{"acronym":"mrmcd111b","aspect_ratio":"4:3","updated_at":"2026-04-08T22:45:05.607+02:00","title":"MRMCD 111b","schedule_url":"","slug":"conferences/mrmcd/mrmcd111b","event_last_released_at":"2009-09-28T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/mrmcd/mrmcd111b","logo_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/folder-mrmcd-2008.png","images_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b","recordings_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd111b","url":"https://api.media.ccc.de/public/conferences/mrmcd111b","events":[{"guid":"import-614c0d8f50a33ecdd5","title":"Solaris/OpenSolaris: ZFS","subtitle":null,"slug":"mrmcd111b-2761-de-solaris-opensolaris_zfs","link":"https://mrmcd.net/schedule/mrmcd111b/events/2761.en.html","description":"ZFS - Design und Möglichkeiten\n","original_language":"eng","persons":["Ulrich Gräf"],"tags":["mrmcd111b"," IT-Security"],"view_count":86,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-02-06T22:00:11.048+01:00","length":2124,"duration":2124,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2761-de-solaris-opensolaris_zfs.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2761-de-solaris-opensolaris_zfs_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-614c0d8f50a33ecdd5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-614c0d8f50a33ecdd5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2761-de-solaris-opensolaris_zfs","url":"https://api.media.ccc.de/public/events/import-614c0d8f50a33ecdd5","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":246,"event_guid":"import-0f35544f8d26cef5e1","weight":1},{"event_id":463,"event_guid":"import-c0178e70704dfcfe97","weight":1},{"event_id":465,"event_guid":"import-844975dbb2fdc5a02b","weight":1},{"event_id":1917,"event_guid":"mC_pKn2WqXsOq9WfJYK1SA","weight":1},{"event_id":1946,"event_guid":"g4_G_MQTHSzaqpAwYo8nlw","weight":1},{"event_id":4542,"event_guid":"56484c54-534e-2020-2020-202020202020","weight":1},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":1},{"event_id":5446,"event_guid":"0f2f3643-570b-5e82-ae4d-0104af27867c","weight":1}]},{"guid":"import-b37309c8e3e0ae69cb","title":"TUD Roboter","subtitle":"im Wettkampf gegen ein Remote-Team aus USA","slug":"mrmcd111b-2764-de-tud_roboter","link":"https://mrmcd.net/schedule/mrmcd111b/events/2764.en.html","description":"Die Darmstadt Dribbling Dackels (DDD) sind das RoboCup-Team der Technischen Universität Darmstadt in der Four-Legged Robot League.\nUnter der Leitung von Prof. Dr. Oskar von Stryk aus dem Fachgebiet Simulation und Systemoptimierung, Fachbereich Informatik, entwickeln wir Algorithmen für eine Mannschaft fußballspielender, autonomer, vierbeiniger Roboter. Die DDD wurden am 9. Mai 2001 gegründet.\n\nDie Darmstadt Dribbling Dackels sind:\nRoboCup World Champion 2004, 2005 und 2008 (mit dem GermanTeam),\nRoboCup GermanOpen Gewinner 2002, 2003, 2007 und 2008.\n\nVoraussichtliche Termin Samstag 6. September 24:00 Uhr, Aufbau ab 23h\n\nLinks:\nhttp://www.robocup.informatik.tu-darmstadt.de/\n","original_language":"eng","persons":["g0ph3r"],"tags":["mrmcd111b"," Workshop"],"view_count":61,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2025-02-28T16:15:04.757+01:00","length":2310,"duration":2310,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2764-de-tud_roboter.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2764-de-tud_roboter_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-b37309c8e3e0ae69cb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-b37309c8e3e0ae69cb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2764-de-tud_roboter","url":"https://api.media.ccc.de/public/events/import-b37309c8e3e0ae69cb","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":457,"event_guid":"import-c05698611a02094da5","weight":1},{"event_id":1892,"event_guid":"98b17d0799a31053","weight":1},{"event_id":1900,"event_guid":"305a20dbdb0a965b","weight":1},{"event_id":1921,"event_guid":"ADQBjEa7855PcoO3lYE6Wg","weight":1},{"event_id":2642,"event_guid":"3b001741-27fc-4261-9808-17e46b8279b3","weight":1},{"event_id":2644,"event_guid":"14f92c2f-c31d-4923-9e4d-7b31acc2f4f1","weight":1},{"event_id":2901,"event_guid":"b4339927-6780-4881-a342-e7a262078dce","weight":1},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":1},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":1}]},{"guid":"import-56b0c5b879cb8dccdf","title":"SSL und TLS","subtitle":"Sichere Kommunikation über unsichere Kanäle","slug":"mrmcd111b-2769-de-ssl_und_tls","link":"https://mrmcd.net/schedule/mrmcd111b/events/2769.en.html","description":"In Zeiten zunehmender Eingriffe in die Privatsphäre des Einzelnen und steigender anderer Gefahren, z. B. Phishing, ist es sehr wichtig geworden, Daten, die man über unsichere Medien wie das Internet überträgt, zu schützen. Hierfür wird meistens das TLS-Protokoll verwendet, das sich seit fast einem Jahrzehnt fest in der Welt des Internet etabliert hat.\n","original_language":"eng","persons":["Elias Most"],"tags":["mrmcd111b"," Cryptographics"],"view_count":154,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-03-29T17:15:06.556+02:00","length":1674,"duration":1674,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2769-de-ssl_und_tls.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2769-de-ssl_und_tls_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-56b0c5b879cb8dccdf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-56b0c5b879cb8dccdf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2769-de-ssl_und_tls","url":"https://api.media.ccc.de/public/events/import-56b0c5b879cb8dccdf","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":202,"event_guid":"import-ee4e2da9f8579fe7e5","weight":1},{"event_id":219,"event_guid":"import-35dff02985e54e4666","weight":1},{"event_id":397,"event_guid":"import-049558fef2794ead26","weight":1},{"event_id":398,"event_guid":"import-40eeb2d209e3af8056","weight":1},{"event_id":400,"event_guid":"import-a28d7897c14d490262","weight":1},{"event_id":420,"event_guid":"import-ee569057dc1097b10b","weight":1},{"event_id":426,"event_guid":"import-d5ed7e29ab1153d0cf","weight":1},{"event_id":430,"event_guid":"import-d287924ad02bdd6429","weight":1},{"event_id":457,"event_guid":"import-c05698611a02094da5","weight":2},{"event_id":460,"event_guid":"import-a06deb348ba5dc5997","weight":1},{"event_id":590,"event_guid":"import-85a56d62611bbbafe7","weight":1},{"event_id":686,"event_guid":"import-b93ce60268c2d2302a","weight":1},{"event_id":1892,"event_guid":"98b17d0799a31053","weight":1},{"event_id":1998,"event_guid":"uC8ap4LP4Xtea09oLvF7_Q","weight":1},{"event_id":2054,"event_guid":"j4JJEB9hzp6UEkQnxkiYOA","weight":2},{"event_id":2122,"event_guid":"DlJOnpxxq4REaMhvquDWSw","weight":1},{"event_id":2327,"event_guid":"42ec874f-960f-4f71-bf88-40d66a462419","weight":1},{"event_id":2404,"event_guid":"5b66e0260395cfaff427b0923476f729","weight":1},{"event_id":2528,"event_guid":"6393a33b-889d-4850-b0e3-cbc7caeab1cb","weight":1},{"event_id":2637,"event_guid":"cbb9db2e-a159-4bea-a2a3-eac73061d1f4","weight":1},{"event_id":2657,"event_guid":"1ccec4e5-ce37-4386-8eba-15c433c7e4d4","weight":1},{"event_id":2659,"event_guid":"e757e434-1104-45ff-80f6-9c022d028dc0","weight":1},{"event_id":2745,"event_guid":"d185ad13-0ac3-4286-849c-c24069400473","weight":1},{"event_id":3791,"event_guid":"37e9af94-4aad-4417-8f88-1863ecfef4d1","weight":1},{"event_id":3812,"event_guid":"d180c287-0760-4421-9406-fedac5a3639c","weight":1},{"event_id":4493,"event_guid":"12c20fb9-b911-5eec-86db-ae321566b8ec","weight":1},{"event_id":4555,"event_guid":"44433941-4739-2020-2020-202020202020","weight":1},{"event_id":5200,"event_guid":"7a4aa837-870b-4b9f-b7f1-43aff69989a6","weight":1},{"event_id":5949,"event_guid":"641b63f4-4499-57e7-ab51-997b002babf0","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5952,"event_guid":"17e98e8e-9c37-54b0-9738-f1004ca6d311","weight":1},{"event_id":5956,"event_guid":"9085a612-073b-5fe3-97e8-02f308ade923","weight":1},{"event_id":5957,"event_guid":"852f565f-93c0-5744-bf05-0682d59e5e07","weight":1},{"event_id":5958,"event_guid":"736d18c5-2d2d-5815-b488-aad7429dfdea","weight":1}]},{"guid":"import-c0178e70704dfcfe97","title":"OpenSolaris/Solaris: DTrace","subtitle":null,"slug":"mrmcd111b-2716-de-opensolaris_solaris-dtrace","link":"https://mrmcd.net/schedule/mrmcd111b/events/2716.en.html","description":"OpenSolaris/Solaris: Dtrace\n---------------------------------------------\n\nBei Sun Microsystems wurde beschlossen, Solaris in\nden OpenSource überzuführen. Dieser Prozess wurde im Juni\n2005 angefangen.\nHeute befindet man sich in der Situation, dass es von Sun\nnoch alte Distributionen von Solaris gibt, die nicht im\nOpenSource sind (Solaris ..., 8, 9 und 10) sowie die neuen\nDistributionen (OpenSolaris ) die schon OpenSource sind.\n\nAlle diese Distributionen lassen sich kostenfrei herunterladen\nund benutzen.\n\nFür die Solaris Distributionen ist voller Support und\nOpenSolaris 2008.05 ist eingeschränkter Support verfügbar.\n\nDer Support für OpenSolaris wird schrittweise ausgebaut werden.\nDer Nachfolger von Solaris 10 wird auf OpenSolaris basieren,\nder Source und voller Support wird verfügbar sein.\n\n(10 Min + 5 Min Diskussion)\n\n\nDtrace - Dynamic Tracing\n-------------------------------------------------------------------\nDtrace ist ein Beispiel für die neuen Projekte im OpenSolaris,\ndie schon Eingang in andere Betriebssysteme gefunden haben.\n\nMit Dtrace wird die Sichtweise auf den Kernel bzw. auf die\nArbeitsweise von Programmen verändert. Statt einzelne Prozesse\nbis zum Systemcall zu untersuchen ist mit Dtrace der gesamte Ablauf\nauch im Kernel beobachtbar. Dazu ist ein generelles System zum\nBeobachten von Kernel-Modulen erstellt worden, das zusätzlich immer\nauch den Kontext des rufenden User-Programms kennt.\n\nDaher sind einzelne Programme, zusammenarbeitende Programme oder\nauch der Ablauf im Kernel beobachtbar.\n\nUm solche Beobachtungen effizient zu ermöglichen wurden verschiedene\nDesign-Entscheidungen getroffen:\n - Messungen dürfen keine Locks im Kernel nutzen\n - Daten müssen effizient verarbeitet werden\n - Der Overhead ohne Messungen muss minimal sein\n\nRealisiert wird Dtrace durch eine Bibliothek libdtrace,\ndie die dtrace Kernel-Möglichkeiten verschiedenen\nAnwendungsprogrammen - auch eigenen - zur Verfügung stellt.\nDas Userland-Programm dtrace nutzt ebenfalls die libdtrace.\n\n\nWie funktioniert dtrace?\n\nMit einem D-Programm wird eine Anfrage gestartet.\nDie Sprache D ist C-artig und ist ähnlich wie die Sprache\nAWK limitiert.\nEin D-Programm besteht aus Klauseln, die Datenwerte an spezifizierten\nMesspunkten im Kernel oder im Userprogramm nutzen können.\nOb die Daten verarbeitet werden lässt sich mit Bedingungen pro\nMesspunkt einschränken.\nAus den Daten kann man dann einfache Ausgaben, formatierte Ausgaben\noder Statistiken erstellen, wobei die Statistikfunktionen Bestandteil\nvon dtrace sind.\n\nDie Implementierung nutzt an jedem potentiellen Messpunkt eine\nListe von Callback-Funktionen. Solange diese Liste leer ist ist der\nOverhead extrem klein.\nWenn ein Messpunkt benutzt wird, dann wird eine Callback-Funktion\naddiert, die lediglich die Bedingung prüft und dann gegebenenfalls die\nbenötigten Daten in einen zirkulären gesharten Puffer schreibt;\ndas Schreiben erfolgt unsynchronisiert und daher sehr effizient\nDas Anwendungsprogramm liest regelmässig (1x pro Sekunde) die \naufgelaufenen Daten aus dem gesharten Puffer.\nGerade wenn viel gemessen wird, ist das Verhältnis von Lesevorgängen\nzu Daten sehr effizient.  Ist weniger los, dann ist die Bearbeitung\nzwar weniger effizient, allerdings ist das nicht negativ zu bewerten,\nweil dann ja noch genug Ressourcen da sind.\n\n(20 Min + 10 Min Vorführung und Diskussion)\n\n\n","original_language":"eng","persons":["Ulrich Gräf"],"tags":["mrmcd111b"," IT-Security"],"view_count":42,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2024-12-12T09:45:02.858+01:00","length":3197,"duration":3197,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2716-de-opensolaris_solaris-dtrace.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2716-de-opensolaris_solaris-dtrace_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-c0178e70704dfcfe97-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-c0178e70704dfcfe97-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2716-de-opensolaris_solaris-dtrace","url":"https://api.media.ccc.de/public/events/import-c0178e70704dfcfe97","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":246,"event_guid":"import-0f35544f8d26cef5e1","weight":1},{"event_id":462,"event_guid":"import-614c0d8f50a33ecdd5","weight":1},{"event_id":553,"event_guid":"import-1642ac54dd91815d89","weight":1},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":1},{"event_id":2071,"event_guid":"UgXvpZ_TwnZ-DtJ8nhCRZw","weight":1},{"event_id":2981,"event_guid":"125a0b2d-34de-4ba7-8b22-00a163df20a2","weight":1},{"event_id":4546,"event_guid":"57545943-4844-2020-2020-202020202020","weight":1},{"event_id":5233,"event_guid":"4a433356-4456-2020-2020-202020202020","weight":1},{"event_id":6155,"event_guid":"39b543c8-45c0-e22d-8276-7c2c9637f199","weight":1},{"event_id":6540,"event_guid":"0a1a58a4-7700-502b-b8f2-405f3e42c1bc","weight":1},{"event_id":6580,"event_guid":"093eca9c-c084-462a-8ed2-b95954782b06","weight":1}]},{"guid":"import-a1c68c7964ecf87fab","title":"Panel: Datenschutzbewegung ","subtitle":null,"slug":"mrmcd111b-2747-de-panel_datenschutzbewegung","link":"https://mrmcd.net/schedule/mrmcd111b/events/2747.en.html","description":"Für unser Panel am Abend haben wir Aktivisten u.a. vom FifF, AK Vorrat und vom CCC eingeladen \n","original_language":"eng","persons":["Constanze Kurz","Simon Columbus","Jens Rinne","Ricardo Cristof Remmert-Fontes","Sandro Gaycken"],"tags":["mrmcd111b"," Globalrelations"],"view_count":25,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-01-31T16:15:09.765+01:00","length":3973,"duration":3973,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2747-de-panel_datenschutzbewegung.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2747-de-panel_datenschutzbewegung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a1c68c7964ecf87fab-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a1c68c7964ecf87fab-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2747-de-panel_datenschutzbewegung","url":"https://api.media.ccc.de/public/events/import-a1c68c7964ecf87fab","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":521,"event_guid":"import-729e44803359d6029d","weight":1},{"event_id":1329,"event_guid":"import-5d3fe535916c811ae9","weight":1},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":1},{"event_id":6608,"event_guid":"46b7c5d8-318d-4f6c-a17e-73f2638ab46a","weight":1},{"event_id":7820,"event_guid":"9a497fd7-62b4-5b5b-bf09-5dd123d18305","weight":1},{"event_id":7824,"event_guid":"a059fb6b-edcb-58a6-8609-6bc409b6b943","weight":1},{"event_id":7834,"event_guid":"d37118e7-992d-5e2a-92cb-890b437b96b6","weight":1}]},{"guid":"import-c05698611a02094da5","title":"mrmcd111b Keynote","subtitle":"Dekan des Fachbereichs Informatik der TUD","slug":"mrmcd111b-2771-de-keynote-karsten_weihe-dekan","link":"https://mrmcd.net/schedule/mrmcd111b/events/2771.en.html","description":"\u003cp\u003etbd\u003c/p\u003e","original_language":"eng","persons":["g0ph3r","Karsten Weihe"],"tags":["mrmcd111b","Keynote"],"view_count":99,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-04-08T22:45:05.603+02:00","length":1180,"duration":1180,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2771-de-keynote-karsten_weihe-dekan.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2771-de-keynote-karsten_weihe-dekan_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-c05698611a02094da5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-c05698611a02094da5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2771-de-keynote-karsten_weihe-dekan","url":"https://api.media.ccc.de/public/events/import-c05698611a02094da5","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":460,"event_guid":"import-a06deb348ba5dc5997","weight":1},{"event_id":461,"event_guid":"import-56b0c5b879cb8dccdf","weight":2},{"event_id":469,"event_guid":"import-b37309c8e3e0ae69cb","weight":1},{"event_id":657,"event_guid":"import-a4e46602a0e417b76b","weight":1},{"event_id":666,"event_guid":"import-96a9a004b788c32b05","weight":1},{"event_id":684,"event_guid":"import-3c6185884db88b4055","weight":1},{"event_id":686,"event_guid":"import-b93ce60268c2d2302a","weight":1},{"event_id":692,"event_guid":"import-3782fc040147a211ac","weight":1},{"event_id":700,"event_guid":"import-cc371f077c977d36d4","weight":1},{"event_id":2054,"event_guid":"j4JJEB9hzp6UEkQnxkiYOA","weight":1},{"event_id":3151,"event_guid":"lX026xlxvrUOA_Cn2jexlA","weight":1},{"event_id":3157,"event_guid":"sL2AMlv7oqiQEYcKuLGkfw","weight":1},{"event_id":3165,"event_guid":"IPvmWP0FuV9b5q-gEI6iHw","weight":1},{"event_id":3168,"event_guid":"Jm8GI5VhZH0dwtwRfnNH0g","weight":1},{"event_id":3182,"event_guid":"7a4XXMduYNgu6p-upAI01w","weight":1},{"event_id":3204,"event_guid":"T7i3zXiVd4QCasP8vVUahA","weight":1},{"event_id":3224,"event_guid":"959d6e13-4915-41f1-81c1-0a3499d61a96","weight":1},{"event_id":3227,"event_guid":"0fd77819-0594-4127-bee3-a1d2fe7b1dd3","weight":1},{"event_id":3228,"event_guid":"51fd6faf-f1ff-4e76-80cd-e2154da8c045","weight":1},{"event_id":3385,"event_guid":"74460321-01f0-4a03-b0fd-ae67143edfab","weight":1},{"event_id":3448,"event_guid":"fb1359f0-76b4-4f28-abad-cdc5c1f97d0f","weight":1},{"event_id":3449,"event_guid":"55e72dd9-5014-4eca-bd26-3fbbad1fd89f","weight":1},{"event_id":3455,"event_guid":"da128639-43c2-4d72-9e9f-572763ab2e4e","weight":1},{"event_id":4535,"event_guid":"4542455a-5147-2020-2020-202020202020","weight":1},{"event_id":5200,"event_guid":"7a4aa837-870b-4b9f-b7f1-43aff69989a6","weight":1},{"event_id":5949,"event_guid":"641b63f4-4499-57e7-ab51-997b002babf0","weight":2},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5952,"event_guid":"17e98e8e-9c37-54b0-9738-f1004ca6d311","weight":1},{"event_id":5956,"event_guid":"9085a612-073b-5fe3-97e8-02f308ade923","weight":1},{"event_id":5957,"event_guid":"852f565f-93c0-5744-bf05-0682d59e5e07","weight":1},{"event_id":5958,"event_guid":"736d18c5-2d2d-5815-b488-aad7429dfdea","weight":1},{"event_id":5973,"event_guid":"724f0afe-8122-588f-a8d6-4ef2a2a18236","weight":1}]},{"guid":"import-844975dbb2fdc5a02b","title":"Historie von Opensolaris","subtitle":null,"slug":"mrmcd111b-2715-de-historie_von_opensolaris","link":"https://mrmcd.net/schedule/mrmcd111b/events/2715.en.html","description":"tbd\n","original_language":"eng","persons":["Joerg Schilling"],"tags":["mrmcd111b"," IT-Security"],"view_count":17,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2024-10-14T16:30:06.551+02:00","length":4000,"duration":4000,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2715-de-historie_von_opensolaris.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2715-de-historie_von_opensolaris_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-844975dbb2fdc5a02b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-844975dbb2fdc5a02b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2715-de-historie_von_opensolaris","url":"https://api.media.ccc.de/public/events/import-844975dbb2fdc5a02b","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":462,"event_guid":"import-614c0d8f50a33ecdd5","weight":1}]},{"guid":"import-5a95c514f979660108","title":"Kryptografie","subtitle":"Eine Einführung","slug":"mrmcd111b-2752-de-kryptografie","link":"https://mrmcd.net/schedule/mrmcd111b/events/2752.en.html","description":"Die meisten Bücher über Kryptographie beschäftigen sich mit Zahlentheorie und den klassischen Verfahren wie RSA, Diffie-Hellman, ElGamal und DSA. Wir zeigen hier eine andere Sichtweise auf verschiedene Kryptographieverfahren und ihre Sicherheit.\n","original_language":"eng","persons":["Erik Tews"],"tags":["mrmcd111b"," Cryptographics"],"view_count":205,"promoted":false,"date":"2008-09-05T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-01-31T12:00:06.860+01:00","length":3481,"duration":3481,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2752-de-kryptografie.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2752-de-kryptografie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-5a95c514f979660108-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-5a95c514f979660108-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2752-de-kryptografie","url":"https://api.media.ccc.de/public/events/import-5a95c514f979660108","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":88,"event_guid":"import-015e28bafa9b484416","weight":1},{"event_id":609,"event_guid":"import-3cf81cc3f1f6d963b9","weight":1},{"event_id":618,"event_guid":"import-ed39004471e1aa188e","weight":1},{"event_id":1265,"event_guid":"import-e12b39e63d03acfbf4","weight":1},{"event_id":1748,"event_guid":"ufJTu-pu8QBUtd-bji9tmw","weight":2},{"event_id":1785,"event_guid":"GqBcTbWHQclHwDW_kI9yBQ","weight":2},{"event_id":2019,"event_guid":"3Fu37xmz8exgycF13SnW-Q","weight":1},{"event_id":2024,"event_guid":"vGiE-5CGlagIkyZmi4OpYw","weight":1},{"event_id":2034,"event_guid":"uTtO3whl3UJt4i1ndRQuow","weight":1},{"event_id":2044,"event_guid":"v7AbhGiALo9fSeHxxUayIQ","weight":1},{"event_id":2120,"event_guid":"1nUJemWy6e8NpH3UzaySIA","weight":1},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2370,"event_guid":"8e05d290-9151-419d-8e63-3bcbb02096ab","weight":4},{"event_id":2609,"event_guid":"d9ccd1cd-58b4-4b70-96f4-6073f43b20fd","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":2796,"event_guid":"3c066b63-c764-4571-bc3b-eb8dfbb5a6d9","weight":1},{"event_id":2850,"event_guid":"4f1a0717-6931-4580-9e49-5d523be045df","weight":1},{"event_id":2915,"event_guid":"eb36c9f7-076a-45cc-ad66-ac97768e0c75","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":3},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":2},{"event_id":3051,"event_guid":"a52b22a5-9b68-4343-a37b-84ed1b0b6bce","weight":1},{"event_id":3404,"event_guid":"927868f5-bec9-457b-85c1-e248d971dcc7","weight":1},{"event_id":3418,"event_guid":"e22d9cbc-8dfe-4b87-a0e0-56fb76a62511","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":2},{"event_id":6545,"event_guid":"400622c5-3754-43fd-aaf3-0ca00e9ad551","weight":2},{"event_id":7799,"event_guid":"493770fd-2347-5707-98bc-22ee77cc9129","weight":2}]},{"guid":"import-a06deb348ba5dc5997","title":"Abusing X.509 certificate features","subtitle":null,"slug":"mrmcd111b-2684-de-abusing_x509_certificate_features","link":"https://mrmcd.net/schedule/mrmcd111b/events/2684.en.html","description":"Public key infrastructures and X.509 are designed to improve the security of applications and protocols. Unluckily, they also offer a lot of features that (when implemented naively) compromise security. The talk will show how browsers and mail clients have implemented certificates in such a way that they could be used for cross-domain user tracking, to unknowingly present a MITM threat to a user or to trigger unwanted HTTP requests on a client or server.\n\nMany people believe PKI and X.509 \"just works\". The talk will show that the subtleties in the specification and implementations are something that should not be forgotten. Also, it shows some examples of interesting vulnerabilities where the vulnerability is actually in the \"logic\" part of the application or specification.\n","original_language":"eng","persons":["Alexander 'alech' Klink"],"tags":["mrmcd111b"," Cryptographics"],"view_count":121,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2025-10-20T23:15:04.691+02:00","length":3462,"duration":3462,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2684-de-abusing_x509_certificate_features.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2684-de-abusing_x509_certificate_features_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a06deb348ba5dc5997-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a06deb348ba5dc5997-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2684-de-abusing_x509_certificate_features","url":"https://api.media.ccc.de/public/events/import-a06deb348ba5dc5997","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":124,"event_guid":"import-4ef0accbc71134a330","weight":1},{"event_id":334,"event_guid":"import-e7962d0b3c3fac22ae","weight":1},{"event_id":457,"event_guid":"import-c05698611a02094da5","weight":1},{"event_id":461,"event_guid":"import-56b0c5b879cb8dccdf","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":686,"event_guid":"import-b93ce60268c2d2302a","weight":1},{"event_id":1135,"event_guid":"import-3d147238f2f1434907","weight":2},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1599,"event_guid":"import-0263d58196a112ebec","weight":2},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":1},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":1},{"event_id":2300,"event_guid":"mzNAGavKy2KOcwOjGqC8pw","weight":2},{"event_id":2544,"event_guid":"2cce4d76-619d-4f60-b7e9-28e8ee9d6483","weight":1},{"event_id":2703,"event_guid":"68ba4a40-b5a4-4ef5-b22c-baf1b0f65f32","weight":1},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":1},{"event_id":3328,"event_guid":"cc7afd5b-dda6-5302-a41d-918795221100","weight":1},{"event_id":3418,"event_guid":"e22d9cbc-8dfe-4b87-a0e0-56fb76a62511","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":1},{"event_id":3690,"event_guid":"8d0aed87-2484-4880-ae08-2dc3c7898959","weight":1},{"event_id":3696,"event_guid":"9d36932f-616a-4677-b924-60c1986fbbfc","weight":1},{"event_id":3723,"event_guid":"f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7","weight":1},{"event_id":3833,"event_guid":"e17b93a7-1ac4-5770-95a8-7248f1376884","weight":1},{"event_id":4235,"event_guid":"e914d37b-16a4-4529-890d-654a4b22b054","weight":1},{"event_id":4427,"event_guid":"dc4aad2d-4ba3-4881-bb90-9a7953bf789d","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":5251,"event_guid":"9f748466-3ce9-11e8-8429-873b5c1d61e2","weight":1},{"event_id":5444,"event_guid":"fcabf377-2082-5e37-9c17-7bc1aa5dc051","weight":1},{"event_id":5590,"event_guid":"9e4db5be-6268-5c92-a58e-72f3d26925fe","weight":1},{"event_id":5592,"event_guid":"7ea126c8-5684-5217-91a0-a52dbcd5453d","weight":1},{"event_id":5596,"event_guid":"941d66c1-b9f8-5327-a157-44401fd3a554","weight":1},{"event_id":5609,"event_guid":"02b0ad5d-58d9-59e0-a443-19d33ce729b7","weight":1},{"event_id":5949,"event_guid":"641b63f4-4499-57e7-ab51-997b002babf0","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5952,"event_guid":"17e98e8e-9c37-54b0-9738-f1004ca6d311","weight":1},{"event_id":5956,"event_guid":"9085a612-073b-5fe3-97e8-02f308ade923","weight":1},{"event_id":5957,"event_guid":"852f565f-93c0-5744-bf05-0682d59e5e07","weight":1},{"event_id":5958,"event_guid":"736d18c5-2d2d-5815-b488-aad7429dfdea","weight":1},{"event_id":6078,"event_guid":"8a3c7006-ba7f-451c-a555-3a9ca4af5f2f","weight":1}]},{"guid":"import-8b481d833804edae7d","title":"Das Ende der Informationellen Selbstbestimmung","subtitle":"Warum der Datenschutz versagt hat","slug":"mrmcd111b-2746-de-das_ende_der_informellen_selbstbestimmung","link":"https://mrmcd.net/schedule/mrmcd111b/events/2746.en.html","description":"\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["mrmcd111b"," Globalrelations"],"view_count":19,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2025-02-27T17:00:06.413+01:00","length":2858,"duration":2858,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2746-de-das_ende_der_informellen_selbstbestimmung.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2746-de-das_ende_der_informellen_selbstbestimmung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-8b481d833804edae7d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-8b481d833804edae7d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2746-de-das_ende_der_informellen_selbstbestimmung","url":"https://api.media.ccc.de/public/events/import-8b481d833804edae7d","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":522,"event_guid":"import-8e09678728188bebdf","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":2139,"event_guid":"vhT7cUtHLVrhJEavNfFKCw","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1}]},{"guid":"import-d6cd450589fd4b059b","title":"decentral development","subtitle":null,"slug":"mrmcd111b-2808-de-decentral_development","link":"https://mrmcd.net/schedule/mrmcd111b/events/2808.en.html","description":"Today, many developing projects are spread all over the world. This results in a lot of new problems and new methods to solve them. Also, new tools are being developed to handle big projects with developers in different countries and different timezones. \n","original_language":"eng","persons":["Jens Muecke"],"tags":["mrmcd111b"," Technik"],"view_count":3,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2024-10-08T22:45:04.166+02:00","length":2790,"duration":2790,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2808-de-decentral_development.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2808-de-decentral_development_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-d6cd450589fd4b059b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-d6cd450589fd4b059b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2808-de-decentral_development","url":"https://api.media.ccc.de/public/events/import-d6cd450589fd4b059b","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[]},{"guid":"import-a13d5f058acc93cd63","title":"CTF Summary","subtitle":null,"slug":"mrmcd111b--en-ctf-summery","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["mrmcd111b"," IT-Security"],"view_count":22,"promoted":false,"date":"2008-01-01T01:00:00.000+01:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2024-12-28T16:00:09.316+01:00","length":165,"duration":165,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b--en-ctf-summery.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b--en-ctf-summery_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a13d5f058acc93cd63-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-a13d5f058acc93cd63-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b--en-ctf-summery","url":"https://api.media.ccc.de/public/events/import-a13d5f058acc93cd63","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":468,"event_guid":"import-60c99adc904e79b650","weight":1},{"event_id":1983,"event_guid":"HvR3MGqT1NqC3G3aIZJv7A","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4399,"event_guid":"4944d3e9-30d6-49c0-b5d0-f7f261c96de4","weight":1}]},{"guid":"import-60c99adc904e79b650","title":"ESA/ESOC","subtitle":"Bericht von dj-spock","slug":"mrmcd111b-2835-de-esa-esoc","link":"https://mrmcd.net/schedule/mrmcd111b/events/2835.en.html","description":"\n","original_language":"eng","persons":["dj-spock"],"tags":["mrmcd111b"," Radio"],"view_count":84,"promoted":false,"date":"2008-09-06T02:00:00.000+02:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2026-03-04T18:15:05.976+01:00","length":2466,"duration":2466,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2835-de-esa-esoc.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/mrmcd111b-2835-de-esa-esoc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-60c99adc904e79b650-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd111b/import-60c99adc904e79b650-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/mrmcd111b-2835-de-esa-esoc","url":"https://api.media.ccc.de/public/events/import-60c99adc904e79b650","conference_title":"MRMCD 111b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd111b","related":[{"event_id":467,"event_guid":"import-a13d5f058acc93cd63","weight":1},{"event_id":3275,"event_guid":"b5281990-8903-5598-963e-77e3548821e1","weight":1},{"event_id":5868,"event_guid":"ab743be1-d7f8-5179-ad97-bba9a0deaa7e","weight":1},{"event_id":5887,"event_guid":"2c8fac7f-38b0-57df-99b1-2dd60d97ddc2","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":2}]}]}