ad30965","weight":15},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":31},{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":19},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":27},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":65},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":29},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":17},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":14},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":24},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":49},{"event_id":7973,"event_guid":"696a345a-9ef1-5985-8dd6-84c9ef22950c","weight":29},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":24},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":36},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":19},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":97},{"event_id":8011,"event_guid":"c8dc6567-0601-4489-b38d-49f6553890b0","weight":21},{"event_id":8016,"event_guid":"6063abf7-f7e1-56fe-b6ee-27cc301aef60","weight":13},{"event_id":8020,"event_guid":"be4a8db4-e60b-11e9-895b-3ca9f456171c","weight":19},{"event_id":8038,"event_guid":"57e2ca9e-d25d-6481-ff79-5c04461953df","weight":16}]},{"guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","title":"Neues Werkzeug für moderne Netzwerksicherheit","subtitle":null,"slug":"ds19-10399-neues_werkzeug_fur_moderne_netzwerksicherheit","link":"https://datenspuren.de/2019/fahrplan/events/10399.html","description":"Von Firewalls und VPNs hat wohl jeder schon gehört - jedoch sind die technischen Details häufig hinter GUIs versteckt, so dass man von den eigentlichen Abläufen dahinter nur wenig sieht. In diesem Vortrag wollen wir auf zwei neue Technologien in Linux näher eingehen: dem iptables-Nachfolger nftables und dem modernen WireGuard VPN-Tunnel.\n\nWir greifen verschiedene Implementierungsdetails auf und zeigen, was die Unterschiede und Vorteile gegenüber Alternativen sind. Gerichtet ist der Vortrag an alle Interessierte, wobei Linux-Admins besonders für die Anwendung in der Praxis profitieren können. Der Vortrag wird in Kombination mit einem darauf folgenden Workshop angeboten.","original_language":"deu","persons":["Simon Hanisch","cookie"],"tags":["DS2019","10399","2019","Datenspuren"],"view_count":660,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-03-10T23:45:08.007+01:00","length":2765,"duration":2765,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10399-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10399-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10399-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10399-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10399-neues_werkzeug_fur_moderne_netzwerksicherheit","url":"https://api.media.ccc.de/public/events/b474e3fe-0a57-4dfb-8c34-42e2497e92c0","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":9},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":1},{"event_id":7864,"event_guid":"3d439f1d-e67a-5e92-96b6-3a9c5ad30965","weight":11},{"event_id":7866,"event_guid":"3349eaff-53ab-5345-afa9-b6ed4203ce6a","weight":1},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":9},{"event_id":7876,"event_guid":"2d010334-8e60-5428-b831-b0bf7b3ba6af","weight":1},{"event_id":7878,"event_guid":"dcabb3af-fcac-5e83-a77d-5aa655cd95b3","weight":1},{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":8},{"event_id":7914,"event_guid":"53354cbe-c92f-5c48-82e3-194690b28f0c","weight":1},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":1},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":1},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":23},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":1},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":13},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":13},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":8},{"event_id":7964,"event_guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","weight":8},{"event_id":7967,"event_guid":"e8a3d7ca-e4f4-40b4-9c60-9d52696fc674","weight":8},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":17},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":16},{"event_id":7984,"event_guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","weight":1},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":31},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":49}]},{"guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","title":"Eröffnung DS19","subtitle":null,"slug":"ds19-10468-eroffnung_ds19","link":"https://datenspuren.de/2019/fahrplan/events/10468.html","description":"Eröffnung der Datenspuren 2019","original_language":"deu","persons":["Nerd Norbert"],"tags":["DS2019","10468","2019","Datenspuren"],"view_count":63,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2024-03-12T16:00:06.025+01:00","length":489,"duration":489,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10468-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10468-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10468-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10468-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10468-eroffnung_ds19","url":"https://api.media.ccc.de/public/events/751ad00b-1ae7-4d90-ac24-8872e15e373e","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7883,"event_guid":"40aa2960-6288-5a2f-bf6f-268746f0ecdf","weight":3},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":4},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":4},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":3},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":5},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":3},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":5},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":3},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":5},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":3},{"event_id":7984,"event_guid":"da8ab4bf-c017-4d56-9dbf-91e976b4a4fd","weight":3},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":4}]},{"guid":"237f9fcd-eca1-4b6c-8154-442524a233cb","title":"Keynote: Datensouveränität","subtitle":null,"slug":"ds19-10442-keynote_datensouveranitat","link":"https://datenspuren.de/2019/fahrplan/events/10442.html","description":"Reichen für die vielbeschworene \"Datensouveränität\" ein hohes Maß an Compliance und IT-Sicherheit aus, oder müssen wir neu denken?\n\nInteroperabilität, Portabilität, neue Verfügungsrechte, \"Daten für alle\" oder einfach eine strikte Durchsetzung des Datenschutzrechts - was ist am besten geeignet, den Bürgerinnen und Bürgern wieder mehr Hoheit über die sei betreffenden Daten zu verschaffen? Reichen für die vielbeschworene \"Datensouveränität\" ein hohes Maß an Compliance und IT-Sicherheit aus, oder müssen wir neu denken?","original_language":"deu","persons":["Frederick Richter"],"tags":["DS2019","10442","2019","Datenspuren"],"view_count":148,"promoted":false,"date":"2019-09-22T00:00:00.000+02:00","release_date":"2019-09-22T02:00:00.000+02:00","updated_at":"2026-01-12T11:00:11.194+01:00","length":3245,"duration":3245,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10442-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10442-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10442-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10442-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10442-keynote_datensouveranitat","url":"https://api.media.ccc.de/public/events/237f9fcd-eca1-4b6c-8154-442524a233cb","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":3},{"event_id":7933,"event_guid":"751ad00b-1ae7-4d90-ac24-8872e15e373e","weight":1},{"event_id":7935,"event_guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","weight":1},{"event_id":7936,"event_guid":"fc47f807-2b7a-4409-b980-3e12322fe6d5","weight":7},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":9},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":7},{"event_id":7965,"event_guid":"cdaff6bf-7759-46b5-ac16-4bf7e22106c2","weight":3},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":3},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":8},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":8},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":10}]}]}