{"acronym":"pw17","aspect_ratio":"16:9","updated_at":"2026-04-09T11:30:07.244+02:00","title":"Privacy Week 2017","schedule_url":"","slug":"conferences/privacyweek/2017","event_last_released_at":"2018-02-01T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"conferences/privacyweek/2017","logo_url":"https://static.media.ccc.de/media/conferences/pw17/logo.png","images_url":"https://static.media.ccc.de/media/conferences/pw17","recordings_url":"https://cdn.media.ccc.de/events/privacyweek/2017","url":"https://api.media.ccc.de/public/conferences/pw17","events":[{"guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","title":"Bundestrojaner - systematische Zerstörung der Informationssicherheit","subtitle":"Der Flurschaden der Quellen-TKÜ und der Crypto Wars","slug":"pw17-114-bundestrojaner_-_systematische_zerstorung_der_informationssicherheit","link":"https://c3voc.de","description":"Die Überwachung soll eine radikale neue Dimension annehmen. Die Quelle von Kommunikationen, sprich das eigene Smartphone, Tablet, der PC oder irgendein sonstiges Gerät, soll eine legale Schadsoftware bekommen, die Daten an der Quelle abgreift. Das ganze soll klar geregelt, gezielt und völiig nebenwirkungsfrei auf schwere oder alle möglichen Straftaten und -versuche angewendet werden. Der Name des Werkzeugs ist verharmlosend Quellen-Telekommunikationsüberwachung (Quellen-TKÜ) genannt. Letztlich ist es Schadsoftware, die alle Kriterien eines trojanischen Pferdes erfüllt, sprich der Bundestrojaner. Warum möchte die Politik dies? Was hat es für unsere digitale Landschaft zu bedeuten? Welchen Bezug gibt es zur Regelung bzw. dem Verbot starker Verschlüsselung? Dieser Vortrag wird Ihnen die Zusammenhänge erläutern.\n\nStaatliche Schadsoftware wird schon seit Jahren eingesetzt. Meist dient sie zur Spionage oder Sabotage. Durch die zunehmende Verschlüsselung in der Kommunikation und die bisher fehlgeschlagenen Versuche kryptographische Algorithmen mit zertifizierten Hintertüren zu versehen, greift man jetzt zur Quelle. Nachrichten sollen unbemerkt dort abgefangen werden, wo sie entstehen. Dazu müssen die Ziele mit Schadsoftware in Form von trojanischen Pferden infiziert werden. Wird dieser Bundestrojaner gesetzliche Realität, so hat das schwere Folgen für die digitale Infrastruktur, die wir alle tagtäglich nutzen. Die Informationssicherheit wird damit systematisch geschwächt. Dieser Vortrag illustriert die Zusammenhänge und beleuchtet die Konsequenzen für alltägliche Aufgaben, Kommunikation, den Staat selbst und die Wirtschaft.","original_language":"deu","persons":["René Pfeiffer"],"tags":["pw17","114"],"view_count":592,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-03T00:15:27.074+01:00","length":3416,"duration":3416,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/114-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/114-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a25cfa4b-0e87-4306-951f-bc10f4c65f61-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a25cfa4b-0e87-4306-951f-bc10f4c65f61-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-114-bundestrojaner_-_systematische_zerstorung_der_informationssicherheit","url":"https://api.media.ccc.de/public/events/a25cfa4b-0e87-4306-951f-bc10f4c65f61","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":16},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":6},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":1},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":5},{"event_id":2677,"event_guid":"ddd4c761-2423-4b55-b040-6adf0f5d2bb3","weight":2},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":4},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":6},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":5},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":11},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":9},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":7},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":3},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":7},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":11},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":7},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":5},{"event_id":5041,"event_guid":"e1a84979-5507-4160-8d47-d8fb39227713","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":6},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":4},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":6},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":6},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":10},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":6},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":12}]},{"guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","title":"EVVA AirKey als Privacy-by-Design-Projekt","subtitle":"Zutrittskontrolle und Datenschutz - Ein vermeintlicher Widerspruch","slug":"pw17-159-evva_airkey_als_privacy-by-design-projekt","link":"https://c3voc.de","description":"Wie lässt sich der Widerspruch, dass in einer Zutrittskontrollanlage prinzipiell alles protokolliert werden soll, mit den aktuellen Anforderungen an den Datenschutz überhaupt auflösen?\n\nAnhand des EVVA AirKey Schließsystems, bei welchem auch Smartphones als Schlüssel eingesetzt werden, und Schlüssel über das Internet weltweit verschickt werden können, wird gezeigt wir der Spagat zwischen moderner und innovativer Zutrittskontrolle und gleichzeitigen erhöhten Anforderungen an den Datenschutz gelingen kann.\n\nSchon sehr frühzeitig in der Entwicklung von AirKey hat sich EVVA mit den rechtlichen Datenschutzthematiken auseinandergesetzt, welche letztendlich zur einer Privacy-by-Design Lösung geführt haben. Wichtig für EVVA war immer, dass alle unsere weltweiten Kunden ihre Zutrittskontrollanlagen nach den jeweiligen sehr unterschiedlichen nationalen Datenschutzbestimmungen überhaupt Rechtskonform betreiben können. \n\nWeitere Informationen: http://www.evva.com/airkey","original_language":"deu","persons":["Johannes Ullmann"],"tags":["pw17","159","Privacy By Design"],"view_count":121,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-01-06T01:30:17.605+01:00","length":1733,"duration":1733,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/159-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/159-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/d41398c2-41d5-41ef-b931-965ca95a1ada-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/d41398c2-41d5-41ef-b931-965ca95a1ada-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-159-evva_airkey_als_privacy-by-design-projekt","url":"https://api.media.ccc.de/public/events/d41398c2-41d5-41ef-b931-965ca95a1ada","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":2},{"event_id":2844,"event_guid":"b753dbd8-32bb-437c-9f15-db0d7ac1811a","weight":2},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":2},{"event_id":3488,"event_guid":"b7f081e5-cbf3-4a2b-af03-bde53f1496b8","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":2},{"event_id":4562,"event_guid":"b880d273-48e5-5f32-8259-e3923f7948ea","weight":4},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":2},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":4},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":2},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":2},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":3},{"event_id":7035,"event_guid":"40829380-cbd9-414e-8afe-b51c12d5e702","weight":2}]},{"guid":"1b4a69f7-0448-46a6-9690-c6b794961919","title":"How to Datenauskunftsbegehren","subtitle":null,"slug":"pw17-223-how_to_datenauskunftsbegehren","link":"https://c3voc.de","description":"Laut dem Datenschutzgesetz hat jeder ein Recht aus Auskunft,\nwas aber nur wenige wissen oder tun. In diesem Vortrag schildere ich den Vorgang des Auskunftsbegehrens, die geltende Rechtslage sowie\nFallstricke und welche Antworten man sich erwarten kann.","original_language":"deu","persons":["Sebastian Pfeifer"],"tags":["pw17","223"],"view_count":139,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-11-10T17:30:08.271+01:00","length":3320,"duration":3320,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/223-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/223-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/1b4a69f7-0448-46a6-9690-c6b794961919-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/1b4a69f7-0448-46a6-9690-c6b794961919-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-223-how_to_datenauskunftsbegehren","url":"https://api.media.ccc.de/public/events/1b4a69f7-0448-46a6-9690-c6b794961919","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":1},{"event_id":3077,"event_guid":"684bfc3f-ed67-422a-88a3-88e9496c9bab","weight":6},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":4},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":7},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":4},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":8},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":4}]},{"guid":"4e08029f-9022-4319-b11c-60308427f3ce","title":"Wie man Informatik interessant für alle gestalten kann","subtitle":null,"slug":"pw17-181-wie_man_informatik_interessant_fur_alle_gestalten_kann","link":"https://c3voc.de","description":"Aus meiner Erfahrung als Informatik-Studentin an der TU Wien möchte ich einige Ideen und Handlungsvorschläge ableiten.\n\nEinige Beispiele aus der universitären Praxis sind klassisch \"gut gemeint\" (aber eben nicht gut), während andere sich als durchaus sinnvoll erwiesen haben. ","original_language":"deu","persons":["pascoda"],"tags":["pw17","181"],"view_count":149,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-01-12T14:30:21.776+01:00","length":2872,"duration":2872,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/181-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/181-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/4e08029f-9022-4319-b11c-60308427f3ce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/4e08029f-9022-4319-b11c-60308427f3ce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-181-wie_man_informatik_interessant_fur_alle_gestalten_kann","url":"https://api.media.ccc.de/public/events/4e08029f-9022-4319-b11c-60308427f3ce","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":4},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":5},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":5},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":3},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":5},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":5},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":5}]},{"guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","title":"never give up!","subtitle":"Grund- und Menschenrechte im 21. Jahrhundert","slug":"pw17-138-never_give_up","link":"https://c3voc.de","description":"Unsere Grund- und Menschenrechte kamen nicht von selbst, \nseit 230 Jahren wird für sie gekämpft, und der Kampf ist nicht vorbei.\n\n\n, \n\nUnsere Grund- und Menschenrechte kamen nicht von selbst, \nWie sind sie zustande gekommen, warum und wofür brauchen wir sie?\nWer hat sie – gegen wen – erkämpft?\nWelche Bedeutung haben sie heute?\nWem sind sie (heute) im Wege?\nWas gilt es heute zu tun?","original_language":"deu","persons":["Herbert Waloschek","Christof Tschohl"],"tags":["pw17","138"],"view_count":28,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-01-07T21:15:04.408+01:00","length":5353,"duration":5353,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/138-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/138-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/b98fc3db-2ab8-4f2e-9672-3e2bfe018f98-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/b98fc3db-2ab8-4f2e-9672-3e2bfe018f98-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-138-never_give_up","url":"https://api.media.ccc.de/public/events/b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5014,"event_guid":"963924f1-15c8-44df-922e-166d786cac5a","weight":2},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":2},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2}]},{"guid":"fffe593d-591a-421e-bf33-01f654ae6847","title":"Was ist ein Gutes Passwort II: Jenseits der pass phrase","subtitle":"Von tokens, OTP und pgp. Neue Cryptohardware, neue Einbindungen","slug":"pw17-102-was_ist_ein_gutes_passwort_ii_jenseits_der_pass_phrase","link":"https://c3voc.de","description":"In Anknüpfung an den letztjährigen Vortrag \"Was ist ein Gutes Passwort™\" wäre diesmal die logische Fortführung fällig. Cryptodevices aka tokens, One-Time-Passwörter (OTP), double identification via NFC-token und pgp encryption, FIDO U2F, was da halt alles so herumkreucht und fleucht. Mit praktischen Beispielen auf Linux, Mac \u0026 Windows, wie man's installiert \u0026 wie man's nutzt.","original_language":"deu","persons":["André Igler","Joel Alwen"],"tags":["pw17","102"],"view_count":782,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-01-31T22:45:09.468+01:00","length":3603,"duration":3603,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/102-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/102-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/fffe593d-591a-421e-bf33-01f654ae6847-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/fffe593d-591a-421e-bf33-01f654ae6847-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-102-was_ist_ein_gutes_passwort_ii_jenseits_der_pass_phrase","url":"https://api.media.ccc.de/public/events/fffe593d-591a-421e-bf33-01f654ae6847","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":22},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":11},{"event_id":3071,"event_guid":"26d987af-415e-4064-9555-f6ff912cafaa","weight":1},{"event_id":3077,"event_guid":"684bfc3f-ed67-422a-88a3-88e9496c9bab","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":5},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":4},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":6},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":5},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":5},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":13},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":24},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":4},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":3},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":11},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":18},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":5},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":11},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":5},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":16},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":4},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":9},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":9},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":12},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":16},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":4},{"event_id":5405,"event_guid":"293f93c2-2574-5683-91af-5b83b08fe8bf","weight":5}]},{"guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","title":"Souveräne Digitale Identität","subtitle":null,"slug":"pw17-217-souverane_digitale_identitat","link":"https://c3voc.de","description":"Probleme wie digitale Überwachung, Missbrauch von Daten, und Verletzung von Privatsphäre sind letztliche eine Frage der Identität. Wer sind wir online, wie präsentieren wir uns, und was wissen andere über uns. Heute wird digitale Identität meist durch Username/Passwort, Föderationen, oder \"soziales\" Login dargestellt. In letzter Zeit allerdings steigt das Interesse für sog. \"souveräne digitale Identität\" (engl. self-sovereign identity), das bedeutet, digitale Identität, die nur ein Individuum selbst erzeugen, verwalten, und auch wieder zerstören kann. Dieser Talk gibt einen Überblick über diese Idee bzw. einige aktuelle technische und politische Entwicklungen.","original_language":"deu","persons":["Markus Sabadello"],"tags":["pw17","217"],"view_count":232,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-01-28T00:00:13.494+01:00","length":1933,"duration":1933,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/217-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/217-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/4d86b49c-e914-465d-8d0f-e84ea582434c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/4d86b49c-e914-465d-8d0f-e84ea582434c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-217-souverane_digitale_identitat","url":"https://api.media.ccc.de/public/events/4d86b49c-e914-465d-8d0f-e84ea582434c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":2},{"event_id":4097,"event_guid":"6076f9f5-0ea2-54a2-a187-cd7deb3fbee6","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":2},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":2},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":3},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":3},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":2},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":5},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2}]},{"guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","title":"Digitale Kompetenz fördern - unterstützende Tools","subtitle":"pi-top als Werkzeug am Weg zur digitalen Kompetenz","slug":"pw17-139-digitale_kompetenz_fordern_-_unterstutzende_tools","link":"https://c3voc.de","description":"„Digitale Kompetenz“ ist mehr als Bedienen der neuesten Version proprietärer Software eines Großkonzerns. Manche Ansätze greifen tiefer und bieten deutlich mehr.\n\nTablet-Klassen, Notebook-Klassen, verschafft das \"Digitale Kompetenz\"?\nWenn wir Verständnis mit Spass vermitteln wollen, gibt es andere Wege:\nCommunity, freie Software, freie Hardware, Anreizt für eigene Erweiterungen und Experimente.\n\nHerbert Waloschek, war Abteilungsleiter in einer Großbank im Bereich Organisation und Informationstechnologie","original_language":"deu","persons":["Herbert Waloschek"],"tags":["pw17","139"],"view_count":93,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-09-24T00:30:02.186+02:00","length":3060,"duration":3060,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/139-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/139-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-139-digitale_kompetenz_fordern_-_unterstutzende_tools","url":"https://api.media.ccc.de/public/events/b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4942,"event_guid":"684c65c0-f61d-11e7-a1a3-57c648cc8333","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":4},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":4},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":2},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":3},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":4},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":3},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":4},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":5},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":4},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":3}]},{"guid":"deb684b5-bb22-4b83-8d6f-3d70f0037e2f","title":"Stalking","subtitle":" Ein Gesellschaftphänomen mitten unter uns","slug":"pw17-118-stalking","link":"https://c3voc.de","description":"Stalking ist ein weit verbreitetes Gesellschaftsphänomen, das unsagbares Leid verursachen und ganze Existenzen vernichten kann. Besonders in Zeiten der Digitalisierung können sich Täter nun neuer Instrumente bedienen, die Ihnen mit wenigen Klicks die komplette Privatsphäre ihrer Opfer eröffnen. Unter dem Titel \"Stalking - ein Gesellschaftphänomen mitten unter uns\" würde ich daher gern auf die Psychologie des Stalkings (nur so kann man es verstehen), die Vorgehensweisen der Täter (mit besonderem Bezug zur Technik), Beispielfälle und die Dimension des Stalking im Business eingehen. Am Ende stehen natürlich die Kriterien, an denen Sie Stalking frühzeitig erkennen können und Strategien zur Lösung des Problems. \n\nDiese Infos kann ich Ihnen als Vortrag, aber auch als Work Shop gestalten, ganz wie Sie mögen.","original_language":"deu","persons":["Sandra Cegla"],"tags":["pw17","118"],"view_count":75,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-08-26T08:15:03.050+02:00","length":3115,"duration":3115,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/118-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/118-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/deb684b5-bb22-4b83-8d6f-3d70f0037e2f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/deb684b5-bb22-4b83-8d6f-3d70f0037e2f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-118-stalking","url":"https://api.media.ccc.de/public/events/deb684b5-bb22-4b83-8d6f-3d70f0037e2f","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":2247,"event_guid":"iU5CnqxotZz_KK2P-uVMsQ","weight":1},{"event_id":2294,"event_guid":"9ba6d9cc-76ac-4e6d-9f2d-9e8c6e9a0c08","weight":1},{"event_id":2305,"event_guid":"4acca0b6-29a2-4a92-9872-11917d49c365","weight":1},{"event_id":2310,"event_guid":"4d34a8ab-f2af-4f8c-8406-91715e2498cb","weight":1},{"event_id":2677,"event_guid":"ddd4c761-2423-4b55-b040-6adf0f5d2bb3","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":3},{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":5},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":3},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":2},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":2},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":2},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":5},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":3},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":6393,"event_guid":"4db8970f-bbfe-4541-90a8-31a05d599ffb","weight":4},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":2}]},{"guid":"16c521cb-b890-4905-b482-407f2fb028de","title":"Facebook? Aber sicher!","subtitle":"Wie social Networks datensparsam und sicher genutzt werden können","slug":"pw17-125-facebook_aber_sicher","link":"https://c3voc.de","description":"Ein Leben ohne Facebook ist vielleicht möglich, erscheint vielen aber sinnlos. In diesem Workshop werden Strategien, Settings und Tools vorgestellt, mit denen das Social Networken nicht nur bei Facebook sicherer für die Anwendenden wird.\n\nDie genauen Differenzierungen der Privatsphäre-Settings, die Möglichkeiten der Suche im Social Graph und die Auswirkungen auf die Googlesuche, Two-Factor-Authentifzierung - nach diesem Workshop sind die Teilnehmenden auf dem aktuellen Stand, was ihre Sicherheit angeht, wenn sie Facebook und andere social Networks nutzen möchten.","original_language":"deu","persons":["Kixka Nebraska"],"tags":["pw17","125"],"view_count":202,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-12-23T19:45:02.577+01:00","length":1841,"duration":1841,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/125-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/125-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/16c521cb-b890-4905-b482-407f2fb028de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/16c521cb-b890-4905-b482-407f2fb028de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-125-facebook_aber_sicher","url":"https://api.media.ccc.de/public/events/16c521cb-b890-4905-b482-407f2fb028de","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1308,"event_guid":"import-ec9465f980d4610552","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":3986,"event_guid":"ff2bf44f-3417-5914-a017-9777087662f7","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":2},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":2},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":3},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":4},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":4},{"event_id":4997,"event_guid":"381d274a-9001-47db-bebb-9b08eadf150c","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":7},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":3},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":6},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":7},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":4},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":3},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":6},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":7}]},{"guid":"c6f29580-288d-4eba-8f70-c9761d20c066","title":"Alles Fake?","subtitle":"Über die Pluralität von Falschmeldungen.","slug":"pw17-191-alles_fake","link":"https://c3voc.de","description":"Falschmeldungen, Fakes und Fake News: Übersicht zur Pluralität der (Des-) Informationsphänomene in sozialen Netzwerken\n\nInformationen waren seit je her abhängig von dem Medium, über das sie übertragen wurden. Und eine Parallelerscheinung zu Informationen sind eben auch Falschmeldungen. In früheren Zeiten wurden Falschmeldungen eher durch Hörensagen weitergegeben, mündliche Traditionen lieferten immer schon Geschichtsstoff. Danach verbreiteten sich Nachrichten in Schriftform bis hin zum Printbereich und der Printpresse. Falschmeldungen schlichen sich gerade im Printbereich dann als klassische \"Enten\" in den Medien ein. \n\nUnd vor Jahren schon hat die elektronische Kommunikation ihren Siegeszug angetreten, mit im Gepäck natürlich die alten urbanen Legenden, aber auch neue Falschmeldungen.  Anfangs verbreiteten sich Informationen auf elektronischem Wege  über Telefax und SMS, danach mithilfe von E-Mail und mittlerweile über  Messenger und sozialer Netzwerken. Kommunikation, Information und Falschmeldung ist also nicht neu, lediglich ihr Trägermedium ist immer anders.\n\nAber nicht nur das Trägermedium ändert sich stetig, auch der Charakter von Fakes und Falschmeldungen unterliegt einer Evolution, da diese sich auch immer ihren äußeren Umständen anpassen.  Der Inhalt einer erfolgreichen Falschmeldung unterliegt dem Zeitgeist und den temporär primär vorherrschenden Ängsten und Befürchtungen. Womit kann man Angst erzeugen? Womit kann man Emotionen entfachen? Hier liegt der inhaltliche Grundstein.  \n","original_language":"deu","persons":["André Wolf"],"tags":["pw17","191"],"view_count":62,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-03-04T19:15:07.857+01:00","length":2486,"duration":2486,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/191-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/191-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c6f29580-288d-4eba-8f70-c9761d20c066-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c6f29580-288d-4eba-8f70-c9761d20c066-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-191-alles_fake","url":"https://api.media.ccc.de/public/events/c6f29580-288d-4eba-8f70-c9761d20c066","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":2},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":1},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":1},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":2},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5028,"event_guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":3},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":3},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":1},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2}]},{"guid":"0e036430-d97f-4e54-b2b8-149e0e9d3d58","title":"Privacy by Code","subtitle":"Datensparsamkeit in Webanwendungen","slug":"pw17-156-privacy_by_code","link":"https://c3voc.de","description":"Webanwendungen sind überall, und selten genug respektieren sie trotz langer Privacy Policy die Daten ihrer Nutzerinnen. Wie ändern wir das? Wie bauen wir unsere Webanwendungen so, dass sie von Konzept über Umsetzung bis Betrieb gut und richtig mit Daten umgehen?\n\nDer Vortrag ist für alle, die sich mit Webanwendungen nicht nur auf Nutzerinnenseite beschäftigen – Entwicklerinnen, Admins, Projektleiterinnen … Wir reden über die Planung, Implementierung, und den Betrieb von Webanwendungen, mit einem Fokus auf Datensparsamkeit und Opsec-Grundlagen.","original_language":"deu","persons":["rixx"],"tags":["pw17","156"],"view_count":210,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-01T15:15:07.688+02:00","length":2877,"duration":2877,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/156-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/156-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/0e036430-d97f-4e54-b2b8-149e0e9d3d58-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/0e036430-d97f-4e54-b2b8-149e0e9d3d58-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-156-privacy_by_code","url":"https://api.media.ccc.de/public/events/0e036430-d97f-4e54-b2b8-149e0e9d3d58","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1421,"event_guid":"import-a01119ee5cfeb211c5","weight":18},{"event_id":2313,"event_guid":"33ee0291-6c0b-4253-9e4b-1bc4d382c04e","weight":2},{"event_id":3881,"event_guid":"f42269d1-0c07-4bac-8251-de779d65cde8","weight":17},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":1},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":1},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":19},{"event_id":6170,"event_guid":"86d8231d-2c05-4207-9da1-2d9eb88f40bb","weight":16},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":37},{"event_id":6379,"event_guid":"9dde571b-4d49-4b44-8329-42e354bcc24b","weight":5},{"event_id":6381,"event_guid":"c0e4f528-92c7-4170-aff3-d4dd5cd74b2c","weight":5},{"event_id":6608,"event_guid":"46b7c5d8-318d-4f6c-a17e-73f2638ab46a","weight":12},{"event_id":6927,"event_guid":"9463b562-8353-562e-8484-f9cac7749407","weight":6}]},{"guid":"cf96324a-dc3f-45b7-ba5a-d3c9774af5ed","title":"PrivacyScore.org","subtitle":"Test websites and rank them according to their security and privacy features","slug":"pw17-121-privacyscore_org","link":"https://c3voc.de","description":"PrivacyScore.org is an automated website scanner that allows to investigate websites for privacy and security issues. You can scan individual websites or enter a list of related websites to see how they compare against each other. The beta of PrivacyScore has been launched on June 8. We will present insights from running the platform for the first few months, some interesting benchmarking results and our future plans.\n\nPrivacyScore.org (https://privacyscore.org) (in public beta since June 2017) is an automated website scanner that allows anyone to investigate websites for privacy and security issues. Users can scan individual websites or submit a list of related websites to learn how they compare against each other. On the one hand public benchmarks improve transparency for citizens, on the other the benchmarks can be of use for data protection agencies that want to or have to audit content providers in their jurisdiction. The benchmarks are also of value for research: We are analyzing whether public \"blaming and shaming\" and/or transparent comparisons of sites within a peer group create an incentive for site operators to implement additional security/privacy measures.\n\nPrivacyScore can be used for various purposes. First, users can determine whether a specific website implements best practices in terms of security and privacy protection. Second, users can assess how a website ranks within its peer group. They can also aggregate results according to site attributes (such as country of origin or funding source) and influence the ranking according to their own preferences.\n\nAt the moment PrivacyScore reports on four types of issues: 1) \"Tracking and privacy checks\" test if the website is tracking you or whether it makes use of third party trackers. 2) \"Website encryption checks\" test if the web server offers HTTPS connections, and whether it is configured according to the state of the art. 3) \"Web security checks\" test if the website leaks internal information and whether it sets HTTP headers that protect against client-side attacks. 4) \"Mail encryption checks\" test whether the mail servers of a website support state-of-the-art transport encryption.","original_language":"eng","persons":["Dominik Herrmann"],"tags":["pw17","121"],"view_count":110,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-02-18T10:15:07.111+01:00","length":2358,"duration":2358,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/121-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/121-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/cf96324a-dc3f-45b7-ba5a-d3c9774af5ed-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/cf96324a-dc3f-45b7-ba5a-d3c9774af5ed-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-121-privacyscore_org","url":"https://api.media.ccc.de/public/events/cf96324a-dc3f-45b7-ba5a-d3c9774af5ed","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1982,"event_guid":"r7eKRmXhvzxdnpzkR3szlg","weight":1},{"event_id":2365,"event_guid":"157510b7-5154-4f7d-ac20-a680e45f53c1","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":2919,"event_guid":"4d473646-e765-441b-98eb-653dfe6bdeb1","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":1},{"event_id":4188,"event_guid":"56713ec1-d05b-5f3d-aacc-40724c90aea5","weight":1},{"event_id":4824,"event_guid":"5d255692-ae5e-4f96-b10e-55929d570813","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":2},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":4},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1}]},{"guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","title":"Wie man aus einer Gesellschaft kontrollierbare Daten macht","subtitle":null,"slug":"pw17-106-wie_man_aus_einer_gesellschaft_kontrollierbare_daten_macht","link":"https://c3voc.de","description":"Menschen sind komplex. Als Gesellschaft lassen sie sich schlecht verstehen und steuern. Deshalb reduzieren wir sie auf Datenpunkte. Daraus kann man Diagramme machen, sie zu Gruppen zusammenfassen und so tun als würde man ihre Bedürfnisse kennen und befriedigen.\n\nDas Web ist Teil der Öffentlichkeit. Es wird diskutiert und gehandelt. Auch Demonstrationen finden statt und können unterschiedliche Formen haben. Etwa ein Shitstorm auf Twitter. Oder besser gesagt, eine Aufmerksamkeitswelle. Ist man Ziel davon, wirkt es beängstigend. Eine Masse an Nachrichten prasselt auf einen ein. \n\nIch habe zahlreicher solcher Aufmerksamkeitswellen visualisiert und in handliche Grafiken gepackt. Man kann rauszoomen und unterschiedliche Gruppen identifizieren. Plötzlich ist das das nicht mehr diese Masse an Nachrichten, sondern nur noch Punkte in unterschiedlichen Größen, die mit Pfeilen verbunden sind. Man bekommt das Gefühl von Kontrolle zurück.\n\nIch möchte mit euch darüber nachdenken, welche Auswirkungen eine solche Reduktion von Menschen auf Politik und Gesellschaft hat. Schließlich ist es kein neues Phänomen. Umfragen, Wahlen und Statistik allgemein funktioniert nach diesem Prinzip.","original_language":"deu","persons":["Luca Hammer"],"tags":["pw17","106"],"view_count":56,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-02-04T15:30:06.055+01:00","length":2339,"duration":2339,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/106-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/106-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/d8b919b6-9cf7-4031-b729-dff7536f1902-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/d8b919b6-9cf7-4031-b729-dff7536f1902-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-106-wie_man_aus_einer_gesellschaft_kontrollierbare_daten_macht","url":"https://api.media.ccc.de/public/events/d8b919b6-9cf7-4031-b729-dff7536f1902","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":2},{"event_id":4427,"event_guid":"dc4aad2d-4ba3-4881-bb90-9a7953bf789d","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":1},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":1},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":2},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":2},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":3},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":3},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":3},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","title":"Ich weiß, was du letzten Sommer gelesen hast!","subtitle":"Die Leser, die Autoren, die Buchhändler und die Daten","slug":"pw17-99-ich_weiss_was_du_letzten_sommer_gelesen_hast","link":"https://c3voc.de","description":"Welche Daten entstehen beim Kaufen, Lesen und Kritisieren von Büchern? Wer hat die Kontrolle darüber und welche Erkenntnisse lassen sich daraus gewinnen?\n\nKapitel 1) Bücher online bestellen und kaufen oder gleich als E-Book direkt runterladen - ein ungestörtes Lesevergnügen? Was verraten wir als Leser den Buchhändlern unseres Vertrauens über uns und unsere Lesevorlieben? Und was plaudern unsere stummen Diener (aka Lesegeräte) obendrein noch aus?\n\nKapitel 2) Welche privaten Daten unserer Leser haben wir als Autoren eigentlich, welche haben Dritte? Wo werden sie gespeichert und auf welche davon hat ein Roman- oder Sachbuchautor selbst überhaupt Zugriff? Wie kann man die vorhandenen Daten sinnvoll nutzen? Und welche gebe ich als Autor von mir selber preis?\n\nKapitel 3) Als Selfpublisher die eigene Buchdatei auf Amazon und Co. selbst anbieten und mit Leserinnen und Lesern via Blog, Newsletter und Social-Media-Kanälen in Kontakt bleiben. Das alles gehört zum heutigen Leser- \u0026 Autorendasein untrennbar dazu. Doch wie öffentlich muss ein Buchautor, eine Buchautorin heute tatsächlich sein, um erfolgreich am Buchmarkt überleben, also Bücher verkaufen zu können?","original_language":"deu","persons":["Wolfgang Tischer","Klaudia Zotzmann-Koch"],"tags":["pw17","99"],"view_count":145,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-21T15:15:05.063+01:00","length":2859,"duration":2859,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/99-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/99-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/63141299-3a04-4ce9-b90f-8da3f4f6649a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/63141299-3a04-4ce9-b90f-8da3f4f6649a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-99-ich_weiss_was_du_letzten_sommer_gelesen_hast","url":"https://api.media.ccc.de/public/events/63141299-3a04-4ce9-b90f-8da3f4f6649a","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":5},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":1},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":6},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":3},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":6},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":11},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":3},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":3},{"event_id":5041,"event_guid":"e1a84979-5507-4160-8d47-d8fb39227713","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4}]},{"guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","title":"Leben in Zeiten des #überwachungspaket","subtitle":null,"slug":"pw17-116-leben_in_zeiten_des_uberwachungspaket","link":"https://c3voc.de","description":"Der (aktuelle) Innenminister möchte bereits vorhandene Überwachungstechnologien ausbauen und wünscht sich auch noch zusätzliche neue Eingriffe in unsere Privatsphäre - alles unter dem Deckmantel des erhöhten Sicherheitsbedürfnisses und steigender Terrorgefahren.\n\nAber was bedeutet das für Menschen, die politisch aktiv sind oder sich engagieren wollen? Inwiefern müssen diese Personen nun ihr Verhalten anpassen, um nicht als \"false positive\" erfasst zu werden und womöglich die volle Bandbreite an personalisierter Überwachung und Repression zu erleben? Und was hat das alles mit \"unpolitischen\" Leuten zu tun?\n\nIdee ist, sich diesen Fragen gemeinsam zu stellen. Wir wollen von den abstrakten Bedrohungsszenarien der bisherigen Diskussion weg hin zu ganz spezifischen Gründen, warum dieses - und jedes andere - Überwachungspaket für jede Person individuell grundrechtswidrig ist.","original_language":"deu","persons":["pascoda"],"tags":["pw17","116"],"view_count":54,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-07-10T15:30:05.345+02:00","length":1976,"duration":1976,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/116-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/116-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/6bebc4b1-8693-4c12-8f3b-f97e4406d932-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/6bebc4b1-8693-4c12-8f3b-f97e4406d932-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-116-leben_in_zeiten_des_uberwachungspaket","url":"https://api.media.ccc.de/public/events/6bebc4b1-8693-4c12-8f3b-f97e4406d932","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2809,"event_guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":2},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":4},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":5},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":2},{"event_id":4995,"event_guid":"c95f70a5-8639-402d-86af-4f3da2f3e320","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":5263,"event_guid":"e19ddb1c-2322-4980-9783-eff8a2f6b262","weight":5},{"event_id":5276,"event_guid":"4a92dabf-87ab-455c-89a9-ef3930924da0","weight":2},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":3}]},{"guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","title":"Erfahrungsbericht Tor Exit-Knoten in Österreich betreiben","subtitle":null,"slug":"pw17-210-erfahrungsbericht_tor_exit-knoten_in_osterreich_betreiben","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Michael Sonntag"],"tags":["pw17","210"],"view_count":295,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-15T18:00:13.203+01:00","length":2740,"duration":2740,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/210-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/210-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-210-erfahrungsbericht_tor_exit-knoten_in_osterreich_betreiben","url":"https://api.media.ccc.de/public/events/4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1413,"event_guid":"import-15e012cd8c759b0240","weight":2},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":4243,"event_guid":"c678a194-0d4a-42a2-b4ef-b19a83459f4c","weight":1},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":6},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":3},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":2},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":2},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":9},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":5},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":10},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":5},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":7},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":11},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":3},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":5},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":8},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":23},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":5},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":11}]},{"guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","title":"Was ist das Internet …","subtitle":"… wo kommt es her, wo geht es hin?","slug":"pw17-161-was_ist_das_internet","link":"https://c3voc.de","description":"Woher kommt das Internet? Was ist der Unterschied zwischen Web und Internet? Wie hat sich das alles entwickelt, und warum können wir es heute einfach so benutzen, ohne zu wissen was es eigentlich ist und wo es herkommt? \n\nAnhand einer chronologischen Herangehensweise möchte ich ohne zu viele technische Details in die Entstehungsgeschichte des Internets einführen. Dabei werde ich vor allem kulturelle und politische Entwicklungen in den Vordergrund stellen.\n\nEine Einführung darin, wie das Internet gebaut wurde, wie es aufgebaut und auch \"besiedelt\" wurde, zeigt viele Kulturtechniken und deren Hintergründe auf. Ganz nebenbei lernt man gundlegende technische Prinzipien, und bleibt hoffentlich mit dem Gedanken zurück, dass das Internet etwas freies ist, und auch frei bleiben soll (und wird!) - und wie man daran teihaben kann. ","original_language":"deu","persons":["sva"],"tags":["pw17","161"],"view_count":389,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-02-28T22:30:04.414+01:00","length":3622,"duration":3622,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/161-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/161-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-161-was_ist_das_internet","url":"https://api.media.ccc.de/public/events/0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1945,"event_guid":"ZC7MIPs8uNBd42GK42CQ_Q","weight":5},{"event_id":3788,"event_guid":"5447b88c-3ce8-447a-a2c3-6b4dbc7258e2","weight":7},{"event_id":4568,"event_guid":"ed21e7c8-1ca0-5f9c-a7d4-3704b66f106c","weight":2},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":2},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":12},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":2},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":3},{"event_id":4957,"event_guid":"3d0f6369-aa48-40bd-b435-bca5ae1f86a8","weight":1},{"event_id":4962,"event_guid":"b562864d-0d7c-4c0e-8d3e-db6f697ce1fc","weight":3},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":5},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":14},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":2},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":3},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":4},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":4},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":3},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":6},{"event_id":5808,"event_guid":"daa949b6-e0b2-4f4d-bd98-a9241f6d09c4","weight":3}]},{"guid":"f843c36d-ed74-4234-8116-dbb786022c7f","title":"Cryptoparty","subtitle":null,"slug":"pw17-225-cryptoparty","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["MacLemon"],"tags":["pw17","225"],"view_count":252,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-10T19:00:09.645+01:00","length":2324,"duration":2324,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/225-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/225-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/f843c36d-ed74-4234-8116-dbb786022c7f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/f843c36d-ed74-4234-8116-dbb786022c7f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-225-cryptoparty","url":"https://api.media.ccc.de/public/events/f843c36d-ed74-4234-8116-dbb786022c7f","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":2},{"event_id":3388,"event_guid":"aff502a2-5d3a-4c9b-a4fa-3031be2801e8","weight":1},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":7},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":10},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":9},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":10},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":3},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":3},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":2},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":11},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":9},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":19},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":21},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":13},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":8},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":13}]},{"guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","title":"Anonymität im Internet","subtitle":null,"slug":"pw17-143-anonymitat_im_internet","link":"https://c3voc.de","description":"Technische Anonymisierungsverfahren im Überblick.\n\nVerschlüsselung schützt Kommunikationsinhalte, verhindert allerdings nicht eine Auswertung von \"Metadaten\". Anonymisierung hingegen verschleiert, wer mit wem wann kommuniziert, und erlaubt so auch eine Umgehung immer weiter um sich greifender Zensurmaßnahmen. \n\nEin Vortrag über gängige Anonymisierungstools wie Tor, I2P, VPNs, Mixmaster, und aktuelle Entwicklungen.","original_language":"deu","persons":["Moritz Bartl"],"tags":["pw17","143"],"view_count":676,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-02-20T00:00:08.358+01:00","length":2789,"duration":2789,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/143-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/143-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/476b4610-680e-4b3b-aec2-9f1fef91cd4e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/476b4610-680e-4b3b-aec2-9f1fef91cd4e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-143-anonymitat_im_internet","url":"https://api.media.ccc.de/public/events/476b4610-680e-4b3b-aec2-9f1fef91cd4e","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2995,"event_guid":"23135566-f6b9-4e08-b7a0-c7454a8e0b23","weight":6},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":2},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":2},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":2},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":6},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":10},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":9},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":7},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":7},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":6},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":39},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":10},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":22},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":12},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":9},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":6},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":13},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":6},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":11},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":6},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":10},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":7},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":34},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":19},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":11},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":27},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":7}]},{"guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","title":"Verschränkte Spielwelten","subtitle":null,"slug":"pw17-218-verschrankte_spielwelten","link":"https://c3voc.de","description":"Was Spiel und was Ernst ist, entscheidet letztlich das Kind. In dieser Session setzen wir uns mit verschränkten Spielwelten auseinander, den kommerziellen einerseits und den selbstbestimmten andererseits. In einem ersten Teil, stellt Louise Horvath die Ergebnisse des netidee-Forschungsprojekts zu vernetztem Spielzeug des ÖIAT vor. Was ist erlaubt, was ist bedenklich, was ist faszinierend? In einem zweiten Teil widmet sich Katta Spiel den Erfahrungen aus dem Co-Designen von Technologien mit autistischen Kindern. ","original_language":"deu","persons":["Louise Horvath","Katta Spiel"],"tags":["pw17","218"],"view_count":106,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-11-13T18:30:04.373+01:00","length":2493,"duration":2493,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/218-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/218-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/25b8b456-9b36-4894-aa20-5b46d0820d34-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/25b8b456-9b36-4894-aa20-5b46d0820d34-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-218-verschrankte_spielwelten","url":"https://api.media.ccc.de/public/events/25b8b456-9b36-4894-aa20-5b46d0820d34","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2779,"event_guid":"73d70ee6-807b-46d0-a39b-f6afa7baf7d4","weight":1},{"event_id":2957,"event_guid":"27f4fab0-b7ad-11e5-9877-fb7fcf035cf2","weight":1},{"event_id":3564,"event_guid":"3dc712b9-9051-4005-8948-56d6344a2f41","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":5},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":3},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":4},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1}]},{"guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","title":"Tracking the Trackers","subtitle":null,"slug":"pw17-171-tracking_the_trackers","link":"https://c3voc.de","description":"In this talk we describe the state and extent of online tracking, from the technical background of how companies build profiles from tracking, and how those can be trivially deanonymised; case studies of the surprising reach of tracking, such as in online banking and political parties' websites; and well as our data on the global reach of tracking. We will also introduce our soon-to-be-launched \"Who Tracks Me\" website, which will provide a constant monitor on the extent of online tracking and where it can be found, and open up our data on trackers.\n\nOnline tracking poses a serious privacy challenge that has drawn significant attention in both academia and industry. Existing approaches for preventing user tracking, based on curated blocklists, suffer from limited coverage and coarse-grained resolution for classification, rely on exceptions that impact sites' functionality and appearance, and require significant manual maintenance. At Cliqz we built a new approach to countering online tracking, targeting the user identifiers which are used to link together user profiles on the server side. Having acquired Ghostery this year, we are combining this approach with their database on trackers and their owners to improve protection from and transparency around online tracking.\n","original_language":"eng","persons":["Sam Macbeth"],"tags":["pw17","171","Techday"],"view_count":346,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-02-24T07:45:08.307+01:00","length":2560,"duration":2560,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/171-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/171-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/3813910d-02b3-48bb-acd0-182fa9679ca5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/3813910d-02b3-48bb-acd0-182fa9679ca5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-171-tracking_the_trackers","url":"https://api.media.ccc.de/public/events/3813910d-02b3-48bb-acd0-182fa9679ca5","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3465,"event_guid":"5b106c5d-b569-4550-83da-ba1aa4217f4d","weight":5},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":10},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":7},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":2},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":8},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":5},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":6},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":6},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":5},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":2},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":4},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":6},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":6},{"event_id":5036,"event_guid":"cf96324a-dc3f-45b7-ba5a-d3c9774af5ed","weight":2},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":4},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":6},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":11},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":11},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":7},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":4}]},{"guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","title":"\"Information. What are they looking at?\"","subtitle":"A documentary on privacy.","slug":"pw17-103-information_what_are_they_looking_at","link":"https://c3voc.de","description":"\"Information. What are they looking at?\" is a documentary film. It aims at inclusively sharing knowledge on privacy violations caused by measures of mass surveillance. The film will be easily accessible to as many people as possible. On the one hand, we will shoot and edit the film in a specific audio-visual language. On the other hand, we will realise the accessibility through the development of a supporting Open Source video playback application. Filmmakers can use this app to bridge barriers of exclusion that exist due to disability or missing language skills.\n\nInformation. What are they looking at? is a documentary film. It aims at inclusively sharing knowledge on privacy violations caused by measures of mass surveillance. The film will be easily accessible to as many people as possible. On the one hand, we will shoot and edit the film in a specific audio-visual language. On the other hand, we will realise the accessibility through the development of a supporting Open Source video playback application. Filmmakers can use this app to bridge barriers of exclusion that exist due to disability or missing language skills.\n\nWe aim at reaching an audience outside of digital enthusiasm, the mainstream media or highly privileged classes. Moreover, we focus on people who are excluded from the discourse due to language barriers and restricted access.\n\nOur film will be available to a broad audience. What does this mean? First of all, it needs to be translated into at least 15 of the most-spoken languages in the world. Each language shall be  translated into subtitles, closed captions, audio-description, sign-language, easy-to-read language, voice-over, and transcripts into braille. Thereby we offer a broad audience the opportunity to learn precisely what is at stake since mass surveillance became the norm.","original_language":"eng","persons":["Theresia Reinhold"],"tags":["pw17","103"],"view_count":86,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-12-08T20:00:05.605+01:00","length":1529,"duration":1529,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/103-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/103-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/712cf77b-e7d5-4619-be29-4fbbffd5d7fd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/712cf77b-e7d5-4619-be29-4fbbffd5d7fd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-103-information_what_are_they_looking_at","url":"https://api.media.ccc.de/public/events/712cf77b-e7d5-4619-be29-4fbbffd5d7fd","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":4362,"event_guid":"67b3b3d4-6098-4694-896c-3e6f76b400d7","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":3},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":3},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":3},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":1},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":3},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":4},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":2}]},{"guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","title":"Anonymization workshop","subtitle":"Tipps, Tricks und Fallen","slug":"pw17-92-anonymization_workshop","link":"https://c3voc.de","description":"Big Data in Form von SmartCity und SmartLiving funktioniert nur, wenn die Algorithmen die Daten von uns allen kennen.\nDatenschutzgesetz und Bankgeheimnis stellen diese Daten aber unter ihren Schutz und fordern strenge Rechtsgrundlagen für die Nutzung,  auch im eigenen Unternehmen.\nDas erfordert angemessene Anonymisierung und Pseudonymisierung.\nJe mehr über Datenanalyse und Big Data gesprochen wird, desto mehr bekommt Anonymisierung und Pseudonymisierung an Bedeutung. \nDer Vortrag zeigt die grundlegenden Konzepte dieser beiden Techniken auf, demonstriert aber auch an Hand von vielen Beispielen, welche Fallstricke dort zu erwarten sind und welche Fehler dabei oft gemacht werden.\n\nThe workshop introduces the concept of anonymization vs pseudonymization. It shows the major mistakes that have been committed in the past when publishing anonymized data. \nFrom this, the lesson asks how each of these mistakes could have been avoided.\nThe session introduces concepts like quasi-identifier, k-anonymity, l-identity, dominance attack, and shows that it is nearly impossible to truly anonymize location data.\nThe author has plenty of experience doing anomization concepts for critical data.\n","original_language":"deu","persons":["Philipp Schaumann"],"tags":["pw17","92"],"view_count":180,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-12-20T16:30:07.895+01:00","length":6915,"duration":6915,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/92-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/92-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/14610aca-cb4d-4d79-915d-07ad36b32e47-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/14610aca-cb4d-4d79-915d-07ad36b32e47-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-92-anonymization_workshop","url":"https://api.media.ccc.de/public/events/14610aca-cb4d-4d79-915d-07ad36b32e47","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":10},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":5},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":11},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":6},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":11},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":7},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":11},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":8},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":4},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":5},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4}]},{"guid":"381d274a-9001-47db-bebb-9b08eadf150c","title":"Privacy by design and GDPR implementation","subtitle":null,"slug":"pw17-137-privacy_by_design_and_gdpr_implementation","link":"https://c3voc.de","description":"Lean in a one-hour workshop how to implement the GDPR right from the start when designing your product!\n\nRegardless of whether your operations relate to the online advertising sector, the provision of technology services, the healthcare sector, the telecommunications sector or some other branch of industry, there is growing demand for compliance with data protection legislation on the part of consumers and authorities. This workshop will give you an overview on the measures required to be implemented when designing your product (privacy by design) - an important step towards compliance with the General Data Protection Regulation (GDPR).","original_language":"eng","persons":["Christoph Bauer"],"tags":["pw17","137"],"view_count":133,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-04-01T15:00:08.541+02:00","length":3201,"duration":3201,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/137-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/137-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/381d274a-9001-47db-bebb-9b08eadf150c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/381d274a-9001-47db-bebb-9b08eadf150c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-137-privacy_by_design_and_gdpr_implementation","url":"https://api.media.ccc.de/public/events/381d274a-9001-47db-bebb-9b08eadf150c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2696,"event_guid":"social_media_roots","weight":1},{"event_id":2839,"event_guid":"94fa109a-45d7-4fea-86e3-12d12510c374","weight":1},{"event_id":2854,"event_guid":"8b3cba12-3928-4fb9-b727-ee4bc9e56f51","weight":1},{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3574,"event_guid":"391366a5-a55c-52b1-b027-ae0ea3f8b1f2","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3669,"event_guid":"7ef9172a-e2c7-4e78-9316-08449bd582c6","weight":1},{"event_id":3810,"event_guid":"4b7f0cd9-ff4b-47ce-827f-eea82a90e300","weight":2},{"event_id":3931,"event_guid":"c4b64657-4468-4214-8a90-fcaf6f1ce2a0","weight":1},{"event_id":4233,"event_guid":"7ab308d4-9655-483e-95b0-710daa377a1a","weight":1},{"event_id":4366,"event_guid":"5985d37d-0b6c-4de6-bb26-cdb89ac45eff","weight":1},{"event_id":4407,"event_guid":"3a2b4f9b-2e86-49c3-9c73-f0b0458d6c9e","weight":6},{"event_id":4677,"event_guid":"27118229-ee0d-4edd-9771-9858ae27222b","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":1},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4834,"event_guid":"c35e099a-f620-41ea-8e99-16cade147196","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":7},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":2},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":2},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":2},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":3},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5226,"event_guid":"334d374d-5652-2020-2020-202020202020","weight":1},{"event_id":5275,"event_guid":"27267d09-859b-4ebf-a779-63145861c816","weight":1},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":1},{"event_id":5462,"event_guid":"136fe55e-bef6-50f7-99b9-6b465ce649a6","weight":1}]},{"guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","title":"Außer Spesen nichts gewesen? ","subtitle":"Ein Fazit des deutschen NSA-Untersuchungsausschusses.","slug":"pw17-180-ausser_spesen_nichts_gewesen","link":"https://c3voc.de","description":"Der NSA-Untersuchungsausschuss des deutschen Bundestages hatte sich das Ziel gesetzt herauszufinden, ob es die von Edward Snowden ans Licht geholten Aktivitäten der Five Eyes auch in Deutschland gibt. Von März 2014 bis Sommer 2017 tagte der Ausschuss, aber wissen wir jetzt mehr über die Kooperationen von NSA und GCHQ mit den deutschen Geheimdiensten? Der Vortrag wird einen Überblick über die Ergebnisse geben und die Frage stellen, ob es den Aufwand wert war.","original_language":"deu","persons":["Anne Roth"],"tags":["pw17","180"],"view_count":149,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-09-26T16:15:07.461+02:00","length":3624,"duration":3624,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/180-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/180-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/524e5c0b-4962-40e2-b668-f0d5eed62e0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/524e5c0b-4962-40e2-b668-f0d5eed62e0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-180-ausser_spesen_nichts_gewesen","url":"https://api.media.ccc.de/public/events/524e5c0b-4962-40e2-b668-f0d5eed62e0d","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2809,"event_guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","weight":4},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":5},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":4},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":3},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":4},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":5},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":6},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":3},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":6},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":5},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":4},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4},{"event_id":6133,"event_guid":"a75634aa-d880-4616-b2c7-a7fe67ac4e7a","weight":3},{"event_id":6134,"event_guid":"33b23c3d-c315-42f2-b1fd-e5bb2f6d6de0","weight":4},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":3}]},{"guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","title":"Datenspuren","subtitle":null,"slug":"pw17-189-datenspuren","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Max Schrems","Lena Doppel","Luca Hammer","Jürgen Haslauer"],"tags":["pw17","189"],"view_count":85,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-12-10T09:30:11.652+01:00","length":2807,"duration":2807,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/189-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/189-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-189-datenspuren","url":"https://api.media.ccc.de/public/events/62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":1},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":2},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":1},{"event_id":4895,"event_guid":"dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7","weight":1},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":1},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":1},{"event_id":4942,"event_guid":"684c65c0-f61d-11e7-a1a3-57c648cc8333","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":2},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4957,"event_guid":"3d0f6369-aa48-40bd-b435-bca5ae1f86a8","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":3},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":3},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":3},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5028,"event_guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","weight":3},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":3},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":6},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5041,"event_guid":"e1a84979-5507-4160-8d47-d8fb39227713","weight":2},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":3},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":2},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":4},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":1},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1}]},{"guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","title":"Privatsphäre bei Fitnesstrackern und Gesundheitsapps","subtitle":null,"slug":"pw17-89-privatsphare_bei_fitnesstrackern_und_gesundheitsapps","link":"https://c3voc.de","description":"Daten, die bei Fitness-Trackern und Medical Apps verarbeitet werden, sind höchst sensibel - was ist nötig, um sie zu schützen?\n\nDie Digitalisierung hat den Gesundheitsmarkt erreicht. Daten können helfen, die Versorgung und Pflege unserer alternden Gesellschaft zu sichern, doch die Daten, die in dieser Branche verarbeitet werden, sind weitaus sensibler als in anderen Branchen wie dem Onlinemarketing: Wir wollen nicht, dass Fremde - oder unser Chef - wissen, ob wir krank, depressiv oder gestresst sind. Daher ist Privatsphäre bei Fitness-Trackern und Medical Apps ein sehr heißes Thema!","original_language":"deu","persons":["Christoph Bauer"],"tags":["pw17","89"],"view_count":179,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-03-29T23:45:03.979+02:00","length":2572,"duration":2572,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/89-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/89-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/dd8ef189-7888-4916-888b-0b19e2e4acd7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/dd8ef189-7888-4916-888b-0b19e2e4acd7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-89-privatsphare_bei_fitnesstrackern_und_gesundheitsapps","url":"https://api.media.ccc.de/public/events/dd8ef189-7888-4916-888b-0b19e2e4acd7","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":2},{"event_id":2114,"event_guid":"TanZs17TL9oukPaNzCAw0A","weight":3},{"event_id":2637,"event_guid":"cbb9db2e-a159-4bea-a2a3-eac73061d1f4","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":2},{"event_id":3134,"event_guid":"632c4eb7-d4b7-52f4-8c52-65713b9035ce","weight":1},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":2},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":2},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":2},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":4},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":2},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":3},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":5409,"event_guid":"a891ac61-3d85-56c1-976c-79fb77172b79","weight":2},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":2},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":3}]},{"guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","title":"Datenschutz und Mobilität","subtitle":"Reisefreiheit im digitalen Zeitalter","slug":"pw17-122-datenschutz_und_mobilitat","link":"https://c3voc.de","description":"Assistenzsysteme erleichtern dem Fahrer immer mehr die Arbeit. Zum Funktionieren dieser Systeme sammeln KFZ aber Daten über jeden Aspekt des Fahrzeuges. Diese Daten können auch an den KFZ Hersteller oder Versicherungen übermittelt werden. Datenschutz ist daher auch beim Automobil ein wichtiges Thema. \n\nFahrzeuge sind mittlerweile mehr Computer als Automobil. Jede einzelne Funktion des Fahrzeuges wird elektronisch gesteuert, von der Sitzeinstellung bis zur Lenkung und Bremsen. Diese Entwicklung hat auch viele Helfer gebracht, welche die Sicherheit erhöhen. Assistenten erleichtern dem Fahrer die Fahrt. All das erhöht die Sicherheit auf den Straßen erheblich. Ab 31.3. 2018 wird das eCall (Emergency Call) System für Neufahrzeuge innerhalb der EU verpflichtend. Ab dann sind alle Fahrzeuge mit einem Mobiltelefonmodul / SIM Karte ausgestattet. Das erlaubt den Fahrzeugen auch ständig online zu sein. Das Fahrzeug ruft dann selbsttätig nach Hilfe, wenn ein Unfall passiert. Auch diese Funktion wird Leben retten. Die andere Seite der Medaille ist, dass diese elektronischen Steuerungen alle über Computer gesteuert werden, und all diese Daten auch gesammelt werden. Viele dieser Daten werden auch an den KFZ Hersteller übermittelt. Zusätzlich wird in Österreich gerade die elektronische Vignette eingeführt. Kameras werden Kennzeichen abfotografieren um sie mit der Datenbank der Vignetteninhaber abzugleichen, Section Controls machen das derzeit schon. Es gibt bereits Pläne diese Daten auch für die Strafverfolgungsbehörden auswertbar zu machen. Das unbeobachtete Treffen mit anderen Personen fällt aber auch unter die Privatsphäre und ist durch die Europäische Menschenrechtskonvention besonders geschützt. Auch und vor allem Im Bereich der Mobilität befinden wir uns hier in einem Spannungsfeld zwischen Freiheit und Sicherheit. ","original_language":"deu","persons":["Werner Illsinger"],"tags":["pw17","122"],"view_count":57,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-07T08:00:09.696+01:00","length":2806,"duration":2806,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/122-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/122-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/56ede25d-f95a-405c-913f-7f8be88f6c2d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/56ede25d-f95a-405c-913f-7f8be88f6c2d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-122-datenschutz_und_mobilitat","url":"https://api.media.ccc.de/public/events/56ede25d-f95a-405c-913f-7f8be88f6c2d","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2616,"event_guid":"0a35d5c0-961b-42ba-a105-8886277b104a","weight":2},{"event_id":3045,"event_guid":"9084d93f-8a0c-4689-9e2c-7e4bad7683a7","weight":2},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":2},{"event_id":3751,"event_guid":"3226a81b-dd11-42cc-8c14-ae9f95c01bbd","weight":1},{"event_id":3931,"event_guid":"c4b64657-4468-4214-8a90-fcaf6f1ce2a0","weight":2},{"event_id":4562,"event_guid":"b880d273-48e5-5f32-8259-e3923f7948ea","weight":4},{"event_id":4975,"event_guid":"a6df518d-7573-4bf7-9465-bfaf0900fc12","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":2},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":3},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":2},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":3},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":2},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":2},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":2},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":2},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":2},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":6},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":2},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":2},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2}]},{"guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","title":"Wie das Internet der Dinge unsere Privatsphäre unterwandert","subtitle":"IoT Fails","slug":"pw17-100-wie_das_internet_der_dinge_unsere_privatsphare_unterwandert","link":"https://c3voc.de","description":"Es mag bequem sein, mit einer App das Licht im Wohnzimmer zu dimmen, mit einem Button Klopapier bei Amazon nachzubestellen, oder sich von Alexa den Wetterbericht vorlesen zu lassen. Doch die Bequemlichkeit hat ihren Preis. Das „Internet der Dinge“, das eine immer größere Vernetzung in den Alltag bringt, gefährdet unsere Privatsphäre. \n\nAnschließend an meinem Talk „Privacy Fails“ vom vergangenen Jahr möchte ich euch dieses Jahr über eine weitere Entwicklung erzählen, die unsere Privatsphäre gefährdet. Heutzutage werden immer mehr Dinge mit dem Internet verbunden, die dies eigentlich gar nicht nötig hätten. Zahnbürsten zum Beispiel. Vibratoren. Oder Weinflaschen. All diese Dinge sind im Netz. \n\nDoch wer überprüft, ob diese wirklich sicher sind? Viele Hersteller dieser Dinge kümmern sich in erster Linie um ihr Geschäft und darum, die Produkte schnell auf den Markt zu bringen, und weniger um die Sicherheit. In meinem Talk möchte ich einige Beispiele aufzeigen und erklären, warum dies zum Problem für uns alle wird. \n\nDann stellt sich noch die Frage: Woher weiß man, dass die vernetzten Geräte nicht permanent mitlauschen, oder Daten leaken? Viele davon tun dies. Denn ohne die umfassende Erfassung und Verarbeitung schier unvorstellbarer Datenmengen lassen sich viele Annehmlichkeiten, die sie uns versprechen, technisch gar nicht bewerkstelligen. Doch je mehr Informationen über uns gesammelt werden, desto mehr wird das Konzept vom „offline sein“, also von „allein“ und „privat“ sein, abnehmen. Gleichzeitig besteht die Gefahr, dass wir immer mehr die Kontrolle darüber verlieren, welche Informationen über uns eigentlich gesammelt werden. Doch wie kommen wir da wieder raus? ","original_language":"deu","persons":["Barbara Wimmer"],"tags":["pw17","100"],"view_count":278,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-06-22T19:30:06.488+02:00","length":2482,"duration":2482,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/100-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/100-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/7c1ede90-60d4-4dda-8475-fb9ed6097e4f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/7c1ede90-60d4-4dda-8475-fb9ed6097e4f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-100-wie_das_internet_der_dinge_unsere_privatsphare_unterwandert","url":"https://api.media.ccc.de/public/events/7c1ede90-60d4-4dda-8475-fb9ed6097e4f","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3071,"event_guid":"26d987af-415e-4064-9555-f6ff912cafaa","weight":1},{"event_id":3077,"event_guid":"684bfc3f-ed67-422a-88a3-88e9496c9bab","weight":1},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":10},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":12},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":6},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":8},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":12},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":5},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":11},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":5},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":7},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":6},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":8},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":11},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":7},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":3},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":12},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":5},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":7},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":15}]},{"guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","title":"Fakes \u0026 Bots","subtitle":"Hand in Hand, aber auch überschätzt","slug":"pw17-190-fakes_bots","link":"https://c3voc.de","description":"Falschmeldungen, Fakes und Fake News sind im Vorfeld der großen Wahlen 2017 in Deutschland und Österreich ein Kernthema gewesen. \n\nWie sehr können uns Falschmeldungen oder gar manipulativ wirkende Fake-Accounts oder Social Bots in unseren Meinungen, Verhaltensweisen oder politischen Entscheidungen beeinflussen? Die Angst vor den potenziellen manipulativen Fähigkeiten von Falschmeldungen war daher in den letzten Monaten recht groß, das Interesse an Prophylaxe dementsprechend hoch.","original_language":"deu","persons":["André Wolf"],"tags":["pw17","190"],"view_count":69,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-01-05T14:45:07.291+01:00","length":2786,"duration":2786,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/190-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/190-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c0f6d8e7-a019-409c-9645-c5ed41af648c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c0f6d8e7-a019-409c-9645-c5ed41af648c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-190-fakes_bots","url":"https://api.media.ccc.de/public/events/c0f6d8e7-a019-409c-9645-c5ed41af648c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4578,"event_guid":"805bb174-4ec9-55c6-bd10-ebe111c212ab","weight":2},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":7},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":4},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":2},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"a1b933f6-11f4-4244-86e7-560107907d77","title":"Leben in Zeiten des #überwachungspaket","subtitle":null,"slug":"pw17-182-leben_in_zeiten_des_uberwachungspaket","link":"https://c3voc.de","description":"Der (aktuelle) Innenminister möchte bereits vorhandene Überwachungstechnologien ausbauen und wünscht sich auch noch zusätzliche neue Eingriffe in unsere Privatsphäre - alles unter dem Deckmantel des erhöhten Sicherheitsbedürfnisses und steigender Terrorgefahren.\n\nAber was bedeutet das für Menschen, die politisch aktiv sind oder sich engagieren wollen? Inwiefern müssen diese Personen nun ihr Verhalten anpassen, um nicht als \"false positive\" erfasst zu werden und womöglich die volle Bandbreite an personalisierter Überwachung und Repression zu erleben? Und was hat das alles mit \"unpolitischen\" Leuten zu tun?\n\nIdee ist, sich diesen Fragen gemeinsam zu stellen. Wir wollen von den abstrakten Bedrohungsszenarien der bisherigen Diskussion weg hin zu ganz spezifischen Gründen, warum dieses - und jedes andere - Überwachungspaket für jede Person individuell grundrechtswidrig ist.","original_language":"deu","persons":["pascoda"],"tags":["pw17","182"],"view_count":31,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-12-28T15:00:06.789+01:00","length":2449,"duration":2449,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/182-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/182-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a1b933f6-11f4-4244-86e7-560107907d77-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a1b933f6-11f4-4244-86e7-560107907d77-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-182-leben_in_zeiten_des_uberwachungspaket","url":"https://api.media.ccc.de/public/events/a1b933f6-11f4-4244-86e7-560107907d77","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":3},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":3},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5015,"event_guid":"910904ae-70f3-414c-aaa3-4d3e67b80a25","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":2},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":2},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":2},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":2},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":2},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":2},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":6133,"event_guid":"a75634aa-d880-4616-b2c7-a7fe67ac4e7a","weight":2},{"event_id":6135,"event_guid":"155eef99-f4f5-46c0-9230-f1a9f5234dbf","weight":2}]},{"guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","title":"Hello? I have an order for I.C. Wiener.","subtitle":"Wenn Spracherkennung zu Identitätsdiebstahl führt.","slug":"pw17-183-hello_i_have_an_order_for_i_c_wiener","link":"https://c3voc.de","description":"Eine kurze Einleitung zu den Gefahren der Spracherkennung im Hinblick auf Privatssphäre und Sicherheit gibt es in diesem Vortrag - es werden Machine Learning Libraries, die Stimmen imitieren können, genauso erklärt wie einfache Methoden des Identitätsdiebstahls, z.B. die Wiedergabe von vorher aufgenommenen Stimmen.","original_language":"deu","persons":["Sanja Bonic"],"tags":["pw17","183"],"view_count":83,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-02-23T22:30:07.752+01:00","length":1386,"duration":1386,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/183-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/183-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/25c6204e-15af-4bfb-83bc-b655268ff2db-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/25c6204e-15af-4bfb-83bc-b655268ff2db-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-183-hello_i_have_an_order_for_i_c_wiener","url":"https://api.media.ccc.de/public/events/25c6204e-15af-4bfb-83bc-b655268ff2db","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":5},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":3},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":4},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":2},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":2},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":3},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":3},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5002,"event_guid":"6497c252-f8aa-46cb-a1ad-a957a4cf01ba","weight":1},{"event_id":5006,"event_guid":"d5afa965-4bfb-4d28-8ff9-ad5eef4bec3e","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":2},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":5},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":5}]},{"guid":"a6df518d-7573-4bf7-9465-bfaf0900fc12","title":"Biometrie ist cool (nicht nur Biometrie)","subtitle":"wer ist Dein Gegner?","slug":"pw17-115-biometrie_ist_cool_nicht_nur_biometrie","link":"https://c3voc.de","description":"Are you using the biometric sensor in your phone? No, why not?\nWho is your enemy you wanting to defend against? Let's take a look at the decisions you face everyday protecting your privacy.\n\nThere are lots and lots of recommendation what to do to protect your personal data freedom, to protect your privacy. IPv6 privacy, do not use biometric, use secure (non memorisable) passwords everywhere. But what rules apply to what? What helps me in my situation, and what is making my digital life more miserable? In this lecture I want to unmask a few rules as urban legends, but also make a case for what is really a problem in daily data tracking by advertisers, agencies and others.","original_language":"eng","persons":["Matthias Šubik"],"tags":["pw17","115"],"view_count":94,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-10-30T02:00:04.667+01:00","length":1858,"duration":1858,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/115-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/115-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a6df518d-7573-4bf7-9465-bfaf0900fc12-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a6df518d-7573-4bf7-9465-bfaf0900fc12-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-115-biometrie_ist_cool_nicht_nur_biometrie","url":"https://api.media.ccc.de/public/events/a6df518d-7573-4bf7-9465-bfaf0900fc12","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":205,"event_guid":"import-17e2f2334e694b4d28","weight":1},{"event_id":232,"event_guid":"import-2d5bd827dc1780ab66","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1122,"event_guid":"import-a24ed08b895b751d60","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1211,"event_guid":"import-476a1a21f28a910dbd","weight":1},{"event_id":1238,"event_guid":"import-476755400a574b9fe2","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":1},{"event_id":1330,"event_guid":"import-917cdb83621321eb8e","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1637,"event_guid":"import-ec1cc73efb088a178c","weight":1},{"event_id":1684,"event_guid":"import-563270facd1ec3ab80","weight":1},{"event_id":1697,"event_guid":"import-3d743102bd3d845235","weight":1},{"event_id":1721,"event_guid":"BRHpBVii4wmCt1nd94vCYg","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":3},{"event_id":2250,"event_guid":"Q41efHdmmnBkM5G8p6Wf_w","weight":1},{"event_id":2265,"event_guid":"yN_BHtGEljjFHh2dl-Irug","weight":1},{"event_id":2623,"event_guid":"3a7400a5-ddef-45b6-af08-3e2240b329ae","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2819,"event_guid":"dda07b64-844a-4a54-8135-8c03f7ee6718","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2829,"event_guid":"0399a5b3-f539-41ed-b0bc-858d7c987688","weight":1},{"event_id":2880,"event_guid":"72ad2630-b736-4d4c-8ea1-d982076426bc","weight":1},{"event_id":2909,"event_guid":"8becd5e2-45df-4723-9d6a-2e9f334875d2","weight":1},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":2967,"event_guid":"cabf79b8-cadc-45ef-89c8-c3c877baf379","weight":1},{"event_id":2969,"event_guid":"a4b72599-b24b-4890-85bb-4f3e24e452e2","weight":1},{"event_id":2970,"event_guid":"d9ed8b4a-8897-46f8-b2e2-38cbf57aa5d6","weight":1},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":3},{"event_id":3103,"event_guid":"25a44513-208d-46ce-9b84-9b6839d942ef","weight":1},{"event_id":3254,"event_guid":"7eab2c8e-e7c8-5687-a77f-05ecd52f26cc","weight":1},{"event_id":3296,"event_guid":"015d3135-1c09-5150-86c5-b528dfe61093","weight":1},{"event_id":3396,"event_guid":"1b3d3055-e131-4157-8432-7d408be4ec2b","weight":1},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":3},{"event_id":3492,"event_guid":"059b07f7-1dd1-4b1b-a10e-9ce82ff0146e","weight":2},{"event_id":3501,"event_guid":"cec35be5-a1f0-496b-82c9-c7ace338b50e","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3654,"event_guid":"ac80424a-f4dc-431d-95f3-3f85664ba2dc","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":3},{"event_id":3980,"event_guid":"2d967d3a-bb8f-5576-aa1f-8fa0708e1fb2","weight":1},{"event_id":3982,"event_guid":"fcc2ffca-3079-5b55-ba27-a676c7b5e8c7","weight":1},{"event_id":3983,"event_guid":"f21bc737-27f2-5aed-be11-48c52f144f4d","weight":2},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":1},{"event_id":4255,"event_guid":"ddb12e13-2fb7-4499-bf28-38db6143aa4b","weight":1},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":1},{"event_id":4369,"event_guid":"5f25fc58-113d-4605-9fc0-9e98407cd9a3","weight":1},{"event_id":4371,"event_guid":"509a87d3-75dd-4ea1-b2ca-79b03ff90749","weight":1},{"event_id":4379,"event_guid":"406d9e92-690e-4a35-97cd-49af5fe33764","weight":1},{"event_id":4555,"event_guid":"44433941-4739-2020-2020-202020202020","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":1},{"event_id":4957,"event_guid":"3d0f6369-aa48-40bd-b435-bca5ae1f86a8","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":5},{"event_id":5028,"event_guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":1},{"event_id":5090,"event_guid":"2180ad03-5c90-5099-a00b-a9be0f719900","weight":1},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":1},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":1},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":1},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":1},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":1},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":1},{"event_id":6133,"event_guid":"a75634aa-d880-4616-b2c7-a7fe67ac4e7a","weight":1},{"event_id":6134,"event_guid":"33b23c3d-c315-42f2-b1fd-e5bb2f6d6de0","weight":1},{"event_id":6135,"event_guid":"155eef99-f4f5-46c0-9230-f1a9f5234dbf","weight":1},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":1},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":3},{"event_id":6494,"event_guid":"9a91d92b-0691-46b2-ba73-112bc598342f","weight":1},{"event_id":6503,"event_guid":"d0d6d058-f117-4ccb-ba6a-c41d9290a287","weight":1},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1},{"event_id":6617,"event_guid":"ccd8a229-cf7c-5ed8-8fe8-9e388009743b","weight":1},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":1}]},{"guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","title":"Die Sprachen der Digitalen Grundbildung","subtitle":"Theorie und Praxis des Lehrplans der neuen verbindlichen Übung.","slug":"pw17-208-die_sprachen_der_digitalen_grundbildung","link":"https://c3voc.de","description":"Eine wichtige Funktion von Lehrplänen ist es, gesellschaftlich relevante Themen zu diskutieren. Das gilt auch für die digitale Grundbildung.\n\nDas Parlament hat im Sommer die verbindliche Übung \"Digitale Grundbildung\" beschlossen, die ab dem kommenden Schuljahr in allen Schulstufen unterrichtet werden soll. Der Kompromiss zwischen Anwendungssprachen und Reflexionssprachen, auf dem der Lehrplan basiert, wird im Vortrag präsentiert und anhand der bisherigen Veröffentlichungen des Ministeriums konkretisiert.","original_language":"deu","persons":["Christian Swertz"],"tags":["pw17","208"],"view_count":60,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-04-19T09:30:03.085+02:00","length":3825,"duration":3825,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/208-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/208-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/72daa621-46fb-4bcf-95a5-8bc86f813c9a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/72daa621-46fb-4bcf-95a5-8bc86f813c9a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-208-die_sprachen_der_digitalen_grundbildung","url":"https://api.media.ccc.de/public/events/72daa621-46fb-4bcf-95a5-8bc86f813c9a","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":2},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":2},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":4},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":2},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":2},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":3},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":2},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":2},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","title":"Security vs Privacy","subtitle":null,"slug":"pw17-132-security_vs_privacy","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Otmar Lendl"],"tags":["pw17","132"],"view_count":289,"promoted":false,"date":"2017-10-29T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-01T16:15:06.259+02:00","length":3090,"duration":3090,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/132-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/132-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/f2fad80c-2d2f-4717-9a82-2406e7b23c77-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/f2fad80c-2d2f-4717-9a82-2406e7b23c77-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-132-security_vs_privacy","url":"https://api.media.ccc.de/public/events/f2fad80c-2d2f-4717-9a82-2406e7b23c77","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":7},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":2},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":4},{"event_id":4957,"event_guid":"3d0f6369-aa48-40bd-b435-bca5ae1f86a8","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":5},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":11},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":6},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":15},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":21},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":7},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":15},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":6},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":12},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":6},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":8},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":8},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":17},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":6},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":9},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":52},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":7}]},{"guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","title":"Eröffnung","subtitle":null,"slug":"pw17-169-eroffnung","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Jürgen Haslauer","Klaudia Zotzmann-Koch"],"tags":["pw17","169"],"view_count":36,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2024-11-14T17:45:02.480+01:00","length":1499,"duration":1499,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/169-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/169-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/b445a0c0-30c4-41f7-9439-e9559cbeca84-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/b445a0c0-30c4-41f7-9439-e9559cbeca84-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-169-eroffnung","url":"https://api.media.ccc.de/public/events/b445a0c0-30c4-41f7-9439-e9559cbeca84","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2634,"event_guid":"c153ecc0-6ead-46ea-9bc7-8d2b774c4a3f","weight":1},{"event_id":2779,"event_guid":"73d70ee6-807b-46d0-a39b-f6afa7baf7d4","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":2},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":3},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":3},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":3},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":1},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":4995,"event_guid":"c95f70a5-8639-402d-86af-4f3da2f3e320","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":5},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1}]},{"guid":"99ad53fd-0f91-4928-8910-8a95c8c5d6ed","title":"Personal Privacy in Wireless Emissions","subtitle":null,"slug":"pw17-211-personal_privacy_in_wireless_emissions","link":"https://c3voc.de","description":"Smartphones und Laptops sind für viele Leute ein täglicher Begleiter geworden. Gewöhnlich haben diese Geräte einen WLAN-Chip, der darauf wartet sich mit einem bekannten Access Point zu verbinden. Genau hier kommt es oft zu Beeinträchtigungen der Privatsphäre, weil der WLAN-Chip nicht immer passiv agiert. Mit einer Studie werden einige Beispiele und Möglichkeiten aufgezeigt. ","original_language":"deu","persons":["Anton Stütz"],"tags":["pw17","211"],"view_count":85,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-23T14:30:10.572+01:00","length":2672,"duration":2672,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/211-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/211-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/99ad53fd-0f91-4928-8910-8a95c8c5d6ed-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/99ad53fd-0f91-4928-8910-8a95c8c5d6ed-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-211-personal_privacy_in_wireless_emissions","url":"https://api.media.ccc.de/public/events/99ad53fd-0f91-4928-8910-8a95c8c5d6ed","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":1837,"event_guid":"ZYk9lubJJBkqDWJBOZpWyw","weight":1},{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":3},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":1},{"event_id":3071,"event_guid":"26d987af-415e-4064-9555-f6ff912cafaa","weight":1},{"event_id":3296,"event_guid":"015d3135-1c09-5150-86c5-b528dfe61093","weight":1},{"event_id":3470,"event_guid":"9b863067-c910-4528-92ab-f5b021add0ee","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3654,"event_guid":"ac80424a-f4dc-431d-95f3-3f85664ba2dc","weight":1},{"event_id":3676,"event_guid":"f6811c99-96af-44d5-b82d-5afe826b2caf","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":3898,"event_guid":"8b54f7fa-012e-4a13-a0cf-a07408e767bf","weight":3},{"event_id":4751,"event_guid":"39866be3-5319-42ed-abf6-aa502a6da89a","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":2},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4959,"event_guid":"b7d36ca6-42ba-421a-95ca-6cf8d4d6fba8","weight":1},{"event_id":4968,"event_guid":"f588fca0-d2c1-45e2-ba34-4b055a369b2a","weight":1},{"event_id":4969,"event_guid":"2f480a87-d595-4312-97c1-0a0f0fa0f75a","weight":1},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":2},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1},{"event_id":5127,"event_guid":"1b13335b-eea5-579e-8e14-480a4467cd24","weight":1},{"event_id":5365,"event_guid":"93a28ecf-424d-57d1-85ce-c40621145f32","weight":1},{"event_id":5405,"event_guid":"293f93c2-2574-5683-91af-5b83b08fe8bf","weight":1},{"event_id":5963,"event_guid":"a82b651c-90ab-5427-96f5-41907efaab08","weight":2},{"event_id":6036,"event_guid":"0d7fbd41-b4a1-5dcc-8d88-1aa859b02495","weight":1},{"event_id":6454,"event_guid":"2963ebe9-6499-5d17-9f2f-0c3f31db5738","weight":2}]},{"guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","title":"E-ID? Nicht ohne Privacy by Design!","subtitle":"Die DSGVO in der Praxis","slug":"pw17-215-e-id_nicht_ohne_privacy_by_design","link":"https://c3voc.de","description":"Beschreibung des kommenden „E-ID“ nach dem novellierten E-Government-Gesetz und Alternativkonzepte, die zeigen, was der mit der Datenschutzgrundverordnung nunmehr verbindlich zu beachtende Grundsatz „Privacy by Design“ in der Praxis bedeutet.\n\nIm April/Mai 2017 haben Bundeskanzleramt und Innenministerium einen Entwurf zur Änderung des E-Government-Gesetzes vorgelegt, mit dem die Bürgerkarte zu einem „E-ID“ umgewandelt werden soll. Mit diesem sollen auch zusätzliche Attribute aus staatlichen Registern nachgewiesen werden können und dies soll auch offline am Handy möglich sein. Das vorgeschlagene Konzept wurde von Experten aus der Zivilgesellschaft abgelehnt, vor allem mit der Begründung, dass damit eine zentrale Stelle geschaffen wird, die in der Lage ist, das gesamte Verhalten der Nutzer im System zu beobachten und somit potenziell zu überwachen.\nDer Vortrag geht auf diese Kritik näher ein und stellt verschiedene Alternativkonzepte vor, die in den letzten Jahren von verschiedenen Initiativen entwickelt wurden – auch in Österreich. Dabei wird deutlich, was der mit der Datenschutzgrundverordnung nunmehr verbindlich zu beachtende Grundsatz „Privacy by Design“ in der Praxis bedeutet.","original_language":"deu","persons":["Walter Hötzendorfer"],"tags":["pw17","215"],"view_count":91,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-09-10T16:15:12.630+02:00","length":1409,"duration":1409,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/215-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/215-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e3a8fd40-a1a1-4d00-83e7-09b395144230-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e3a8fd40-a1a1-4d00-83e7-09b395144230-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-215-e-id_nicht_ohne_privacy_by_design","url":"https://api.media.ccc.de/public/events/e3a8fd40-a1a1-4d00-83e7-09b395144230","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3045,"event_guid":"9084d93f-8a0c-4689-9e2c-7e4bad7683a7","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3751,"event_guid":"3226a81b-dd11-42cc-8c14-ae9f95c01bbd","weight":1},{"event_id":3810,"event_guid":"4b7f0cd9-ff4b-47ce-827f-eea82a90e300","weight":6},{"event_id":3931,"event_guid":"c4b64657-4468-4214-8a90-fcaf6f1ce2a0","weight":2},{"event_id":4759,"event_guid":"119d0188-df86-11e7-a509-670931c02efc","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":2},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":2},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":1},{"event_id":4997,"event_guid":"381d274a-9001-47db-bebb-9b08eadf150c","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5015,"event_guid":"910904ae-70f3-414c-aaa3-4d3e67b80a25","weight":2},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2},{"event_id":5275,"event_guid":"27267d09-859b-4ebf-a779-63145861c816","weight":5}]},{"guid":"c34a07a2-0add-4809-bb25-280368b84db0","title":"p≡p ≡ pretty Easy privacy ≡ Die technischen Details","subtitle":"privacy by default, for everyone","slug":"pw17-162-p_p_pretty_easy_privacy_die_technischen_details","link":"https://c3voc.de","description":"Einfache Verschlüsselung für alle, E-Mails und Nachrichten werden standardmaessig \"by default\" verschlüsselt und anonymisiert, ohne dass der Nutzer grossen Aufwand damit hat, sondern seine Standardanwendungen verwendet. End-To-End, Peer-to-Peer und ohne zentrale Infrastruktur, Open Source mit Code Reviews und Unterstützung von üblichen Cryptostandards (S/MIME, PGP, OTR) - und am Ende zur Anonymisierung sogar noch durch GNUnet geschickt.\n\nWie das gehen soll? Wir versuchens! Kleine Vorstellung des Projektes, dem Stand der Software und der aktuellen Implementierung der Ideen und Standards, wie z.B. Trustwords als nutzbare Erweiterung des Konzeptes des Fingerprints oder das leidige Problem der Keyserver bei GPG.","original_language":"deu","persons":["sva"],"tags":["pw17","162"],"view_count":791,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-19T22:30:08.034+01:00","length":2238,"duration":2238,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/162-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/162-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c34a07a2-0add-4809-bb25-280368b84db0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c34a07a2-0add-4809-bb25-280368b84db0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-162-p_p_pretty_easy_privacy_die_technischen_details","url":"https://api.media.ccc.de/public/events/c34a07a2-0add-4809-bb25-280368b84db0","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1945,"event_guid":"ZC7MIPs8uNBd42GK42CQ_Q","weight":16},{"event_id":4213,"event_guid":"518fd627-fdec-4be5-8da1-8ff6ec705717","weight":11},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":27},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":9},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":11},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":22},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":11},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":22},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":9},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":14},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":11},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":10},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":4},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":9},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":32},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":24},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":10},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":12},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":31},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":17},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":17},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":21},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":44},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":20},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":17}]},{"guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","title":"Stolpersteine und Nebenwirkungen verschlüsselter Kommunikation","subtitle":null,"slug":"pw17-123-stolpersteine_und_nebenwirkungen_verschlusselter_kommunikation","link":"https://c3voc.de","description":"Die Kommunikation via Email Nachrichten ist und bleibt eine \"Killerapplikation\" des Internets. Die fehlende Ende-zu-Ende Privatheit ist historisch gewachsen, eine Aufrüstung auf verschlüsselte Nachrichten benötigt mehr als nur die Anwendung eines kryptographischen Schlüssels, sondern hat vielerlei Konsequenzen und Nebenwirkungen. Dieser Vortrag zeigt gesammelt einige Teilprobleme die für verschlüsselte Kommunikation gelöst werden müssen ...und darum verschicken wir Nachrichten heute (meist) noch immer im Klartext.","original_language":"deu","persons":["Martin Pirker"],"tags":["pw17","123"],"view_count":99,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-03-04T13:30:06.980+01:00","length":2446,"duration":2446,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/123-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/123-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/cf5cdd13-5557-4440-93cd-9645be4a362b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/cf5cdd13-5557-4440-93cd-9645be4a362b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-123-stolpersteine_und_nebenwirkungen_verschlusselter_kommunikation","url":"https://api.media.ccc.de/public/events/cf5cdd13-5557-4440-93cd-9645be4a362b","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":7},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":3},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":3},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":3},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":2},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":4},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":5},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":6},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":3},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":4},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":4},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":4},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":4},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":6},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":3}]},{"guid":"c0628cc6-b320-4377-902f-59d6078b2608","title":"Internet of Things (IoT) Privacy \u0026 Security","subtitle":null,"slug":"pw17-117-internet_of_things_iot_privacy_security","link":"https://c3voc.de","description":"Das Internet der Dinge (Internet of Things) ist im Moment in aller Munde - aber welche Privacy- und welche Sicherheits-Probleme kommen damit auf uns zu? Nicht umsonst heißt ein gerade erschienenes Buch zur Sicherheit dieser Geräte \"The Internet of Risky Things\" [1]\n\nDer Talk wird eine Einführung in die Problematik anhand von Beispielen geben, nicht nur die \"intelligenten\" Philips Hue Lampen hatten Sicherheitsprobleme, wir haben eigentlich auch einen reichen \nErfahrungsschatz aus anderen IT-Bereichen wo in der Vergangenheit schon einiges schiefgegangen ist. Die Hoffnung -- die ja zuletzt stirbt -- ist, dass wir diese nicht im IoT-Bereich wiederholen.\n\nIn der Diskussion wird sich Gelegenheit ergeben, auch eigene Anekdoten und Erfahrungen mit IoT-Geräten beizutragen.\n\n[1] Sean Smith, \"The Internet of Risky Things -- Trusting the Devices \nThat Surround Us\", O'Reilly, 2017","original_language":"deu","persons":["Ralf Schlatterbeck"],"tags":["pw17","117"],"view_count":216,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-10-13T15:00:07.364+02:00","length":2539,"duration":2539,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/117-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/117-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c0628cc6-b320-4377-902f-59d6078b2608-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c0628cc6-b320-4377-902f-59d6078b2608-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-117-internet_of_things_iot_privacy_security","url":"https://api.media.ccc.de/public/events/c0628cc6-b320-4377-902f-59d6078b2608","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":9},{"event_id":4365,"event_guid":"7b8075fb-aafa-4037-beb9-168b5461c831","weight":4},{"event_id":4402,"event_guid":"e2b0e698-fd7d-434e-ad0f-5c511654fe9d","weight":3},{"event_id":4436,"event_guid":"0a5c2a3a-aae3-47c6-97e8-c28af5efc466","weight":4},{"event_id":4645,"event_guid":"f0851394-22b0-440c-aafc-e8690fc1cf51","weight":2},{"event_id":4653,"event_guid":"468f5a67-1aab-492d-9aec-6ef220badc52","weight":5},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":2},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":7},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":2},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":6},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":2},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":2},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":4}]},{"guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","title":"Durchsetzen von Datenschutz","subtitle":null,"slug":"pw17-155-durchsetzen_von_datenschutz","link":"https://c3voc.de","description":"„Grundrechte existieren nicht nur am Papier, sondern müssen auch in der Praxis durchgesetzt werden. In mehreren Verfahren hat Max Schrems versucht sein Recht auf Datenschutz durchzusetzen. Beim Fall von „Safe Harbor“ ist ihm das vor dem Europäischen Gerichtshof schon gelungen. Zwei andere Fälle sind noch vor Gericht. \n\nDer Vortrag bietet einen Überblick über die Möglichkeiten und Unwägbarkeiten wenn man Europa eine Rechte gegen einen Großkonzern durchsetzen will und zeigt Optionen auf.","original_language":"deu","persons":["Max Schrems"],"tags":["pw17","155"],"view_count":160,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-12-14T17:45:03.886+01:00","length":3007,"duration":3007,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/155-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/155-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/3cd44a5c-ab9d-455d-81cb-550605bb88e8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/3cd44a5c-ab9d-455d-81cb-550605bb88e8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-155-durchsetzen_von_datenschutz","url":"https://api.media.ccc.de/public/events/3cd44a5c-ab9d-455d-81cb-550605bb88e8","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":7},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":2},{"event_id":4562,"event_guid":"b880d273-48e5-5f32-8259-e3923f7948ea","weight":5},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":5},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":3},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":2},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":2},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":2},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":6},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","title":"Die Macht der Kybernetik und die Ohnmacht der Vernunft","subtitle":"Praktische Vorschläge zum Umgang mit der Ideologie der Homöostase für ProgrammiererInnen.","slug":"pw17-207-die_macht_der_kybernetik_und_die_ohnmacht_der_vernunft","link":"https://c3voc.de","description":"ProgrammiererInnen bestimmen das Leben von anderen Menschen. Das erfordert einen verantwortlichen Umgang mit kybernetischen Maschinen.\n\nUm verantwortlich programmieren zu können, ist es hilfreich, die Ideologie der Homöostase zu kennen. Die Ideologie der Homöostase, die der Kybernetik, auf der Computertechnologie basiert, zu Grunde liegt, und die in der Volkswirtschaftslehre, der Biologie, der Soziologie und vielen anderen Wissenschaften ebenfalls verwendet wird, geht davon aus, dass sich Systeme von alleine in ein Gleichgewicht bringen. Das ist ein Denkfehler. Wie der Fehler vermieden werden kann, wird am Beispiel von System aus der Bildungsverwaltung demonstriert.","original_language":"deu","persons":["Christian Swertz"],"tags":["pw17","207"],"view_count":406,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-04T02:15:13.892+01:00","length":3239,"duration":3239,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/207-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/207-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/20290fc0-b626-429e-92ff-7aafdd08c1c5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/20290fc0-b626-429e-92ff-7aafdd08c1c5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-207-die_macht_der_kybernetik_und_die_ohnmacht_der_vernunft","url":"https://api.media.ccc.de/public/events/20290fc0-b626-429e-92ff-7aafdd08c1c5","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":3},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":2},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":9},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":2},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":3},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":5},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":4},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":3},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":6},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":8},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":2},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":3},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":6},{"event_id":6084,"event_guid":"23b6a643-93ae-4700-b299-ba16f85c0311","weight":3},{"event_id":6110,"event_guid":"ddd1f753-9281-4dfd-af0f-21ef30ca9adf","weight":7}]},{"guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","title":"Wie weit kann/darf man in einem digital Wahlkampf gehen?","subtitle":null,"slug":"pw17-142-wie_weit_kann_darf_man_in_einem_digital_wahlkampf_gehen","link":"https://c3voc.de","description":"Der gerade beendete Nationalrats-Wahlkampf wurde von vielen Beobachtern als einer der schmutzigsten aller Zeiten bewertet.\n\nAber was ist den eigentlich Microtargeting, Zielgruppensegmentierungen und diese phösen Dark-Posts, von denen  fachkundigen Journalisten ständig schreiben?\nWerfen wir gemeinsam einen Blick hinter die Kulissen und schauen uns an, wie man digitale Fußabdrücke auf Facebook strategisch sammelt und zur Kampagnensteuerung auswertet.","original_language":"deu","persons":["Thomas Thaler"],"tags":["pw17","142"],"view_count":25,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2023-10-11T14:00:02.628+02:00","length":1233,"duration":1233,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/142-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/142-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e13e2d2d-7277-454c-8b3e-95f2a33f0821-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e13e2d2d-7277-454c-8b3e-95f2a33f0821-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-142-wie_weit_kann_darf_man_in_einem_digital_wahlkampf_gehen","url":"https://api.media.ccc.de/public/events/e13e2d2d-7277-454c-8b3e-95f2a33f0821","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":4537,"event_guid":"59434448-5539-2020-2020-202020202020","weight":1},{"event_id":4541,"event_guid":"5133534b-4a45-2020-2020-202020202020","weight":1},{"event_id":4546,"event_guid":"57545943-4844-2020-2020-202020202020","weight":1},{"event_id":4590,"event_guid":"50415938-4b52-2020-2020-202020202020","weight":1},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":1},{"event_id":4995,"event_guid":"c95f70a5-8639-402d-86af-4f3da2f3e320","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5014,"event_guid":"963924f1-15c8-44df-922e-166d786cac5a","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":2},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":1},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":5252,"event_guid":"7805cae2-d664-441a-af87-555a2c5633a2","weight":1},{"event_id":5951,"event_guid":"416b46f8-7d6c-5bbb-82da-b7481007b94f","weight":1},{"event_id":5952,"event_guid":"17e98e8e-9c37-54b0-9738-f1004ca6d311","weight":1},{"event_id":5957,"event_guid":"852f565f-93c0-5744-bf05-0682d59e5e07","weight":1},{"event_id":5964,"event_guid":"f5c4898d-68fb-5758-9ea1-717a099803dd","weight":1},{"event_id":5965,"event_guid":"c9dcd2a5-288f-55d0-8577-dc00c2e185ce","weight":1},{"event_id":5968,"event_guid":"7c904fc9-3288-5009-afc9-0ce6c3d8d5b1","weight":1},{"event_id":5973,"event_guid":"724f0afe-8122-588f-a8d6-4ef2a2a18236","weight":1}]},{"guid":"c95f70a5-8639-402d-86af-4f3da2f3e320","title":"Journalismus und Datenspuren","subtitle":null,"slug":"pw17-172-journalismus_und_datenspuren","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Nikolaus Forgó","Anne Roth","Martin Thür","Catharina Felke","Herbert Gnauer"],"tags":["pw17","172"],"view_count":158,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-01-28T09:00:13.347+01:00","length":4293,"duration":4293,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/172-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/172-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c95f70a5-8639-402d-86af-4f3da2f3e320-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c95f70a5-8639-402d-86af-4f3da2f3e320-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-172-journalismus_und_datenspuren","url":"https://api.media.ccc.de/public/events/c95f70a5-8639-402d-86af-4f3da2f3e320","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2060,"event_guid":"ClNPvo4FJlWHUMIfYe7d9Q","weight":3},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":3},{"event_id":3844,"event_guid":"385033fe-d217-0130-aca6-28dd05677c66","weight":2},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4963,"event_guid":"d9921ab0-9a29-4f3f-9140-99456589283d","weight":2},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":2},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":2},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":2},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2},{"event_id":5197,"event_guid":"061fe21f-a1b4-434b-8386-bde835ef2966","weight":1},{"event_id":5213,"event_guid":"704e73d5-8c26-468e-8734-d84c9a54b7a0","weight":1},{"event_id":5214,"event_guid":"611faad1-716b-41c9-b9fa-28ab95cda126","weight":1}]},{"guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","title":"Datensafari - Was wir täglich alles so preisgeben","subtitle":"Wandelnde Datenlecks im Visier von Staat und Industrie","slug":"pw17-90-datensafari_-_was_wir_taglich_alles_so_preisgeben","link":"https://c3voc.de","description":"Der moderne Mensch ist täglich ohne Pause online. Unsere Aktivitäten werden zunehmend erfasst, vermessen, gespeichert, bewertet und in alle Welt verteilt. Dank dem Internet der Dinge, smarten Geräten und dem ständigen Aufenthalt in Netzwerken machen wir es den Datenhändlern sehr leicht. Dieser Vortrag soll beleuchten was im täglichen Alltag an Daten anfällt, was diese Aussagen und wohin diese unter Umständen gehen\n\nMittlerweile geht es beim Datenhandel um weit mehr als Websurfen. Es geht auch nicht nur um Aktivitäten im Internet. Viele Geräte, speziell Smartphones oder Personal Computing Devices, haben Verbindungen in mehrere Netzwerke. Präsenzinformationen und das Verfolgen von Kunden in Geschäften sind nur wenige Beispiele von der schönen neuen Welt, in der Daten das Rohöl des 21. Jahrhunderts sein sollen. Die Problematik dabei ist, dass viele Produkte und Dienstleistungen nie die ganze Wahrheit sagen. Alleine ein Gast-WLAN kann schon sehr gute Profile erstellen, und damit kann man unter Umständen im Lieblingscafé ahnungslos ausgeraubt werden ohne es zu merken. In diesem Vortrag werden praktische Beispiele für Datenlecks am Alltag von fiktiven Menschen mit echten Daten illustriert. Lassen Sie sich zeigen welches Profil Ihre Umgebung von Ihnen schon hat.","original_language":"deu","persons":["René Pfeiffer"],"tags":["pw17","90"],"view_count":120,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-09-14T15:30:05.608+02:00","length":3498,"duration":3498,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/90-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/90-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e95727e6-e848-4122-b9e1-b1bc57b9c7de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e95727e6-e848-4122-b9e1-b1bc57b9c7de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-90-datensafari_-_was_wir_taglich_alles_so_preisgeben","url":"https://api.media.ccc.de/public/events/e95727e6-e848-4122-b9e1-b1bc57b9c7de","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":5},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":9},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":8},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":5},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":8},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":6},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":8},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":3},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":5},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":5},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":5},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":9}]},{"guid":"49230bac-cb6a-4d49-bcd7-0739823b0440","title":"Algorithmic fairness","subtitle":"Können Algorithmen fair sein?","slug":"pw17-113-algorithmic_fairness","link":"https://c3voc.de","description":"Informatik wird zunehmend zur automatisierten Entscheidungsfindung eingesetzt. In diesen Systemen werden jedoch zunehmend Formen von Diskriminierung entdeckt wodurch ein breiter Diskurs zu Fairness nötig wird. Die Einheit umfasst eine kurze Einführung mit anschließender Diskussion mit allen Anwesenden. Es ist kein spezieller Bildungshintergrund erforderlich. Fairness ist poltisch zu verhandeln und als soziales Konstrukt abhängig von kontextuellen Erfahrungen und Perspektiven.\n\nEin Beispiel zu bereits eingesetzten Systemen ist die Vorhersage von Kriminalität in Regionen in den USA. Es konnte jedoch nachgewiesen werden dass dieses System einen rassistischen Bias hat. Dieser Bias stammt aus historischen Daten der Polizei welche für die lernende Algorithmen (Machine Learning) als Input verwendet wurden. In den letzten Jahren wurden viele solcher Problemfälle bekannt. In Konsequenz entstanden neue Forschungscommunities zu Fairness von algorithmschen Systemen.\n\n\n","original_language":"deu","persons":["Gabriel Grill"],"tags":["pw17","113"],"view_count":55,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-01-11T15:15:15.336+01:00","length":2967,"duration":2967,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/113-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/113-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/49230bac-cb6a-4d49-bcd7-0739823b0440-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/49230bac-cb6a-4d49-bcd7-0739823b0440-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-113-algorithmic_fairness","url":"https://api.media.ccc.de/public/events/49230bac-cb6a-4d49-bcd7-0739823b0440","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":399,"event_guid":"import-00de4922cd32e1f008","weight":1},{"event_id":2086,"event_guid":"1q4jAFZgpy0xvFH-XpS70g","weight":1},{"event_id":2404,"event_guid":"5b66e0260395cfaff427b0923476f729","weight":1},{"event_id":3057,"event_guid":"abd7ef07-2fcf-40c5-b718-b4c93c567d83","weight":1},{"event_id":3572,"event_guid":"97eb193e-25c8-5ae8-b83c-a0de3daa31fc","weight":4},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":4698,"event_guid":"87de639d-024d-48d7-8955-3f529befc9f5","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5015,"event_guid":"910904ae-70f3-414c-aaa3-4d3e67b80a25","weight":1},{"event_id":5028,"event_guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5036,"event_guid":"cf96324a-dc3f-45b7-ba5a-d3c9774af5ed","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":1},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":1},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":1},{"event_id":5889,"event_guid":"0063c6b6-e7e8-5f8e-bac5-d5e90fd53a05","weight":1},{"event_id":5987,"event_guid":"2fdcdadb-0575-5a47-a59f-8376db33f0a6","weight":1},{"event_id":6000,"event_guid":"db737a14-3b5c-590c-ab96-81cbe9d3a08e","weight":2},{"event_id":6019,"event_guid":"720cbd83-2341-53d1-94d6-d7ecd909ff68","weight":1},{"event_id":6033,"event_guid":"645aed60-6a15-5114-8ba4-21880aeb00b3","weight":1},{"event_id":6036,"event_guid":"0d7fbd41-b4a1-5dcc-8d88-1aa859b02495","weight":1},{"event_id":6037,"event_guid":"9527d51d-1eae-56b4-baec-1ba1f8b31120","weight":2},{"event_id":6114,"event_guid":"02a2a813-6981-438c-ad51-a1b55d79e613","weight":1}]},{"guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","title":"Status Überwachungspaket der Bundesregierung","subtitle":null,"slug":"pw17-108-status_uberwachungspaket_der_bundesregierung","link":"https://c3voc.de","description":"epicenter.works berichtet über den Status des von der Bundesregierung im Jänner 2017 angekündigten Überwachungspakets, so wie er sich im Herbst 2017 darstellt.\n\nAm 30. Jänner 2017 hat die österreichische Bundesregierung ein überarbeitetes Regierungsprogramm anlässlich des Neustarts der Koalition präsentiert. Nur sieben Monate nach Inkrafttreten des Polizeilichen Staatsschutzgesetzes und im Jahr, in dem das Staatsgrundgesetz von 1867 sein 150-jähriges Bestehen feiert, wurde ein umfängliches Paket von Überwachungsmaßnahmen und neuen Kompetenzen für die Sicherheitsbehörden, das noch nie da gewesene Einschränkungen der Privatsphäre und des Rechts auf Datenschutz mit sich bringt, vorgestellt. Begründet werden diese Maßnahmen von den Regierungsparteien mit einer angeblich wachsenden Bedrohungslage durch Terrorismus. Eine Evaluierung bereits bestehender Kompetenzen und Befugnisse und deren Effektivität im Rahmen der Verbrechensbekämpfung bzw. -prävention hat die Bundesregierung jedoch nicht vorgenommen. Vom Bundesminister für Inneres wird sogar eine „lückenlose Überwachung in allen Fragen“ gefordert.\n\nNeben einer flächendeckenden, vernetzten Videoüberwachung des öffentlichen Raums (Zugriff auf aufgezeichnetes Material und Echtzeitstreaming), einer Neuauflage staatlicher Spionagesoftware zur Überwachung internetbasierter Kommunikation, einer Wiedereinführung der Vorratsdatenspeicherung, einer Registrierungspflicht von prepaid-Wertkarten, der Nutzung von Kennzeichenerfassungssystemen der ASFINAG und einer Ausweitung der akustischen Überwachung von Personen findet sich zudem erstmals in der Geschichte der Zweiten Republik ein echter Gesinnungstraftatbestand (zu den „staatsfeindlichen Bewegungen, geplant als § 247a StGB“) unter den vorgeschlagenen Maßnahmen.\n\nNach der Aufkündigung der großen Koalition und dem Ausrufen von Neuwahlen ist nicht klar, welche dieser Überwachungsmaßnahmen tatsächlich im Parlament beschlossen werden. Mit Stand Ende Mai steht fest, dass die ÖVP die SPG-Novelle (Videoüberwachung, Kennzeichenerfassung) und die StPO-Novelle (Vorratsdatenspeicherung, Bundestrojaner) als Initiativantrag im Parlament einbringen wird. epicenter.works berichtet über den Status des Überwachungspakets, so wie er sich im Herbst 2017 darstellt.","original_language":"deu","persons":["werquer","Andreas Czák"],"tags":["pw17","108"],"view_count":58,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-12-20T17:00:04.581+01:00","length":2540,"duration":2540,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/108-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/108-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-108-status_uberwachungspaket_der_bundesregierung","url":"https://api.media.ccc.de/public/events/4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":2},{"event_id":2172,"event_guid":"ELK9-ZQeFcqKxBYW8eay8g","weight":1},{"event_id":2374,"event_guid":"62d56fa6-0610-4ae1-bbfa-d68bc9d47994","weight":2},{"event_id":2436,"event_guid":"83b785ad-0882-4552-9ad4-0cde123f3837","weight":1},{"event_id":2779,"event_guid":"73d70ee6-807b-46d0-a39b-f6afa7baf7d4","weight":2},{"event_id":3001,"event_guid":"45e4959c-f5d7-44b1-968f-9b2d8832e480","weight":1},{"event_id":3479,"event_guid":"700cc235-cd49-4a33-9093-86f459d264e6","weight":1},{"event_id":3566,"event_guid":"40332b3d-c3b6-5c10-be52-1014af10f5ad","weight":2},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":4},{"event_id":4188,"event_guid":"56713ec1-d05b-5f3d-aacc-40724c90aea5","weight":1},{"event_id":4485,"event_guid":"da208942-2be8-4f14-9466-ba8e7b74fca8","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":4},{"event_id":4994,"event_guid":"49230bac-cb6a-4d49-bcd7-0739823b0440","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":3},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":4},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":2}]},{"guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","title":"Das Tor Ökosystem","subtitle":"Anonyme Dienste im Internet - Mehr als nur der Tor-Browser","slug":"pw17-226-das_tor_okosystem","link":"https://c3voc.de","description":"Eines der meist verbreiteten Werkzeuge zur Anonymisierung von Web-Traffic ist Tor. Es gibt jedoch noch viele weitere Nutzungsmöglichkeiten für dieses universelle und essentielle Werkzeug. Hier erfährst Du, was für Möglichkeiten Du außer dem bekannten Tor-Browser noch hast. Ebenso gibts ein paar Tips um Anonymisierung am Mobiltelefon zu nutzen.","original_language":"deu","persons":["MacLemon"],"tags":["pw17","226"],"view_count":808,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-09T11:30:07.239+02:00","length":1965,"duration":1965,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/226-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/226-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/15e6de74-a59d-42a7-b116-da561a7a2aad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/15e6de74-a59d-42a7-b116-da561a7a2aad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-226-das_tor_okosystem","url":"https://api.media.ccc.de/public/events/15e6de74-a59d-42a7-b116-da561a7a2aad","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2776,"event_guid":"3d7c416e-7e31-11e5-b91e-f1d2b07f83cb","weight":6},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":10},{"event_id":2995,"event_guid":"23135566-f6b9-4e08-b7a0-c7454a8e0b23","weight":7},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":16},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":5},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":8},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":11},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":34},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":5},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":6},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":21},{"event_id":5002,"event_guid":"6497c252-f8aa-46cb-a1ad-a957a4cf01ba","weight":1},{"event_id":5006,"event_guid":"d5afa965-4bfb-4d28-8ff9-ad5eef4bec3e","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":19},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":31},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":23},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":5},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":14},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":6},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":16},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":19},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":8},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":15},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":6},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":8},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":17},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":48},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":6},{"event_id":5067,"event_guid":"7fcad042-c9e4-5713-8991-938d7e33f050","weight":7},{"event_id":5664,"event_guid":"ae4882b3-90b3-4479-b94b-3e2c0208ef7c","weight":12},{"event_id":6044,"event_guid":"5808be1e-ce91-48a2-a22a-91c3289d3819","weight":8},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":6},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":13}]},{"guid":"c8913456-cd69-467a-a446-2330ae8b5299","title":"Encryption on DSLR-Cameras","subtitle":null,"slug":"pw17-120-encryption_on_dslr-cameras","link":"https://c3voc.de","description":"Privacy is one of the key issues of the information age. Especially in the post-Snowden era this fact has become clear to most individuals around the globe. Especially journalists seek for an opportunity to keep the sensitive result of their work hidden. This fact was recently underlined by an open letter from 150 journalists to camera manufacturers, demanding built-in encryption for DSLR-cameras. In the course of our research we found that an universal approach using SD-cards for direct encryption satisfies the journalist's requirements manufacturer-independent. We used libsodium on a modified WiFi-capable SD-card.","original_language":"eng","persons":["Gabor Szivos","Georg Bernold"],"tags":["pw17","120"],"view_count":211,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-06-17T16:15:05.123+02:00","length":1849,"duration":1849,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/120-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/120-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c8913456-cd69-467a-a446-2330ae8b5299-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c8913456-cd69-467a-a446-2330ae8b5299-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-120-encryption_on_dslr-cameras","url":"https://api.media.ccc.de/public/events/c8913456-cd69-467a-a446-2330ae8b5299","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":2},{"event_id":1271,"event_guid":"import-f8b849a9e3b83d4724","weight":1},{"event_id":2078,"event_guid":"7156e245-d372-44d9-af0f-cbaa2e089f2c","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":2},{"event_id":2857,"event_guid":"b9b2c371-417c-45c4-a47f-faf7eeb11fbf","weight":3},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":3},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3856,"event_guid":"80d7750a-3951-462f-8513-715571c31738","weight":2},{"event_id":3896,"event_guid":"567b415b-22c0-4371-86e8-454ad43734f8","weight":1},{"event_id":4426,"event_guid":"21c4794b-1dbb-4c28-a48a-bdc5d4455cde","weight":1},{"event_id":4653,"event_guid":"468f5a67-1aab-492d-9aec-6ef220badc52","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":1},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":2},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":2},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":2},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":3},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":2},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":1},{"event_id":5045,"event_guid":"99ad53fd-0f91-4928-8910-8a95c8c5d6ed","weight":2},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":4},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":5658,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb890","weight":3}]},{"guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","title":"Free Your Android","subtitle":null,"slug":"pw17-176-free_your_android","link":"https://c3voc.de","description":"In unserem Workshop möchten wir folgendes vermitteln bzw. anbieten:\n\u003cul\u003e\n  \u003cli\u003eGrundzüge freier Software und der Zusammenhang zum Datenschutz\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für den FDroid App-Store\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für Auswahl an populären freien Android Apps\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für freie Varianten des Android Betriebssystems\u003c/li\u003e\n\u003c/ul\u003e","original_language":"deu","persons":["Michael Pöhn"],"tags":["pw17","176"],"view_count":340,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-02-18T12:30:08.109+01:00","length":5322,"duration":5322,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/176-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/176-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/0d450673-ab40-45f9-b949-6d7055ad8c28-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/0d450673-ab40-45f9-b949-6d7055ad8c28-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-176-free_your_android","url":"https://api.media.ccc.de/public/events/0d450673-ab40-45f9-b949-6d7055ad8c28","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2303,"event_guid":"4c9d3345-7fed-4d90-ba86-bd9437898c53","weight":1},{"event_id":3816,"event_guid":"e370add0-106d-48e6-9e97-cd560ba60b9c","weight":3},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4130,"event_guid":"6953ca59-16e4-4b23-97dd-64675f6fbe79","weight":7},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":1},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":1},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":3},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":2},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":3},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":3},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":3},{"event_id":4994,"event_guid":"49230bac-cb6a-4d49-bcd7-0739823b0440","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":36},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":5},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":4},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":7},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":4},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":3},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":3},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":5},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":6},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":2},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":7},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":4},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":4},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":6},{"event_id":5271,"event_guid":"3af88c8a-b051-4691-9c3e-f518f42ca5d3","weight":3},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":3},{"event_id":6071,"event_guid":"3de5e9cd-651b-4894-b653-33925a4d00dc","weight":3},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":6},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":10}]},{"guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","title":"Crypto-Workshop","subtitle":"Die Wiener Cryptoparty zu Gast bei der PrivacyWeek","slug":"pw17-188-crypto-workshop","link":"https://c3voc.de","description":"Bisherige Themen bei der Cryptoparty Wien: \nThema: IoT Fails - Ein Einblick in die skurrilen Fails der IoT Industrie \nThema: Bitcoin - Funktionsweise der Blockchain \nThema: Workshop → Bitmessage, A Peer‐to‐Peer Message Authentication and Delivery System \nThema: Workshop → Anonym im Internet? Wirklich anonym mit Tor? \nThema: Workshop → Email Verschlüsselung mit GPG \nThema: Handy Messenger - Die guten, die schlechten und die weit verbreiteten \nThema: Ein #33c3 - Rückblick \nThema: Vorbereitungsworkshop #33c3 - Laptop absichern \u0026 Co \nThema: E-Voting \nThema: Handy Messenger - Die guten, die schlechten und die weit verbreiteten \nThema: Das Tor Ökosystem, mehr als nur den Tor-Browser benutzen. \nThema: OpSec - wie verhält man sich, um Metadaten zu minimieren \nThema: Zu viele Passwörter? Passwortmanagement Software, 2-Faktor Authentifizierung \nThema: Backup, jetzt aber richtig! \nThema: Ransomware: „DatenVERschlüsselung leicht gemacht“ \nThema: Browsererweiterungen für Firefox \u0026 Chrome - Hands on Workshop \nThema: #32c3 - Eine Rückschau \nThema: Vorbereitungsworkshop #32c3 - Laptop absichern \nThema: Email… the good, the bad and the mostly ugly \nThema: Adblocking und Anti-Tracking/-Profiling \nThema: Rückschau auf den Sommer 2015 und das Chaos Communication Camp sowie Vortragsempfehlungen \nThema: Ab 19:30: Computer sicher nutzen: Über Malware, Phishing und Co. - Sichere Nutzung vom Computer um sich vor Malware, Phishing und Co zu schützen \nThema: Wie sicher kann Email sein? GPG und S/MIME. \nThema: Handy Security, sichere Sprach- und Videotelefonie, sichere Text-Messenger \nThema: TLS Zertifikate, Überprüfung, Zertifizierungssstellen und Superfish \nThema: Rückschau auf den 31. Chaos Communication Congress (31C3), aktuelle Entwicklungen, Fragen und Antworten \nThema: Einführung in das Thema Kryptografie mit anschließendem praktischen Workshop zu Browsersicherheit \nThema: Den eigenen Laptop absichern. Speziell für Besuchende des 31C3 \nThema: IT-Sicherheit und online Privatsphäre im Studium \nThema: Wie sicher ist https wirklich? \nThema: Verschlüsselte Datenträger austauschen \nThema: Alternativen zu Googles Diensten \nThema: Netzsperren und Zensur \nThema: Browser Fingerprinting, Tor, Tails \nThema: Filter Bubble \nThema: Browser \nThema: Heartbleed \u0026 Passwortsicherheit \nThema: Esoterische Kryptografie Tools - eine muntere Rundschau über die unsinnigen Dinge die da draussen sind von denen Du besser die Finger lässt. \nThema: Email Verschlüsselung mit GPG \nThema: Instant Messaging - Sicherer und privater Chatten mit Jabber und OTR \nThema: Anonymiät online, Tor, I2P \nThema: Absichern mobiler Geräte im Internet. Laptops, Tablets, Mobiltelefone. Speziell auch für Besuchende des 30C3 \nThema: Metadaten: Was das ist, wo sie entstehen, warum sie gefährlich sind und wie sich manche davon Vermeiden lassen. \nThema: Email-Verschlüsselung \nThema: Die CryptoCalypse - NSA und die Kryptographie: Wie sicher ist sicher? \nThema: Grundlagen der Verschlüsselung, Sicheres speichern von Daten \nThema: Operational Security (Feind hört mit) \nThema: OPSEC, Tor Hidden Services im Internet \u0026 alles was euch interessiert (bringt Fragen mit!)","original_language":"deu","persons":["Petar Kosic"],"tags":["pw17","188"],"view_count":528,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-06T15:30:05.199+02:00","length":2186,"duration":2186,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/188-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/188-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-188-crypto-workshop","url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":6},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":2},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":4},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":5},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":5},{"event_id":4471,"event_guid":"8590e34b-db76-42ed-a741-016951a2e626","weight":4},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":2},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":8},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":19},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":10},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":6},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":17},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":5},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":5},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":9},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":21},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":6},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":15},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":7},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":17},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":6},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":4},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":5},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":6}]},{"guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","title":"Trauer 2.0","subtitle":"Wie Soziale Medien die Trauerkommunikation beeinflussen","slug":"pw17-141-trauer_2_0","link":"https://c3voc.de","description":"Digitalisierung und Soziale Medien sind allgegenwärtig und beeinflussen inzwischen nahezu jeden unserer Lebensbereiche. Auch so persönliche Themen wie Tod und Trauer verlagern sich immer mehr ins Social Web. Welche Entwicklungen lassen sich dazu beobachten und was treibt Trauernde an, virtuelle Friedhöfe zu nutzen, um ihren Verstorbenen ein digitales Denkmal zu schaffen? Eine spannende Grundlagendiskussion darüber, wohin die Reise gehen kann.\n\nVortrag und Diskussion ","original_language":"deu","persons":["Kristina Juchum"],"tags":["pw17","141"],"view_count":173,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-02-19T02:45:04.089+01:00","length":1084,"duration":1084,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/141-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/141-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/638baab4-c0c6-4560-9845-9c20a96fcb3d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/638baab4-c0c6-4560-9845-9c20a96fcb3d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-141-trauer_2_0","url":"https://api.media.ccc.de/public/events/638baab4-c0c6-4560-9845-9c20a96fcb3d","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":3},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":6},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":6},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":9},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":6},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":3},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":8},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":3},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":6},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":35},{"event_id":5041,"event_guid":"e1a84979-5507-4160-8d47-d8fb39227713","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":5},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":5},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":14}]},{"guid":"963924f1-15c8-44df-922e-166d786cac5a","title":"Privatsphären-freundliche und beweisbar sichere Authentisierung im Internet","subtitle":null,"slug":"pw17-216-privatspharen-freundliche_und_beweisbar_sichere_authentisierung_im_internet","link":"https://c3voc.de","description":"Dieser Vortrag gibt eine Kurzübersicht über existierende Identitätsmanagementsysteme, deren Probleme in Bezug auf die Privatsphäre der Benützer, und führt beweisbar sichere Alternativen aus der Fachliteratur in verständlichen Worten ein.  \n\nAttribut-basierte anonyme Credential-Systeme erlauben die Privatsphären-freundliche Authentisierung von Benützern gegenüber Cloud-Service-Anbietern. Einerseits hat der Benützer volle Kontrolle, welche Attribute (z.B. Name und Alter) an den Service-Anbieter übertragen werden und welche (z.B. Nationalität und Wohnort) geheimgehalten werden. Andererseits erhält der Service-Anbieter gleichzeitig hohe Authentizitätsgarantien für die offengelegten Attribute, wodurch sichergestellt wird, dass der Benützer nur korrekte Attribute offenlegen kann.\n\nZiel dieses Vortrags ist es, Probleme in bestehenden Identitätsmanagement-Systemen zu diskutieren und die Notwendigkeit für Privatsphären-freundliche Authentisierungsmethoden zu erläutern. Weiters soll eine Übersicht über in der kryptographischen Literatur exisiterende Lösungen und ein Eindruck über die technische Realisierbarkeit gegeben werden.\n\nDer Vortrag setzt keine technischen, mathematischen, oder kryptographischen Kenntnisse voraus, sondern führt die Konzepte abstrakt und allgemeinverständlich für ein breites Publikum ein.\n","original_language":"deu","persons":["Stephan Krenn"],"tags":["pw17","216"],"view_count":35,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2021-01-14T19:30:05.159+01:00","length":1367,"duration":1367,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/216-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/216-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/963924f1-15c8-44df-922e-166d786cac5a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/963924f1-15c8-44df-922e-166d786cac5a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-216-privatspharen-freundliche_und_beweisbar_sichere_authentisierung_im_internet","url":"https://api.media.ccc.de/public/events/963924f1-15c8-44df-922e-166d786cac5a","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":590,"event_guid":"import-85a56d62611bbbafe7","weight":1},{"event_id":2008,"event_guid":"zLQRrJi05bpzgkLweZJT1Q","weight":1},{"event_id":2316,"event_guid":"5468e017-bf80-4910-9616-4efd93efb9a2","weight":1},{"event_id":4268,"event_guid":"ba28bb48-0861-4159-a27b-d27b8a3e2ec2","weight":1},{"event_id":4276,"event_guid":"190f2b60-5541-48bd-82ad-239ff97fdba0","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":2},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":2},{"event_id":5706,"event_guid":"615c0099-652b-5e1f-bf9e-2e613d10b254","weight":2},{"event_id":6133,"event_guid":"a75634aa-d880-4616-b2c7-a7fe67ac4e7a","weight":2}]},{"guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","title":"Privacy by Design","subtitle":"Collecting data in a socially responsible manner without privacy side effects","slug":"pw17-158-privacy_by_design","link":"https://c3voc.de","description":"Privacy by Design means that the complete architecture right from collection, processing, serving the data is built with privacy and security in mind from the ground up. The term Big Data needs little introduction; it is the foundation of today's services, without this most of the services that we enjoy today could not exists not exist. The industry modus-operandi can be described as \"collect-all-you-can\", this behavior is not only accepted but encouraged. This approach to data collection, however is dangerous especially when data involves our everyday actions and when the subject of data collection involves human actions on the Web, side-effects are something to be considered seriously. What is a side-effect in context of data collection ? In simple terms, a piece of knowledge that can be learned from data analysis which was neither intended nor expected, and that poses a risk to the privacy of the subjects of the data collection. During this talk we will provide evidences of side-effects on popular systems such as google analytics that compromise the privacy of the users, even to the point of obtaining personal identifiable information (PII).\n\nUnfortunately the current approach of data collection where aggregation only happens on the backend of the collector makes these side effects unavoidable. At Cliqz we faced the same problem when designing our data collection system. We needed data from our users to build our services: a browser with an integrated search engine, news recommendation, security services such as anti-phishing and anti-tracking and so on. However, we were very troubled by the side-effects. That is why we created the framework – Human-Web[1] , a novel approach to data collection that relies on client-side aggregation rather than server-side. Since server-side aggregation of user's data is bound to produce side-effects, it is strictly forbidden. Our data collection backend only receives signals from our users if and only if those signals require no further aggregation. If aggregation by user is required, it will be carried out in the client itself. Thus no UID ever reaches our data collection backend. In addition to remove explicit UIDs we have a complex set of heuristics to detect potential implicit UIDs in the content of the signals as well. This talk, however, is not just about how we at Cliqz build privacy preserving data collection systems, which have been running in production for over two years now, the whole motivation behind this talk is to showcase design choices and exciting new technologies that can help anyone collect and transport data in a privacy preserving manner which can be useful for any number of uses cases, for instance one can use the same approach to build a privacy-preserving google analytics (as can be showcased in a demo) and solve problems like re-targeting, complex telemetry for business intelligence, goal conversions or like in our case building a complete search-engine. The intended audience for this talk is anyone who deals with data, as a takeaway they will learn how by a slight change in the methodology data can be collected in a much much saner and safer way ultimately protecting and respecting the user's privacy. Actually to demonstrate further, we have built a demo Google Analytics[2] service that covers a wide-range of metrics that require would require tracking to solve not so trivial use cases like unique, goal completion, return rate, time on page, etc, but instead it relies on the principles of privacy by design and yet achieves what services like Google analytics will.\n\nFootnotes: [1] : https://cliqz.com/en/whycliqz/human-web [2] : http://josepmpujol.net/public/papers/big_green_tracker.pdf\n\n\n\nData from users is needed to build great products. Google, Facebook even Doubleclick would not be able to offer their services unless they had tons of data. No company or product is an exception, the current industry modus-operandi is \"collect-as-you-can\" and it is bound to produce privacy side effects.\n\nWe would like to share an alternative approach based on client-side aggregation. This talk will showcase how it is perfectly possible to collect and anonymously send data without any user identifiers or PII for building data driven products like a browser with a fully integrated search engine (Cliqz), Anti-tracking, Anti-phishing etc. without risking or compromising the users privacy at any time.","original_language":"eng","persons":["Konark Modi"],"tags":["pw17","158"],"view_count":132,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-05-16T13:15:04.131+02:00","length":2265,"duration":2265,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/158-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/158-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/3ce2f136-e772-4358-9a71-e8d94b04f17c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/3ce2f136-e772-4358-9a71-e8d94b04f17c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-158-privacy_by_design","url":"https://api.media.ccc.de/public/events/3ce2f136-e772-4358-9a71-e8d94b04f17c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":3751,"event_guid":"3226a81b-dd11-42cc-8c14-ae9f95c01bbd","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":1},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":1},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":1},{"event_id":4895,"event_guid":"dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7","weight":1},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":5},{"event_id":4997,"event_guid":"381d274a-9001-47db-bebb-9b08eadf150c","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":2},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":3},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":1},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":6},{"event_id":5790,"event_guid":"f9c7f1a4-a696-4559-9d65-52e770591c38","weight":3}]},{"guid":"e1a84979-5507-4160-8d47-d8fb39227713","title":"Status „It’s complicated“. Digitale Spuren der Liebe","subtitle":null,"slug":"pw17-126-status_it_s_complicated_digitale_spuren_der_liebe","link":"https://c3voc.de","description":"„Das einzig Wichtige im Leben sind die Spuren von Liebe, die wir hinterlassen, wenn wir weggehen.“ sagte Albert Schweitzer. Er hatte schließlich auch keinen Facebook-Account.\nAber: Wie verlieben sich Angehörige der Generation Y und die “Singles mit Niveau” in diesem Jahrtausend richtig? Und wie entliebt man sich, ohne 734 Follower davon zu benachrichtigen? Ist es für die Beziehung hilfreich, dass man die neue Flamme schon vor dem ersten Date online nachstalken kann? Und was, wenn man beim letzten Cybersex Spuren hinterlassen hat?\nEs ist kompliziert geworden mit der „Liebe im digitalen Zeitalter“. \nUnser Talk ist ein romantischer Spaziergang und Wegweiser durch die digitale Liebeslandschaft – bisweilen auch ein bisschen expliziter.","original_language":"deu","persons":["Ally Auner","Jürgen Haslauer"],"tags":["pw17","126"],"view_count":72,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-09-01T21:30:04.383+02:00","length":3637,"duration":3637,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/126-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/126-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e1a84979-5507-4160-8d47-d8fb39227713-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e1a84979-5507-4160-8d47-d8fb39227713-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-126-status_it_s_complicated_digitale_spuren_der_liebe","url":"https://api.media.ccc.de/public/events/e1a84979-5507-4160-8d47-d8fb39227713","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2408,"event_guid":"25d1ba3b-cf21-4d83-935d-d064f10a6035","weight":1},{"event_id":4760,"event_guid":"b14c9516-d104-465e-8c7c-b2eae5d31f5a","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1},{"event_id":4925,"event_guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","weight":1},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":3},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":3},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","title":"\"CYBER!\". Abriss einer politischen Ökonomie der Malware","subtitle":"CYBERCYBER!","slug":"pw17-153-cyber_abriss_einer_politischen_okonomie_der_malware","link":"https://c3voc.de","description":"Was Profundes über das Zusammenspiel der Intereressen von Kriminellen, Geheimdiensten, Industrie und nun auch Cops auf dem Schwarzmarkt der binären Bösartigkeiten. ","original_language":"deu","persons":["Erich Moechel"],"tags":["pw17","153"],"view_count":132,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-11-27T02:00:01.893+01:00","length":3071,"duration":3071,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/153-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/153-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/2b1c43f0-a0b6-4a65-b249-dad071ee0c5e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/2b1c43f0-a0b6-4a65-b249-dad071ee0c5e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-153-cyber_abriss_einer_politischen_okonomie_der_malware","url":"https://api.media.ccc.de/public/events/2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2008,"event_guid":"zLQRrJi05bpzgkLweZJT1Q","weight":1},{"event_id":2222,"event_guid":"Z4htibNZxLewwCmPKSdeqA","weight":9},{"event_id":4268,"event_guid":"ba28bb48-0861-4159-a27b-d27b8a3e2ec2","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":3},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":5},{"event_id":5014,"event_guid":"963924f1-15c8-44df-922e-166d786cac5a","weight":2},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":2},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":3},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":3},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":3},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":3},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":3},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":1},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":4},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":3},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":3},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":3},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":2},{"event_id":5987,"event_guid":"2fdcdadb-0575-5a47-a59f-8376db33f0a6","weight":11},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":4}]},{"guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","title":"Aktivitäten CERT.at","subtitle":null,"slug":"pw17-131-aktivitaten_cert_at","link":"https://c3voc.de","description":"Review der Tätigkeiten von CERT.at. Dafür brauch ich rund 45 mins.","original_language":"deu","persons":["Otmar Lendl"],"tags":["pw17","131"],"view_count":38,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-05-20T21:30:08.879+02:00","length":2756,"duration":2756,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/131-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/131-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/37ca8131-2da3-412d-bae4-6cbc56753b90-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/37ca8131-2da3-412d-bae4-6cbc56753b90-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-131-aktivitaten_cert_at","url":"https://api.media.ccc.de/public/events/37ca8131-2da3-412d-bae4-6cbc56753b90","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3869,"event_guid":"y51b5xL9m5uzZtXF7dFzLw","weight":1},{"event_id":3908,"event_guid":"-vvrZxatKLSv4pWA4oIpVg","weight":1},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":2},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5020,"event_guid":"deb684b5-bb22-4b83-8d6f-3d70f0037e2f","weight":2},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":2},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":1},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1}]},{"guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","title":"I GOOGLE YOU","subtitle":"über Gläserne Menschen, kuratierte Pinnwände und Popkultur","slug":"pw17-177-i_google_you","link":"https://c3voc.de","description":"Triggerwarnung:\nIm Rahmen des Talks bzw. der Performance kommen ggf. Schilderungen persönlicher Erlebnisse vor, die Auslösereiz bei Betroffenen sein können. \n","original_language":"deu","persons":["Frida Vamos"],"tags":["pw17","177"],"view_count":756,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-08-08T08:15:04.035+02:00","length":3644,"duration":3644,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/177-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/177-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a15280a6-4f11-4c81-9e9c-7bd9cb6ed343-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a15280a6-4f11-4c81-9e9c-7bd9cb6ed343-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-177-i_google_you","url":"https://api.media.ccc.de/public/events/a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":10},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":27},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":6},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":9},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":9},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":11},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":37},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":13},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":9},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":7},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":7},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":14},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":14},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":14},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":30},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":9},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":27},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":11},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":13},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":30},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":44},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":15},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":11},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":14},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":40},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":10},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":16},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":13},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":18},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":48},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":32},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":52},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":14},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":18}]},{"guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","title":"Free Your Android","subtitle":null,"slug":"pw17-147-free_your_android","link":"https://c3voc.de","description":"In unserem Workshop möchten wir folgendes vermitteln bzw. anbieten:\n\u003cul\u003e\n  \u003cli\u003eGrundzüge freier Software und der Zusammenhang zum Datenschutz\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für den FDroid App-Store\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für Auswahl an populären freien Android Apps\u003c/li\u003e\n  \u003cli\u003eVorstellung und Installationsanleitung für freie Varianten des Android Betriebssystems\u003c/li\u003e\n\u003c/ul\u003e","original_language":"deu","persons":["Michael Pöhn"],"tags":["pw17","147"],"view_count":505,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-22T02:15:03.224+01:00","length":4435,"duration":4435,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/147-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/147-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e5a54f6e-71cc-461e-91d5-5a1c0e3f316f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e5a54f6e-71cc-461e-91d5-5a1c0e3f316f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-147-free_your_android","url":"https://api.media.ccc.de/public/events/e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2422,"event_guid":"03553ade-bec3-4833-8210-6ac0983bb0c0","weight":1},{"event_id":2436,"event_guid":"83b785ad-0882-4552-9ad4-0cde123f3837","weight":3},{"event_id":3442,"event_guid":"b467ea0d-15c2-4e1b-a430-fc3ee9be445f","weight":1},{"event_id":3451,"event_guid":"00de42c4-14bf-48ab-8e7b-7a66bf2f5515","weight":1},{"event_id":3561,"event_guid":"f97830db-1b51-420a-91f0-b713fa9571ec","weight":1},{"event_id":4389,"event_guid":"91d3f23c-ef7a-45d9-9e26-a5df4f19b130","weight":1},{"event_id":4427,"event_guid":"dc4aad2d-4ba3-4881-bb90-9a7953bf789d","weight":1},{"event_id":4721,"event_guid":"4e19087d-3aa5-5be9-8a36-17f4d28e3a11","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":7},{"event_id":4872,"event_guid":"c26fa336-680b-49e5-80e6-24432305e94d","weight":1},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":6},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":8},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":10},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":11},{"event_id":5009,"event_guid":"73c1d740-06c2-11e8-aa24-a771a532ebc5","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":22},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":5},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":15},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":13},{"event_id":5041,"event_guid":"e1a84979-5507-4160-8d47-d8fb39227713","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":9},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":19},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":6},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":36},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":13},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":15},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":30},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":6},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":8},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":8}]},{"guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","title":"Zwischen Tinder und Instagram. Über das Datenschutz-Verständnis Jugendlicher.","subtitle":null,"slug":"pw17-129-zwischen_tinder_und_instagram_uber_das_datenschutz-verstandnis_jugendlicher","link":"https://c3voc.de","description":"Junge Erwachsene und ihr Verständnis von Datenschutz werden häufig völlig falsch eingeschätzt. Stereotype Beurteilung von Verhaltensweisen und Verallgemeinerungen (\"Die hängen dauernd am Telefon und posten einfach alles, ohne darüber nachzudenken!\") führen zu verkürzten Analysen und Schubladendenken.\n \nWas bedeutet \"Privatheit\" für Jugendliche? Wie gehen junge Erwachsene damit um und wie stehen sie zum Thema Datenschutz? \n\nDiese und andere Fragen möchten wir in unserem Vortrag aufwerfen und nicht nur spannende Erkenntnisse, sondern auch eine differenzierte Sichtweise anbieten, wenn es darum geht, welchen Zugang \"die Jungen\" haben oder nicht haben.","original_language":"deu","persons":["Uschi Juno","Michaela Wein"],"tags":["pw17","129"],"view_count":302,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-28T15:15:13.513+01:00","length":2471,"duration":2471,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/129-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/129-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/51eb0169-e1fc-4b40-816c-be3a11618c45-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/51eb0169-e1fc-4b40-816c-be3a11618c45-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-129-zwischen_tinder_und_instagram_uber_das_datenschutz-verstandnis_jugendlicher","url":"https://api.media.ccc.de/public/events/51eb0169-e1fc-4b40-816c-be3a11618c45","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":7},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":7},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":5},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":12},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":12},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":8},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":8},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":12},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":5},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":7},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":9},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":8},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":6},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":8},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":18}]},{"guid":"1fd3475c-f696-415b-971d-786e173e212c","title":"Anonymisierungstools","subtitle":null,"slug":"pw17-144-anonymisierungstools","link":"https://c3voc.de","description":"Workshop - Ergänzend zum Vortrag über Anonymisierungstools.","original_language":"deu","persons":["Moritz Bartl"],"tags":["pw17","144"],"view_count":313,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-02-22T19:30:09.183+01:00","length":5949,"duration":5949,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/144-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/144-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/1fd3475c-f696-415b-971d-786e173e212c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/1fd3475c-f696-415b-971d-786e173e212c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-144-anonymisierungstools","url":"https://api.media.ccc.de/public/events/1fd3475c-f696-415b-971d-786e173e212c","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":6},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":11},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":39},{"event_id":5002,"event_guid":"6497c252-f8aa-46cb-a1ad-a957a4cf01ba","weight":1},{"event_id":5006,"event_guid":"d5afa965-4bfb-4d28-8ff9-ad5eef4bec3e","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":11},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":11},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":5},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":6},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":9},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":7},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":7},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":21},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":10},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":7},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":7},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":13}]},{"guid":"78e97862-206a-40ac-b37e-209db1b67406","title":"Closing Event","subtitle":null,"slug":"pw17-193-closing_event","link":"https://c3voc.de","description":null,"original_language":"deu","persons":[],"tags":["pw17","193"],"view_count":15,"promoted":false,"date":"2017-10-29T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2020-04-23T17:30:02.613+02:00","length":2553,"duration":2553,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/193-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/193-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/78e97862-206a-40ac-b37e-209db1b67406-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/78e97862-206a-40ac-b37e-209db1b67406-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-193-closing_event","url":"https://api.media.ccc.de/public/events/78e97862-206a-40ac-b37e-209db1b67406","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":1},{"event_id":4387,"event_guid":"9910a89c-ce50-4b0d-80a2-930e4bda8574","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":1},{"event_id":5002,"event_guid":"6497c252-f8aa-46cb-a1ad-a957a4cf01ba","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":1},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1},{"event_id":6608,"event_guid":"46b7c5d8-318d-4f6c-a17e-73f2638ab46a","weight":1}]},{"guid":"5224273a-2731-4695-a514-e3895d9022e8","title":"Wie man sich der Maschine bedient wenn man die Maschine bedient.","subtitle":"Performante Tipps für Entscheidungsimpulse setzende Akteure.","slug":"pw17-206-wie_man_sich_der_maschine_bedient_wenn_man_die_maschine_bedient","link":"https://c3voc.de","description":"Menschen machen sich oft zu Dienerinnen und Dienern von Computersystemen. Besser ist es, sich der Maschinen zu bedienen. \n\nEin Dasein als DienerIn ist bequem - man muss nicht selbst denken. Für alle, die lieber selbst denken, ist es besser, selbst gesetzte Probleme zu lösen - und nicht anderen zu dienen, indem vorgesetzte Probleme gelöst werden. ","original_language":"deu","persons":["Christian Swertz"],"tags":["pw17","206"],"view_count":54,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-08-17T19:30:02.438+02:00","length":2914,"duration":2914,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/206-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/206-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/5224273a-2731-4695-a514-e3895d9022e8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/5224273a-2731-4695-a514-e3895d9022e8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-206-wie_man_sich_der_maschine_bedient_wenn_man_die_maschine_bedient","url":"https://api.media.ccc.de/public/events/5224273a-2731-4695-a514-e3895d9022e8","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1539,"event_guid":"import-b7bf07eb250a05828e","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":3134,"event_guid":"632c4eb7-d4b7-52f4-8c52-65713b9035ce","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":2},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":2},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":3},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":2},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":2},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":2},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":1}]},{"guid":"910904ae-70f3-414c-aaa3-4d3e67b80a25","title":"Podiumsdiskussion TechDay","subtitle":null,"slug":"pw17-175-podiumsdiskussion_techday","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Walter Hötzendorfer","Stephan Krenn","MacLemon"],"tags":["pw17","175"],"view_count":30,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2023-11-27T00:00:03.492+01:00","length":2043,"duration":2043,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/175-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/175-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/910904ae-70f3-414c-aaa3-4d3e67b80a25-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/910904ae-70f3-414c-aaa3-4d3e67b80a25-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-175-podiumsdiskussion_techday","url":"https://api.media.ccc.de/public/events/910904ae-70f3-414c-aaa3-4d3e67b80a25","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4994,"event_guid":"49230bac-cb6a-4d49-bcd7-0739823b0440","weight":1},{"event_id":5011,"event_guid":"e3a8fd40-a1a1-4d00-83e7-09b395144230","weight":2},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":2},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5065,"event_guid":"b13b7d07-a781-4777-ac11-c331a204e710","weight":1}]},{"guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","title":"Ransomware","subtitle":"DatenVERschlüsselung leicht gemacht","slug":"pw17-98-ransomware","link":"https://c3voc.de","description":"Ransomware ist in der Gegenwart in aller Munde. Dauernd hört man in den News davon. Neben Privatnutzern trifft es vor allem auch Firmen, die damit große Probleme haben.\n\nDieser Vortrag gibt einen Blick in die Welt der Ransomware.\n\nÜberall im Munde aber was dahinter genau steckt wissen nicht allzuviele.\n\nDer Vortrag wird folgende Themen beinhalten:\n\n* Ransomware? Was ist das?\n* Ransomware in der Gegenwart\n* Wie funktioniert Ransomware?\n* Wie schütze ich mich davor\n\nGanz am Schluss gibt es dann noch eine Kostprobe in Form einer Livedemo.\n\nDieser Vortrag ist für Leute aller technischen Level konzipiert. Egal ob Neuling oder ExpertIn, Ihr alle seid Willkommen.","original_language":"deu","persons":["Petar Kosic"],"tags":["pw17","98"],"view_count":333,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-08T00:30:06.474+02:00","length":3004,"duration":3004,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/98-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/98-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/f8195587-4ca3-4bd4-9bb7-a79356b0ead4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/f8195587-4ca3-4bd4-9bb7-a79356b0ead4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-98-ransomware","url":"https://api.media.ccc.de/public/events/f8195587-4ca3-4bd4-9bb7-a79356b0ead4","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3486,"event_guid":"5922d022-17b9-446a-b6f6-958b1d706e7e","weight":3},{"event_id":4554,"event_guid":"48595951-4733-2020-2020-202020202020","weight":3},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":4},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":4},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":3},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"a31f66ba-021f-4199-9286-702a59ab9c05","title":"Internet of Things (IoT) Privacy \u0026 Security","subtitle":null,"slug":"pw17-179-internet_of_things_iot_privacy_security","link":"https://c3voc.de","description":"Das Internet der Dinge (Internet of Things) ist im Moment in aller Munde - aber welche Privacy- und welche Sicherheits-Probleme kommen damit auf uns zu? Nicht umsonst heißt ein gerade erschienenes Buch zur Sicherheit dieser Geräte \"The Internet of Risky Things\" [1]\n\nDer Talk wird eine Einführung in die Problematik anhand von Beispielen geben, nicht nur die \"intelligenten\" Philips Hue Lampen hatten Sicherheitsprobleme, wir haben eigentlich auch einen reichen Erfahrungsschatz aus anderen IT-Bereichen wo in der Vergangenheit schon einiges schiefgegangen ist. Die Hoffnung -- die ja zuletzt stirbt -- ist, dass wir diese nicht im IoT-Bereich wiederholen.\n\nIn der Diskussion wird sich Gelegenheit ergeben, auch eigene Anekdoten und Erfahrungen mit IoT-Geräten beizutragen.\n\n[1] Sean Smith, \"The Internet of Risky Things -- Trusting the Devices \nThat Surround Us\", O'Reilly, 2017","original_language":"deu","persons":["Ralf Schlatterbeck"],"tags":["pw17","179"],"view_count":61,"promoted":false,"date":"2017-10-29T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-10T20:15:22.146+01:00","length":2571,"duration":2571,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/179-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/179-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a31f66ba-021f-4199-9286-702a59ab9c05-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a31f66ba-021f-4199-9286-702a59ab9c05-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-179-internet_of_things_iot_privacy_security","url":"https://api.media.ccc.de/public/events/a31f66ba-021f-4199-9286-702a59ab9c05","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2696,"event_guid":"social_media_roots","weight":1},{"event_id":2839,"event_guid":"94fa109a-45d7-4fea-86e3-12d12510c374","weight":1},{"event_id":2854,"event_guid":"8b3cba12-3928-4fb9-b727-ee4bc9e56f51","weight":1},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":1},{"event_id":2994,"event_guid":"1a1b0866-0e61-410e-842d-2f6879634423","weight":1},{"event_id":3574,"event_guid":"391366a5-a55c-52b1-b027-ae0ea3f8b1f2","weight":1},{"event_id":4249,"event_guid":"98f8267c-cad1-4d04-8a52-f7e979e68c00","weight":1},{"event_id":4255,"event_guid":"ddb12e13-2fb7-4499-bf28-38db6143aa4b","weight":1},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":2},{"event_id":4436,"event_guid":"0a5c2a3a-aae3-47c6-97e8-c28af5efc466","weight":2},{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":4942,"event_guid":"684c65c0-f61d-11e7-a1a3-57c648cc8333","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":2},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":2},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":1},{"event_id":4997,"event_guid":"381d274a-9001-47db-bebb-9b08eadf150c","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":2},{"event_id":5012,"event_guid":"0e036430-d97f-4e54-b2b8-149e0e9d3d58","weight":1},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":2},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":2},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":1},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":2},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":1},{"event_id":5036,"event_guid":"cf96324a-dc3f-45b7-ba5a-d3c9774af5ed","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":2},{"event_id":5045,"event_guid":"99ad53fd-0f91-4928-8910-8a95c8c5d6ed","weight":1},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":3},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5051,"event_guid":"56ede25d-f95a-405c-913f-7f8be88f6c2d","weight":2},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":6194,"event_guid":"0cac2097-401c-5db7-b57d-1beba7fd0908","weight":3},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":2}]},{"guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","title":"Limitierungen und Risiken von online Texteanalyse-Services, vulgo Plagiatsprüfprogrammen","subtitle":null,"slug":"pw17-124-limitierungen_und_risiken_von_online_texteanalyse-services_vulgo_plagiatsprufprogrammen","link":"https://c3voc.de","description":"Eine Vielzahl an Medienberichten über betrügende PolitikerInnen machte Plagiarimus in den letzten Jahren bisweilen zu einem unschönen Business. Leider kommt es dabei allerdings zu einigen panikartigen Reflexen, die für Lehrende, WissenschafterInnen und Studierende bei der Bekämpfung der Ursachen von Plagiarismus nicht unbedingt förderlich sind. Ähnlich wie in der Medizin ist Prävention auch in diesem Gebiet nicht so sehr im Fokus wie die spätere Schadensbegrenzung. Werfen wir gemeinsam einen unaufgeregten Blick hinter die Kulissen der Plagiatsdetektion und der dabei verwendeten Software!\n\nIn den letzten Jahren regten ein scheinbar endloser Strom an plagiierenden MissetäterInnen, nicht alle davon PolitikerInnen, die öffentliche Meinung wie auch Bildungseinrichtungen auf.\n\nZurecht kommen dabei viele Fragen auf: Wieso können einige die Regeln so dreist brechen, ohne dass es jemandem auffällt? Oder sind manche Menschen einfach nur ein wenig \"gleicher\" als andere?\nOder waren die Regeln in früheren Jahren vielleicht anders als jetzt? Was, wenn sich Zuständige nicht genug gekümmert haben? Was können wir gegen Betrug im Bildungs- und Hochschulbereich eigentlich unternehmen? Warum kaufen Institutionen die „Black Box“ Plagiatsprüfsoftware so anstandslos? Wo werden unsere Daten hingeschickt und wer hat überhaupt Zugriff darauf? Und, überprüft eigentlich irgendjemand diese Firmen, die die Prüfsoftware herstellen und betreiben?\n\nWährend dieser \"Meet an Expert\"-Session können Sie eine erfahrende Wissenschaftsberaterin und präventive Plagiatsprüferin, die bereits mehr als tausend Hochschuldokumente geprüft hat, über Plagiate und Plagiatsprüfung fragen.\n\nNach einer kurzen Einleitung was Plagiarismus ist und warum es für Hochschulen und Studierende so wichtig ist, „saubere“ Abschlussarbeiten abzuliefern, wird Miljković Details zur Detektion von Plagiaten bzw. Textähnlichkeiten geben. Dann wird sie einen sehr kritischen Blick hinter die Kulissen der Prüfsoftware-Industrie werfen und eine realistischen Überblick zu Möglichkeiten und Limitierungen der Software geben. Nach dieser Session ist Zeit für Ihre Fragen.","original_language":"eng","persons":["Natascha Miljkovic"],"tags":["pw17","124"],"view_count":64,"promoted":false,"date":"2017-10-25T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2025-03-21T11:00:03.523+01:00","length":1825,"duration":1825,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/124-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/124-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-124-limitierungen_und_risiken_von_online_texteanalyse-services_vulgo_plagiatsprufprogrammen","url":"https://api.media.ccc.de/public/events/47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5014,"event_guid":"963924f1-15c8-44df-922e-166d786cac5a","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":2},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":4},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":2},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":2},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":4}]},{"guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","title":"Sichere Authentifizierung","subtitle":"wie man Biometrie und Passworte richtig verwendet","slug":"pw17-97-sichere_authentifizierung","link":"https://c3voc.de","description":"Alle Authentifizierungsverfahren können irgendwie überwunden werden. Machen wir es den Angreifern so schwer wie möglich.\n\nIm Vergangenen Jahr habe ich gezeigt, wie einfach sich Authentifizierungsverfahren (Biometrie, Passwort, RFID-Karten) überwinden lassen. Dieses mal will ich versuchen, das Problem von der anderen Seite, der Seite der Benutzer zu betrachten. Gibt es Möglichkeiten, Passworte sicher einzugeben oder biometrische Systeme so zu benutzen, dass es einem Angreifer deutlich schwerer fällt euch zu hacken? ","original_language":"deu","persons":["starbug"],"tags":["pw17","97"],"view_count":398,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-05T19:30:07.397+01:00","length":2554,"duration":2554,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/97-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/97-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/e213beae-6b9a-48fd-b3c5-7036a4e530ac-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/e213beae-6b9a-48fd-b3c5-7036a4e530ac-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-97-sichere_authentifizierung","url":"https://api.media.ccc.de/public/events/e213beae-6b9a-48fd-b3c5-7036a4e530ac","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":3},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":12},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":3},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":8},{"event_id":3030,"event_guid":"743b35a6-jsdj-11e5-882f-0beea432bf4e","weight":1},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":12},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":7},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":8},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4975,"event_guid":"a6df518d-7573-4bf7-9465-bfaf0900fc12","weight":5},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":4},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":4},{"event_id":5015,"event_guid":"910904ae-70f3-414c-aaa3-4d3e67b80a25","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":3},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":11},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5049,"event_guid":"b98fc3db-2ab8-4f2e-9672-3e2bfe018f98","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":5},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":3},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":15},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":10}]},{"guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","title":"Warum gibt es eigentlich das Internet der Dinge?","subtitle":"Geschichte des IoT mit Querverbindungen zum besseren Verständnis","slug":"pw17-91-warum_gibt_es_eigentlich_das_internet_der_dinge","link":"https://c3voc.de","description":"Das Internet of Things (IoT) oder Internet der Dinge ist in aller Munde. Genau wie bei den Kampfbegriffen Cloud, \"smart\" und Dienste \"as a Service\" fehlt leider die genaue Bedeutung. Dieser Vortrag beleuchtet die Geschichte der Technologien, die zum IoT Fieber geführt haben, und die Verbindungen des IoT Ökosystems mit den privaten und beruflichen Daten. IoT ist keine neue Technologie. Es ist eine logische Konsequenz aus Geschäftsmodellen und Datenhandel.\n\nWer regelmäßig IT Nachrichten liest, der/die wird sich über manche Trends wundern. Tragbare Vernetzung und allgegenwärtige Rechenleistung führt zu neuen Verquickungen, die dann scheinbar plötzlich Neues möglich machen. Wenn man sich die Hintergründe und die Geschichte anschaut, so sieht man Zusammenhänge, die die vorgegaukelte Innovation entzaubern. Dieser Vortrag ist für alle gedacht, die sich mit smarten Gegenständen umgeben (wollen), oder die Silicon Valley als gelobtes Land ansehen und zweifelhafte Geschäftsmodelle blind anbeten. \"Smart\" hat leider nichts mit Intelligenz zu tun. Erfahren Sie in diesem Vortrag wieso.","original_language":"deu","persons":["René Pfeiffer"],"tags":["pw17","91"],"view_count":176,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2024-11-06T03:30:02.472+01:00","length":2654,"duration":2654,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/91-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/91-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/d0df705f-a1ec-41e8-9240-7009943e03bc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/d0df705f-a1ec-41e8-9240-7009943e03bc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-91-warum_gibt_es_eigentlich_das_internet_der_dinge","url":"https://api.media.ccc.de/public/events/d0df705f-a1ec-41e8-9240-7009943e03bc","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":342,"event_guid":"import-ef9f4cf355ba454d2f","weight":2},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":2},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":3},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":7},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":8},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":4},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":3},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":1},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":7},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":4},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","title":"Der Ausverkauf des Privaten","subtitle":"Wie Unternehmen ihre Zukunft verspielen","slug":"pw17-146-der_ausverkauf_des_privaten","link":"https://c3voc.de","description":"Der Schutz des Privaten steht oft im Widerspruch zu wirtschaftlichem Erfolg. Geschäftsmodell und Gesellschaft funktionieren auf Dauer aber nur, wenn Nutzer mehr Macht über ihre Daten haben.\n\nIn der Europäischen Union gilt das Prinzip der Datensparsamkeit: Unternehmen sollen nur soviele Daten erheben, wie für eine Dienstleistung benötigt werden. Noch. Denn an vielen Fronten wird versucht, das Prinzip aufzuweichen: Big Data heißt das große Versprechen, der freie Fluss von Daten soll Geschäfte ankurbeln. Statt um Datenschutz geht es um „Datensouveränität“. Doch das Geschäftsmodell ist auf Sand gebaut, die Souveränität der Verbraucher eine Farce. Es gibt eine bessere Lösung, um Innovationen voranzutreiben und mit Daten Geld zu verdienen: Man gibt den Nutzern die Macht über ihre Daten. Ein Blick auf die Sprache in der aktuellen Debatte und ein Plädoyer für ein Geschäftsmodell, das wirklich Zukunft hat. ","original_language":"deu","persons":["Mirjam Stegherr"],"tags":["pw17","146"],"view_count":91,"promoted":false,"date":"2017-10-23T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2025-12-20T17:00:04.601+01:00","length":1646,"duration":1646,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/146-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/146-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/d2324267-fa1a-49be-b9cf-cb2a96471608-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/d2324267-fa1a-49be-b9cf-cb2a96471608-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-146-der_ausverkauf_des_privaten","url":"https://api.media.ccc.de/public/events/d2324267-fa1a-49be-b9cf-cb2a96471608","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":2},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":3},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":3},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":4},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":7},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":5},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":1},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":5},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":2},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":3},{"event_id":5030,"event_guid":"f8195587-4ca3-4bd4-9bb7-a79356b0ead4","weight":1},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":7},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":3},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7}]},{"guid":"a33e07e8-36eb-4228-876f-f71944700aa6","title":"Digital danach","subtitle":"Über virtuelle Friedhöfe, Datenfriedhöfe und andere Spuren unseres digitalen Lebens","slug":"pw17-224-digital_danach","link":"https://c3voc.de","description":"Podium / Diskussionsrunde zum Vortrag „Trauer 2.0“.","original_language":"deu","persons":["Kristina Juchum","Klaudia Zotzmann-Koch"],"tags":["pw17","224"],"view_count":319,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-01-12T22:30:28.057+01:00","length":1174,"duration":1174,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/224-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/224-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/a33e07e8-36eb-4228-876f-f71944700aa6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/a33e07e8-36eb-4228-876f-f71944700aa6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-224-digital_danach","url":"https://api.media.ccc.de/public/events/a33e07e8-36eb-4228-876f-f71944700aa6","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":2},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":2},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":2},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":7},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":13},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":1},{"event_id":4986,"event_guid":"4e08029f-9022-4319-b11c-60308427f3ce","weight":5},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":6},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":15},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":32},{"event_id":5013,"event_guid":"20290fc0-b626-429e-92ff-7aafdd08c1c5","weight":8},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":2},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":2},{"event_id":5019,"event_guid":"25b8b456-9b36-4894-aa20-5b46d0820d34","weight":2},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":11},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":7},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":11},{"event_id":5032,"event_guid":"638baab4-c0c6-4560-9845-9c20a96fcb3d","weight":35},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":6},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":7},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":18},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":1},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":6},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":6},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":12},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":14},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":7},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":7},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":15},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":40},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":6}]},{"guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","title":"Staatliche Spionagesoftware","subtitle":"Effektives Mittel zur Kriminalitätsbekämpfung oder Gefahr für die IT-Infrastruktur?","slug":"pw17-107-staatliche_spionagesoftware","link":"https://c3voc.de","description":"Der Vortrag beleuchtet die rechtlichen Rahmenbedingungen des Einsatzes staatlicher Spionagesoftware sowie die daraus folgende strukturelle Gefahr für die IT-Sicherheit \n\nImmer mehr europäische Regierungen und Politiker fordern den Einsatz staatlicher Spionagesoftware zur Überwachung internetbasierter Kommunikation um Kriminalität und insbesondere Terrorismus effektiver bekämpfen zu können. Aufgrund des immer weiter verbreiteten Einsatzes von Ende-zu-Ende verschlüsselten Kommunikationsdiensten soll es den Sicherheitsbehörden ermöglicht werden, Kommunikationsinhalte vor bzw. nach einer allfälligen Verschlüsselung zu überwachen. Diese Software muss jedoch durch Ausnutzung kritischer Sicherheitslücken in die Computersysteme (PCs, Laptops, Smartphones, Tablets, Spielekonsolen etc.) geschleust werden, um Daten, unbemerkt vom Nutzer des infiltrierten Systems, an die Sicherheitsbehörden übermitteln zu können. Die Regierungen stehen vor dem Dilemma, dass sie einerseits für den Schutz von (insbesondere kritischen) IT-Infrastrukturen verantwortlich sind und andererseits ein Interesse daran haben müssen, dass kritische Sicherheitslücken, die auch ein Einfallstor für Kriminelle sind, offen bleiben, um staatliche Spionagesoftware einsetzen zu können. Wie gefährlich das Verschweigen von Sicherheitslücken durch staatliche Behörden für BenutzerInnen von Computersystemen und die gesamte Wirtschaft ist, hat nicht zuletzt die Ransomware „WannaCry“, die auf einem der NSA entwendeten Spionageprogramm basiert, aufgezeigt.\nIm Vortrag wird einerseits auf die rechtlichen Rahmenbedingungen dieser Überwachungsmaßnahme in Österreich eingegangen und andererseits die gesetzlichen Grundlagen in anderen europäischen Staaten, insbesondere Deutschland, Italien und Großbritannien beleuchtet. Abschließend wird erörtert, ob dieser Eingriff in informationstechnische Systeme, also in den höchstpersönlichen Lebensbereich, den Kernbereich der geschützten Privatsphäre, mit den europäischen Grundrechten überhaupt vereinbar ist.","original_language":"deu","persons":["Alexander Czadilek"],"tags":["pw17","107"],"view_count":114,"promoted":false,"date":"2017-10-27T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-29T20:45:06.675+02:00","length":3046,"duration":3046,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/107-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/107-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/5cbed437-ac2c-4692-b2fc-e9814c71f962-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/5cbed437-ac2c-4692-b2fc-e9814c71f962-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-107-staatliche_spionagesoftware","url":"https://api.media.ccc.de/public/events/5cbed437-ac2c-4692-b2fc-e9814c71f962","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1641,"event_guid":"import-c56bb30a25766c2a18","weight":1},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":1},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":3},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":1},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":1},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":1},{"event_id":4895,"event_guid":"dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7","weight":1},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":3},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":2},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":4},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":6},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":4},{"event_id":4987,"event_guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","weight":4},{"event_id":4988,"event_guid":"3ce2f136-e772-4358-9a71-e8d94b04f17c","weight":1},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":4},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5022,"event_guid":"72daa621-46fb-4bcf-95a5-8bc86f813c9a","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5028,"event_guid":"d8b919b6-9cf7-4031-b729-dff7536f1902","weight":3},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":2},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":1},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":4},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5044,"event_guid":"c6f29580-288d-4eba-8f70-c9761d20c066","weight":3},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":2},{"event_id":5053,"event_guid":"5224273a-2731-4695-a514-e3895d9022e8","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3}]},{"guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","title":"Crypto-Talk","subtitle":"Die Wiener Cryptoparty zu Gast bei der PrivacyWeek","slug":"pw17-185-crypto-talk","link":"https://c3voc.de","description":"Eine Einführung zur Cryptoparty","original_language":"deu","persons":["Petar Kosic"],"tags":["pw17","185"],"view_count":237,"promoted":false,"date":"2017-10-29T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2024-08-19T13:45:03.383+02:00","length":3072,"duration":3072,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/185-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/185-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/5cc72efe-e510-4c67-b49c-cbf12b4899cf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/5cc72efe-e510-4c67-b49c-cbf12b4899cf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-185-crypto-talk","url":"https://api.media.ccc.de/public/events/5cc72efe-e510-4c67-b49c-cbf12b4899cf","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2442,"event_guid":"5fa41067-c82d-404b-bd9b-5f861d988265","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":6},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":10},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":13},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":13},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":17},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":7},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":9},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":13},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":8},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":17},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":9},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":32}]},{"guid":"07792c85-9a93-4c90-bdcd-9cd8165c2ae5","title":"Von der flächendeckenden Überwachung zur  flächendeckenden Lenkung der Bürger","subtitle":"Big Data Algorithmen  als Lenkungswerkzeug","slug":"pw17-93-von_der_flachendeckenden_uberwachung_zur_flachendeckenden_lenkung_der_burger","link":"https://c3voc.de","description":"Der Vortrag zeigt an Hand von vielen Beispielen, dass die flächendeckende Überwachung die wir derzeit durch die Sammlung unserer persönlichen Daten erleben, nur die Spitze des Eisbergs ist und schon aus ökonomischen Gründen zu einer Lenkung und Steuerung der Menschen führen wird.\n\n\nAn die (freiwillige) flächendeckende Überwachung durch die verschiedenen Dienstleister wie Google, Facebook, Apple, Microsoft, Twitter, WhatsApp, Skype und der vielfältigen Fitness-Tracker haben sich die meisten Nutzer anscheinend bereits gewöhnt. Die meisten wissen, dass bei Nutzung eines Smartphones mit den vielfältigen Apps viel Privates an die jeweiligen Dienstleister geliefert wird. Auch mit der Weitergabe dieser Daten an die „Sicherheitsdienste“ scheinen sich die meisten irgendwie abgefunden zu haben.\nUnklar ist aber zumeist, dass die Big Data Algorithmen daraus nicht nur benutzer-bezogene Werbung generieren, sondern dass diese (undurchsichtigen) Algorithmen Entscheidungen für die Nutzer treffen, ohne dass der Benutzer dies beeinflussen kann.\nDas beginnt mit der selektiven Auswahl des Lesestoffs auf Grund von Entscheidungen des Page Ranking Algorithmus der Suchmaschine (und deren selektive Auswahl der Nachrichten das jeweilige Weltbild ganz leicht verschieben (können]), geht weiter mit der Wahl des Lebenspartners auf Dating-Websites, die schon heute mittels Algorithmen welche Persönlichkeit und Beziehungsglück miteinander verknüpfen, bestimmen, mit wem die Nutzer der Website glücklich sein werden, bis hin zu zukünftigen Finanz-Risiko-Optimierern deren Big Data Algorithmen sehr genau die Wahrscheinlichkeit abschätzen, dass jemand der diesen Facebook-Freundeskreis hat und in diesem Wohnbezirk wohnt seinen Kredit nicht zurückzahlt.\nDa bleibt nur die Frage offen, ob wir die letzte Generation vor der (befürchteten oder erhofften) Singularität sind oder nicht vielleicht die erste Generation danach.","original_language":"deu","persons":["Philipp Schaumann"],"tags":["pw17","93"],"view_count":305,"promoted":false,"date":"2017-10-24T00:00:00.000+02:00","release_date":"2018-01-31T01:00:00.000+01:00","updated_at":"2026-03-01T17:00:08.429+01:00","length":2592,"duration":2592,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/93-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/93-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/07792c85-9a93-4c90-bdcd-9cd8165c2ae5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/07792c85-9a93-4c90-bdcd-9cd8165c2ae5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-93-von_der_flachendeckenden_uberwachung_zur_flachendeckenden_lenkung_der_burger","url":"https://api.media.ccc.de/public/events/07792c85-9a93-4c90-bdcd-9cd8165c2ae5","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":8},{"event_id":4583,"event_guid":"1908aed0-db9b-50de-bb04-e58a397818a9","weight":5},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":3},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":4},{"event_id":4946,"event_guid":"64be895b-faa3-5543-b6e0-06cf4b361229","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4952,"event_guid":"382bcc74-e1f3-4f59-846c-fcbef11a33a2","weight":1},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":1},{"event_id":4961,"event_guid":"ea16cf8c-b42f-4576-89ee-d5255b62ef13","weight":1},{"event_id":4966,"event_guid":"ff0880c5-af4e-4bf5-9396-06fabdc1f840","weight":1},{"event_id":4970,"event_guid":"b445a0c0-30c4-41f7-9439-e9559cbeca84","weight":1},{"event_id":4973,"event_guid":"524e5c0b-4962-40e2-b668-f0d5eed62e0d","weight":5},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":2},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":4},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":5},{"event_id":4978,"event_guid":"6bebc4b1-8693-4c12-8f3b-f97e4406d932","weight":1},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":2},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":5},{"event_id":4982,"event_guid":"d2324267-fa1a-49be-b9cf-cb2a96471608","weight":5},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":7},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":1},{"event_id":4990,"event_guid":"4d86b49c-e914-465d-8d0f-e84ea582434c","weight":3},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":6},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":3},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":4},{"event_id":5037,"event_guid":"4d8ee3bb-1b32-4dc1-9ad5-cb6ee8323c83","weight":4},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":4},{"event_id":5043,"event_guid":"16c521cb-b890-4905-b482-407f2fb028de","weight":4},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":2},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7}]},{"guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","title":"Probleme mit E-Voting","subtitle":"Ein Überblick über die vielseitigen Probleme von elektronischen Wahlen.","slug":"pw17-167-probleme_mit_e-voting","link":"https://c3voc.de","description":"Elektronische Wahlen können doch so bequem sein - sind sie aber nicht, wenn man Wert auf sein Wahlrecht legt. Ein Überblick über die vielseitigen Probleme von elektronischen Wahlen.","original_language":"deu","persons":["Barbara Ondrisek"],"tags":["pw17","167","Privacy By Design"],"view_count":326,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-03-23T16:45:07.925+01:00","length":2440,"duration":2440,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/167-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/167-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/1ac43fa1-ecbf-449e-a5d0-310b74309a35-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/1ac43fa1-ecbf-449e-a5d0-310b74309a35-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-167-probleme_mit_e-voting","url":"https://api.media.ccc.de/public/events/1ac43fa1-ecbf-449e-a5d0-310b74309a35","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":918,"event_guid":"import-d64bd455642b344372","weight":3},{"event_id":1207,"event_guid":"import-dae971198d23eea37b","weight":4},{"event_id":2183,"event_guid":"yMuYr5eW4o9FpJMw-NwXrg","weight":2},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":1},{"event_id":3848,"event_guid":"e6746e7f-dca9-4265-86c7-0bef863d83a9","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":3},{"event_id":5017,"event_guid":"47b534e3-87d5-4f6b-85d5-bff2bf3d5a5d","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":2},{"event_id":5024,"event_guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","weight":2},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":1},{"event_id":5035,"event_guid":"62e8097e-faf7-45c9-9aa3-a0cf69b3aaf9","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":2},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":4},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":3},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":2},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":1}]},{"guid":"bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","title":"Stalking","subtitle":" Ein Gesellschaftphänomen mitten unter uns","slug":"pw17-178-stalking","link":"https://c3voc.de","description":"Stalking ist ein weit verbreitetes Gesellschaftsphänomen, das unsagbares Leid verursachen und ganze Existenzen vernichten kann. Besonders in Zeiten der Digitalisierung können sich Täter nun neuer Instrumente bedienen, die Ihnen mit wenigen Klicks die komplette Privatsphäre ihrer Opfer eröffnen. Unter dem Titel \"Stalking - ein Gesellschaftphänomen mitten unter uns\" würde ich daher gern auf die Psychologie des Stalkings (nur so kann man es verstehen), die Vorgehensweisen der Täter (mit besonderem Bezug zur Technik), Beispielfälle und die Dimension des Stalking im Business eingehen. Am Ende stehen natürlich die Kriterien, an denen Sie Stalking frühzeitig erkennen können und Strategien zur Lösung des Problems. \n\nDiese Infos kann ich Ihnen als Vortrag, aber auch als Work Shop gestalten, ganz wie Sie mögen.","original_language":"deu","persons":["Sandra Cegla"],"tags":["pw17","178"],"view_count":168,"promoted":false,"date":"2017-10-26T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-09T02:00:03.437+02:00","length":2854,"duration":2854,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/178-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/178-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-178-stalking","url":"https://api.media.ccc.de/public/events/bb1d811a-6bd9-4c88-b373-6f61a1ea7ee8","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":2},{"event_id":4974,"event_guid":"25c6204e-15af-4bfb-83bc-b655268ff2db","weight":1},{"event_id":4980,"event_guid":"37ca8131-2da3-412d-bae4-6cbc56753b90","weight":1},{"event_id":5016,"event_guid":"b22bb12f-7bf1-4e5f-b3d5-7baf9bb3d18c","weight":1},{"event_id":5020,"event_guid":"deb684b5-bb22-4b83-8d6f-3d70f0037e2f","weight":5},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":3},{"event_id":5034,"event_guid":"3cd44a5c-ab9d-455d-81cb-550605bb88e8","weight":2},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":1},{"event_id":5048,"event_guid":"2b1c43f0-a0b6-4a65-b249-dad071ee0c5e","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":2},{"event_id":5055,"event_guid":"e13e2d2d-7277-454c-8b3e-95f2a33f0821","weight":1},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":3},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1},{"event_id":5064,"event_guid":"762f9a23-ca2c-4391-a725-8651eb5a0609","weight":2},{"event_id":6393,"event_guid":"4db8970f-bbfe-4541-90a8-31a05d599ffb","weight":2}]}]}