{"acronym":"ccchh-extras","aspect_ratio":"16:9","updated_at":"2026-04-03T20:45:10.222+02:00","title":"Chaosstudio Hamburg","schedule_url":"","slug":"regional/ccchh/extras","event_last_released_at":"2024-05-24T00:00:00.000+02:00","link":"","description":"","webgen_location":"regional/ccchh/extras","logo_url":"https://static.media.ccc.de/media/regional/ccchh/extras/csh-logo.png","images_url":"https://static.media.ccc.de/media/regional/ccchh/extras","recordings_url":"https://cdn.media.ccc.de/contributors/ccchh/extras","url":"https://api.media.ccc.de/public/conferences/ccchh-extras","events":[{"guid":"7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c","title":"Kein Backup - Kein Mitleid","subtitle":null,"slug":"ccchh-extras-56214-kein-backup-kein-mitl","link":"https://c3voc.de","description":"Digitale Selbstverteidigung - Chaos Computer Club Hamburg\nAufgenommen in der Zentralbibliothek Hamburg\n@stephanius@chaos.social\n\nDaten sind Teil unseres Lebens geworden, seien es Fotos, Emails oder wichtige Dokumente. Falls wir sie verlieren, kann das mehr als ärgerlich sein. Aber wo liegen unsere Daten eigentlich? Auf dem Smartphone, in der Cloud, dem Laptop? Welche Gefahren drohen und wie kann ein Privatmensch vorbeugen?\n\nDie Gruppe „Digitale Selbstverteidigung“ des CCC Hamburg gibt wichtige Denkanstöße zum Thema Backup-Strategien und ganz praktische Tipps für den Alltag mit Smartphones, Tablets und Computern. Am Ende zeigen wir auch einen anspruchsvolleren Ansatz für Fortgeschrittene bzw. Technikbegeisterte, und natürlich wird wieder viel Zeit für Fragen und Diskussionen sein.","original_language":"deu","persons":["stephanius","n0th1ng"],"tags":["import","56214","2024"],"view_count":2642,"promoted":false,"date":"2024-03-08T18:00:00.000+01:00","release_date":"2024-04-13T00:00:00.000+02:00","updated_at":"2026-04-03T20:45:10.217+02:00","length":6004,"duration":6004,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56214-7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56214-7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56214-7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56214-7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-56214-kein-backup-kein-mitl","url":"https://api.media.ccc.de/public/events/7d9ee6b5-1fbb-4b3b-ace5-02dd8c39066c","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"699c5930-227f-4398-a36d-700a966487e2","title":"Stop #DataRetention: Exposing a New Generation of Data Retention Laws","subtitle":"","slug":"ccchh-extras-4167-stop-dataretention-exp","link":"https://hamburg.ccc.de/","description":"In this panel, five experts from NGOs and MEP Patrick Breyer (Greens/EFA, Pirates) will present the current situation with the data retention of citizen’s personal location and connection data in the EU, focusing on Belgium, Denmark, Germany, France, Ireland, Portugal, the Czech Republic and the European Commission.\r\n\r\nA new generation of data retention laws threatens the fundamental rights of citizens in the European Union. While the EU Court of Justice allows blanket data retention only in specific and limited exceptions, these laws by their very nature aim to collect communications data from virtually the entire population, breaking the bounds of the EU Court's rulings. This new generation actually wants to turn the exception of mass surveillance into the standard. The panel shows for example what the concept of \"targeted\" data retention really means and how dangerous the systematic storage of IP addresses is. The speakers call on the European Commission and the governments of the EU countries to stop the concept of mass surveillance throughout the EU and to respect the Court’s rulings as the absolute limits for exceptional cases only. \r\n\r\nJoin the debate on data retention: #DataRetention | #Vorratsdatenspeicherung | #Bewaarplicht  | Conservation des données | #MassSurveillance | #QuickFreeze \r\n\r\n\u003cbr/\u003e\r\n\r\n\u003ch4\u003e references / links / documents \u003c/h4\u003e\r\n\r\n\u003cul\u003e\u003cli\u003eEuropean Commission: non-paper WK 7294/2021 from 10 June 2021 at statewatch.org / PDF\r\nhttps://www.statewatch.org/news/2021/july/eu-communications-data-retention-commission-seeks-member-state-views-on-the-way-forward/ \r\nhttps://www.statewatch.org/media/2592/eu-council-data-retention-com-non-paper-wk-7294-2021.pdf  \u003c/li\u003e\r\n\r\n\u003cli\u003elegal opinion by former EU Judge Prof. Dr. iur. Vilenas Vadapalas\r\nPDF: https://www.patrick-breyer.de/wp-content/uploads/2022/04/20220407_Legal_Opinion_Data_Retention_Vadapalas_updated-SimeonTC-VV-REV.pdf \r\nhttps://www.patrick-breyer.de/en/comeback-of-data-retention-former-eu-judge-dismisses-commissions-plans/ \u003c/li\u003e\r\n\r\n\u003cli\u003eBelgian draft law on data retention:\r\nprojet de loi n° 2572\r\nhttp://www.lachambre.be/media/index.html?language=fr\u0026sid=55U2884\u003c/li\u003e\r\n\u003cli\u003ePatrick's press release:\r\nhttps://www.patrick-breyer.de/en/tomorrow-belgian-mass-surveillance-proposal-on-data-retention/\u003c/li\u003e\r\n\u003cli\u003ePatrick's opinion:\r\nhttps://www.patrick-breyer.de/wp-content/uploads/2022/05/Avis-du-depute-europeen-Patrick-Breyer-concernant-le-projet-de-loi-belge-de-conservation-des-donnees-16.05.22.pdf\u003c/li\u003e\r\n\u003cli\u003estatement on geo \"targeted\" DR: \r\nhttps://www.patrick-breyer.de/en/belgium-what-geographically-targeted-data-retention-would-really-mean/\u003c/li\u003e\r\n\u003cli\u003eLDH’s opinion\r\nhttps://www.liguedh.be/retention-des-donnees-la-ligue-des-droits-humains-appelle-le-parlement-a-ne-pas-voter-ce-projet-permettant-la-collecte-systematique-des-metadonnees/\r\nTweet: https://twitter.com/liguedh_be/status/1526803085187813377\r\narticle by NGO Bits of Freedom: https://www.bitsoffreedom.nl/2022/05/10/belgium-wants-to-ban-signal-and-is-a-harbinger-of-european-policy/\r\n\u003c/li\u003e\u003c/ul\u003e\r\n\r\n\u003ch4\u003e speakers \u003c/h4\u003e\u003cul\u003e\u003cli\u003e\u003ca href=\"https://www.patrick-breyer.de/dataretention\"\u003ePatrick Breyer\u003c/a\u003e MEP\r\nDigital freedom fighter and Member of the European Parliament\r\nFediverse/ Twitter: @echo_pbreyer\u003c/li\u003e\r\n\r\n\u003cli\u003eJesper Lund\r\nChairman of \u003ca href=\"https://www.itpol.dk\"\u003eIT-Political Association of Denmark\u003c/a\u003e\r\nTwitter: @je5perl @itpof\u003c/li\u003e\r\n\r\n\u003cli\u003eTJ McIntyre\r\nChairman of \u003ca href=\"https://www.digitalrights.ie\"\u003eDigital Rights Ireland\u003c/a\u003e\r\nTwitter: @DRIalerts @tjmcintyre\u003c/li\u003e\r\n\r\n\u003cli\u003eBastien Le Querrec\r\nMember \u003ca href=\"https://www.laquadrature.net\"\u003eLa Quadrature du Net\u003c/a\u003e, Lawyer\r\nFediverse / Twitter: @laquadrature @BLeQuerrec\u003c/li\u003e\r\n\r\n\u003cli\u003eJan Vobořil\r\nExecutive Director, Attorney at law \u003ca href=\"https://www.iure.org\"\u003eIuridicum Remedium\u003c/a\u003e\r\nTwitter: @iure_cz\u003c/li\u003e\r\n\r\n\u003cli\u003eEduardo Santos\r\nPresident of \u003ca href=\"https://direitosdigitais.pt/\"\u003eD3 – Defesa dos Direitos Digitais\u003c/a\u003e, Lawyer\r\nTwitter: @direitosdig F\r\nMastodon: https://masto.pt/@d3 \r\nphoto \u0026 D3's logos: https://edsantos.eu/photos312424/\u003c/li\u003e\r\n\u003c/ul\u003e","original_language":"eng","persons":["Patrick Breyer","Jesper Lund","Bastien Le Querrec","Jan Vobořil","Eduardo Santos"],"tags":["4167","2022"],"view_count":314,"promoted":false,"date":"2022-06-09T20:30:00.000+02:00","release_date":"2022-06-10T00:00:00.000+02:00","updated_at":"2026-01-17T14:00:11.071+01:00","length":5842,"duration":5842,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/4167-699c5930-227f-4398-a36d-700a966487e2.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/4167-699c5930-227f-4398-a36d-700a966487e2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/4167-699c5930-227f-4398-a36d-700a966487e2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/4167-699c5930-227f-4398-a36d-700a966487e2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-4167-stop-dataretention-exp","url":"https://api.media.ccc.de/public/events/699c5930-227f-4398-a36d-700a966487e2","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"d1f78c2e-06d2-4160-8f3e-eca8eda55670","title":"Starkes Passwort, sichere Identität","subtitle":null,"slug":"ccchh-extras-56165-starkes-passwort-sich","link":"https://c3voc.de","description":"Digitale Selbstverteidigung (CCCHH) - Passwörter\n\nGute Passwörter schützen unser digitales Leben vor Diebstahl, Missbrauch und Verlust. Aber was genau macht gute Passwörter aus? Und kann ich was falsch machen beim Umgang damit?\nIn diesem Vortrag des Chaos Computer Clubs Hamburg in der Zentralbibliothek erklären wir, wie Kriminelle arbeiten und was das für uns bedeutet. Wir sprechen darüber, welche Regeln bei Erstellung und Umgang mit Passwörtern wichtig sind und welchen Mehrwert Passwortmanager oder 2-Faktor-Authentisierung bieten.","original_language":"deu","persons":["stephanius","w1ntermute","n0th1ng"],"tags":["import","56165","2024"],"view_count":2066,"promoted":false,"date":"2024-01-26T18:00:00.000+01:00","release_date":"2024-02-04T00:00:00.000+01:00","updated_at":"2026-04-01T13:00:05.219+02:00","length":6493,"duration":6493,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-56165-starkes-passwort-sich","url":"https://api.media.ccc.de/public/events/d1f78c2e-06d2-4160-8f3e-eca8eda55670","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"f6c40632-d8fd-4020-ba53-67260d12928a","title":"Lauscht mein Smartphone heimlich mit?","subtitle":null,"slug":"ccchh-extras-56164-lauscht-mein-smartpho","link":"https://c3voc.de","description":"Digitale Selbstverteidung (CCCHH) - Lauschende Smartphones - Überwachungskapitalismus\n\nGestern im Café über den nächsten Urlaub gesprochen und heute auffällig viel Werbung für All-Inclusive am Mittelmeer zwischen den Youtube-Videos? Hört man doch immer wieder!\n\nDieser Talk des CCC Hamburg in der Zentralbibliothek geht der Frage auf den Grund, ob unsere Smartphones heimlich unsere Gespräche belauschen, um uns mit gezielter Werbung zu bombardieren. Wir werden mögliche Motive hinter diesen Spionagevorwürfen und das Geschäftsmodell von Google und Meta erläutern. Wir zeigen wissenschaftliche Untersuchungen zum Thema Handy-Sicherheit und gehen auf alternative Erklärungen für das Phänomen ein.\n\nTalk und Folien: stephanius\nUnterstützt von: w1ntermute und n0thing\nUntertitel: seranne","original_language":"deu","persons":["stephanius"],"tags":["import","56164","2023"],"view_count":5346,"promoted":false,"date":"2023-12-01T18:00:00.000+01:00","release_date":"2024-02-03T00:00:00.000+01:00","updated_at":"2026-03-29T21:45:07.337+02:00","length":4476,"duration":4476,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56164-f6c40632-d8fd-4020-ba53-67260d12928a.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56164-f6c40632-d8fd-4020-ba53-67260d12928a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56164-f6c40632-d8fd-4020-ba53-67260d12928a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56164-f6c40632-d8fd-4020-ba53-67260d12928a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-56164-lauscht-mein-smartpho","url":"https://api.media.ccc.de/public/events/f6c40632-d8fd-4020-ba53-67260d12928a","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"060dcd0c-a216-5447-abf3-7ddd41e5d5c6","title":"Chatkontrolle","subtitle":null,"slug":"ccchh_extras-1007-chatkontrolle","link":"https://c3voc.de","description":"\n        Die Chatkontrolle ist momentan der größte Angriff auf digitale Grundrechte - und sie ist nicht mal das richtige Instrument für das eigentliche Ziel, konsequenter gegen den Vertrieb von Missbrauchsdarstellungen von Kindern vorgehen zu können.\nWir erklären warum es diesen Verordnungsentwurf eigentlich gibt und was er wirklich bedeutet. Weiter wollen wir auf die Gefahren bei der Umsetzung aufmerksam machen und erklären was passieren muss damit wird das Schlimmste verhindern können.\n        ","original_language":"deu","persons":["khaleesi","viktor"],"tags":["csh_tdoh","1007","2022","ccchh","tdoh"],"view_count":548,"promoted":false,"date":"2022-08-27T20:00:00.000+02:00","release_date":"2022-08-27T00:00:00.000+02:00","updated_at":"2026-03-09T15:15:06.788+01:00","length":3123,"duration":3123,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1007-060dcd0c-a216-5447-abf3-7ddd41e5d5c6.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1007-060dcd0c-a216-5447-abf3-7ddd41e5d5c6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1007-060dcd0c-a216-5447-abf3-7ddd41e5d5c6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1007-060dcd0c-a216-5447-abf3-7ddd41e5d5c6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh_extras-1007-chatkontrolle","url":"https://api.media.ccc.de/public/events/060dcd0c-a216-5447-abf3-7ddd41e5d5c6","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"8c4a6243-50dc-43ca-b5fe-15661edb1972","title":"Streng geheim! Verschlüsselung im Alltag","subtitle":null,"slug":"ccchh-extras-56215-streng-geheim-verschl","link":"https://c3voc.de","description":"Digitale Selbstverteidigung - Chaos Computer Club Hamburg\nAufgenommen in der Zentralbibliothek Hamburg\n@stephanius@chaos.social\n@w1ntermute@23.social\n\nModerne Kryptografie ist eine Grundsäule digitaler Selbstverteidigung. Der Umgang mit Verschlüsselung ist in vielen Situation deutlich einfacher geworden – z.B. beim Surfen oder bei Instant-Messengern – manchmal aber leider noch kompliziert wie bei Emails.\nIn diesem Vortrag des CCCHH betrachten wir grundlegende Herausforderungen angewandter Verschlüsselung (AES+RSA), wo sie jeden Tag zum Einsatz kommt (OpenPGP und TLS), und was Anwenderinnen selbst dafür tun können, digital sicherer unterwegs zu sein. Wir erklären den Unterschied zwischen symmetrischen und asymmetrischen Verfahren und was eigentlich das kleine Schloss in der Browserzeile bedeutet. Am Ende gibt's einen 30-minütigen Fragen-Teil.","original_language":"deu","persons":["stephanius","w1ntermute","n0th1ng"],"tags":["import","56215","2024"],"view_count":801,"promoted":false,"date":"2024-04-12T19:00:00.000+02:00","release_date":"2024-05-24T00:00:00.000+02:00","updated_at":"2026-04-03T13:45:08.761+02:00","length":7278,"duration":7278,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56215-8c4a6243-50dc-43ca-b5fe-15661edb1972.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56215-8c4a6243-50dc-43ca-b5fe-15661edb1972_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56215-8c4a6243-50dc-43ca-b5fe-15661edb1972.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56215-8c4a6243-50dc-43ca-b5fe-15661edb1972.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-56215-streng-geheim-verschl","url":"https://api.media.ccc.de/public/events/8c4a6243-50dc-43ca-b5fe-15661edb1972","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"f7b66fc1-72bd-5660-98a5-bd9b811f6e99","title":"Backup-Lösungen / Strategien","subtitle":null,"slug":"ccchh_extras-1005-backup_loesungen_strategien","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["stephanius"],"tags":["csh_tdoh","1005","2022","ccchh","tdoh"],"view_count":2174,"promoted":false,"date":"2022-08-27T18:00:00.000+02:00","release_date":"2022-08-27T00:00:00.000+02:00","updated_at":"2026-03-30T18:15:07.043+02:00","length":3142,"duration":3142,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1005-f7b66fc1-72bd-5660-98a5-bd9b811f6e99.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1005-f7b66fc1-72bd-5660-98a5-bd9b811f6e99_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1005-f7b66fc1-72bd-5660-98a5-bd9b811f6e99.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1005-f7b66fc1-72bd-5660-98a5-bd9b811f6e99.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh_extras-1005-backup_loesungen_strategien","url":"https://api.media.ccc.de/public/events/f7b66fc1-72bd-5660-98a5-bd9b811f6e99","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"93bf8744-55a9-5f4d-97e8-ed45e6e69113","title":"Passwortmanager","subtitle":null,"slug":"ccchh_extras-1004-passwortmanager","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["w1ntermute"],"tags":["csh_tdoh","1004","2022","ccchh","tdoh"],"view_count":2629,"promoted":false,"date":"2022-08-27T17:00:00.000+02:00","release_date":"2022-08-27T00:00:00.000+02:00","updated_at":"2026-04-01T20:00:08.031+02:00","length":1675,"duration":1675,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1004-93bf8744-55a9-5f4d-97e8-ed45e6e69113.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1004-93bf8744-55a9-5f4d-97e8-ed45e6e69113_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1004-93bf8744-55a9-5f4d-97e8-ed45e6e69113.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1004-93bf8744-55a9-5f4d-97e8-ed45e6e69113.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh_extras-1004-passwortmanager","url":"https://api.media.ccc.de/public/events/93bf8744-55a9-5f4d-97e8-ed45e6e69113","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"5f1641f7-8a3c-5bb7-9616-87b6f32ea17e","title":"Sicherheit im eigenen Netzwerk","subtitle":null,"slug":"ccchh_extras-1006-sicherheit_im_eigenen_netzwerk","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["teto","Black Frog"],"tags":["csh_tdoh","1006","2022","ccchh","tdoh"],"view_count":2272,"promoted":false,"date":"2022-08-27T19:00:00.000+02:00","release_date":"2022-08-28T00:00:00.000+02:00","updated_at":"2026-03-31T13:30:08.877+02:00","length":1117,"duration":1117,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1006-5f1641f7-8a3c-5bb7-9616-87b6f32ea17e.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1006-5f1641f7-8a3c-5bb7-9616-87b6f32ea17e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1006-5f1641f7-8a3c-5bb7-9616-87b6f32ea17e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/1006-5f1641f7-8a3c-5bb7-9616-87b6f32ea17e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh_extras-1006-sicherheit_im_eigenen_netzwerk","url":"https://api.media.ccc.de/public/events/5f1641f7-8a3c-5bb7-9616-87b6f32ea17e","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]}]}