{"acronym":"mrmcd13","aspect_ratio":"16:9","updated_at":"2026-04-06T09:00:04.206+02:00","title":"MRMCD 2013 - Security Advice","schedule_url":"http://c3voc.de/share/schedules/mrmcd13/schedule.xml","slug":"conferences/mrmcd/mrmcd13","event_last_released_at":"2014-07-13T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/mrmcd/mrmcd13","logo_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/mrmcd2013-logo.jpg","images_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13","recordings_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd13","url":"https://api.media.ccc.de/public/conferences/mrmcd13","events":[{"guid":"NNuyGuqLdOP6yfR_D8KPIw","title":"MRMCD2013: Brace for Impact","subtitle":null,"slug":"MRMCD2013_-_5198_-_de_-_gate_104_-_201309081523_-_mrmcd2013_brace_for_impact_-_unicorn","link":"http://c3voc.de/share/schedules/mrmcd13/events/5198.html","description":"The world famous closing ceremony","original_language":"eng","persons":["Unicorn"],"view_count":21,"promoted":false,"date":"2013-09-08T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2025-05-14T00:00:04.117+02:00","tags":["Luftfahrt"],"length":1022,"duration":1022,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5198.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5198_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/NNuyGuqLdOP6yfR_D8KPIw-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/NNuyGuqLdOP6yfR_D8KPIw-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5198_-_de_-_gate_104_-_201309081523_-_mrmcd2013_brace_for_impact_-_unicorn","url":"https://api.media.ccc.de/public/events/NNuyGuqLdOP6yfR_D8KPIw","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1910,"event_guid":"XNiA1prIpuScO0I-cBudhA","weight":1},{"event_id":2077,"event_guid":"rv3NgNf5nI3B91sWPH3Y3A","weight":1},{"event_id":2660,"event_guid":"26d3eacd-7186-45b9-8583-32d33044f0a6","weight":1},{"event_id":3497,"event_guid":"13dd8dc0-2c01-46cf-87e0-1b659c04d4e3","weight":1},{"event_id":4557,"event_guid":"374e5454-5055-2020-2020-202020202020","weight":1}]},{"guid":"Ncs6_K_EBG41FPMXVa7I3w","title":"Gamejams","subtitle":"In 48 Stunden zum fertigen Spiel","slug":"MRMCD2013_-_5267_-_de_-_gate_104_-_201309071223_-_gamejams_-_xandy","link":"http://c3voc.de/share/schedules/mrmcd13/events/5267.html","description":"\n3 Mal im Jahr entwickeln Programmierer weltweit in nur 48 Stunden über 2000 Spiele zu einem vorgegebenen Thema. Wieso sollte man bei so einem Event mitmachen und wie schafft man es in der kurzen Zeit ein gutes Spiel zu entwickeln? ","original_language":"eng","persons":["xAndy"],"view_count":23,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2024-01-05T02:00:07.253+01:00","tags":[null],"length":2548,"duration":2548,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5267-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5267-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/Ncs6_K_EBG41FPMXVa7I3w-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/Ncs6_K_EBG41FPMXVa7I3w-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5267_-_de_-_gate_104_-_201309071223_-_gamejams_-_xandy","url":"https://api.media.ccc.de/public/events/Ncs6_K_EBG41FPMXVa7I3w","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":1964,"event_guid":"pNGiD11kb37bp1iyWbii0g","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3693,"event_guid":"90c2f1c6-c32e-4bb2-b8a0-db6b4e24e4b3","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3697,"event_guid":"a431b8a5-b8af-4ccf-bba2-7b1d88a782fb","weight":1},{"event_id":3699,"event_guid":"0d02bd82-f771-471c-b4bb-5e24b755b169","weight":1},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3715,"event_guid":"4c92b3f4-e32a-483b-9e5f-4e8201849284","weight":1},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":1},{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":1},{"event_id":3748,"event_guid":"09eb4f7a-8cf0-436f-aaa4-88190ee26e6d","weight":1},{"event_id":3752,"event_guid":"fc56c971-c65e-43ca-a92c-d98c7fb47bd6","weight":1},{"event_id":3758,"event_guid":"14590762-b249-463b-9617-46d0f0d3f5b3","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":1}]},{"guid":"91VC0Iiv6xUjfJrGOM6V_A","title":"Slide To Unlock -- or Provide Your Facebook Pictures?","subtitle":"A Critical Analysis of Biometric Authentication Mechanisms","slug":"MRMCD2013_-_5208_-_de_-_gate_104_-_201309061923_-_slide_to_unlock_--_or_provide_your_facebook_pictures_-_bluec0re_-_schalla","link":"http://c3voc.de/share/schedules/mrmcd13/events/5208.html","description":"In this talk we present a critical analysis of the four most appropriate candidates of biometric authentication mechanisms on mobile devices: fingerprint, face, voice and iris recognition. The results of our analysis show that there is still no compromise between usability and safety, because especially on mobile devices the unlock mechanism has to be quick and easy and this fact affects the overall security of the authentication mechanism. Using precise cameras and good microphones in mobile devices it is possible to use biometric authentication mechanisms like face, iris or voice recognition, but these methods are still in an immature phase and they suffer from different vulnerabilities which will be described in our presentation. The main reason of this problem is the lack of liveness detection which is crucial for all biometric authentication methods. We show that pictures retrieved from social media are enough to bypass the current biometric recognition mechanisms, even the approaches including built-in liveness detection on android phones.","original_language":"eng","persons":["bluec0re","schalla"],"view_count":172,"promoted":false,"date":"2013-09-06T02:00:00.000+02:00","release_date":"2014-06-15T02:00:00.000+02:00","updated_at":"2025-12-09T21:30:10.318+01:00","tags":["Web und IT-Security"],"length":3112,"duration":3112,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5208-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5208-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/91VC0Iiv6xUjfJrGOM6V_A-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/91VC0Iiv6xUjfJrGOM6V_A-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5208_-_de_-_gate_104_-_201309061923_-_slide_to_unlock_--_or_provide_your_facebook_pictures_-_bluec0re_-_schalla","url":"https://api.media.ccc.de/public/events/91VC0Iiv6xUjfJrGOM6V_A","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1089,"event_guid":"import-4a118e414c2784362b","weight":1},{"event_id":1274,"event_guid":"import-b24e96b14b74162533","weight":3},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1831,"event_guid":"shKT8wmGW3LurqOCDmbZyg","weight":1},{"event_id":1935,"event_guid":"Uo38_f5Bc4djTtf3Phgwzw","weight":3},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":2},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2437,"event_guid":"42a28f85-89af-48f9-acef-345c8b2e1183","weight":2},{"event_id":2438,"event_guid":"ba45991d-6548-4a8f-90d8-da72fd417f89","weight":3},{"event_id":2587,"event_guid":"89b01590-66cd-4804-9235-f63f073da68d","weight":1},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":2},{"event_id":4941,"event_guid":"02146e03-1a07-44f2-83b3-e1fd261a4214","weight":1},{"event_id":5416,"event_guid":"cdbaeeb3-8291-4974-b36e-264cf2b882ac","weight":1},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":2}]},{"guid":"B5KGQ9thWS9G3VOdtmk93g","title":"Too-Smart-TVs","subtitle":"Wie intelligente Fernseher zum Zuschauertracking missbraucht werden.","slug":"MRMCD2013_-_5196_-_de_-_gate_104_-_201309062023_-_too-smart-tvs_-_erik_tews","link":"http://c3voc.de/share/schedules/mrmcd13/events/5196.html","description":null,"original_language":"eng","persons":["erik.tews"],"view_count":120,"promoted":false,"date":"2013-09-06T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2025-12-01T21:15:08.105+01:00","tags":["Anonymität im Real Life und außerhalb des Internets"],"length":2795,"duration":2795,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5196-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5196-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/B5KGQ9thWS9G3VOdtmk93g-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/B5KGQ9thWS9G3VOdtmk93g-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5196_-_de_-_gate_104_-_201309062023_-_too-smart-tvs_-_erik_tews","url":"https://api.media.ccc.de/public/events/B5KGQ9thWS9G3VOdtmk93g","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":148,"event_guid":"import-633868694666482e9f","weight":1},{"event_id":155,"event_guid":"import-0b5b1fe8443b7a4274","weight":1},{"event_id":174,"event_guid":"import-8b9acbb013dda29c4d","weight":1},{"event_id":177,"event_guid":"import-edbff5e15d6cf3f558","weight":1},{"event_id":590,"event_guid":"import-85a56d62611bbbafe7","weight":1},{"event_id":609,"event_guid":"import-3cf81cc3f1f6d963b9","weight":1},{"event_id":626,"event_guid":"import-938a45e3503283dad8","weight":1},{"event_id":636,"event_guid":"import-d3c5d3252def4c998f","weight":1},{"event_id":644,"event_guid":"import-3f778f4cee65c8ffb3","weight":1},{"event_id":1906,"event_guid":"ZY8Lyu9IXYAbQsJqjQpFrQ","weight":1},{"event_id":1967,"event_guid":"7yHELzyvtegbmt7acz9EFg","weight":1},{"event_id":1970,"event_guid":"MUuq5fkYiR9DaVH-ky_O1A","weight":1},{"event_id":1976,"event_guid":"b0167f2efcd6a228","weight":1},{"event_id":2054,"event_guid":"j4JJEB9hzp6UEkQnxkiYOA","weight":1},{"event_id":2059,"event_guid":"1oeeHOhsxwY6RF09x5sGMw","weight":1},{"event_id":2080,"event_guid":"Q8Gx1V1QSvum7N9obW7QHw","weight":1},{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":1},{"event_id":2095,"event_guid":"betriebsdaten","weight":1},{"event_id":2654,"event_guid":"81d4d7df-f4eb-4752-bfff-43306b3524de","weight":1},{"event_id":2698,"event_guid":"analogrechnerprogrammierung","weight":1},{"event_id":2699,"event_guid":"unix-geschichte","weight":1},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":1},{"event_id":2966,"event_guid":"de6a55a9-96fc-4f5d-a038-b57675f67713","weight":1},{"event_id":2967,"event_guid":"cabf79b8-cadc-45ef-89c8-c3c877baf379","weight":1},{"event_id":2968,"event_guid":"472cf626-050c-409e-b5fb-c9ee5ef9096f","weight":1},{"event_id":2969,"event_guid":"a4b72599-b24b-4890-85bb-4f3e24e452e2","weight":1},{"event_id":2970,"event_guid":"d9ed8b4a-8897-46f8-b2e2-38cbf57aa5d6","weight":1},{"event_id":2971,"event_guid":"2a70a73e-f526-4550-956d-a637d05fd2cd","weight":1},{"event_id":2972,"event_guid":"e328de69-f963-4bff-9018-ffc5501ce1bf","weight":1},{"event_id":2973,"event_guid":"4bb40941-e0e5-4764-9ece-9dffe49db376","weight":1},{"event_id":2999,"event_guid":"0cd4467e-31c9-43bf-a315-491dc48c3c6a","weight":1},{"event_id":3354,"event_guid":"18b5c345-1c6a-5833-839b-15cae3a6d269","weight":1},{"event_id":3404,"event_guid":"927868f5-bec9-457b-85c1-e248d971dcc7","weight":1},{"event_id":3509,"event_guid":"effdd672-d519-e3ee-e933-b7a65655c168","weight":1},{"event_id":4222,"event_guid":"bfaf0024-a741-4015-85df-49663c462cf8","weight":1},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":1},{"event_id":4265,"event_guid":"9ba5a35b-0608-40f1-84ec-e02c387cb60b","weight":1},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":1},{"event_id":4336,"event_guid":"962f467f-8c6b-44cc-98cd-673128a9aef5","weight":1},{"event_id":4383,"event_guid":"aa3b2924-157d-41fc-a48b-d5230919b1ed","weight":1},{"event_id":4555,"event_guid":"44433941-4739-2020-2020-202020202020","weight":1},{"event_id":4564,"event_guid":"59e9fb52-6966-5b70-b3cd-e8576b1e2289","weight":1},{"event_id":4570,"event_guid":"b3cfeacd-ce23-584f-87dd-61202b5251cc","weight":1},{"event_id":4573,"event_guid":"0a06447c-95e2-5d84-b1fc-2601e846ffbe","weight":1},{"event_id":6447,"event_guid":"1cc2086d-bfd7-53fd-8ae2-25efc204bcdf","weight":1},{"event_id":6460,"event_guid":"a8605e7e-438f-5fb2-9b16-a054469fba8e","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6571,"event_guid":"f4568030-a378-586e-b39a-4fab71027a37","weight":1},{"event_id":6621,"event_guid":"9c7b5d1d-6f78-5935-9aa5-bf10bf26e54e","weight":1},{"event_id":6962,"event_guid":"ec1f65e0-1333-5bb2-af4c-46f91052467e","weight":1}]},{"guid":"Tcu-vm4bVFeJAtBDD5YUtA","title":"Torservers.net","subtitle":"Geschichten über den Betrieb von Tor Exit Relays","slug":"MRMCD2013_-_5199_-_de_-_gate_104_-_201309062123_-_torservers_net_-_mo","link":"http://c3voc.de/share/schedules/mrmcd13/events/5199.html","description":"Torservers.net startete 2010, und ist inzwischen das größte Netzwerk an Organisationen, die Tor Exit Relays betreiben.","original_language":"eng","persons":["mo"],"view_count":174,"promoted":false,"date":"2013-09-06T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2025-04-25T03:00:02.545+02:00","tags":["Web und IT-Security"],"length":3535,"duration":3535,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5199-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5199-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/Tcu-vm4bVFeJAtBDD5YUtA-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/Tcu-vm4bVFeJAtBDD5YUtA-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5199_-_de_-_gate_104_-_201309062123_-_torservers_net_-_mo","url":"https://api.media.ccc.de/public/events/Tcu-vm4bVFeJAtBDD5YUtA","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":2370,"event_guid":"8e05d290-9151-419d-8e63-3bcbb02096ab","weight":1},{"event_id":2486,"event_guid":"439d64b1-b08b-4313-87f9-c469211d4206","weight":1},{"event_id":2748,"event_guid":"0fd9f541-1698-4e24-a7e4-ab7195d21a05","weight":1},{"event_id":2776,"event_guid":"3d7c416e-7e31-11e5-b91e-f1d2b07f83cb","weight":1},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":3051,"event_guid":"a52b22a5-9b68-4343-a37b-84ed1b0b6bce","weight":2},{"event_id":3052,"event_guid":"cb2c6d99-f7fa-4853-a5e4-a417839530dc","weight":2},{"event_id":3500,"event_guid":"1baa15ec-41c4-4eb2-8499-1929ce105bf2","weight":1},{"event_id":3507,"event_guid":"47579b81-db6a-542f-7fba-1e133d68d3ae","weight":1},{"event_id":3566,"event_guid":"40332b3d-c3b6-5c10-be52-1014af10f5ad","weight":1},{"event_id":3579,"event_guid":"37781754-b1cd-5304-9b68-4a7507e32608","weight":1},{"event_id":3641,"event_guid":"b9ca38ea-fa88-48c4-8083-9415eee93fcb","weight":1},{"event_id":3654,"event_guid":"ac80424a-f4dc-431d-95f3-3f85664ba2dc","weight":2},{"event_id":3848,"event_guid":"e6746e7f-dca9-4265-86c7-0bef863d83a9","weight":1},{"event_id":4238,"event_guid":"9ea86f2f-b236-431f-9027-8b31c0b2ad56","weight":1},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":1},{"event_id":4264,"event_guid":"9b45fac3-3ccb-4778-abf1-cc564467ede1","weight":1},{"event_id":4265,"event_guid":"9ba5a35b-0608-40f1-84ec-e02c387cb60b","weight":1},{"event_id":4284,"event_guid":"d23d5053-0684-4342-a0a4-7cfc4cd2afe3","weight":1},{"event_id":4288,"event_guid":"6e5a6877-3a72-464f-bf47-4bbd103b41fe","weight":1},{"event_id":4305,"event_guid":"b2b9237b-d45a-4271-9b63-66573c1de3c7","weight":1},{"event_id":4337,"event_guid":"444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","weight":1},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5273,"event_guid":"065e78a2-c020-4199-ad38-4bea1e62eb15","weight":1},{"event_id":5283,"event_guid":"f636e390-cad4-47f7-873d-7a23431fed16","weight":1},{"event_id":5664,"event_guid":"ae4882b3-90b3-4479-b94b-3e2c0208ef7c","weight":2},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":1},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":1},{"event_id":6044,"event_guid":"5808be1e-ce91-48a2-a22a-91c3289d3819","weight":1},{"event_id":6217,"event_guid":"cc202ef4-4f9c-579c-b07b-1ef414c937e9","weight":1},{"event_id":6220,"event_guid":"6c7791b3-f33d-52e0-8b65-e1fcbbd1118e","weight":1},{"event_id":6221,"event_guid":"ed3dee00-15b8-54f1-b68c-51baea4890a6","weight":1},{"event_id":6229,"event_guid":"255cb75a-a2bb-5495-88f9-94be005953f1","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":1}]},{"guid":"qhHYA8W5FgbkHqAdYePmEQ","title":"Hacking Medical Devices","subtitle":null,"slug":"MRMCD2013_-_5209_-_de_-_gate_104_-_201309081123_-_hacking_medical_devices_-_flo","link":"http://c3voc.de/share/schedules/mrmcd13/events/5209.html","description":"In den letzten Jahren sind immer mehr technologisch hochentwickelte medizinische Geräte auf den Markt gekommen. Diese Geräte haben mittlerweile vielfältige Kommunikationsmöglichkeiten. Wir befassen uns in einem Forschungsprojekt mit der Sicherheit dieser Geräte und werden den Stand unserer Arbeit in diesem Vortrag präsentieren.","original_language":"eng","persons":["flo"],"view_count":1234,"promoted":false,"date":"2013-09-08T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2026-03-02T20:00:09.680+01:00","tags":["Web und IT-Security"],"length":2958,"duration":2958,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5209.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5209_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/qhHYA8W5FgbkHqAdYePmEQ-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/qhHYA8W5FgbkHqAdYePmEQ-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5209_-_de_-_gate_104_-_201309081123_-_hacking_medical_devices_-_flo","url":"https://api.media.ccc.de/public/events/qhHYA8W5FgbkHqAdYePmEQ","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":229,"event_guid":"import-84ac09898882828ddb","weight":3},{"event_id":3468,"event_guid":"91c80405-d612-48f2-832f-2c42ffcfada6","weight":7},{"event_id":3642,"event_guid":"fd205d0d-d767-4ff6-9771-9f2d4c933fe7","weight":2}]},{"guid":"MUuq5fkYiR9DaVH-ky_O1A","title":"Scheitern auf hohem Niveau: Warum du als Hacker auf jeden/keinen Fall ein Startup joinen solltest","subtitle":"(Was ich bei aka-aki lernte)","slug":"MRMCD2013_-_5238_-__-_gate_104_-_201309071523_-_scheitern_auf_hohem_niveau_warum_du_als_hacker_auf_jeden_keinen_fall_ein_startup_joinen_solltest_-_mntmn","link":"http://c3voc.de/share/schedules/mrmcd13/events/5238.html","description":"Aka-aki, gegründet 2007 von ein paar Studenten, millionenfinanziert, eins der ersten mobilen Social Networks mit über 700.000 Nutzern, am Ende grandios gescheitert: was war da los? Learnings aus der Perspektive eines Programmierers, der es von Anfang an mit aufbaute, und warum man es sich gut überlegen sollte, irgendwo für eine Beteiligung mitzuarbeiten.","original_language":"eng","persons":["mntmn"],"view_count":126,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2025-10-29T10:30:07.751+01:00","tags":["Hack the planet"],"length":362,"duration":362,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5238.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5238_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/MUuq5fkYiR9DaVH-ky_O1A-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/MUuq5fkYiR9DaVH-ky_O1A-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5238_-__-_gate_104_-_201309071523_-_scheitern_auf_hohem_niveau_warum_du_als_hacker_auf_jeden_keinen_fall_ein_startup_joinen_solltest_-_mntmn","url":"https://api.media.ccc.de/public/events/MUuq5fkYiR9DaVH-ky_O1A","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":148,"event_guid":"import-633868694666482e9f","weight":1},{"event_id":155,"event_guid":"import-0b5b1fe8443b7a4274","weight":1},{"event_id":174,"event_guid":"import-8b9acbb013dda29c4d","weight":1},{"event_id":177,"event_guid":"import-edbff5e15d6cf3f558","weight":1},{"event_id":284,"event_guid":"import-f325f1d2ed9f3f9906","weight":1},{"event_id":365,"event_guid":"import-951fb835b898590d42","weight":1},{"event_id":1909,"event_guid":"B5KGQ9thWS9G3VOdtmk93g","weight":1},{"event_id":1910,"event_guid":"XNiA1prIpuScO0I-cBudhA","weight":1},{"event_id":1964,"event_guid":"pNGiD11kb37bp1iyWbii0g","weight":1},{"event_id":2080,"event_guid":"Q8Gx1V1QSvum7N9obW7QHw","weight":1},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":1},{"event_id":3470,"event_guid":"9b863067-c910-4528-92ab-f5b021add0ee","weight":1},{"event_id":3884,"event_guid":"6ae836a0-0b7d-4a55-bc1d-55ba4da11ec7","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":5658,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb890","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5953,"event_guid":"3c3707ab-6d54-53b8-93d9-7c414cac425e","weight":1},{"event_id":5956,"event_guid":"9085a612-073b-5fe3-97e8-02f308ade923","weight":1},{"event_id":5966,"event_guid":"b6554fda-0520-5ae9-ad5a-73dab200bf36","weight":1},{"event_id":6135,"event_guid":"155eef99-f4f5-46c0-9230-f1a9f5234dbf","weight":1},{"event_id":6390,"event_guid":"6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c","weight":1},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":2},{"event_id":6447,"event_guid":"1cc2086d-bfd7-53fd-8ae2-25efc204bcdf","weight":1},{"event_id":6460,"event_guid":"a8605e7e-438f-5fb2-9b16-a054469fba8e","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6571,"event_guid":"f4568030-a378-586e-b39a-4fab71027a37","weight":1},{"event_id":6621,"event_guid":"9c7b5d1d-6f78-5935-9aa5-bf10bf26e54e","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":1},{"event_id":6953,"event_guid":"69bd5b99-fbd1-568f-8cde-9694b6f7e319","weight":1},{"event_id":6962,"event_guid":"ec1f65e0-1333-5bb2-af4c-46f91052467e","weight":1}]},{"guid":"7rxU3wLkh3k1kKMlqzWTcg","title":"Open Data in Deutschland","subtitle":"Eine Übersicht zur politischen Situation in Deutschland, zum internaltionalen Kontext und zu konkreten Projekten","slug":"MRMCD2013_-_5171_-_de_-_gate_104_-_201309071423_-_open_data_in_deutschland_-_claudia_schwegmann","link":"http://c3voc.de/share/schedules/mrmcd13/events/5171.html","description":"In diesem Vortrag wird der Stand der Open Data Bewegung in Deutschland vorgestellt: die rechtliche Situation, der bisherige politische Prozess und sowie der gegenwärtige Stand der Open Data Umsetzung durch staatlicher Behörden oder zivilgesellschaftlicher Initiativen. Um eine Einschätzung der Situation in Deutschland zu erleichtern werden auch Entwicklungen im internationalen Kontext kurz beschrieben.","original_language":"eng","persons":["Claudia Schwegmann"],"view_count":60,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2023-06-28T18:45:02.532+02:00","tags":["Hack the planet"],"length":2757,"duration":2757,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5171.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5171_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/7rxU3wLkh3k1kKMlqzWTcg-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/7rxU3wLkh3k1kKMlqzWTcg-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5171_-_de_-_gate_104_-_201309071423_-_open_data_in_deutschland_-_claudia_schwegmann","url":"https://api.media.ccc.de/public/events/7rxU3wLkh3k1kKMlqzWTcg","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":536,"event_guid":"import-6e86cf78ae6a909608","weight":2},{"event_id":666,"event_guid":"import-96a9a004b788c32b05","weight":1},{"event_id":2116,"event_guid":"TTTm_k9VrKkIgw9wor4zQQ","weight":2},{"event_id":2745,"event_guid":"d185ad13-0ac3-4286-849c-c24069400473","weight":1},{"event_id":3542,"event_guid":"bce0437f-0cf3-4d3d-ba32-2f1d29cd2516","weight":3},{"event_id":3562,"event_guid":"36c64823-02d8-4039-9899-e760886efcd9","weight":4},{"event_id":4326,"event_guid":"1b4ced58-cf46-4f36-9ddc-bcb567fa9f47","weight":1},{"event_id":4730,"event_guid":"fa904c76-9fc0-5686-bb61-0e3583d8d6c5","weight":1}]},{"guid":"ZY8Lyu9IXYAbQsJqjQpFrQ","title":"\"The Slingshot Channel\" - Phänomen oder Kalkül?","subtitle":"Wie man mit Nischenthemen im Web erfolgreich sein kann","slug":"MRMCD2013_-_5160_-_de_-_gate_104_-_201309071923_-_the_slingshot_channel_-_phanomen_oder_kalkul_-_jorg_sprave","link":"http://c3voc.de/share/schedules/mrmcd13/events/5160.html","description":"Dieser Vortrag beschreibt die Geschichte und den Alltag eines der erfolgreichsten und gleichzeitig ungewöhnlichsten YouTube-Kanals Deutschland: Der \"Slingshot Channel\". ","original_language":"eng","persons":["Jörg Sprave"],"view_count":157,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2026-04-06T09:00:04.201+02:00","tags":[null],"length":3004,"duration":3004,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5160-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5160-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/ZY8Lyu9IXYAbQsJqjQpFrQ-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/ZY8Lyu9IXYAbQsJqjQpFrQ-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5160_-_de_-_gate_104_-_201309071923_-_the_slingshot_channel_-_phanomen_oder_kalkul_-_jorg_sprave","url":"https://api.media.ccc.de/public/events/ZY8Lyu9IXYAbQsJqjQpFrQ","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":141,"event_guid":"import-806d5c23f700a7a18c","weight":1},{"event_id":1909,"event_guid":"B5KGQ9thWS9G3VOdtmk93g","weight":1},{"event_id":1967,"event_guid":"7yHELzyvtegbmt7acz9EFg","weight":2},{"event_id":2520,"event_guid":"c992aea0-c7b2-4b8b-ae5e-758cabd0ca47","weight":1},{"event_id":3458,"event_guid":"0cd76d0e-cdb3-4c3f-9ebc-0dd2918be905","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4665,"event_guid":"bac361fe-2e40-4671-abd5-694d07187365","weight":1},{"event_id":4667,"event_guid":"9b3292f5-f7bd-49f9-8c2b-5dc98d72e6a4","weight":1},{"event_id":4668,"event_guid":"d1ff1805-f2c4-4da6-9437-deb109e6383f","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":5258,"event_guid":"e3e99d32-545e-476e-b92e-c9a7a2915e2c","weight":1},{"event_id":6459,"event_guid":"41e36295-68d2-5c2b-add5-d6b6b58df605","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6988,"event_guid":"7d234a0b-b224-5362-81ae-3baedaa55eea","weight":1},{"event_id":7823,"event_guid":"a2846627-02c2-5acf-a729-e8bd700766ce","weight":1},{"event_id":7843,"event_guid":"d21c048c-ff08-5483-af93-a32b0e13fe48","weight":1},{"event_id":7844,"event_guid":"0d9112f3-d8b0-5cf3-adf0-842be6380d20","weight":1}]},{"guid":"yaW593oqackOhTqR8bVqvQ","title":"Proximax, Telex, Flashproxy oder Tor Bridges","subtitle":"Übersicht über aktuelle Zensurumgehungssoftware","slug":"MRMCD2013_-_5173_-_de_-_gate_104_-_201309081323_-_proximax_telex_flashproxy_oder_tor_bridges_-_qbi","link":"http://c3voc.de/share/schedules/mrmcd13/events/5173.html","description":"Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Tools wie Proxies, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge unterstützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? Der Vortrag stellt einige von diesen vor und zeigt die Stärken und Schwächen.","original_language":"eng","persons":["qbi"],"view_count":37,"promoted":false,"date":"2013-09-08T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2026-01-24T16:15:12.293+01:00","tags":["Web und IT-Security"],"length":3199,"duration":3199,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5173.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5173_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/yaW593oqackOhTqR8bVqvQ-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/yaW593oqackOhTqR8bVqvQ-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5173_-_de_-_gate_104_-_201309081323_-_proximax_telex_flashproxy_oder_tor_bridges_-_qbi","url":"https://api.media.ccc.de/public/events/yaW593oqackOhTqR8bVqvQ","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":1},{"event_id":4873,"event_guid":"8453f8f1-d934-4d10-bcfa-a857fa65b8df","weight":1}]},{"guid":"hNIOYWq3u0VL9agmbBwEnw","title":"frab","subtitle":"conference schedule management","slug":"MRMCD2013_-_5168_-_de_-_gate_104_-_201309081223_-_frab_-_mm","link":"http://c3voc.de/share/schedules/mrmcd13/events/5168.html","description":"frab wird auf verschiedenen chaos und chaosnahen Veranstaltungen genutzt um das Programm zu erstellen.\n\nDer Vortrag geht auf die Verwendung und Entwicklung von frab ein. Zum Schluss wird die Club-weite Infrastruktur vorgestellt.","original_language":"eng","persons":["mm"],"view_count":67,"promoted":false,"date":"2013-09-08T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2026-01-28T19:45:09.603+01:00","tags":["Open Source Entwicklung"],"length":2697,"duration":2697,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5168.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5168_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/hNIOYWq3u0VL9agmbBwEnw-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/hNIOYWq3u0VL9agmbBwEnw-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5168_-_de_-_gate_104_-_201309081223_-_frab_-_mm","url":"https://api.media.ccc.de/public/events/hNIOYWq3u0VL9agmbBwEnw","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":2},{"event_id":2618,"event_guid":"d4feda86-cee8-45c3-b62a-4bff418a0dee","weight":1},{"event_id":4557,"event_guid":"374e5454-5055-2020-2020-202020202020","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1}]},{"guid":"7yHELzyvtegbmt7acz9EFg","title":"Statistische Fallen(steller)","subtitle":null,"slug":"MRMCD2013_-_5241_-_de_-_gate_104_-_201309081423_-_statistische_fallen_steller_-_khamacher","link":"http://c3voc.de/share/schedules/mrmcd13/events/5241.html","description":"Computerspiele führen zu Amokläufen? Vorratsdatenspeicherung \u0026 Co sind Werkzeuge für \"Precrime\"? Päpste sind auch nur Menschen?","original_language":"eng","persons":["khamacher"],"view_count":136,"promoted":false,"date":"2013-09-08T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2023-11-23T13:45:03.907+01:00","tags":["Anonymität im Real Life und außerhalb des Internets"],"length":3606,"duration":3606,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5241.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5241_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/7yHELzyvtegbmt7acz9EFg-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/7yHELzyvtegbmt7acz9EFg-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5241_-_de_-_gate_104_-_201309081423_-_statistische_fallen_steller_-_khamacher","url":"https://api.media.ccc.de/public/events/7yHELzyvtegbmt7acz9EFg","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1749,"event_guid":"YYw-34ht9mf83cFWsxTCAw","weight":1},{"event_id":1906,"event_guid":"ZY8Lyu9IXYAbQsJqjQpFrQ","weight":2},{"event_id":1909,"event_guid":"B5KGQ9thWS9G3VOdtmk93g","weight":1},{"event_id":2062,"event_guid":"SRfkRBTjEJe3cNS0Br3cdQ","weight":1},{"event_id":2520,"event_guid":"c992aea0-c7b2-4b8b-ae5e-758cabd0ca47","weight":1},{"event_id":4665,"event_guid":"bac361fe-2e40-4671-abd5-694d07187365","weight":1},{"event_id":4667,"event_guid":"9b3292f5-f7bd-49f9-8c2b-5dc98d72e6a4","weight":1},{"event_id":4668,"event_guid":"d1ff1805-f2c4-4da6-9437-deb109e6383f","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":6459,"event_guid":"41e36295-68d2-5c2b-add5-d6b6b58df605","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1}]},{"guid":"pNGiD11kb37bp1iyWbii0g","title":"GP = GP","subtitle":"Maenner, die auf Pixel starren","slug":"MRMCD2013_-_5182_-_de_-_gate_104_-_201309071723_-_gp_gp_-_nuit","link":"http://c3voc.de/share/schedules/mrmcd13/events/5182.html","description":"Software und Hardware Einsatz bei Panoramen, die 50 GP ueberschreiten.","original_language":"eng","persons":["nuit"],"view_count":39,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2026-02-16T23:45:10.401+01:00","tags":[null],"length":2826,"duration":2826,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5182.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5182_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/pNGiD11kb37bp1iyWbii0g-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/pNGiD11kb37bp1iyWbii0g-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5182_-_de_-_gate_104_-_201309071723_-_gp_gp_-_nuit","url":"https://api.media.ccc.de/public/events/pNGiD11kb37bp1iyWbii0g","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":1},{"event_id":1713,"event_guid":"import-4f8250d931be212cab","weight":2},{"event_id":1907,"event_guid":"Ncs6_K_EBG41FPMXVa7I3w","weight":1},{"event_id":1938,"event_guid":"SNtvye8d6i---_LiIAd6KQ","weight":1},{"event_id":1970,"event_guid":"MUuq5fkYiR9DaVH-ky_O1A","weight":1},{"event_id":1975,"event_guid":"1d9f168fd259ff3d","weight":1},{"event_id":1985,"event_guid":"bMqZPzTNrt01vh8LIJPt_g","weight":1},{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":1},{"event_id":2164,"event_guid":"XGqu620EKR92-WUWMXNRvA","weight":1},{"event_id":2385,"event_guid":"b55ec10e-b12f-40e0-bb25-4fee2f13ad86","weight":1},{"event_id":2414,"event_guid":"b27fffbe-258a-4bc9-a27c-f7558bcba446","weight":1},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":1},{"event_id":3423,"event_guid":"77e35271-243a-4e79-8401-f94dd1b5711a","weight":1},{"event_id":3470,"event_guid":"9b863067-c910-4528-92ab-f5b021add0ee","weight":1},{"event_id":3501,"event_guid":"cec35be5-a1f0-496b-82c9-c7ace338b50e","weight":1},{"event_id":4485,"event_guid":"da208942-2be8-4f14-9466-ba8e7b74fca8","weight":1},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5953,"event_guid":"3c3707ab-6d54-53b8-93d9-7c414cac425e","weight":1},{"event_id":5956,"event_guid":"9085a612-073b-5fe3-97e8-02f308ade923","weight":1},{"event_id":5966,"event_guid":"b6554fda-0520-5ae9-ad5a-73dab200bf36","weight":1},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":1},{"event_id":6953,"event_guid":"69bd5b99-fbd1-568f-8cde-9694b6f7e319","weight":1}]},{"guid":"XNiA1prIpuScO0I-cBudhA","title":"MRMCD2013: Takeoff","subtitle":"We wish you a pleasent journey","slug":"MRMCD2013_-_5167_-_de_-_gate_104_-_201309061753_-_mrmcd2013_takeoff_-_unicorn","link":"http://c3voc.de/share/schedules/mrmcd13/events/5167.html","description":null,"original_language":"eng","persons":["Unicorn"],"view_count":28,"promoted":false,"date":"2013-09-06T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2023-07-31T12:30:02.307+02:00","tags":["Luftfahrt"],"length":409,"duration":409,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5167-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5167-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/XNiA1prIpuScO0I-cBudhA-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/XNiA1prIpuScO0I-cBudhA-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5167_-_de_-_gate_104_-_201309061753_-_mrmcd2013_takeoff_-_unicorn","url":"https://api.media.ccc.de/public/events/XNiA1prIpuScO0I-cBudhA","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":1963,"event_guid":"NNuyGuqLdOP6yfR_D8KPIw","weight":1},{"event_id":1970,"event_guid":"MUuq5fkYiR9DaVH-ky_O1A","weight":1},{"event_id":4557,"event_guid":"374e5454-5055-2020-2020-202020202020","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1}]},{"guid":"SmGg0EtUqnEYpLxDHI5X1g","title":"Don't remove your ethics before flight","subtitle":null,"slug":"MRMCD2013_-_5189_-_de_-_gate_104_-_201309061823_-_don_t_remove_your_ethics_before_flight_-_fukami","link":"http://c3voc.de/share/schedules/mrmcd13/events/5189.html","description":"Nicht erst der Überwachungsskandal rund um PRISM und Tempora zeigt, dass es mehr als genug Techniker zu geben scheint, die bereit sind, am Aufbau dieser Strukturen mitzuwirken - teilweise aus finanziellen Gründen, teilweise weil sie nicht überblicken, wozu ihre Arbeit benutzt wird (z.B. weil sie sich mit nur mit Teilaspekten beschäftigen). Die Keynote beleuchtet wenig akademisch die ganz konkreten Fragen, die sich daraus ergeben. ","original_language":"eng","persons":["fukami"],"view_count":31,"promoted":false,"date":"2013-09-06T02:00:00.000+02:00","release_date":"2014-06-18T02:00:00.000+02:00","updated_at":"2025-09-29T00:45:02.522+02:00","tags":["Hack the planet"],"length":2740,"duration":2740,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5189-h264-hq.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5189-h264-hq_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/SmGg0EtUqnEYpLxDHI5X1g-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/SmGg0EtUqnEYpLxDHI5X1g-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5189_-_de_-_gate_104_-_201309061823_-_don_t_remove_your_ethics_before_flight_-_fukami","url":"https://api.media.ccc.de/public/events/SmGg0EtUqnEYpLxDHI5X1g","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":145,"event_guid":"import-38af0f45219fff06fd","weight":1},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":1},{"event_id":2660,"event_guid":"26d3eacd-7186-45b9-8583-32d33044f0a6","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1}]},{"guid":"WBJGKVQxGRFSjHRdIIQEtA","title":"Quantify the World","subtitle":"You want some measurements with that?","slug":"MRMCD2013_-_5145_-_de_-_gate_104_-_201309071323_-_quantify_the_world_-_tiefpunkt","link":"http://c3voc.de/share/schedules/mrmcd13/events/5145.html","description":" Irgendwas über Sensoren, Daten, und was man damit so tun kann.","original_language":"eng","persons":["tiefpunkt"],"view_count":13,"promoted":false,"date":"2013-09-07T02:00:00.000+02:00","release_date":"2014-07-13T02:00:00.000+02:00","updated_at":"2025-05-09T23:30:04.032+02:00","tags":["Hack the planet"],"length":2588,"duration":2588,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5145.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/5145_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/WBJGKVQxGRFSjHRdIIQEtA-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd13/WBJGKVQxGRFSjHRdIIQEtA-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/MRMCD2013_-_5145_-_de_-_gate_104_-_201309071323_-_quantify_the_world_-_tiefpunkt","url":"https://api.media.ccc.de/public/events/WBJGKVQxGRFSjHRdIIQEtA","conference_title":"MRMCD 2013 - Security Advice","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd13","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1719,"event_guid":"import-1975766c6d4f873c2c","weight":1},{"event_id":1935,"event_guid":"Uo38_f5Bc4djTtf3Phgwzw","weight":1},{"event_id":2015,"event_guid":"EdK-AIe26526YOhHHmQwAQ","weight":1},{"event_id":2075,"event_guid":"og51ww-R2NDBGuA6LeTfRA","weight":1},{"event_id":2114,"event_guid":"TanZs17TL9oukPaNzCAw0A","weight":1},{"event_id":2247,"event_guid":"iU5CnqxotZz_KK2P-uVMsQ","weight":1},{"event_id":2248,"event_guid":"SNW-UDgMBlqvbRHVTwhxpg","weight":1},{"event_id":2420,"event_guid":"02b7f942-d9e9-468e-85cd-12837f48bc16","weight":1},{"event_id":2526,"event_guid":"e8f03c57-f500-492a-9028-b91acffe7695","weight":1},{"event_id":3073,"event_guid":"deadbcbf-a450-4005-99d1-054b38e58b86","weight":1},{"event_id":3291,"event_guid":"600fd387-0789-5cae-ba0b-844d84aca816","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1}]}]}