{"acronym":"pw18","aspect_ratio":"16:9","updated_at":"2026-04-08T17:00:06.524+02:00","title":"PrivacyWeek 2018","schedule_url":"","slug":"conferences/privacyweek/2018","event_last_released_at":"2020-01-04T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"conferences/privacyweek/2018","logo_url":"https://static.media.ccc.de/media/events/privacyweek/2018/logo.png","images_url":"https://static.media.ccc.de/media/events/privacyweek/2018","recordings_url":"https://cdn.media.ccc.de/events/privacyweek/2018","url":"https://api.media.ccc.de/public/conferences/pw18","events":[{"guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","title":"AI für Laien oder Werden uns Computer beherrschen und wenn ja warum nicht?","subtitle":null,"slug":"pw18-44-ai-fr-laien-oder-werden-uns-computer-beherrschen-und-wenn-ja-warum-nicht-","link":"https://cfp.privacyweek.at/pw18/talk/ZUTFPY","description":"Ich möchte den Komplex AI und was damit möglich und was nicht möglich ist, für Laien einfach \u0026 verständnisvoll darstellen. Daraus resultiert, dass wir einerseits – so wie es jetzt aussieht – in absehbarer Zeit nicht von Maschinen beherrscht werden. Auf der anderen Seite macht moderne Technologie schon heute totalitäre Systeme möglich (Beispiel: Xinjang in China), die alles übertreffen, was 1984 als Dystopie prophezeite. Deshalb ist es wichtig, diese Thematik auch für Technik-Laien verständlich zu machen, weil das Thema politisch uns alle angeht.\n\nFür Nerds ist es selbstverständlich, für den Laien ist es ein Buch mit sieben Siegeln: Künstliche Intelligenz, gemein AI genannt. Für Nerds ist es klar, dass hinter AI in der derzeitigen Form keine kognitive Intelligenz steht, sondern nur eine Summe von Algorithmen. Und auch, dass moderne Rechenleistungen diese Algorithmen in ungeahnten neuen Anwendungsbereichen möglich machen. Zum Beispiel Überwachung. Automatische Nummertafelerkennung via CCTV-Kameras? Jede dritte Polizei in den USA hat so etwas schon heute, so gut wie alle anderen planen eine zeitnahe Einführung. Ähnliches gilt für Bodycams, komplett mit Bluetooth und WiFi. In China gibt es Bodycams in einer Brille, die dem Polizisten die Ergebnisse von Gesichtserkennung in Realtime anzeigen. Alte Stasi-Offiziere kriegen da feuchte Hosen von.\nIn der breiten Öffentlichkeit ist da noch wenig Bewusstsein über die Thematik vorhanden. Sollte es aber, denn wenn dem Leberkäs-Herbert aka unserem Innenminister fad wird, führt er das morgen auch bei uns ein, und auf Dauer wird uns auch die fröhliche Inkompetenz unserer Mächtigen nicht vor höchst unliebsamen Resultaten schützen.\nUm politisch eine Diskussion darüber möglich zu machen, und dadurch hoffentlich Schlimmerem vorzubeugen, muss aber ein breites Verständnis in der Mehrheit der Nicht-Nerds da draussen vorhanden sein. Ist es nicht, wie wir wissen, also muss man es schaffen. In Talks wie diesem.\n\n•\tWie funktioniert ein Computer? Fünf Minuten für eine sehr dumme Maschine, die mit \n        Lichtgeschwindigkeit addiert.\n•\tWas ist ein Algorithmus und wieso ist das auch für einen Laien wichtig?\n•\tWas ist Intelligenz? Was heißt „kognitive Intelligenz“? Und wieso reicht da ein Algorithmus nicht \n        aus?\n•\tWas bedeutet AI in der Realität? Was ist heute technisch möglich, was ist schon Realität?\n•\tVor einer Herrschaft der Maschinen müssen wir uns nicht fürchten. Vor einer Herrschaft der \n        Algorithmen aber schon, vor allem wenn sie in die falschen Hände geraten. Was bedeutet das für jeden Einzelnen von uns?\n•\tQ\u0026A, Diskussion","original_language":"deu","persons":["André Igler"],"tags":["pw18","44"],"view_count":200,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-19T15:45:06.243+02:00","length":1868,"duration":1868,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/44-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/44-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/44-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/44-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-44-ai-fr-laien-oder-werden-uns-computer-beherrschen-und-wenn-ja-warum-nicht-","url":"https://api.media.ccc.de/public/events/c3983e72-6fe1-5f5f-b22a-47c6562caeb8","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2587,"event_guid":"89b01590-66cd-4804-9235-f63f073da68d","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":5},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1},{"event_id":6560,"event_guid":"7956605c-adae-5563-ab8c-c97b6781fefa","weight":1},{"event_id":6577,"event_guid":"49fe1044-4038-4cec-8e80-71621c9e7d6e","weight":1},{"event_id":6585,"event_guid":"2ef1d870-f2b1-583b-98c6-09574123a90f","weight":1},{"event_id":6599,"event_guid":"faa0618b-14fe-5542-b160-d6591468a897","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":3},{"event_id":6689,"event_guid":"7e315c21-fe30-527b-a7cc-6b1c58dec4dc","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":7},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":5},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":5},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":3},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":5},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":4},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":12},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":7},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":5},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1}]},{"guid":"d59adecb-8cd1-515c-b1dd-909303240438","title":"Die Digitale Endlagerung der Generationen und das Ende der Erziehung.","subtitle":null,"slug":"pw18-77-die-digitale-endlagerung-der-generationen-und-das-ende-der-erziehung-","link":"https://cfp.privacyweek.at/pw18/talk/DKKAX8","description":"\"Generation\" ist eine symbolisches Muster, mit dem wir uns selbst verstehen. Mit \"Generation\" ist eine  Vorstellung der Zukunft verbunden, die vom Aussterben bedroht ist. Was wird, ist Jetzt.\n\nMannheims unterstellt mit seinem Begriff der Generationenlagerung eine zeitliche Struktur von Vergangenheit und Zukunft, die nur in Buchkulturen Sinn macht - nicht aber in digitalen Kulturen, in denen Zukunft und Vergangenheit eine andere kulturelle Bedeutung haben: Während mit Büchern Wissen über Generationen hinweg überliefert werden kann, ist das mit Computertechnologie nicht der Fall. Es gibt weder eine Erinnerung an die Vergangenheit vorheriger Generationen noch die Möglichkeit, mit zukünftigen Generationen zu kommunizieren. Das betrifft PädagogInnen massiv, weil die immer glauben, für eine Zukunft zu erziehen. Das  ist in der Pädagogik allerdings bekannt...","original_language":"deu","persons":["Christian Swertz"],"tags":["pw18","77"],"view_count":111,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-05-25T01:30:04.082+02:00","length":2280,"duration":2280,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/77-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/77-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/77-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/77-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-77-die-digitale-endlagerung-der-generationen-und-das-ende-der-erziehung-","url":"https://api.media.ccc.de/public/events/d59adecb-8cd1-515c-b1dd-909303240438","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":3},{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":1},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":4},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":4},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":3},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":4},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":4}]},{"guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","title":"Free Your Android - Kontrolle über die eigenen Daten","subtitle":null,"slug":"pw18-30-free-your-android-kontrolle-ber-die-eigenen-daten","link":"https://cfp.privacyweek.at/pw18/talk/FASQC7","description":"Unsere mobilen Geräte beinhalten mehr persönliche Informationen als jedes andere System.\nWelche Möglichkeiten und Probleme gibt es, diesen Geräten zu vertrauen?\n\nViele Mobiltelefone sind von Haus aus nicht darauf ausgelegt, die Privatsphäre ihrer Eigentümer zu Garantieren. Dinge wie eine enge Integration in Public Cloud Infrastruktur, vom Hersteller vorinstallierte Software mit unerwünschten Features bis hin zu fehlende Sicherheitsupdates machen viele Geräte Problematisch.\nDer Vortrag soll eine Einführung darin bieten, wie man sich mithilfe von Freier Software schützen kann.","original_language":"deu","persons":["Albert Dengg"],"tags":["pw18","30"],"view_count":718,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-08-13T12:45:03.720+02:00","length":1782,"duration":1782,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/30-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/30-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/30-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/30-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-30-free-your-android-kontrolle-ber-die-eigenen-daten","url":"https://api.media.ccc.de/public/events/89e5bbf5-ed9a-58dc-962b-91ebfba80da3","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":8},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":10},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":4},{"event_id":6503,"event_guid":"d0d6d058-f117-4ccb-ba6a-c41d9290a287","weight":5},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":11},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":13},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":10},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":9},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":9},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":39},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":12},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":9},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":10},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":37},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":14},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":11},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":23},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":12},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":16},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":7},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":7},{"event_id":6756,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb897","weight":5}]},{"guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","title":"Selfhosting als Alternative zu Public Cloud Diensten","subtitle":null,"slug":"pw18-41-selfhosting-als-alternative-zu-public-cloud-diensten","link":"https://cfp.privacyweek.at/pw18/talk/HGTTQ7","description":"Nicht alle Public Cloud Dienste respektieren den Datenschutz so wie wir es uns wünschen würden.\nGezeigt werden soll welche Möglichkeiten es gibt einfach Dienste wie Datei-/Termin- und Kontakt-Synchronisation zu lösen und welche Fallstricke man beachten sollte um nicht mehr Probleme zu schaffen als man löst\n\nNicht alle Public Cloud Dienste respektieren den Datenschutz so wie wir es uns wünschen würden.\nGezeigt werden soll welche Möglichkeiten es gibt einfach Dienste wie Datei-/Termin- und Kontakt-Synchronisation zu lösen und welche Fallstricke man beachten sollte um nicht mehr Probleme zu schaffen als man löst","original_language":"eng","persons":["Albert Dengg"],"tags":["pw18","41"],"view_count":471,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-04-07T12:30:08.445+02:00","length":2961,"duration":2961,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/41-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/41-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/41-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/41-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-41-selfhosting-als-alternative-zu-public-cloud-diensten","url":"https://api.media.ccc.de/public/events/e4b9eb41-0ffd-546a-b56e-4c06eb676334","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":4},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":4},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":12},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":5},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":6},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":4},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":10},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":39},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":23},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":17},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":13},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":21},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":4},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":14},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":8},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":10},{"event_id":6932,"event_guid":"3ac46290-51e0-5ee2-93a0-8fb4b99cf67c","weight":5},{"event_id":6935,"event_guid":"8d3ca632-2245-5110-a092-a8109c388c9d","weight":6}]},{"guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","title":"Lesung aus Smart Lies, alles smart?","subtitle":null,"slug":"pw18-26-lesung-aus-smart-lies-alles-smart-","link":"https://cfp.privacyweek.at/pw18/talk/S9EQWU","description":"Stellt euch vor, ihr fährt nach Kroatien auf Urlaub und das smarte Schloss eurer gemieteten Ferienwohnung streikt. Oder ihr arbeitet in einem Hochhaus, und der Lift braucht gerade, als ihr ins 30. Stockwerk fahren wollt, ein Update. In der neuen, smarten Welt kann vieles passieren, woran zuerst einmal keiner denkt - außer Schriftstellern mit ihrer unendlichen Vorstellungskraft. Die besten Ausschnitte aus \"Smart Lies - alles smart?\" in einer Lesung.\n\nBeim „Internet der Dinge“ liegen Wirklichkeit und Utopie nah beieinander: Die ersten vernetzte Kühlschränke, die Spam-Mails verschickt haben, gab es bereits im Jahr 2014. Vernetzte Autos, deren Bremsen am selben System hingen wie der Autoradio, wurden 2015 geknackt und aus der Ferne manipuliert. 2016 folgten Smart-TVs. Diese Geschichten hätten auch Science-Fiction-Autoren nicht besser hingekriegt! Oft sind es aber auch weniger spektakuläre Dinge, wie IP-Überwachungskameras, Thermostate, Feuermelder, Netzwerkdrucker oder WLAN-Router, die das “Internet der Dinge” zu einer wahren Gefahr für das gesamte Internet machen.\n\nDie Anthologie \"Smart Lies - Alles smart!\", die Barbara Wimmer zusammen mit Günther Friesinger von monochrom veröffentlicht hat, beschäftigt sich daher mit dem Thema „Alles smart, oder?“ – Smarte Geräte sind oft gar nicht so intelligent wie sie auf den ersten Blick scheinen. Oft sind es auch einfach kleine Spionagegeräte und wir geben damit zudem immer häufiger die Herrschaft über unsere eigenen Entscheidungen ab. Eine App hier, die uns die Wassertemperatur verrät, einen App da, die unsere Heizung aufdreht. Doch was passiert eigentlich, wenn wir uns auf die Aussage der digitalen Assistentin Alexa verlassen, die sagt, dass es draußen schneit, statt einfach selbst aus dem Fenster zu sehen und und dabei die Sonne scheint?\n\nMehrere Autorinnen und Autoren lesen aus ihren Geschichten für die Anthologie vor.","original_language":"deu","persons":["Nina Dreist","Josef Wukovits","Roman Markus","Günther Friesinger","Regine Zawodsky","Klaudia Zotzmann-Koch"],"tags":["pw18","26"],"view_count":68,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-11-08T08:45:03.122+01:00","length":3303,"duration":3303,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/26-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/26-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/26-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/26-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-26-lesung-aus-smart-lies-alles-smart-","url":"https://api.media.ccc.de/public/events/ac3a3832-a26a-598b-992a-39454e8e99d2","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":1},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6716,"event_guid":"5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":2},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":1},{"event_id":6948,"event_guid":"b3de8588-0b08-5c0b-b7eb-152aedeea572","weight":1},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":1},{"event_id":7213,"event_guid":"3ad77889-fccb-55ca-a014-82551329c013","weight":1},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":1}]},{"guid":"8f164ba4-e1e0-5ebc-92a3-74d22abb0ae1","title":"Die Roboter kommen - technische und gesellschaftliche Aspekte der autonomen Fahrzeuge","subtitle":null,"slug":"pw18-12-die-roboter-kommen-technische-und-gesellschaftliche-aspekte-der-autonomen-fahrzeuge","link":"https://cfp.privacyweek.at/pw18/talk/ZM873Z","description":"Der Vortrag behandelt die Herausforderungen die sich (vermutlich) aus der Einführung von autonomen Fahrzeugen ergeben werden.\n\nAutonome Fahrzeuge werden oft verknüpft mit einem angeblichen Siegeszug des elektrischen Antriebs, dem Übergang von Fahrzeugbesitz zu Fahrzeug-Nutzung, einer Mobilität für alle (auch Kinder und ältere Personen können endlich allein fahren) und oft behaupteten positiven Aspekten für die Umwelt und die Städte.\nWenn wir jedoch die Implikationen etwas tiefer untersuchen, so entdecken wir viele Effekte zweiter Ordnung die nicht auf den ersten Blick sichtbar sind. So wird eine Verfügbarkeit von billigeren autonomen Taxis zuallererst zu einem Rückgang des öffentlichen Personennaheverkehrs führen. \nDie riesigen finanziellen Herausforderungen z.B. für vernetzte intelligente Infrastrukturen oder elektrifizierte Autobahnen könnten zu ganz neuen Optionen für public-private-partnerships und vielleicht ganz neuen Besitzverhältnissen bei den bis jetzt noch öffentlichen Straßen führen.","original_language":"deu","persons":["Philipp Schaumann"],"tags":["pw18","12","2018"],"view_count":140,"promoted":false,"date":"2018-10-23T16:15:00.000+02:00","release_date":"2020-01-04T01:00:00.000+01:00","updated_at":"2024-03-20T15:30:04.665+01:00","length":2424,"duration":2424,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/12-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/12-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/12-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/12-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-12-die-roboter-kommen-technische-und-gesellschaftliche-aspekte-der-autonomen-fahrzeuge","url":"https://api.media.ccc.de/public/events/8f164ba4-e1e0-5ebc-92a3-74d22abb0ae1","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[]},{"guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","title":"„Generation Bindungsunfähig“ - zwischen Stealthing, Tinder, Stalking \u0026 Co.","subtitle":null,"slug":"pw18-20--generation-bindungsunfhig-zwischen-stealthing-tinder-stalking-co-","link":"https://cfp.privacyweek.at/pw18/talk/VBEJJL","description":"Was hat es auf sich mit der \"Generation Bindungsunfähig\"? Mit der Brille einer ehemaligen Kriminalkommissarin aus den Brennpunkt Berlin-Neukölln wirken manche Veränderungen der Generation der \"Digital Natives\" alles andere als banal. Ganz besonders im Zusammenhang mit Beziehungstaten, die laut Statistik den Mammutteil der Straftaten ausmachen, gibt es einige gesellschaftliche Veränderungen, die es zu beobachten gilt.\n\nGrundlage und der Sinn des menschlichen Lebens sind Beziehungen. Sie haben uns in Urzeiten das Überleben gesichert und spielen auch in der modernen Zeit eine der wichtigsten Rollen in unserm Leben.\n\nIn Anbetracht einiger Phänomene der Neuzeit wie Stealthing, Ghosting, Stalking \u0026 Co. müssen wir uns fragen: Was hat sich zwischen den Generationen verändert? Welchen Einfluss haben dabei die digitalen Möglichkeiten? Welche neuen Umgangsformen gibt es, welche Risiken bergen sie? Was sagen die Kriminalstatistiken dazu?\n\nEine Reise durch die Un- und Abarten im Tinder-Zeitalter für einen bewussten und erfüllenden Umgang mit unseren Beziehungen.","original_language":"deu","persons":["Sandra Cegla"],"tags":["pw18","20"],"view_count":143,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-31T13:45:05.241+02:00","length":3031,"duration":3031,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/20-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/20-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/20-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/20-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-20--generation-bindungsunfhig-zwischen-stealthing-tinder-stalking-co-","url":"https://api.media.ccc.de/public/events/f1c3226b-03ad-5601-9fa8-2ce3865c5de0","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":1},{"event_id":3051,"event_guid":"a52b22a5-9b68-4343-a37b-84ed1b0b6bce","weight":1},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":1},{"event_id":4697,"event_guid":"d1ad1f19-57fe-4e84-966a-cf880c0118a3","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":6088,"event_guid":"2b62cf68-340d-47d3-a6e3-ac63f4c4e564","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":2},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":5},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":1},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":1},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":4},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":4},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":3},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":3},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":10},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":4},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":5}]},{"guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","title":"Keynote \"Technik vorausdenken?\"","subtitle":null,"slug":"pw18-3-keynote-technik-vorausdenken-","link":"https://cfp.privacyweek.at/pw18/talk/ZTQEM9","description":"Wieso war es früher einfacher Technik vorauszudenken, obwohl es heute viel mehr spannende Technologie-Entwicklungen gibt als noch vor 150 Jahren? Gehen uns die Technologie-Zukünfte aus oder haben wir so viele Technologie-Zukünfte, dass wir einfach den Überblick verlieren? Was braucht es eigentlich, um Technik vorauszudenken? Die Keynote gibt erste Antworten und Deutungsversuche, um den aufgeworfenen Fragen zu begegnen.","original_language":"deu","persons":["Volker Wittpahl"],"tags":["pw18","3"],"view_count":57,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-01-07T18:45:08.053+01:00","length":1532,"duration":1532,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/3-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/3-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/3-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/3-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-3-keynote-technik-vorausdenken-","url":"https://api.media.ccc.de/public/events/b737ec84-23a3-5efe-aaec-f43e0fa49221","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":1},{"event_id":6405,"event_guid":"4dcbb9c4-8f93-40ed-85c0-90474f4ea623","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1},{"event_id":6536,"event_guid":"0a4a43e0-2b8d-424c-aaa3-101c843de75c","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":2},{"event_id":6684,"event_guid":"84a71aa2-6b94-5061-bbd0-26756287fa42","weight":1},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":2},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":4},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":1},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":3},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6763,"event_guid":"c7788f24-1c2c-46b6-8e7b-dbd53dc47979","weight":1},{"event_id":6774,"event_guid":"d9d8ab96-d460-49bc-bfe5-f29a4c8998fe","weight":1}]},{"guid":"7e4830cc-7390-5718-aba6-31e34e357ad4","title":"2018: A GDPR Enforcement Odyssey","subtitle":null,"slug":"pw18-90-2018-a-gdpr-enforcement-odyssey","link":"https://cfp.privacyweek.at/pw18/talk/PZKLGL","description":"This talk will discuss noyb's first complaints on \"forced consent\" and the GDPR cross-border cooperation and consistency mechanism.\n\nOn the first day of the GDPR, noyb (the European Center for Digital Rights) filed four complaints on behalf of different data subjects across the EU before the data protection authorities in Austria, Germany, Belgium and France. The complaints, targeted against Facebook, Google, Instagram and WhatsApp, focused on the issue of “forced consent”, namely the invalidity of consent that users of these services were forced to give in order to continue using the service. Besides their substantive law implications, the complaints were also among the first ones to initiate the GDPR cross-border cooperation mechanism.\n\nDrawing on this experience, the speakers (Data Protection Lawyers at noyb) will present an overview of the strategy followed in the forced consent case and share some preliminary findings from the first GDPR cross-border complaint process. Finally, the speakers will critically discuss the GDPR dispute resolution mechanism, wondering whether it could eventually be even better than expected.","original_language":"eng","persons":["Gaëtan Goldberg","Ioannis Kouvakas"],"tags":["pw18","90","2018"],"view_count":78,"promoted":false,"date":"2018-10-23T13:45:00.000+02:00","release_date":"2020-01-04T01:00:00.000+01:00","updated_at":"2025-09-10T12:15:12.497+02:00","length":1752,"duration":1752,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/90-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/90-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/90-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/90-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-90-2018-a-gdpr-enforcement-odyssey","url":"https://api.media.ccc.de/public/events/7e4830cc-7390-5718-aba6-31e34e357ad4","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[]},{"guid":"82aff162-f521-513d-aba9-47b5aae1935a","title":"Mehr Überwachung, weniger Datenschutz: Privatsphäre unter Schwarz-Blau","subtitle":null,"slug":"pw18-27-mehr-berwachung-weniger-datenschutz-privatsphre-unter-schwarz-blau","link":"https://cfp.privacyweek.at/pw18/talk/7B7KTJ","description":"Schon in den ersten Monaten weitet die neue Regierung Überwachung aus und schränkt den Datenschutz ein. Wir geben einen Überblick über diese politischen Entwicklungen, was man dagegen unternehmen kann und was noch alles auf uns zukommen könnte.\n\nEine der ersten Maßnahmen der neuen Regierung war eine vollkommen überzogene Verschärfung von Überwachungsbefugnissen. Mit der SPÖ musste die ÖVP noch heftig über das Überwachungspaket streiten. Es war schließlich in einer rot-schwarzen Koalition nicht mehrheitsfähig. Die FPÖ hingegen half als Regierungspartner eifrig bei der Umsetzung. Bundestrojaner, Vorratsdatenspeicherung durch die Hintertür, verstärkte Videoüberwachung, Straßenüberwachung. Registrierungspflicht für SIM-Karten, mehr Anwendungsfälle für IMSI-Catcher, und die Einschränkung des Briefgeheimnisses – alles das soll angeblich notwendig sein, um Verbrechen wirksam zu bekämpfen. Dabei sinkt die Kriminalitätsrate während die Aufklärungsquote steigt. \n\nViele der Maßnahmen treffen alle Menschen in diesem Land und nicht nur Kriminelle. Schutzsuchenden werden die Menschenrechte überhaupt aberkannt. Künftig sollen sie im Asylverfahren ihre Mobiltelefone zur Beweissicherung aushändigen müssen. Diese können dann komplett ausgelesen werden, es kommt zu einer digitalen Hausdurchsuchung. Damit wird stärker in die Rechte von Asylwerbern und Asylwerberinnen eingegriffen, als in die von Menschen, die einer schweren Straftat verdächtigt werden.\n\nAuf europäischer Ebene ist mit der Datenschutzgrundverordnung (DSGVO), die seit 25. Mai anzuwenden ist, ein Durchbruch in Sachen Datenschutz gelungen. Knapp davor versuchte die Regierung, diesen Schutz der Privatsphäre an allen Ecken und Enden aufzuweichen: Betroffenenrechte wurden ausgeschlossen, weite Ausnahmen geschaffen und Strafen sollen am besten gleich gar nicht angewendet werden. Heikle personenbezogene Daten aus öffentlichen Datenbanken sollen zu allen wissenschaftlichen Zwecken – auch kommerziellen –  zur Verfügung stehen. Im Fall von Daten der Elektronischen Gesundheitsakte (ELGA) sorgte dies für heftige Diskussionen. \n\nIn unserem Vortrag versuchen wir, einen Überblick darüber zu geben, was sich in den letzten Monaten im Bereich Überwachung und Datenschutz in Österreich politisch getan hat, was man dagegen unternehmen kann und was noch alles auf uns zukommen könnte.","original_language":"deu","persons":["Angelika Adensamer","Werner Reiter"],"tags":["pw18","27"],"view_count":93,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-30T10:45:08.612+01:00","length":1927,"duration":1927,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/27-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/27-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/27-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/27-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-27-mehr-berwachung-weniger-datenschutz-privatsphre-unter-schwarz-blau","url":"https://api.media.ccc.de/public/events/82aff162-f521-513d-aba9-47b5aae1935a","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5025,"event_guid":"712cf77b-e7d5-4619-be29-4fbbffd5d7fd","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":3},{"event_id":6009,"event_guid":"a8945808-334b-4383-809a-d80d9be6e07f","weight":2},{"event_id":6407,"event_guid":"eff16504-08ce-4de0-bf44-d877d286aac9","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6466,"event_guid":"2d71612c-7f40-484b-a939-10b809aedd80","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":3},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":3},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":3},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":2},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":2},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":6},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":2},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":4},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":3},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":1},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":3},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":3},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":2}]},{"guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","title":"Security Safari in b0rkenLand","subtitle":null,"slug":"pw18-35-security-safari-in-b0rkenland","link":"https://cfp.privacyweek.at/pw18/talk/UVZTCG","description":"2018 hat Ja gut angefangen für die Internet bzw. Computersecurity Gemeinde. Dann sorgen wir auch mal dafür das es auch gut endet.\n\nEine kleine Reise zwischen kaputten Metallklötzen, \"undokumentierten Benutzeraccounts\" und anderen Sicherheitslücken.\nEs werden zusammenfassend einige Sicherheitsprobleme präsentiert von bekannten als auch weniger bekannten Produkten.\n\nIT bzw. Computersicherheit ist ein spannendes Gebiet. Nicht nur für Kriminelle sondern auch für Wissenschaftler, Programmierer und Benutzer. Wir alle sollten wissen das keine 100% Sicherheit existiert. Deswegen möchte ich dies auch anhand von diesem Vortrag untermauern.\n\nIm Vortrag werde ich eine Auswahl von Sicherheitslücken/Probleme präsentieren die sich so im Laufe des Jahres 2018 angesammelt haben und dadurch einen Einblick in einen Teil der alltägliche Welt der IT Sicherheit bieten.\n\nDu wirst wahrscheinlich nach diesem Vortrag deine Software und Hardware mit anderen Augen betrachten.","original_language":"deu","persons":["Hetti"],"tags":["pw18","35"],"view_count":81,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-07-27T21:30:01.691+02:00","length":2850,"duration":2850,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/35-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/35-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/35-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/35-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-35-security-safari-in-b0rkenland","url":"https://api.media.ccc.de/public/events/1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":3},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":4},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":3},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":2},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":3},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":2},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":2},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":3}]},{"guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","title":"What the Keks?!","subtitle":null,"slug":"pw18-69-what-the-keks-","link":"https://cfp.privacyweek.at/pw18/talk/XR3DTQ","description":"Der Datenschutz, Geoblocking und die Kekse. Zwischen Zweiklassengesellschaft im Internet und positiven Auswirkungen der DSGVO.\n\nKnurps","original_language":"deu","persons":["Adrian Dabrowski"],"tags":["pw18","69"],"view_count":148,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-12-18T19:30:04.961+01:00","length":1980,"duration":1980,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/69-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/69-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/69-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/69-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-69-what-the-keks-","url":"https://api.media.ccc.de/public/events/0eca76b7-9294-50c1-9dfa-df5936080e62","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":11},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":10},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":10},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":10},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":4},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":6},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":10},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":2},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":5},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":3}]},{"guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","title":"Internet of Dildos - a long way to a vibrant future","subtitle":null,"slug":"pw18-2-internet-of-dildos-a-long-way-to-a-vibrant-future","link":"https://cfp.privacyweek.at/pw18/talk/3FAW7G","description":"Mit großer Befriedigung kommt große Verantwortung. Eine Verantwortung, die von den Herstellern intelligenter Sexspielzeuge nicht ausreichend berücksichtigt wird, während sie mit extrem sensiblen Daten umgehen. Unter den meisten Herstellern herrscht der Konsens: „Solange es keine ernsthaften Schwachstellen, oder Leaks gibt, gibt es auch kein Problem“. Diese Gedanken waren die Ausgangsbasis für das Forschungsprojekt (Masterarbeit) „Internet of Dildos“ – a long way to a vibrant future. Das Forschungsprojekt befasst sich mit der Identifikation und Analyse von Schwachstellen in smarten Sex Spielzeug. Inklusive dazugehöriger Software, Hardware und Firmware. \nNach einer initialen Analyse einer kleinen Auswahl an Produkten wurde eine erschreckende Anzahl an kritischen Schwachstellen identifiziert. Dabei wurden sowohl technische, als auch Datenschutzrechtlich hoch bedenkliche Schwachstellen gefunden.\n\nIn recent years the internet of things has slowly creeped into our daily life and is now an essential part of it, whether you want it or not. A long-existing sub category of the internet of things is a mysterious area called teledildonics. This term got invented about 40 years ago and described (at this time fictional) devices, allowing their users to pleasure themselves, while being interconnected to a global network of plastic dongs. In the 21st century, teledildonics actually exist. Multiple devices are on the (multi-million dollar) market, offering the ability to pleasure an individual, while being connected to the internet. Those devices offer functionalities, like remote pleasuring over local links as well as over the internet. They implement social media-like functionalities such as friends lists, instant messaging, movie chats and explicit-image sharing. \nWith great pleasure comes great responsibility. A responsibility, which is not taken enough into consideration by the smart sex toy manufacturers as they should, while handling extremely sensitive data. As long as there is no serious breach, there is no problem, right?\nThis was the basis for a research project called “Internet of Dildos, a long way to a vibrant future”, dealing with the assessment of smart sex toys and identification of vulnerabilities in those products, including mobile apps, backends and the actual hardware. \nAfter the assessment of a selection of multiple smart sex toys an abyss of vulnerabilities was revealed. The identified vulnerabilities range from technically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways. It was possible to gain access to thousands of users’ data records, including cleartext passwords, explicit images, real-world names, real-world addresses, and many more specific facts. Furthermore, we were able to remotely pleasure individuals without their consent over the internet, or over a local link.\n\nPresentation Outline\n1.\tWhy?\nExplanation as to why it is necessary to conduct penetration tests in the area of teledildonics and why the topic was chosen for further research. \n\n2.\tQuick introduction into basics like\nInternet of Things (IoT)\nSextech\nTeledildonics (History of Smart Sex Toys)\nInternet of Dongs (IoD)\n\n3.\tThe “Test Devices”\nA quick introduction of the test devices examined during this project.\nExplanation of their feature set including areas of application and use-cases.\n\n4.\tLet’s get dirty – An overview of the identified vulnerabilities\nDS_STORE File Information Disclosure\nCustomer Database Credential Disclosure\nUnrestricted Access to administrative interfaces\nWeird authentication implementation\nUnauthenticated Bluetooth LE Connections\nMissing Authentication in Remote Control\nAnd many more…\n\n5.\tBluetooth LE Protocol exploitation\nBrief overview over Bluetooth LE security features\nBrief overview over Bluetooth LE authentication/pairing methods\nBrief overview over Bluetooth LE exploitation Hardware\nBrief overview over Bluetooth LE exploitation Software\nHands-on example\n\n6.\tThe “Swinger Club Problem”\nHow the manufacturers tried to downplay the vulnerabilities.\n\n7.\tLegal Issues – Rape over the wire?\nHow are current laws dealing with sexual pleasure without consent over the internet?\n\n8.\tResponsible Disclosure Process\nCoordinated vulnerability remediation with the German CERT-Bund\n\n9.\tOngoing/Similar Research\n\nTakeaways\nAttendees are made aware that not a single category of devices in the internet of things is secure, no matter how obscure and outlandish the device might be. This should also raise attention and motivation to test all those devices that are already out there and handle the Internet of Things more cautiously.\nAnother important takeaway is to raise attention to how poorly programmed many IoT devices are and how it is still possible to discover vulnerability cases, which should be resolved and extinct. \nLast but not least, we want to take the opportunity to discuss and raise attention to the hot topic of “remote rape” or how our current legislature deals with remote pleasuring without consent.\n\nWhy this talk?\nFirst and foremost, this talk will be a lot of fun while teaching the audience how to assess smart sex toys and penetrate their backends (pun intended). The audience will learn what an attacker is capable of when attacking smart sex toys, nowadays. Furthermore, the audience will get deep insights into Bluetooth LE penetration testing including a hands-on example on a selected smart sex toy.\nMost of the identified vulnerabilities [1, 2, 3, 4] identified to this day include minor backend issues and or the good old exploitation of the Bluetooth LE protocol. The major difference compared to this research is, that the SEC Consult Vulnerability Lab identified a potential massive breach of data, including explicit images, clear text passwords, etc) via the “publicly” accessible database, as well as the issue with the remote pleasuring without consent, which is a so called “Feature”.\n\n[1] https://arstechnica.com/information-technology/2017/10/screwdriving-many-bluetooth-sex-toys-leave-users-vulnerable/\n[2] https://internetofdon.gs/reports/\n[3] https://www.pentestpartners.com/security-blog/screwdriving-locating-and-exploiting-smart-adult-toys/\n[4] https://scubarda.wordpress.com/2017/10/17/hacking-a-bt-low-energy-ble-butt-plug/","original_language":"deu","persons":["Werner Schober"],"tags":["pw18","2"],"view_count":559,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-10T21:15:07.556+01:00","length":2490,"duration":2490,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/2-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/2-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/2-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/2-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-2-internet-of-dildos-a-long-way-to-a-vibrant-future","url":"https://api.media.ccc.de/public/events/d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":4},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":6},{"event_id":6551,"event_guid":"3a571c21-31ed-453b-886d-7dea7b5751cd","weight":14},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":4},{"event_id":6693,"event_guid":"68eef21a-279b-5ac7-9a22-0d6e43c1d97f","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":5},{"event_id":6706,"event_guid":"37ce5c4e-4364-53fc-8a13-9a201fdb7b11","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":4},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":2},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":5},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":12},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":7},{"event_id":6730,"event_guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":4},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":4},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":5}]},{"guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","title":"Technik vorausdenken - Autor*innen und die Gesellschaft von morgen","subtitle":null,"slug":"pw18-38-technik-vorausdenken-autor-innen-und-die-gesellschaft-von-morgen","link":"https://cfp.privacyweek.at/pw18/talk/KDX37B","description":"Wo bleiben die Autor*innen, die mutig den Schritt in die kommenden Jahrzehnte der Menschheit wagen?","original_language":"deu","persons":["Klaudia Zotzmann-Koch","Volker Wittpahl","Eva Rossmann","René 'Lynx' Pfeiffer"],"tags":["pw18","38"],"view_count":44,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-07-29T18:15:06.461+02:00","length":3321,"duration":3321,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/38-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/38-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/38-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/38-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-38-technik-vorausdenken-autor-innen-und-die-gesellschaft-von-morgen","url":"https://api.media.ccc.de/public/events/7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6689,"event_guid":"7e315c21-fe30-527b-a7cc-6b1c58dec4dc","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":2},{"event_id":6716,"event_guid":"5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","weight":2},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":2},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":4},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":3},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":2},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":2}]},{"guid":"ee7389df-5ede-58e2-adad-d9f293435e14","title":"Netzpolitik in der Ära Cyber 4.0","subtitle":null,"slug":"pw18-96-netzpolitik-in-der-ra-cyber-4-0","link":"https://cfp.privacyweek.at/pw18/talk/DFRPLG","description":"Stell dir vor es ist Krieg, aber niemand stirbt. Obwohl der Angriff seine Ziele schwer getroffen hat, sind die materiellen Schäden nach 12 Stunden bereits behoben. Mehr braucht es nicht, zu wissen, dass der Begriff „Cyberwar“ Unsinn ist.\n\nStell dir vor es ist Krieg, aber niemand stirbt. Obwohl der Angriff seine Ziele schwer getroffen hat, sind die materiellen Schäden nach 12 Stunden bereits behoben. Mehr braucht es nicht, zu wissen, dass der Begriff „Cyberwar“ Unsinn ist.\nCyber ist auch keine neue militärische Waffengattung, sondern die Fortsetzung der Diplomatie mit technisch-informationellen Mitteln unterhalb der Schwelle zum tatsächlichen Krieg. Die Akteure sind zwar\nMilitärs, sie zielen aber nicht aufeinander sondern auf Zivilisten, die eskalierenden Cyberscharmützel spielen sich ja in zivilen Informationsnetzen ab. Deswegen kollidiert Cyber mit jeder Form zivilgesellschaftlicher Netzpolitik und das erst recht in seiner neuen Version 4.0.","original_language":"deu","persons":["Erich Möchel"],"tags":["pw18","96"],"view_count":46,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-12-25T00:15:02.503+01:00","length":2252,"duration":2252,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/96-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/96-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/96-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/96-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-96-netzpolitik-in-der-ra-cyber-4-0","url":"https://api.media.ccc.de/public/events/ee7389df-5ede-58e2-adad-d9f293435e14","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":3051,"event_guid":"a52b22a5-9b68-4343-a37b-84ed1b0b6bce","weight":1},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":2},{"event_id":4697,"event_guid":"d1ad1f19-57fe-4e84-966a-cf880c0118a3","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":6505,"event_guid":"c22707f5-d850-5827-9334-c48446f69fd2","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":2},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":2},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":3},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":2},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":2},{"event_id":6717,"event_guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":1},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":2},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":1},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":2},{"event_id":6752,"event_guid":"d4be771b-799c-4d7d-83ee-dc87e3a7ad78","weight":1},{"event_id":6754,"event_guid":"9334d62b-43ee-42da-81bc-00db2650b631","weight":1},{"event_id":6756,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb897","weight":1}]},{"guid":"e06c32e4-e7b5-5573-925c-20e1ed02c79c","title":"Google's Malicious Determinism - Implications of \"The Selfish Ledger\"","subtitle":null,"slug":"pw18-28-google-s-malicious-determinism-implications-of-the-selfish-ledger-","link":"https://cfp.privacyweek.at/pw18/talk/9BKMMS","description":"Google's \"thought experiment\" is as unsurprising as its megalomania. But it entirely ignores the dangers that would inevitably follow.\n\nGoogle's \"thought experiment\" video \"The Selfish Ledger\" was leaked in May 2018. In it, the company toys with the idea of *What if your data does not belong to you, but to everyone in your lineage, maybe even to the society. And this data, this big book about you, can be accessed anytime.* \nWe have been talking about surveillance and privacy for years now, but what Google proposes in this video is bigger than this, more nuanced. Any comparisons to *1984* are obsolete because the proposition made is that behaviour of humans can be shaped - controlled to a point where they will be enforced - to help a greater good - which would be determined by Google and a set of artificial intelligence. \nMy talk investigates the individual and societal implications that would follow such a powerful technology and describes how dangerous it would be for our future.","original_language":"eng","persons":["Theresia Reinhold"],"tags":["pw18","28"],"view_count":179,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-08-05T22:15:05.887+02:00","length":2765,"duration":2765,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/28-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/28-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/28-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/28-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-28-google-s-malicious-determinism-implications-of-the-selfish-ledger-","url":"https://api.media.ccc.de/public/events/e06c32e4-e7b5-5573-925c-20e1ed02c79c","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":3391,"event_guid":"7aa3a3b6-3879-4d05-8b5a-0b72ba96343c","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":1},{"event_id":4111,"event_guid":"3f6e8f7c-3ee4-510a-b7f3-680c1df30297","weight":1},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":1},{"event_id":5471,"event_guid":"1bb2c793-0c0a-51da-94d6-82ae8d11d0d9","weight":1},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":1},{"event_id":5960,"event_guid":"541dc917-721a-59c3-b4eb-371a7e8acc3e","weight":1},{"event_id":5962,"event_guid":"26141aad-592b-560b-9aea-49f432b501f0","weight":1},{"event_id":6116,"event_guid":"adf228ad-49ed-577c-b788-7acc6e78575b","weight":1},{"event_id":6117,"event_guid":"c0346b4e-e2b0-555f-bfe5-07a143c134c9","weight":1},{"event_id":6118,"event_guid":"445ecee7-fe02-5f23-85b8-3dd42c469d64","weight":1},{"event_id":6119,"event_guid":"7f55a92a-72b8-51cc-a615-b2f1ba4dcb4e","weight":1},{"event_id":6120,"event_guid":"6f3f49b6-2f08-50ff-a45c-aa728047dd5e","weight":1},{"event_id":6121,"event_guid":"4e876909-16b1-5520-82a8-07f257a20faf","weight":1},{"event_id":6137,"event_guid":"c3e12a88-f919-4f1b-84f8-20c2683c1d2a","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":2},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":1},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":1},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":1},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":2},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":1},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":1},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":2},{"event_id":6782,"event_guid":"d8b5fb56-e8e9-5ad5-91d0-c5eb8a1740fb","weight":1},{"event_id":6832,"event_guid":"1a3e4df3-5b17-51b8-a74f-287787033ce3","weight":1},{"event_id":6883,"event_guid":"99ace7c3-7db9-5411-b508-507033994f49","weight":1},{"event_id":6977,"event_guid":"a074695f-3005-5c95-81a0-cba745d8773d","weight":1},{"event_id":7013,"event_guid":"983e0e84-0f2a-5b4c-afb0-eb44fe36918c","weight":1},{"event_id":7051,"event_guid":"bdf6c301-d6d9-5dde-b159-881c217f1e66","weight":1},{"event_id":7242,"event_guid":"c156dd9a-f4f5-5374-8683-0f0a170063f8","weight":1},{"event_id":7246,"event_guid":"bd14bd0e-364d-5be2-aec8-2bc424f5f1af","weight":1},{"event_id":7248,"event_guid":"0430ce77-480e-5621-898b-e00f453fbabf","weight":1},{"event_id":7262,"event_guid":"6636c191-d2c2-4255-98e9-5ad7a656bbbe","weight":1}]},{"guid":"666a27b1-5b6b-5f18-8ede-94d995016190","title":"Bias in Algorithmen - wenn Algorithmen irren lernen","subtitle":null,"slug":"pw18-57-bias-in-algorithmen-wenn-algorithmen-irren-lernen","link":"https://cfp.privacyweek.at/pw18/talk/Z9QSD3","description":"Dieser Talk gibt einen Überblick in das Thema Bias in Algorithmen - woher kommt Bias, warum geht uns das was an, und was wird gerade dagegen gemacht?\n\nAus dem Leben gegriffene Beispiele für Bias werden genauso besprochen wie ausgewählte Ergebnisse von Forschung und Entwicklung, um Bias unter Kontrolle zu bringen. Außerdem: wo ist Bias in Datensets in Ordnung, und wo gehört etwas gemacht?","original_language":"deu","persons":["pascoda"],"tags":["pw18","57"],"view_count":229,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-04-07T00:00:05.923+02:00","length":1941,"duration":1941,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/57-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/57-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/57-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/57-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-57-bias-in-algorithmen-wenn-algorithmen-irren-lernen","url":"https://api.media.ccc.de/public/events/666a27b1-5b6b-5f18-8ede-94d995016190","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":2},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":6000,"event_guid":"db737a14-3b5c-590c-ab96-81cbe9d3a08e","weight":3},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":1},{"event_id":6571,"event_guid":"f4568030-a378-586e-b39a-4fab71027a37","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6717,"event_guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","weight":2},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":2},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":4},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":2},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":3},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":2}]},{"guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","title":"23 and Me, and You, and Everybody Else","subtitle":null,"slug":"pw18-29-23-and-me-and-you-and-everybody-else","link":"https://cfp.privacyweek.at/pw18/talk/GYT8SA","description":"Wo bleibt unsere Privatsphaere im Zeitalter von DNA Sequenzierungs- und Ahnenforschungsservices? Was machen kommerzielle Anbieter mit unseren Genomdaten?\n\nDNA Sequenzierung und DNA Marker Methoden erlauben es heutzutage immer schneller und billiger einen Fingerabdruck unseres Selbst anzufertigen. Kommerzielle Unternehmen die DNA Analysen anbieten um Ahnenforschung zu betreiben, oder um Gesundheitsrisiken aufzuzeigen, gibt es mittlerweile zuhauf. Ich werde im Rahmen dieses Vortrags eine kurze Einfuehrung in die verwendeten Technologien und biologisch/chemischen Grundlagen geben. Weiters werde ich Anbieter solcher Services darauf durchleuchten, welche Technologien sie einsetzen, welche Daten diese erzeugen, welche Analysen diese Daten ermoeglichen, und was letztendlich dann beim Kunden ankommt. Insbesondere werde ich einen kritischen Blick auf die jeweiligen Privacy Policies der involvierten Unternehmen werfen.","original_language":"deu","persons":["Ronny"],"tags":["pw18","29"],"view_count":98,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-22T03:15:04.082+02:00","length":3216,"duration":3216,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/29-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/29-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/29-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/29-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-29-23-and-me-and-you-and-everybody-else","url":"https://api.media.ccc.de/public/events/d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":6365,"event_guid":"249fbe57-2fe1-4a79-98f3-e4ff160dfb2b","weight":1},{"event_id":6434,"event_guid":"6beabddc-2dd6-43d2-9936-618d41d42cde","weight":1},{"event_id":6457,"event_guid":"74b9c748-970f-4693-ac7e-46fcc733d2b4","weight":1},{"event_id":6519,"event_guid":"5a8097ad-15c2-492e-8bc4-6b634fd8e963","weight":1},{"event_id":6530,"event_guid":"83bf042d-7382-4975-a3f8-92229944b8fc","weight":1},{"event_id":6689,"event_guid":"7e315c21-fe30-527b-a7cc-6b1c58dec4dc","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":4},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":2},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":2},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":2}]},{"guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","title":"Zukunftsvisionen","subtitle":null,"slug":"pw18-106-zukunftsvisionen","link":"https://cfp.privacyweek.at/pw18/talk/QBNV3Z","description":"Wie kommen wir - angesichts aktueller politischer und technischer Entwicklungen - zu positiven Zukunftsbildern und wie können wir sie tatsächlich umsetzen?","original_language":"deu","persons":["Volker Wittpahl","Herbert Waloschek","Herbert Gnauer","Klaudia Zotzmann-Koch"],"tags":["pw18","106"],"view_count":138,"promoted":false,"date":"2018-10-28T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-26T09:30:05.135+01:00","length":4019,"duration":4019,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/106-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/106-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/106-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/106-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-106-zukunftsvisionen","url":"https://api.media.ccc.de/public/events/fc7dd329-c9be-55c3-aa8e-5ee099a93b56","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":3},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":5},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":2},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":2},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":4},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":4},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":7},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":5},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":5},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":6},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":8},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":5},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":5},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":10},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":9},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":4},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":9}]},{"guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","title":"Usable Security: Die unendliche Geschichte","subtitle":null,"slug":"pw18-87-usable-security-die-unendliche-geschichte","link":"https://cfp.privacyweek.at/pw18/talk/CTJ3E8","description":"Ein (etwas zynischer) Rückblick auf die Frage warum denn nicht alle Verschlüsselung (sicher) verwenden. Inklusive des Versuchs Antworten auf die Fragen zu geben ob die Anleitung lesen (RTFM!) ein sinnvoller Vorschlag ist, ob Expert_innen sich tatsächlich sicherer Verhalten als Laien, und ob Security by Default die Lösung all unserer Probleme ist.\n\nBitte ausfüllen","original_language":"deu","persons":["Matthias Fassl"],"tags":["pw18","87"],"view_count":87,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-04-08T17:00:06.522+02:00","length":2152,"duration":2152,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/87-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/87-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/87-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/87-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-87-usable-security-die-unendliche-geschichte","url":"https://api.media.ccc.de/public/events/b78e2c47-2fae-5266-a91f-06a6f2f9d19e","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":2},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1},{"event_id":6510,"event_guid":"5b7a598e-95a6-58fa-b390-96a66a1cd7b5","weight":2},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":2},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6684,"event_guid":"84a71aa2-6b94-5061-bbd0-26756287fa42","weight":1},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":2},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":2},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":4},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":2},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":3},{"event_id":6730,"event_guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","weight":2},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":3},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":2},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1}]},{"guid":"5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","title":"Meine Demenz gehört mir? – Philosophische und Literarische Blicke auf Privatheit(-sverletzungen) in Pflegesituationen.","subtitle":null,"slug":"pw18-18-meine-demenz-gehrt-mir-philosophische-und-literarische-blicke-auf-privatheit-sverletzungen-in-pflegesituationen-","link":"https://cfp.privacyweek.at/pw18/talk/83WZQZ","description":"Der Schutz von Privatheit wird spätestens seit Edward Snowden wieder vermehrt diskutiert: Beinahe überall scheint nun unsere Privatsphäre gefährdet. Nahezu außen vor bleiben die Menschen, die in ihrer konkreten Lebenssituation täglich massiven Eingriffen in ihre Privatsphäre ausgeliefert sind: Menschen mit Demenz, die auf Pflege angewiesen sind. Und dabei wird gerade dieses Thema angesichts der, uns alle betreffenden, Problematik einer alternden Gesellschaft und einem akutem, erschreckendem Pflegekräftemangel immer brisanter und zum großen politischen Problem.\n\nDer Schutz von Privatheit wird spätestens seit Edward Snowden wieder vermehrt diskutiert: Beinahe überall scheint nun unsere Privatsphäre gefährdet. Egal ob wir uns im virtuellen oder analogen Raum bewegen, immer wähnen wir uns unter dem Blick eines »Großen Bruders«. Der Fokus der Debatten um Privatheit und deren Schutz liegt dabei auf den Auswirkungen von Technologien und menschlichem Miteinander für autonome Erwachsene, oder solche, die es noch werden wollen. Nahezu außen vor bleiben die Menschen, die in ihrer konkreten Lebenssituation täglich massiven Eingriffen in ihre Privatsphäre ausgeliefert sind: Menschen mit Demenz, die auf Pflege angewiesen sind. Und dabei wird gerade dieses Thema angesichts der, uns alle betreffenden, Problematik einer alternden Gesellschaft und einem akutem, erschreckendem Pflegekräftemangel immer brisanter und zum großen politischen Problem. \n\nSowohl in der familiären oder ambulanten Pflege zuhause als auch bei der Betreuung in Pflegeeinrichtungen wird die Privatheit der Patienten enorm eingeschränkt. Zwischen Fürsorge und Kontrolle stehen Aushandlungs- und Abwägungsprozesse zwischen Sicherheit, Gesundheit, Wohlergehen auf der einen und Privatheit auf der anderen Seite. Diese Aushandlungsprozesse gehen in der Praxis zumeist zulasten der Privatheit der Patient/innen, was nicht zuletzt daran liegt, dass Pflege immer effizienter werden soll. Foucaultsche Überwachung und Kontrolle sind – besonders in institutionellen Pflegesituationen – an der Tagesordnung, und die Strukturierung des Lebens nach Prinzipien der Handhab- und Planbarkeit führen zu Regelungen des alltäglichen Lebens, in denen Privatheit kaum noch eine Rolle spielt. Sei es der Zwang zu Gruppenaktivitäten oder dem Aufenthalt in Gruppen, die notwendige Aufgabe körperlicher Integrität bei Vorgängen wie Waschen und Körperpflege, oder der immer stärker werdende Rückgriff auf sogenannte Telecare-Technologien. Demenzkranke sehen sich besonders starken Eingriffen in ihre Privatsphäre ausgesetzt.\n\nDer Workshop rückt vor diesem Hintergrund die spezifische Situation von Demenzkranken in ins Zentrum seiner Diskussionen. Wir planen dabei ein zweistufiges Modell, in dem wir ausgehend von der philosophischen Theorie Beate Rösslers zuerst gemeinsam mit allen Workshop-Teilnehmer/innen eine Definition und Merkmale von Privatheit erarbeiten. Anschließend wollen wir in einem zweiten Schritt gemeinsam auf literarische und filmische Inszenierungen von Demenz und Pflege sehen, und diese mit den erarbeiteten philosophischen Überlegungen diskutieren. Unser Blick richtet sich auf die literarische Umsetzung, Darstellung und Inszenierung des Problemkreises, um gemeinsam zu verstehen, auf welche Privatheitsverluste Literatur und Film hinweisen und wie diese Über- und Eingriffe literarisch erzählt werden. Literatur und Film haben das Potential Gegenwart in besonderer Weise wahrzunehmen, sie dürfen ihre Gegenstände überformen, unterlaufen, kritisieren, ironisieren oder verzerren. Umso genauer wollen wir im Workshop mit den Teilnehmern hinsehen: Wer spricht in den Texten eigentlich? Wessen Blick erhält der Leser? Was für Figuren und Motive werden entworfen und findet der Leser eine ein- oder mehrdeutige Darstellung?\n\nDie Theorie von Beate Rössler eignet sich in besonderer Weise zur Analyse von Texten, weil sie Privatheit in drei Bereiche unterteilt – lokale, informationelle und dezisionale Privatheit. Damit lässt sich ein Großteil unserer alltagssprachlichen Verwendungen von „privat“ einfangen. Ihre Definition von Privatheit als Kontrolle über den Zugang zu sich selbst und den eigenen Entscheidungen und Informationen, erlaubt es zudem den Kontrollverlust, der mit dem Übergang in eine Pflegesituation eintritt, besonders hervorzuheben und zu kontextualisieren.\n\nUnser Ziel ist es, mit den Workshopteilnehmer/innen ein besseres Verständnis für das Konzept der Privatheit zu entwickeln und den eigenen Blick für Übertretungen dieser zu schärfen. Vor allem wollen wir ein Bewusstsein dafür schaffen, dass Privatheit nicht nur in medialen Kontexten im Sinne von Datensätzen, sondern auch in alltäglich gelebten Situationen von enormer Bedeutung ist und es Menschen gibt, die qua ihrer Zugehörigkeit zu einer marginalisierten Gruppe, eines besonderen Schutzes bedürfen. Viele von uns werden irgendwann im Alter Pflege benötigen – ob Demenz oder nicht – und wir sind aufgerufen, diese Pflegesituationen mitzugestalten.","original_language":"deu","persons":["Sabrina Huber","Laura Wackers"],"tags":["pw18","18"],"view_count":31,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-03-10T18:30:07.148+01:00","length":6398,"duration":6398,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/18-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/18-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/18-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/18-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-18-meine-demenz-gehrt-mir-philosophische-und-literarische-blicke-auf-privatheit-sverletzungen-in-pflegesituationen-","url":"https://api.media.ccc.de/public/events/5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":1},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":1},{"event_id":5767,"event_guid":"dbb0c6bc-d14f-4d9b-9c9e-f66fa0143721","weight":1},{"event_id":5914,"event_guid":"bd7d06d7-8889-51fa-854e-021d23b79183","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6443,"event_guid":"14281f92-873c-478c-a962-f1eb8b6c15d9","weight":1},{"event_id":6465,"event_guid":"622c9585-e332-4915-a9ac-987a34da4d14","weight":1},{"event_id":6491,"event_guid":"9f8b19eb-31cb-4250-80d4-5caf4e0b33dd","weight":1},{"event_id":6590,"event_guid":"7ee42591-4f4d-481d-884b-44f5e18e1803","weight":1},{"event_id":6592,"event_guid":"b11ac9c0-8a4d-47ae-a584-f5c01fa2a01c","weight":1},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":1},{"event_id":6693,"event_guid":"68eef21a-279b-5ac7-9a22-0d6e43c1d97f","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":1},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":2},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":2},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6730,"event_guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","weight":1},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":2},{"event_id":6756,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb897","weight":1},{"event_id":6763,"event_guid":"c7788f24-1c2c-46b6-8e7b-dbd53dc47979","weight":1},{"event_id":6774,"event_guid":"d9d8ab96-d460-49bc-bfe5-f29a4c8998fe","weight":1}]},{"guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","title":"Aufmerksamkeits-Ökonomie auf Social Media","subtitle":null,"slug":"pw18-89-aufmerksamkeits-konomie-auf-social-media","link":"https://cfp.privacyweek.at/pw18/talk/8WC39M","description":"Clickbait, Urbane Legenden und Phantomdiskussionen\n\nWenn (urbane) Legenden sich in die Realität hinein entwickeln:\nDer Moment, in dem die Social Media Gesprächswertigkeit so hoch ist, so dass es niemanden  mehr interessiert,  ob sich hinter dem Thema lediglich eine Legende verbirgt.\n\nWelche Phänomene konnten wir in den letzten Jahren beobachten und wie haben sich diese bis heute entwickelt?","original_language":"deu","persons":["Andre Wolf"],"tags":["pw18","89"],"view_count":154,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-08-01T00:45:04.116+02:00","length":3083,"duration":3083,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/89-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/89-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/89-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/89-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-89-aufmerksamkeits-konomie-auf-social-media","url":"https://api.media.ccc.de/public/events/9b9be282-765c-5dad-b62a-42a2cde4bfc5","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2474,"event_guid":"ce075d1c-1a3a-4b7f-b98a-5b9b8443e1ad","weight":1},{"event_id":6393,"event_guid":"4db8970f-bbfe-4541-90a8-31a05d599ffb","weight":2},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":1},{"event_id":6540,"event_guid":"0a1a58a4-7700-502b-b8f2-405f3e42c1bc","weight":3},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":2},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":1},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":2},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":2},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":2},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":3},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":4},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":2},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":2},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":2},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":1},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":5},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":2},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":2},{"event_id":6752,"event_guid":"d4be771b-799c-4d7d-83ee-dc87e3a7ad78","weight":2}]},{"guid":"90815ac2-75f3-5c77-8782-58bf0aeda423","title":"Epistemology in the Cloud - On Fake News and Digital Sovereignty","subtitle":null,"slug":"pw18-16-epistemology-in-the-cloud-on-fake-news-and-digital-sovereignty","link":"https://cfp.privacyweek.at/pw18/talk/RDA7FG","description":"The web allows anyone to say anything and so raises the age-old question of epistemology. Starting from a recent analysis of knowledge using counterfactual logic, the author goes to show how control of the hardware on which content is located is essential to thought. But since thinking is a social activity we need to be able to co-operate to do so across nodes owned by different actors. This sets strong requirements on a feasible architecture for peer to peer cooperation. An architecture to do so is described which furthermore has space for all kinds of actors from individuals up to the largest institutions.\n\nThe current article is online here:\nhttps://co-operating.systems/2018/10/23/C3W\nThe slides are here:\nhttps://co-operating.systems/2018/10/23/","original_language":"eng","persons":["Henry Story"],"tags":["pw18","16"],"view_count":80,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-05-18T18:00:04.603+02:00","length":2710,"duration":2710,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/16-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/16-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/16-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/16-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-16-epistemology-in-the-cloud-on-fake-news-and-digital-sovereignty","url":"https://api.media.ccc.de/public/events/90815ac2-75f3-5c77-8782-58bf0aeda423","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":1},{"event_id":6434,"event_guid":"6beabddc-2dd6-43d2-9936-618d41d42cde","weight":1},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":2},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":1},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":1},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":1},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":1},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":7249,"event_guid":"515128bb-19ca-46cb-aeb3-2ba50a68d6b2","weight":1}]},{"guid":"3424364c-cbd5-58da-ad91-5bef295f6146","title":"Dem Ueberwachungsstaat von der Schippe springen","subtitle":null,"slug":"pw18-70-dem-ueberwachungsstaat-von-der-schippe-springen","link":"https://cfp.privacyweek.at/pw18/talk/AQYWKS","description":"Der Ueberwachungsstaat hat viel zu bieten. In Reisepaessen und Personalausweisen befinden sich seit laengerem Funkchips auf denen Gesichtsbilder und Fingerabdruecke gespeichert sind.\nDieser Vortrag wirft ein Auge auf staatliche Ueberwachungstechniken und beschreibt Massnahmen, sich dagegen zur Wehr zu setzen.\n\nDer Ueberwachungsstaat hat viel zu bieten. In Reisepaessen und Personalausweisen befinden sich seit laengerem Funkchips auf denen Gesichtsbilder und Fingerabdruecke gespeichert sind. Telefone koennen auf wenige Meter genau geortet, Chats und Telefonate abgehoert werden. Kameras im oeffentlichen Raum machen das Verfolgen von Personen und \"auffaelligem Verhalten\" so einfach wie nie. Und mit dem Bundestrojaner sind auch die Daten auf unseren Computern nicht mehr sicher. \nDieser Vortrag soll einen Einblick in die verwendeten Technologien geben und versuchen Wege auszuzeigen ihnen entgegenzutreten.","original_language":"deu","persons":["starbug"],"tags":["pw18","70"],"view_count":834,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-02-10T00:15:07.215+01:00","length":2452,"duration":2452,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/70-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/70-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/70-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/70-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-70-dem-ueberwachungsstaat-von-der-schippe-springen","url":"https://api.media.ccc.de/public/events/3424364c-cbd5-58da-ad91-5bef295f6146","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":18},{"event_id":6018,"event_guid":"c31fc06b-dd24-53d2-99cc-ee40a58acabf","weight":1},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":6},{"event_id":6396,"event_guid":"b34662ae-f1c6-4711-9270-b5865f6dd6c8","weight":1},{"event_id":6418,"event_guid":"dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861","weight":1},{"event_id":6422,"event_guid":"e8385c89-d33a-42d8-afb6-8ae28fe5c89d","weight":1},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":12},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":5},{"event_id":6500,"event_guid":"064a7014-a88c-462a-b06f-7d6de62d622f","weight":1},{"event_id":6517,"event_guid":"e77ef54a-5dd7-4be1-80c7-42726b273e6f","weight":1},{"event_id":6521,"event_guid":"020051ff-2594-46ce-b92a-0786743e4624","weight":1},{"event_id":6537,"event_guid":"70b257cc-d26a-4044-b95e-5d3e6d8c7597","weight":1},{"event_id":6594,"event_guid":"623e136b-1ac6-4ef3-8152-d55cfcc80268","weight":1},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":5},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":5},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":14},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":9},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":5},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":23},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":5},{"event_id":6717,"event_guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","weight":1},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":5},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":1},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":6},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":10},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":37},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":12},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":7},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":41},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":5},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":7},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":5},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":5},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":15},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":10},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":13},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":5},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":5},{"event_id":6752,"event_guid":"d4be771b-799c-4d7d-83ee-dc87e3a7ad78","weight":11}]},{"guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","title":"»Der Traum von der Digitalen Unsichtbarkeit oder Rede an den kleinen digitalen Mann« / »The Dream of Digital Invisibility or Speech to the Little Digital Man«","subtitle":null,"slug":"pw18-68--der-traum-von-der-digitalen-unsichtbarkeit-oder-rede-an-den-kleinen-digitalen-mann-the-dream-of-digital-invisibility-or-speech-to-the-little-digital-man-","link":"https://cfp.privacyweek.at/pw18/talk/L3M7E9","description":"Vorstellung des neu gegründeten Wiener Instituts für Digitale Privatsphäre (Gründer: Peter Stummer, Alexander Foggensteiner, Heinrich Mautner Markhof; Technischer Berater: Markus Sabadello).\n\n\nPresentation of the newly founded Vienna Institute for Digital Privacy (Founders: Peter Stummer, Alexander Foggensteiner, Heinrich Mautner Markhof, Technical Advisor: Markus Sabadello).\n\nDas Institut für Digitale Privatsphäre (IDP) wurde als gemeinnütziger Verein im Mai 2018 gegründet um die horrende Kluft zwischen technischen Möglichkeiten, gesetzlichen Rahmenbedingungen und kommerziellen Interessen einerseits und den grundlegenden Bedürfnissen nach Privatsphäre des Einzelnen zu überbrücken. \n\n-  IDP wird vertrauenswürdige und einfach zu bedienende digitale Datenschutz-Tools erforschen, entwickeln, zertifizieren, bündeln und vertreiben.\n\n - IDP entwickelt das Schweizermesser für die Digitale Privatsphäre. Ohne Wenn und Aber.\n\n- Die Präsentation beschreibt den Weg von der Idee zur Umsetzung.\n\n\n\nThe Institute for Digital Privacy (IDP) was established as a nonprofit association in May 2018 to bridge the horrendous gap between technical capabilities, regulatory frameworks and commercial interests on the one hand, and individuals' basic privacy needs on the other.\n\n - IDP will explore, develop, certify, bundle and distribute trusted and easy-to-use digital privacy tools.\n\n - IDP develops the Swiss knife for digital privacy. No ifs and buts.\n\nThe presentation describes the path from idea to implementation.","original_language":"deu","persons":["Peter Stummer","Markus Sabadello"],"tags":["pw18","68"],"view_count":82,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-02-01T19:30:09.248+01:00","length":1605,"duration":1605,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/68-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/68-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/68-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/68-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-68--der-traum-von-der-digitalen-unsichtbarkeit-oder-rede-an-den-kleinen-digitalen-mann-the-dream-of-digital-invisibility-or-speech-to-the-little-digital-man-","url":"https://api.media.ccc.de/public/events/2f312311-584e-5fcc-996f-6a71e3b9e641","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1778,"event_guid":"7abembel5Nwrd3h_pRjeOQ","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":3628,"event_guid":"4de841b2-0f34-494e-ba5b-0b79ba2c88cd","weight":1},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":1},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":3},{"event_id":4991,"event_guid":"3813910d-02b3-48bb-acd0-182fa9679ca5","weight":1},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":1},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":1},{"event_id":6391,"event_guid":"1601bf3b-ce4a-44c9-993f-7d28fa65168d","weight":1},{"event_id":6406,"event_guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","weight":1},{"event_id":6426,"event_guid":"1dc4f8d0-e5f6-4e49-b647-1a5e0cabbb00","weight":1},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6480,"event_guid":"513a2aeb-79b0-4222-ba5e-09d1d9057122","weight":1},{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":1},{"event_id":6524,"event_guid":"9f27a4c2-f957-4bad-81a8-988a37429d5c","weight":1},{"event_id":6529,"event_guid":"f76415ac-d07b-4c5a-bedf-460470711712","weight":1},{"event_id":6540,"event_guid":"0a1a58a4-7700-502b-b8f2-405f3e42c1bc","weight":1},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1},{"event_id":6575,"event_guid":"07f5d97a-161c-4435-abad-6ef08107df15","weight":1},{"event_id":6580,"event_guid":"093eca9c-c084-462a-8ed2-b95954782b06","weight":1},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6698,"event_guid":"90815ac2-75f3-5c77-8782-58bf0aeda423","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":2},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":7},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":7},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":4},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":3},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":4},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":3},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":3},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":1}]},{"guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","title":"Neues von PGP","subtitle":null,"slug":"pw18-19-neues-von-pgp","link":"https://cfp.privacyweek.at/pw18/talk/TKSBNY","description":"In den letzten Monaten wurden mehrere Schachstellen von E-Mail-Verschlüsselung bekannt, währenddessen wird aktiv daran gearbeitet, die Techniken leichter nutzbar zu machen und auch Metadaten zu schützen. Der Vortrag gibt einen Überblick über aktuelle Entwicklungen.\n\nEfail: Im Mai 2018 gingen Behauptungen durch alle Medien, dass unverschlüsselte E-Mails sicherer seien als verschlüsselte. Was ist dran an den Behauptungen der Sicherheitsforscher und was bedeutet das für den Nutzer der (vermeintlich) betroffenen Programme?\n\nMit dem Memoryhole Standard werden die trotz Verschlüsselung des Mailinhalts unverschlüsselten Metadaten (wie dem Betreff) so weit wie möglich auf dem Transport verschlüsselt - was einen Kritikpunkt an PGP teilweise entkräftet.\n\nIm September 2018 meldete ein Newsportal, dass die Anzeigen von gültigen in vielen Programmen vom Absender nachgeahmt werden können, wobei die Ähnlichkeiten von Mailprogramm zu Mailprogramm variieren.\n\nPEP (Pretty easy privacy) und Autocrypt machen die Nutzung von PGP für Einsteiger deutlich leichter und wurden schon in diversen Programmen integriert. Das ist ein wichtiger Schritt für PGP, doch wurde dann Anfang Oktober 2018 bekannt, dass damit für kurze Zeit unter Windows E-Mails gar nicht verschlüsselt wurden.","original_language":"deu","persons":["Sebastian Wagner"],"tags":["pw18","19"],"view_count":308,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-21T14:45:08.857+01:00","length":2152,"duration":2152,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/19-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/19-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/19-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/19-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-19-neues-von-pgp","url":"https://api.media.ccc.de/public/events/780a8d95-2dbb-588d-9f28-d28093ba8cf2","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":4},{"event_id":6477,"event_guid":"c85de43e-107e-4247-b550-946f376e2ec4","weight":4},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":4},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":13},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":5},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":11},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":7},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":8},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":9},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":4},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":6}]},{"guid":"db47b0e4-1c96-529b-a24d-4709be64998c","title":"Exploring Opportunities and Challenges for Emerging Cognitive Human-centric Personal Data Ecosystems: Empowering humans in the age of the GDPR","subtitle":null,"slug":"pw18-23-exploring-opportunities-and-challenges-for-emerging-cognitive-human-centric-personal-data-ecosystems-empowering-humans-in-the-age-of-the-gdpr","link":"https://cfp.privacyweek.at/pw18/talk/9E3NMF","description":"This interdisciplinary talk aims to reflect on a solution for resolving key tensions between providing personalized services and the right to privacy, by envisioning new Cognitive Human-centric Personal Data Ecosystems (C/CH-PDEs) in which personal data can only be collected and processed under the control of the data subject.\n\nIn our increasingly digital societies, data is perceived as a key resource for economic growth. Among the highest-valued corporations today, many have business models that are essentially based on data of or about their users. This development has raised serious concerns about individuals' right to privacy and their ability to exercise control over their own data, as well as about the broader shifts of power between data subjects and data controllers that this development entails. Consequently, European policy makers have passed the General Data Protection Regulation (GDPR), which has imposed stricter regulations on personal data handling practices within the EU.\nIn parallel, a movement - often associated with the term “MyData” - has emerged in the civil society with the goal to put individuals in control of their personal data. One of the major adoption barriers for such platforms, however, has been the difficulty individuals face in acquiring their personal data from data controllers. In this talk after introducing the technical aspects of the Cognitive Human-centered Personal Data Ecosystems, I discuss how the new rights under the GDPR could drive the emergence of such ecosystems, in which individuals' roles are no longer limited to that of passive \"data subjects\", but in which they become active stakeholders that have access to, exercise control over, and create value from their personal data. Finally, some of the sociotechnical drivers and barriers of cognitive human-centric personal data ecosystems will be discussed.","original_language":"eng","persons":["Soheil Human"],"tags":["pw18","23"],"view_count":91,"promoted":false,"date":"2018-10-28T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2023-11-07T05:30:02.699+01:00","length":2386,"duration":2386,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/23-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/23-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/23-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/23-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-23-exploring-opportunities-and-challenges-for-emerging-cognitive-human-centric-personal-data-ecosystems-empowering-humans-in-the-age-of-the-gdpr","url":"https://api.media.ccc.de/public/events/db47b0e4-1c96-529b-a24d-4709be64998c","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":6086,"event_guid":"58f65666-0f8f-436d-b1eb-095ba70ac203","weight":1},{"event_id":6091,"event_guid":"19f2c787-3c20-4d76-bead-6941f4156e47","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":1},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":2},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6746,"event_guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","weight":2},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1},{"event_id":6755,"event_guid":"e1844070-a145-4e59-aa90-2ab14f791a2d","weight":1}]},{"guid":"62228e80-fbf1-540b-b2be-5a0969f02001","title":"You are (not) in control","subtitle":null,"slug":"pw18-51-you-are-not-in-control","link":"https://cfp.privacyweek.at/pw18/talk/3VSPTE","description":"What does (not) being in control mean in regards to your own privacy? Have we replaced control with trust?\n\nMore and more people buy into online ecosystems at the cost of their personal data. A big reason for this is the growing drive to participate in the online social circles. European Competition authorities have started discussion evaluating the value of personal data and the power imbalance created by it. When examining these situation the question of privacy control start coming up and might create insight into how these power imbalances are manifesting for consumers and citizens. \n\nPrivacy concerns show up much more vigorously in situations that are personally connected or immediate, but are less present in situation where trust is extended towards systems under the control of far away parties. The trust relationship in analog privacy is seemingly removed in digital scenarios and is replaced by exploitative systems.","original_language":"eng","persons":["qchen"],"tags":["pw18","51"],"view_count":64,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-01-03T16:45:08.340+01:00","length":2407,"duration":2407,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/51-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/51-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/51-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/51-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-51-you-are-not-in-control","url":"https://api.media.ccc.de/public/events/62228e80-fbf1-540b-b2be-5a0969f02001","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2408,"event_guid":"25d1ba3b-cf21-4d83-935d-d064f10a6035","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":2},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":1},{"event_id":4706,"event_guid":"cc614df4-ff39-4475-99d5-6597e5fadc75","weight":1},{"event_id":5945,"event_guid":"52486d44-0fed-5499-a21f-3c88e72d9b48","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6561,"event_guid":"9a59a736-ef6f-57ec-9261-e632cac8b51c","weight":1},{"event_id":6689,"event_guid":"7e315c21-fe30-527b-a7cc-6b1c58dec4dc","weight":2},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":3},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":3},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6717,"event_guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","weight":3},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":1},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":2},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":5},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":3},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":2},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":4}]},{"guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","title":"Wen und was darf ich eigentlich noch ungestraft fotografieren?","subtitle":null,"slug":"pw18-75-wen-und-was-darf-ich-eigentlich-noch-ungestraft-fotografieren-","link":"https://cfp.privacyweek.at/pw18/talk/CGEYCS","description":"Fotografie - gefangen im Netz von  Urheberrecht, DSGVO, Panoramafreiheit und dem Recht am eigenen Bild.\n\nZur Zeit der Erfindung der Fotografie war ein Foto ein Unikat. Die Herstellung bedeutete einen sehr großen Aufwand und das Foto konnte nicht weiter verbreitet werden. Heute hat jedermann die Möglichkeit, auf einfache Weise sehr viele Fotos herzustellen und diese beispielsweise über soziale Medien, innerhalb von Sekunden weiterzuverbreiten.\nIm Gegenzug dazu, werden die Vorschriften und Gesetze, die das Weiterverbreiten und sogar das Anfertigen verbieten, immer restriktiver.","original_language":"deu","persons":["Regine Zawodsky"],"tags":["pw18","75"],"view_count":151,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-07-28T16:30:05.480+02:00","length":2645,"duration":2645,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/75-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/75-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/75-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/75-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-75-wen-und-was-darf-ich-eigentlich-noch-ungestraft-fotografieren-","url":"https://api.media.ccc.de/public/events/dd88e389-69a5-5e2a-8920-963f300ba8f4","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":2},{"event_id":6484,"event_guid":"600ea8de-65d9-540d-abb1-a4f956e6143f","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6561,"event_guid":"9a59a736-ef6f-57ec-9261-e632cac8b51c","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":3},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":3},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":4},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":7},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":4},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":3},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":12},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":2},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":3},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":5},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":3},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":3},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":3},{"event_id":6753,"event_guid":"7fb7e9a0-0bcd-4500-a0e5-5a99614a192c","weight":2}]},{"guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","title":"Chaos macht Schule Wien","subtitle":null,"slug":"pw18-8-chaos-macht-schule-wien","link":"https://cfp.privacyweek.at/pw18/talk/SB3F7G","description":"Zwei Jahre \"Chaos macht Schule\" in Östereich - ein Erfahrungsbericht.\n\nZeitgleich mit der ersten Privacyweek hat der C3W 2016 das Format \"Chaos macht Schule\" nach Österreich gebracht. Unter der Adresse schule@c3w.at melden sich Lehrende und nach Abstimmungen über die Inhalte kommen wir, einzeln oder zu zweit, an die Schule. So waren wir in den ersten zwei Jahren in 50 Schulklassen und haben dabei einiges erlebt. Neben der Arbeit mit Schüler:innen haben wir (zukünftige) Lehrende informiert und die Werbetrommel für \"Chaos macht Schule\" bei unterschiedlichsten Veranstaltungen geschlagen. Der Talk zeigt was geklappt hat und woran wir auch gescheitert sind. Auf jeden Fall bleiben wir dran!","original_language":"deu","persons":["Sonja Waldgruber"],"tags":["pw18","8"],"view_count":111,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-01-02T02:45:11.503+01:00","length":2258,"duration":2258,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/8-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/8-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/8-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/8-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-8-chaos-macht-schule-wien","url":"https://api.media.ccc.de/public/events/2ac4833e-a17f-5224-b180-580a3be0c33b","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":26,"event_guid":"import-7546b8f6ee2d14b2e6","weight":1},{"event_id":31,"event_guid":"import-a05a76991aa031db49","weight":1},{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":3608,"event_guid":"a0c851a1-b44e-46cb-bbb8-db966bc8639b","weight":3},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":2},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":3},{"event_id":5810,"event_guid":"291fe17d-80ca-46a9-9978-c61509a4f9c9","weight":2},{"event_id":5830,"event_guid":"1f3a0237-0515-4cdb-90ac-d57f7bc85586","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":1},{"event_id":6540,"event_guid":"0a1a58a4-7700-502b-b8f2-405f3e42c1bc","weight":1},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1},{"event_id":6561,"event_guid":"9a59a736-ef6f-57ec-9261-e632cac8b51c","weight":2},{"event_id":6568,"event_guid":"13d40859-635a-49e6-91bd-0f64bfcfe64c","weight":1},{"event_id":6687,"event_guid":"fadce300-8a81-5092-ac3d-2511fefef930","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":3},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":1},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":2},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":1},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":1},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":1},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":2},{"event_id":6753,"event_guid":"7fb7e9a0-0bcd-4500-a0e5-5a99614a192c","weight":1},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":1},{"event_id":6932,"event_guid":"3ac46290-51e0-5ee2-93a0-8fb4b99cf67c","weight":1},{"event_id":6941,"event_guid":"210b1e90-42a5-5f93-a0fd-6eef22df57ec","weight":1},{"event_id":7015,"event_guid":"fe773b9a-4a85-5517-a591-c54d46f24634","weight":1},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":2},{"event_id":7328,"event_guid":"dadcbdee-c37b-4faf-ba6f-56d34bc9dee7","weight":2}]},{"guid":"92d4043d-757a-5650-aa1e-c338386695e8","title":"Escaping the Silo - über das Gute Leben nach Facebook und Co","subtitle":null,"slug":"pw18-101-escaping-the-silo-ber-das-gute-leben-nach-facebook-und-co","link":"https://cfp.privacyweek.at/pw18/talk/JALF3Z","description":"\"Mit dem Angriff der Blockchain wird das ALLES in Ordnung kommen\" :-D","original_language":"deu","persons":["Paul Fuxjäger"],"tags":["pw18","101"],"view_count":88,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-07-14T19:15:04.449+02:00","length":2666,"duration":2666,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/101-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/101-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/101-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/101-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-101-escaping-the-silo-ber-das-gute-leben-nach-facebook-und-co","url":"https://api.media.ccc.de/public/events/92d4043d-757a-5650-aa1e-c338386695e8","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6047,"event_guid":"e83405c6-2a35-4834-a462-5da4fe10652e","weight":2},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":2},{"event_id":6535,"event_guid":"a875f05c-5eeb-4478-9e6f-863fc52b8868","weight":1},{"event_id":6675,"event_guid":"1c42bd49-3477-5e45-973a-92ea2b1f6b3d","weight":1},{"event_id":6687,"event_guid":"fadce300-8a81-5092-ac3d-2511fefef930","weight":2},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":5},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":4},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":9},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":2},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":7},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":5},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":5},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":7},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":6},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":9},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":4},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":6},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":6},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":6}]},{"guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","title":"Closing Event","subtitle":null,"slug":"pw18-84-closing-event","link":"https://cfp.privacyweek.at/pw18/talk/8MW8MQ","description":"Das Closing Event. Das war die #pw18.\n\nDie Highlights der #pw18 und wie es weitergeht.","original_language":"deu","persons":["PrivacyWeek Team"],"tags":["pw18","84"],"view_count":33,"promoted":false,"date":"2018-10-28T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-03-22T01:45:03.905+01:00","length":2326,"duration":2326,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/84-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/84-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/84-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/84-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-84-closing-event","url":"https://api.media.ccc.de/public/events/923e69bf-e179-5cd4-80af-81851b1bd7e7","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":2},{"event_id":3674,"event_guid":"bfc2ab1f-8384-4d7d-801a-dde8c81e039c","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3755,"event_guid":"2bdf3de1-417b-4a5a-b31e-4701a921fb5c","weight":1},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":1},{"event_id":5069,"event_guid":"84639ed6-fb5d-584a-a879-84e60b0cafd5","weight":1},{"event_id":5073,"event_guid":"74d7736f-f73a-5164-9e7d-2fc69e74cc99","weight":1},{"event_id":5661,"event_guid":"fb43f374-958e-447c-ba13-a013113d44e3","weight":1},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":1},{"event_id":5670,"event_guid":"61886440-d4eb-43de-8914-152c9fabdffc","weight":2},{"event_id":5675,"event_guid":"67bdba2c-7f22-4ecd-ae9a-f60a9443baaa","weight":1},{"event_id":5676,"event_guid":"dcc0ceda-0a43-49dd-a3d0-277e1046b8d7","weight":1},{"event_id":5704,"event_guid":"cb9fec93-addb-50e7-b0ab-9fb17707014b","weight":1},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":1},{"event_id":5714,"event_guid":"f606c934-db6f-5946-82e6-dc62c9856089","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6450,"event_guid":"8cfcba40-e656-5f5b-b46f-8a9f09913c85","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1},{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":1},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":4},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6691,"event_guid":"9c572732-4b50-5eec-aab1-01ac45435785","weight":1},{"event_id":6693,"event_guid":"68eef21a-279b-5ac7-9a22-0d6e43c1d97f","weight":1},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":2},{"event_id":6744,"event_guid":"db47b0e4-1c96-529b-a24d-4709be64998c","weight":2},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":2},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1}]},{"guid":"37ce5c4e-4364-53fc-8a13-9a201fdb7b11","title":"Ethical Problems with Robots and AI","subtitle":null,"slug":"pw18-36-ethical-problems-with-robots-and-ai","link":"https://cfp.privacyweek.at/pw18/talk/JSMUM3","description":"This talk gives an introduction to ethical problems raised by new digital technologies, in particular robotics and AI. Particular attention will be given to the topic of privacy.\n\n[please fill in]","original_language":"eng","persons":["Dr. Mark Coeckelbergh"],"tags":["pw18","36"],"view_count":88,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-06-16T10:30:06.402+02:00","length":2660,"duration":2660,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/36-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/36-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/36-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/36-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-36-ethical-problems-with-robots-and-ai","url":"https://api.media.ccc.de/public/events/37ce5c4e-4364-53fc-8a13-9a201fdb7b11","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":2},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":1},{"event_id":5253,"event_guid":"25b036d4-ae45-4173-9806-65611e90a78c","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":3},{"event_id":6402,"event_guid":"8a3e490c-30a5-46a6-ab4f-45ef3b23b1a1","weight":1},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":1},{"event_id":6457,"event_guid":"74b9c748-970f-4693-ac7e-46fcc733d2b4","weight":1},{"event_id":6459,"event_guid":"41e36295-68d2-5c2b-add5-d6b6b58df605","weight":1},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":2},{"event_id":6591,"event_guid":"ba68f092-89bd-4348-9f81-7a05317a0497","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":2},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":2},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":2},{"event_id":6759,"event_guid":"e58153f1-a3c4-4aaf-94e6-423df6b1a420","weight":1},{"event_id":6760,"event_guid":"d65538ed-8538-5ff3-89d8-241c88259890","weight":1},{"event_id":6761,"event_guid":"fe35e706-2204-5740-a646-53064ee1a53e","weight":1},{"event_id":6763,"event_guid":"c7788f24-1c2c-46b6-8e7b-dbd53dc47979","weight":1}]},{"guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","title":"Private Daten im Datensee","subtitle":null,"slug":"pw18-43-private-daten-im-datensee","link":"https://cfp.privacyweek.at/pw18/talk/LJPAGH","description":"Dieser Talk beschäftigt sich mit der Problematik das man manchmal zwangsläufig persönliche Daten aufzeichnet, andererseits eine radikale Vorverarbeitung oder Maskierung die Daten unter Umständen auch sehr verfälscht.\n\nDie heute verfügbare Rechenleistung ermöglicht den Weg zum Erkenntnisgewinn über den Ansatz Data Mining: Schritt 1: es werden alle nur irgendwie greifbaren Daten gesammelt. Schritt 2: Die Daten werden ausgewertet. Bei einem \"Mitschneiden\" von Datenströmen, sei es nun z.B. Netzwerkverkehr oder Aktivitäten auf einem Computer landen auch unweigerlich persönliche Daten im Datensee. Die Umgang mit dieser Situation ist nicht ganz einfach. Einerseits möchte man - oder ist sogar gesetzlich dazu gezwungen - persönliche Daten identifizieren und herauslöschen, andererseits bedeutet eine Veränderung der Originaldaten auch eine Änderung der enthaltenen Information.\nDieser Vortrag zeigt einige Praxisbeispiele aus dem IT-Security und Forschungsalltag und ein paar Ansätze wie man mit der Problematik umgehen kann.","original_language":"deu","persons":["Martin Pirker"],"tags":["pw18","43"],"view_count":52,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-11T21:15:04.379+02:00","length":2006,"duration":2006,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/43-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/43-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/43-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/43-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-43-private-daten-im-datensee","url":"https://api.media.ccc.de/public/events/dd2bd0ce-112b-5cdc-ad02-7118441a7c59","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":4666,"event_guid":"dbaa263c-62ed-4565-b184-fd85a7e6fd2c","weight":1},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":1},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4984,"event_guid":"dd8ef189-7888-4916-888b-0b19e2e4acd7","weight":1},{"event_id":4985,"event_guid":"d0df705f-a1ec-41e8-9240-7009943e03bc","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":1},{"event_id":5026,"event_guid":"a1b933f6-11f4-4244-86e7-560107907d77","weight":1},{"event_id":5254,"event_guid":"83235eb6-ce2d-4f4d-8124-1d38010a2076","weight":1},{"event_id":6401,"event_guid":"f0d70663-0769-4462-ad27-bc516d9cb141","weight":1},{"event_id":6466,"event_guid":"2d71612c-7f40-484b-a939-10b809aedd80","weight":1},{"event_id":6483,"event_guid":"b873392d-f0e7-50ee-a918-770f104efeae","weight":1},{"event_id":6551,"event_guid":"3a571c21-31ed-453b-886d-7dea7b5751cd","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6579,"event_guid":"85ec8360-737b-4ee3-be2d-d8e050b1d117","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":2},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":1},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":1},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":2},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":2},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":1},{"event_id":6716,"event_guid":"5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","weight":1},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":1},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":3},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":3},{"event_id":6730,"event_guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":2},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":1},{"event_id":6744,"event_guid":"db47b0e4-1c96-529b-a24d-4709be64998c","weight":1},{"event_id":6746,"event_guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","weight":1},{"event_id":6753,"event_guid":"7fb7e9a0-0bcd-4500-a0e5-5a99614a192c","weight":1},{"event_id":6924,"event_guid":"5ae4bf60-023d-5d6c-b54f-911b84ac7582","weight":1},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":1}]},{"guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","title":"Privatsphäre, Grundrechte, wer braucht denn noch so etwas ?","subtitle":null,"slug":"pw18-32-privatsphre-grundrechte-wer-braucht-denn-noch-so-etwas-","link":"https://cfp.privacyweek.at/pw18/talk/GG9UTX","description":"Wir leben in wirklich tollen Zeiten: Gesetze, die vor dem Jahr 2000 beschlossen wurden, können wir aufheben.\nSo einfach kann Welt sein.\nOder doch nicht?\n\n\"Alle Menschen sind von Natur aus in gleicher Weise frei und unabhängig und besitzen bestimmte angeborene Rechte, welche sie ihrer Nachkommenschaft durch keinen Vertrag rauben oder entziehen können, wenn sie eine staatliche Verbindung eingehen, und zwar den Genuss des Lebens und der Freiheit, die Mittel zum Erwerb und Besitz von Eigentum und das Erstreben und Erlangen von Glück und Sicherheit.\"\nund\n\"Alle Macht ruht im Volke und leitet sich folglich von ihm her; die Beamten sind nur seine Bevollmächtigten und Diener und ihm jederzeit verantwortlich.\"\n\nAlles klar, alles selbstverständlich erreicht und gesichert bis in alle Ewigkeit?","original_language":"deu","persons":["Herbert Waloschek","Christof Tschohl"],"tags":["pw18","32"],"view_count":117,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-12-30T10:15:15.671+01:00","length":5050,"duration":5050,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/32-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/32-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/32-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/32-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-32-privatsphre-grundrechte-wer-braucht-denn-noch-so-etwas-","url":"https://api.media.ccc.de/public/events/9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6009,"event_guid":"a8945808-334b-4383-809a-d80d9be6e07f","weight":3},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":3},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":2},{"event_id":6466,"event_guid":"2d71612c-7f40-484b-a939-10b809aedd80","weight":2},{"event_id":6484,"event_guid":"600ea8de-65d9-540d-abb1-a4f956e6143f","weight":1},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6561,"event_guid":"9a59a736-ef6f-57ec-9261-e632cac8b51c","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":3},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":3},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":3},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":2},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":3},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":5},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":9},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":3},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":1},{"event_id":6746,"event_guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","weight":2}]},{"guid":"b209505d-8413-50aa-adc3-429767c4c62d","title":"From 0 to Exit","subtitle":null,"slug":"pw18-34-from-0-to-exit","link":"https://cfp.privacyweek.at/pw18/talk/97LQXQ","description":"Unser Verein \"Foundation for Applied Privacy\" (https://appliedprivacy.net/) hat sich zum Ziel gesetzt die Infrastruktur für Online Privacy in Österreich stark zu verbessern. Anfang 2018 gründeten wir unseren Verein und starteten unser erstes Hauptprojekt: Den Ausbau der Tor-Netzwerk Kapazitäten in Österreich.\n\nDas Tor-Netzwerk ist das am weitest verbreitete Netzwerk um Anonymität im Internet zu stärken.\n\nEs wird von vielen Freiwilligen betrieben, die dafür notwendige Serverinfrastruktur (Relays) der Öffentlichkeit kostenlos bereitstellen.\nDa sich Privacy-Tools wie Tor wachsender Beliebtheit erfreuen, ist auch eine wachsende Infrastruktur notwendig.\n\nIn Österreich gab es Anfang 2018 nur eine geringe Anzahl an schnellen Tor-Relays, aber noch spezieller ist die Situation bei Exit-Relays, die wichtige Schnittstelle vom Tor-Netzwerk in das Internet. Mit Stand Mai 2018 wurden in Österreich nur zwei solche Server betrieben. Für Österreich ist diese Zahl entäuschend gering!\n\nWir haben uns als Aufgabe gesetzt diese Situation zu verändern und die Tor-Exit-Infrastruktur in Österreich wesentlich zu stärken. Dazu wollen wir uns -- die \"Foundation for Applied Privacy\" -- vorstellen: den Weg den wir bis jetzt gegangen sind, die Herausforderungen vor die wir gestellt werden und wie wir die Zukunft von Tor, vor allem in Österreich mitgestalten.","original_language":"deu","persons":["Martin Schmiedecker"],"tags":["pw18","34"],"view_count":142,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-16T07:00:03.389+01:00","length":2350,"duration":2350,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/34-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/34-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/34-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/34-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-34-from-0-to-exit","url":"https://api.media.ccc.de/public/events/b209505d-8413-50aa-adc3-429767c4c62d","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":4331,"event_guid":"6e4cc66d-2edc-41ab-9d9b-6ec921e0944d","weight":2},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5038,"event_guid":"5cbed437-ac2c-4692-b2fc-e9814c71f962","weight":1},{"event_id":6379,"event_guid":"9dde571b-4d49-4b44-8329-42e354bcc24b","weight":1},{"event_id":6417,"event_guid":"bf5019dc-499d-4c06-9ad0-35adbe01e7f3","weight":1},{"event_id":6484,"event_guid":"600ea8de-65d9-540d-abb1-a4f956e6143f","weight":2},{"event_id":6504,"event_guid":"b4850756-d05b-5689-818b-b4b3b233244e","weight":1},{"event_id":6558,"event_guid":"4dca2405-3576-59a5-8bd9-98c9d452eaa5","weight":1},{"event_id":6568,"event_guid":"13d40859-635a-49e6-91bd-0f64bfcfe64c","weight":1},{"event_id":6600,"event_guid":"68619725-72ae-5645-8b6c-8e645e5d9c47","weight":2},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":3},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":1},{"event_id":6706,"event_guid":"37ce5c4e-4364-53fc-8a13-9a201fdb7b11","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":1},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6716,"event_guid":"5a9abae2-d8ad-5cd9-ad61-a598b5e16ad0","weight":1},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":1},{"event_id":6730,"event_guid":"ac3a3832-a26a-598b-992a-39454e8e99d2","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":2},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":1},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":1},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":1},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":1},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":1},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":1}]},{"guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","title":"DSGVO - Was ist passiert?","subtitle":null,"slug":"pw18-103-dsgvo-was-ist-passiert-","link":"https://cfp.privacyweek.at/pw18/talk/9SCRN3","description":"Mit massivem Lobbying hat die Internet- und Medienindustrie versucht, die DSGVO aufzuweichen. Das Ende des Internets war angekündigt. Ist es wirklich so weit gekommen?","original_language":"deu","persons":["Andreas Krisch","Angelika Adensamer","Jürgen Haslauer","Erich Möchel"],"tags":["pw18","103"],"view_count":71,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-10-31T15:00:05.031+01:00","length":4379,"duration":4379,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/103-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/103-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/103-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/103-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-103-dsgvo-was-ist-passiert-","url":"https://api.media.ccc.de/public/events/befefa91-0d58-5fc3-bb7c-cf35ab99b01e","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":1},{"event_id":5275,"event_guid":"27267d09-859b-4ebf-a779-63145861c816","weight":2},{"event_id":6088,"event_guid":"2b62cf68-340d-47d3-a6e3-ac63f4c4e564","weight":2},{"event_id":6391,"event_guid":"1601bf3b-ce4a-44c9-993f-7d28fa65168d","weight":2},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":4},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6698,"event_guid":"90815ac2-75f3-5c77-8782-58bf0aeda423","weight":2},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":2},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":2},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":3},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1}]},{"guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","title":"targeted advertising considered harmful","subtitle":null,"slug":"pw18-61-targeted-advertising-considered-harmful","link":"https://cfp.privacyweek.at/pw18/talk/3AXQPQ","description":"targeted advertising, micromarketing oder »adtech« sind relativ neue technologien, um werbung möglichst reibungsfrei zu den zielgruppen bzw. zielpersonen zu bekommen. uns wird das dann als »relevante werbung« verkauft. dass diese form der werbeadressierung das wesentlichste business-modell von google und facebook sind, wissen wir. im vortrag wird diskutiert, was diese möglichkeiten mit der werbebranche, den werbeträgern und -empfängern im einzelnen, sowie mit der gesellschaft im ganzen, macht.\n\nas of yet, i don't have a description","original_language":"deu","persons":["Peter Purgathofer"],"tags":["pw18","61"],"view_count":77,"promoted":false,"date":"2018-10-25T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-02-12T14:15:07.199+01:00","length":2640,"duration":2640,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/61-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/61-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/61-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/61-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-61-targeted-advertising-considered-harmful","url":"https://api.media.ccc.de/public/events/e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1694,"event_guid":"import-93c25b8ee500834319","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":5791,"event_guid":"9144aaee-4cb6-4497-89d9-acca7da85730","weight":1},{"event_id":6098,"event_guid":"289155d4-9fab-46ad-86e6-6db5d065e44a","weight":1},{"event_id":6151,"event_guid":"799b4f08-66a0-3585-2e9e-092f7507722d","weight":1},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":1},{"event_id":6583,"event_guid":"623fd999-d7dd-4fd8-896c-75e51a21df1e","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":1},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":1},{"event_id":6711,"event_guid":"e06c32e4-e7b5-5573-925c-20e1ed02c79c","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":2},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":2},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":2},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":2},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":2},{"event_id":6739,"event_guid":"7e4f400e-19b8-5870-b26a-ec9ad0e5cdaa","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":1},{"event_id":6744,"event_guid":"db47b0e4-1c96-529b-a24d-4709be64998c","weight":1},{"event_id":6746,"event_guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","weight":1},{"event_id":6759,"event_guid":"e58153f1-a3c4-4aaf-94e6-423df6b1a420","weight":2}]},{"guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","title":"Wissen Sie, was sie tun? Beobachtungen aus dem Pilotversuch zur verbindlichen Übung \"Digitale Grundbildung\" in österreichischen Schulen.","subtitle":null,"slug":"pw18-81-wissen-sie-was-sie-tun-beobachtungen-aus-dem-pilotversuch-zur-verbindlichen-bung-digitale-grundbildung-in-sterreichischen-schulen-","link":"https://cfp.privacyweek.at/pw18/talk/RTQTRF","description":"Der Pilotversuch zur verbindlichen Übung \"Digitale Grundbildung\" wurde mit Beobachtungen und Interviews begleitet. Im Vortrag wird über die Ergebnisse berichtet.\n\nSeit 1. September 2018 müssen alle österreichischen Schulen in der Skundarstufe 1 die verbindliche Übung \"Digitale Grundbildung\" anbieten. Bereits im letzten Schuljahr wurde an zahlreichen Schulen ein Piltoversuch zur Vorbereitung der flächendeckenden Einführung durchgeführt. Mit einigen Lehrenden und Lernenden, die an dem Piltoversuch beteiligt waren, wurden Interviews und Unterrichtsbeobachtungen durchgeführt. Die Ergebnisse zeigen viel Engagement und einige Anlaufschwierigkeiten.","original_language":"deu","persons":["Christian Swertz"],"tags":["pw18","81"],"view_count":35,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-01-29T23:00:05.955+01:00","length":2777,"duration":2777,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/81-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/81-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/81-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/81-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-81-wissen-sie-was-sie-tun-beobachtungen-aus-dem-pilotversuch-zur-verbindlichen-bung-digitale-grundbildung-in-sterreichischen-schulen-","url":"https://api.media.ccc.de/public/events/722db692-2d84-50a4-aa10-d37ef0dbac1e","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":585,"event_guid":"import-d94f5d200796e19ab4","weight":1},{"event_id":2338,"event_guid":"e51a1062-c2e2-487c-9d94-f97b47a894af","weight":1},{"event_id":3268,"event_guid":"e216ccb9-01df-5998-b9bd-9d79b0b2ef3b","weight":1},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":1},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":1},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":1},{"event_id":5845,"event_guid":"0b16f931-d146-54d8-8114-bc28d56980b7","weight":1},{"event_id":6025,"event_guid":"6d52b06c-1295-4983-84e1-d0fb807af357","weight":1},{"event_id":6026,"event_guid":"4e71365d-0edf-4378-936d-e5df91bf9d6d","weight":1},{"event_id":6029,"event_guid":"19767f93-f0df-477f-a534-aee61b4288a9","weight":1},{"event_id":6043,"event_guid":"6cc5fc97-964e-4850-9292-6c452518e1e6","weight":1},{"event_id":6077,"event_guid":"ed108886-6e5d-4f34-8628-537a5f5faf6f","weight":1},{"event_id":6190,"event_guid":"033c05e8-0563-52e5-ac29-145898350fc2","weight":1},{"event_id":6229,"event_guid":"255cb75a-a2bb-5495-88f9-94be005953f1","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":1},{"event_id":6457,"event_guid":"74b9c748-970f-4693-ac7e-46fcc733d2b4","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":3},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":2},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":1},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":1},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":1},{"event_id":6717,"event_guid":"2ac4833e-a17f-5224-b180-580a3be0c33b","weight":2},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":1},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":1},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":1},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":1},{"event_id":6732,"event_guid":"666a27b1-5b6b-5f18-8ede-94d995016190","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":1},{"event_id":6744,"event_guid":"db47b0e4-1c96-529b-a24d-4709be64998c","weight":1},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6746,"event_guid":"923e69bf-e179-5cd4-80af-81851b1bd7e7","weight":1},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":1},{"event_id":6752,"event_guid":"d4be771b-799c-4d7d-83ee-dc87e3a7ad78","weight":1},{"event_id":6990,"event_guid":"f6cd723d-64bc-5ab1-b0ad-d33cdacf3c18","weight":1},{"event_id":7007,"event_guid":"ca6ca903-4797-50a2-8d1a-d06afba1352b","weight":1},{"event_id":7234,"event_guid":"8996a0a1-1829-4eef-a534-c67dc52a3707","weight":1},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":1},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":1},{"event_id":7255,"event_guid":"265fd581-ed2b-5985-879c-0d51c45c70c8","weight":1},{"event_id":7284,"event_guid":"3792767b-278f-46f3-ab92-a598a997b4de","weight":1},{"event_id":7328,"event_guid":"dadcbdee-c37b-4faf-ba6f-56d34bc9dee7","weight":1},{"event_id":7341,"event_guid":"7100ad0c-e4f3-4784-b707-46759cd3cb6a","weight":1},{"event_id":7346,"event_guid":"ca6cfc09-dc85-4685-8764-af0c293c8558","weight":1}]},{"guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","title":"Datenkrake Bildungssystem - 2+2=5","subtitle":null,"slug":"pw18-33-datenkrake-bildungssystem-2-2-5","link":"https://cfp.privacyweek.at/pw18/talk/Z3RNFX","description":"BIFIE, SOKRATES, Bildungsevidenz - der Staat, und in seinem Auftrag Private, sammeln ständig und über Jahre hinweg Daten von Österreichs Kindern in einer Umgebung, die eigentlich sicher sein sollte - in der Schule. Eine Elterninitiative hat die BiStÜ 2018 des BIFIE boykottiert und stellt kritische Fragen.\n\nAm 15. Mai 2018 finden an etwa 3000 Volksschulen in Österreich Bildungsstandüberprüfungen im Fach Mathematik statt. Eine Gruppe kritischer Eltern an einer Salzburger Volksschule beginnt, die Vorgangsweise des ausführenden Testinstituts BIFIE zu hinterfragen. Sie analysieren Gesetze, parlamentarische Anfragebeantwortungen und stellen dem BIFIE unangenehme Fragen, die bis heute nicht zufriedenstellend beantwortet werden konnten.\nDabei stoßen sie auf eine ganze Datenindustrie, die die Kinder im österreichischen Bildungssystem über Jahrzehnte beobachtet, kognitive Fähigkeiten auswertet und sozio-ökonomische Daten erhebt. Nach dem Willen der Bundesregierung soll dies nun sogar ausgedehnt werden und schon bei den Kleinsten im Kindergarten beginnen. Nach 25 Jahren haben die Tester eine Datensammlung, die die kognitive und soziale Entwicklung eines Menschen komplett abbildet.\nVergleiche mit dem standardized testing in den USA zeigen, das Bildungssystem in Österreich ist mehr und mehr datengetrieben und datenhungrig. Nur im Unterschied zu den USA gibt es hier kein opting out...\n\nDer Talk soll dabei folgende Fragen adressieren:\n\n- Wozu hat das BIFIE eine gesetzliche Ermächtigung für private Dritte Forschung zu betreiben, von Nestlé über Facebook bis hin zur russischen Regierung? Und warum darf es dabei auf vorhandene, im staatlichen Auftrag erhobene Testdaten zugreifen?\n\n- Warum unterliegt das BIFIE beim Zugriff auf die zentrale Bildungsevidenz nicht den gleichen strengen gesetzlichen Beschränkungen wie die Schulbehörden?\n\n- Warum werden bei den Tests Leistungsdaten indirekt personenbezogen und nicht anonym erfasst? Warum wird ständig bestritten, dass die Identifizierung des einzelnen Kindes jederzeit möglich ist?\n\n- Wenn nach dem Willen der Bundesregierung das BIFIE aufgelöst wird, wer bekommt die Daten? Droht der Markteintritt von Test-Konzernen wie Pearson in Österreich?\n\n- Gibt es überhaupt jemanden, der in Österreich einen Überblick hat, wer mit SchülerInnen-Daten was, wann und wo macht? Online-Schulbücher, Bildungsevidenzen, Datenmigrationen, Testungen, Contracting out von Bildungs- und Forschungseinrichtungen haben ein nicht mehr zu überblickendes Ökosystem an Datenprozessen entstehen lassen. Die Frage nach einer transparenten und offenen Architektur und nach unabhängigem Auditing stellt sich dringender denn je.","original_language":"deu","persons":["Josef Hörmandinger","Felix Steinlechner"],"tags":["pw18","33"],"view_count":115,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-12-13T09:15:06.078+01:00","length":2605,"duration":2605,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/33-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/33-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/33-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/33-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-33-datenkrake-bildungssystem-2-2-5","url":"https://api.media.ccc.de/public/events/64f880cc-b22a-54d3-a471-97a11d0c702a","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":3},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":4},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":7},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":6},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":5},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":4},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":9},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":4},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":3},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":5},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":4},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":3},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":5},{"event_id":6756,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb897","weight":5}]},{"guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","title":"Das Verhältnis zwischen Privacy und Security","subtitle":null,"slug":"pw18-52-das-verhltnis-zwischen-privacy-und-security","link":"https://cfp.privacyweek.at/pw18/talk/VTCBEF","description":"Datenschutz und Datensicherheit, im Englischen Privacy und Security, werden oft gemeinsam genannt. Der Unterschied zwischen den beiden Begriffen ist oft nicht so klar, wenn man Publikationen liest oder der Politik folgt, die beide Worte gerne synonym verwenden. Es kommt dann meist „irgendwas mit Schutz und Privatsphäre“ heraus. Dieser Vortrag soll beim semantischen Navigieren helfen und dem Publikum die Chance geben, Scharlatanerie von echtem Schutz zu unterscheiden. Gründerinnen und Mitarbeiter von Start-Ups sind explizit eingeladen.\n\nDatenschutz bedient sich der Datensicherheit, um die gesteckten Ziele - den Schutz privater Daten - umzusetzen. Umgekehrt muss Datensicherheit nicht automatisch mit persönlichen Daten zu tun haben. Betriebssysteme und Applikationen dürfen sich ja auch selbst ohne Anwenderinnen schützen. Abhängig vom Kontext kommt Datensicherheit allerdings durchaus mit Profilen und Persönlichkeiten in Berührung. Die unsägliche Biometrie zum Login ist ein (schlechtes) Beispiel, genau wie die Analyse von Verhalten, um die Benutzung von Konten durch Menschen zu prüfen, oder simple Nachrichten mit Namen, Telefonummern oder ähnlichem. Überwachung ist oft ein Problem für den Datenschutz, ist aber fallweise eine Komponente von Datensicherheit. Wieder hängt es stark vom Kontext ab. Dieser Vortrag möchte aber nicht relativieren, sondern Klarheit in die Verwirrung bringen als auch  Gemeinsamkeiten sowie Unterschieden zwischen den Disziplinen klarstellen.","original_language":"deu","persons":["René 'Lynx' Pfeiffer"],"tags":["pw18","52"],"view_count":128,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-01-18T11:00:10.303+01:00","length":2293,"duration":2293,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/52-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/52-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/52-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/52-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-52-das-verhltnis-zwischen-privacy-und-security","url":"https://api.media.ccc.de/public/events/eb95bc69-2cc1-5756-9fd7-5be37de6b936","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2109,"event_guid":"LnUCEWEhM_Af2eeF-PI5JQ","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":1},{"event_id":3544,"event_guid":"40db7b74-c47b-4318-9c23-7f2bff199b85","weight":1},{"event_id":3546,"event_guid":"d9b6af5a-3215-4dc7-8fc5-071c5f6f568e","weight":1},{"event_id":3552,"event_guid":"16d2170d-140d-4551-9119-328f12f60668","weight":1},{"event_id":3557,"event_guid":"9edcccc7-e7b3-4da9-aa3e-48f1c2689a40","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":4538,"event_guid":"41484e52-4847-2020-2020-202020202020","weight":1},{"event_id":4666,"event_guid":"dbaa263c-62ed-4565-b184-fd85a7e6fd2c","weight":1},{"event_id":4667,"event_guid":"9b3292f5-f7bd-49f9-8c2b-5dc98d72e6a4","weight":1},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":1},{"event_id":4981,"event_guid":"e95727e6-e848-4122-b9e1-b1bc57b9c7de","weight":1},{"event_id":4997,"event_guid":"381d274a-9001-47db-bebb-9b08eadf150c","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":3},{"event_id":5058,"event_guid":"a31f66ba-021f-4199-9286-702a59ab9c05","weight":1},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":1},{"event_id":5766,"event_guid":"73f1dcb2-25ba-48ff-a02a-3abc33360f03","weight":1},{"event_id":6009,"event_guid":"a8945808-334b-4383-809a-d80d9be6e07f","weight":3},{"event_id":6021,"event_guid":"ac6568e2-ae17-43b6-b7ff-8fd9799c259f","weight":1},{"event_id":6090,"event_guid":"4edc2846-21af-494b-b548-cdb4bfbe27c4","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6183,"event_guid":"0d9a8ed7-d571-5f68-8c7a-b9575db30ccd","weight":1},{"event_id":6249,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb894","weight":1},{"event_id":6454,"event_guid":"2963ebe9-6499-5d17-9f2f-0c3f31db5738","weight":3},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":2},{"event_id":6522,"event_guid":"8703c4a7-981c-4aa5-8f4c-36da54d5b435","weight":1},{"event_id":6547,"event_guid":"089b7fec-3ee1-493c-9b90-782c0514ffb4","weight":1},{"event_id":6623,"event_guid":"46273d22-b89b-463e-aa9e-3f2b94e1ef89","weight":1},{"event_id":6698,"event_guid":"90815ac2-75f3-5c77-8782-58bf0aeda423","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":1},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":3},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":5},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":4},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":9},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":6},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":5},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":4},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":3},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":7},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":3},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":3},{"event_id":6758,"event_guid":"8c7fcb7a-e250-5af0-8da3-f5f4c0845895","weight":1},{"event_id":6759,"event_guid":"e58153f1-a3c4-4aaf-94e6-423df6b1a420","weight":1}]},{"guid":"4f48bd42-5f00-5fb4-a98d-6a83d9e399e1","title":"Eröffnung","subtitle":null,"slug":"pw18-71-erffnung","link":"https://cfp.privacyweek.at/pw18/talk/LPNLNK","description":"Es geht wieder los!\n\nHier kommt noch eine coole Beschreibung hin.","original_language":"deu","persons":["PrivacyWeek Team"],"tags":["pw18","71","2018"],"view_count":28,"promoted":false,"date":"2018-10-22T17:00:00.000+02:00","release_date":"2020-01-04T01:00:00.000+01:00","updated_at":"2025-07-29T18:15:03.585+02:00","length":2091,"duration":2091,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/71-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/71-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/71-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/71-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-71-erffnung","url":"https://api.media.ccc.de/public/events/4f48bd42-5f00-5fb4-a98d-6a83d9e399e1","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[]},{"guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","title":"Staatstrojaner","subtitle":null,"slug":"pw18-83-staatstrojaner","link":"https://cfp.privacyweek.at/pw18/talk/CKBM78","description":"Immer mehr Staaten setzen Schadsoftware ein, um IT-Geräte zu infiltrieren und überwachen. Ein Überblick über Technik, Gesetze und Probleme.","original_language":"deu","persons":["Andre Meister"],"tags":["pw18","83"],"view_count":622,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-13T13:00:08.213+01:00","length":2295,"duration":2295,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/83-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/83-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/83-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/83-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-83-staatstrojaner","url":"https://api.media.ccc.de/public/events/b7640bd5-2810-53ee-8b8e-b5f8472add1f","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":5},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":7},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":10},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":21},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":10},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":23},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":41},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":9},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":9},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":11},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":9},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":11},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":8},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":8},{"event_id":6752,"event_guid":"d4be771b-799c-4d7d-83ee-dc87e3a7ad78","weight":7},{"event_id":6753,"event_guid":"7fb7e9a0-0bcd-4500-a0e5-5a99614a192c","weight":6}]},{"guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","title":"None of your Business - ein Leben nach Facebook","subtitle":null,"slug":"pw18-97-none-of-your-business-ein-leben-nach-facebook","link":"https://cfp.privacyweek.at/pw18/talk/8MV38W","description":"Seit einem Jahr ist NOYB - \"none of your business\" - dabei, Datenschutzverbesserungen auch gegenüber Großkonzernen wie Google und Facebook zu erstreiten. Ein Bericht über die ersten Beschwerden bei den Aufsichtsbehörden und wie eine Rechtsdurchsetzung grundsätzlich funktionieren kann.","original_language":"deu","persons":["Max Schrems"],"tags":["pw18","97"],"view_count":215,"promoted":false,"date":"2018-10-23T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-04-05T20:00:05.578+02:00","length":2313,"duration":2313,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/97-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/97-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/97-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/97-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-97-none-of-your-business-ein-leben-nach-facebook","url":"https://api.media.ccc.de/public/events/49ccafc1-c33a-58ce-b788-e50dabdca382","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":2},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":2},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":9},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":12},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":7},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":11},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":13},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":14},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":7},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":7},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":10},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":2},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":10},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":7}]},{"guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","title":"Etwas über Auskunftsbegehren","subtitle":null,"slug":"pw18-82-etwas-ber-auskunftsbegehren","link":"https://cfp.privacyweek.at/pw18/talk/QUEUL7","description":"Was ist ein Auskunftsbegehren? Womit kann ich rechnen wenn ich eines stelle?\n\nLaut dem Datenschutzgesetz hat jeder ein Recht aus Auskunft, was aber nur wenige wissen oder tun. In diesem Vortrag schildere ich den Vorgang des Auskunftsbegehrens, die geltende Rechtslage sowie Fallstricke und welche Antworten man sich erwarten kann.","original_language":"deu","persons":["Sebastian Elisa Pfeifer"],"tags":["pw18","82"],"view_count":60,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-10-01T19:45:07.712+02:00","length":2040,"duration":2040,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/82-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/82-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/82-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/82-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-82-etwas-ber-auskunftsbegehren","url":"https://api.media.ccc.de/public/events/b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2824,"event_guid":"27260dd7-65b6-40ec-8929-2b96b45aa368","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":5029,"event_guid":"1b4a69f7-0448-46a6-9690-c6b794961919","weight":2},{"event_id":5260,"event_guid":"5c28a69e-02ed-4e3e-bf26-9046cf5fde11","weight":2},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":1},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":1},{"event_id":6134,"event_guid":"33b23c3d-c315-42f2-b1fd-e5bb2f6d6de0","weight":1},{"event_id":6137,"event_guid":"c3e12a88-f919-4f1b-84f8-20c2683c1d2a","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6406,"event_guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","weight":1},{"event_id":6426,"event_guid":"1dc4f8d0-e5f6-4e49-b647-1a5e0cabbb00","weight":1},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":1},{"event_id":6480,"event_guid":"513a2aeb-79b0-4222-ba5e-09d1d9057122","weight":1},{"event_id":6524,"event_guid":"9f27a4c2-f957-4bad-81a8-988a37429d5c","weight":1},{"event_id":6529,"event_guid":"f76415ac-d07b-4c5a-bedf-460470711712","weight":1},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":1},{"event_id":6655,"event_guid":"65bb2015-b4c1-5910-b1d7-3d46ab456340","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":1},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":2},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":3},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":2},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":4},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":2},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":4},{"event_id":6744,"event_guid":"db47b0e4-1c96-529b-a24d-4709be64998c","weight":2},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6755,"event_guid":"e1844070-a145-4e59-aa90-2ab14f791a2d","weight":1},{"event_id":6759,"event_guid":"e58153f1-a3c4-4aaf-94e6-423df6b1a420","weight":2}]},{"guid":"eaefeac8-5296-5d22-9610-3519f994aaa1","title":"Digitale Grenzüberschreitungen im Privaten - Cybergewalt in Beziehung","subtitle":null,"slug":"pw18-73-digitale-grenzberschreitungen-im-privaten-cybergewalt-in-beziehung","link":"https://cfp.privacyweek.at/pw18/talk/RL3PXL","description":"Wie zeigen sich Digitale Übergriffe in nahen Beziehungen? Wie kann dieser Form der Gewalt begegnet werden? Wo liegen die Herausforderungen im Umgang damit?\nAm Podium diskutieren Sonja Aziz, Opferschutzanwältin, Sandra Cegla, Valentina Wieser, Beratungsstelle Wiener Frauenhäuser, Klaudia Zotzmann-Koch","original_language":"deu","persons":["Klaudia Zotzmann-Koch","Sandra Cegla","Sonja Aziz","Beratungsstelle Wiener Frauenhäuser","pascoda"],"tags":["pw18","73","2018"],"view_count":321,"promoted":false,"date":"2018-10-22T18:15:00.000+02:00","release_date":"2020-01-04T01:00:00.000+01:00","updated_at":"2026-04-02T19:45:04.252+02:00","length":5886,"duration":5886,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/73-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/73-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/73-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/73-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-73-digitale-grenzberschreitungen-im-privaten-cybergewalt-in-beziehung","url":"https://api.media.ccc.de/public/events/eaefeac8-5296-5d22-9610-3519f994aaa1","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[]},{"guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","title":"Die Sprache der BVT-Affäre","subtitle":null,"slug":"pw18-24-die-sprache-der-bvt-affre","link":"https://cfp.privacyweek.at/pw18/talk/SDF99H","description":"Die BVT-Affäre ist in aller Munde. Dieser Tage können wir den Untersuchungsausschuss über die Medien mitverfolgen. Aber wie wird diese Debatte eigentlich geführt und in welchem Kontext steht sie?\n\nDie BVT-Affäre, ein aktuelles politisches Thema über das im Moment durch den beginnenden Untersuchungsausschuss, wieder intensiv diskutiert wird. Dabei verwenden alle Seiten ihre ganz eigene Sprache um die Situation rund um das BVT in ihrem Lichte erscheinen zu lassen. Welche Metaphern verwenden sie? Welche Methoden der Diskussion werden angewendet? In welchen Kontext stellen sie die Debatte? Order kurz: Wie wird der Diskurs geframed? Diesen Fragen widme ich mich in diesem Vortrag.","original_language":"deu","persons":["Erwin Ernst 'eest9' Steinhammer"],"tags":["pw18","24"],"view_count":73,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2021-06-30T13:15:05.812+02:00","length":2442,"duration":2442,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/24-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/24-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/24-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/24-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-24-die-sprache-der-bvt-affre","url":"https://api.media.ccc.de/public/events/c2d4701d-bb4c-5154-aab5-541b7daf72df","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2408,"event_guid":"25d1ba3b-cf21-4d83-935d-d064f10a6035","weight":1},{"event_id":2634,"event_guid":"c153ecc0-6ead-46ea-9bc7-8d2b774c4a3f","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1},{"event_id":6493,"event_guid":"2375222b-7dae-4bca-a5b0-aea227ab0d76","weight":1},{"event_id":6560,"event_guid":"7956605c-adae-5563-ab8c-c97b6781fefa","weight":1},{"event_id":6622,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb896","weight":1},{"event_id":6694,"event_guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","weight":1},{"event_id":6698,"event_guid":"90815ac2-75f3-5c77-8782-58bf0aeda423","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":1},{"event_id":6705,"event_guid":"b209505d-8413-50aa-adc3-429767c4c62d","weight":1},{"event_id":6706,"event_guid":"37ce5c4e-4364-53fc-8a13-9a201fdb7b11","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":1},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":1},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":1},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":1},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":1},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":2},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":1},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":1},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":1},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":1},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":2},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":4},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":1},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":1},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":1},{"event_id":6935,"event_guid":"8d3ca632-2245-5110-a092-a8109c388c9d","weight":3}]},{"guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","title":"Per Anhalter durch das Fediverse - in vier Teilen","subtitle":null,"slug":"pw18-80-per-anhalter-durch-das-fediverse-in-vier-teilen","link":"https://cfp.privacyweek.at/pw18/talk/SKTR7R","description":"Nach ein kurzer Abriss über Vergangenheit des Fediverse lernen wir die aktuellen Dienste und Protokolle kennen. Wir installieren eine Pleroma Instanz, legen Accounts an und üben die grundlegende Verwendung im Web und über Apps. Schließlich besprechen wir, wie man selbst Services im Fediverse erstellt.\n\n# 1. Vom Urknall bis 2018 - Entwicklung des Fediverse\n# 2. Protokolle und Dienste \n* dezentrale Natur der Services\n* ActivityPub, Activity-Streams und Json-LD\n* Aspekte: Privatsphäre, Backup und Redundanz\n* Ersetzen der zentralen Services von Twitter, Facebook, Instagram, Youtube, Itunes Podcast und Soundcloud durch föderierte, von der Community oder selbst gehostete Instanzen von Mastodon, Pleroma, Friendica, Gnu Social, Diaspora, Pixelfed, Nextcloud, PeerTube, Panoptikum und FunkWhale\n# 3. Hands-on\n* Instanz installieren\n* Accounts anlegen \n* Erste Experimente\n* Tools (Backup, Übertragen von Accounts)\n# 4. Call-to-action: selber ein Service konzipieren und implementieren\n* Roadmap\n* Abschätzung des Arbeitsaufwandes\n* Fortschrittsbericht des entsprechenden Projektes bei der Podcasting Plattform Panoptikum.io.","original_language":"deu","persons":["Stefan Haslinger"],"tags":["pw18","80"],"view_count":385,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-16T15:30:06.504+01:00","length":3268,"duration":3268,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/80-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/80-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/80-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/80-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-80-per-anhalter-durch-das-fediverse-in-vier-teilen","url":"https://api.media.ccc.de/public/events/c939e872-ac04-5729-a8e4-7c75af9d56be","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1908,"event_guid":"Tcu-vm4bVFeJAtBDD5YUtA","weight":1},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":8},{"event_id":5664,"event_guid":"ae4882b3-90b3-4479-b94b-3e2c0208ef7c","weight":1},{"event_id":6044,"event_guid":"5808be1e-ce91-48a2-a22a-91c3289d3819","weight":1},{"event_id":6406,"event_guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","weight":2},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":2},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":4},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":3},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":6},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":4},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":2},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":1},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":2},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":5},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":2},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":3},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":4},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":5},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":2},{"event_id":6923,"event_guid":"34a02ed2-892e-5a40-96a6-f997d42ab784","weight":7},{"event_id":7233,"event_guid":"ffaadd96-8dde-4c1d-bdcd-466774acc85c","weight":4}]},{"guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","title":"Die digitale Strassenbahn – Fluch oder Segen?","subtitle":null,"slug":"pw18-88-die-digitale-strassenbahn-fluch-oder-segen-","link":"https://cfp.privacyweek.at/pw18/talk/99PSJN","description":"Risiken der Digitalisierung des öffentlichen Personen-Nahverkehrs in Ballungsräumen im Hinblick auf den Schutz individueller Daten.\n\nDie Stadt der Zukunft ist Smart. Zumindest liest man das jetzt überall: Smart im Sinne von künstlicher Intelligenz gesteuert. Die auch AI genannte Maschinenintelligenz wird unsere Strassenbahnen steuern, den Individualverkehr regeln, den Müll rechtzeitig abholen und uns morgens rechtzeitig ins Büro und abends unversehrt wieder nach Hause bringen. Mit autonom fahrenden Fahrzeugen, um deren Parkplätze wir uns nicht mehr kümmern brauchen. Kurzum: Smart City wird das digitale Paradies.\nSo oder ähnlich verkaufen uns das derzeit die Marketingstrategen. Das ganze hat nur einen Haken: Es wird nicht so einfach funktionieren, wie man uns das derzeit gerade glauben machen will. Denn um halbwegs zu funktonieren, braucht AI Daten. Ganz viele Daten. Furchtbar viele Daten. Deinen Namen und Vornamen, Deine Adresse und Dein Geburtsdatum, wo Du arbeitest und wann Du einkaufen gehst und wann Du Deinen Hund Gassi führst und ob Du behindert bist und wann Du Urlaub machst und wann Du zu Deiner Freundin fährst und nicht zu Hause übernachtest. Kurzum: Alles, was Du so täglich treibst, in Datenform, dient dazu, den Ablauf der Smart City zu planen und zu steuern, je mehr Daten, desto besser.\nLeider kommt in den meisten Zukunftsszenarien zu diesem Thema der Datenschutz erst gar nicht vor. Datenschutzgrundverordnung? Datenschutzbeauftragter? Wie meinen?\nDer Talk setzt sich damit auseinander, wie und welche Daten wo erfasst werden und was wir tun sollten, um unsere Daten auch in der Smart City gut zu schützen.","original_language":"deu","persons":["André Igler"],"tags":["pw18","88"],"view_count":64,"promoted":false,"date":"2018-10-28T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2024-06-19T14:45:06.591+02:00","length":2245,"duration":2245,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/88-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/88-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/88-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/88-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-88-die-digitale-strassenbahn-fluch-oder-segen-","url":"https://api.media.ccc.de/public/events/7a8d8045-fc52-5032-8471-1a2d98a17a38","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":5754,"event_guid":"acca1d2a-792c-4ef0-a76a-33622dc89a7f","weight":1},{"event_id":5966,"event_guid":"b6554fda-0520-5ae9-ad5a-73dab200bf36","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1},{"event_id":6582,"event_guid":"36635330-55d6-4297-abcd-6d22fd2d22df","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":6684,"event_guid":"84a71aa2-6b94-5061-bbd0-26756287fa42","weight":2},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1},{"event_id":6691,"event_guid":"9c572732-4b50-5eec-aab1-01ac45435785","weight":1},{"event_id":6692,"event_guid":"92fb4404-88f4-5c6e-bd11-ff2c1621fbc7","weight":2},{"event_id":6693,"event_guid":"68eef21a-279b-5ac7-9a22-0d6e43c1d97f","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":4},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":3},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":1},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":3},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":1},{"event_id":6737,"event_guid":"b737ec84-23a3-5efe-aaec-f43e0fa49221","weight":1},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":3},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":3}]},{"guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","title":"Decentralized Identifiers (DIDs)","subtitle":null,"slug":"pw18-25-decentralized-identifiers-dids-","link":"https://cfp.privacyweek.at/pw18/talk/VKBEPJ","description":"Decentralized Identifiers (DIDs) are a core building block for a completely new approach to digital identity.\n\nDecentralized Identifiers (DIDs) are an important innovation in the emerging so-called \"self-sovereign\" digital identity community. Identifiers such as names and numbers have always been the basis for any identity and communications systems, and while historically identifiers have been issued and controlled by central authorities, blockchains and other technologies today provide the ability for individuals, organizations, and things to register identifiers in a \"self-sovereign\" way, i.e. with decentralization and privacy \"built-in\".\n\nThe World Wide Web Consortium (W3C) will standardize this technology, and the Decentralized Identity Foundation (DIF) has started a community effort to implement open-source components. These will serve as building blocks for a new kind of digital identity infrastructure that functions without any intermediary or central authority. Many large companies and small startups are supporting this effort, including e.g. IBM, Microsoft, Sovrin, Blockstack, uPort, Veres One, and others.\n\nIn this presentation, we will introduce and demonstrate the concept of Decentralized Identifiers, talk about the communities that are building and using them, and discuss how they relate to other ongoing efforts in the self-sovereign identity community.","original_language":"eng","persons":["Markus Sabadello"],"tags":["pw18","25"],"view_count":414,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-02-01T14:15:06.459+01:00","length":2763,"duration":2763,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/25-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/25-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/25-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/25-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-25-decentralized-identifiers-dids-","url":"https://api.media.ccc.de/public/events/b96a30bf-ce64-5f89-b058-d9bd92fd1f83","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":2},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":2},{"event_id":5775,"event_guid":"8c0b8e5b-7e38-486a-bd97-5329857ffae8","weight":1},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":1},{"event_id":6451,"event_guid":"fdf06e81-63a7-5a92-ac5a-053440cdf221","weight":2},{"event_id":6555,"event_guid":"208a0d4d-bd15-5795-82aa-563e270001d5","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":3},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":2},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":2},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":3},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":4},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":4},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":3},{"event_id":6926,"event_guid":"e51e5695-68c6-52f8-828b-472a204ffaec","weight":2},{"event_id":6935,"event_guid":"8d3ca632-2245-5110-a092-a8109c388c9d","weight":2}]},{"guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","title":"Email, wie funktioniert das eigentlich wirklich?","subtitle":null,"slug":"pw18-98-email-wie-funktioniert-das-eigentlich-wirklich-","link":"https://cfp.privacyweek.at/pw18/talk/P87YPE","description":"Email ist wohl das älteste, dezentrale, soziale Netzwerk im Internet. Lerne wie sich dieses erwachsene Medium, im Laufe der Jahre, technisch weiterentwickelt hat und wie ein modernes OpenSource Email System funktioniert. Diese Komplexität hat weitreichende Auswirkungen auf die Privatsphäre der Benutzenden.\n\nEmail stirbt nicht aus. Die dezentrale Natur und die (meist) klar definierten Standards, versprechen ein langes Leben. Wie fast alle Technologien hat sich auch Email im Laufe der Jahrzehnte durchaus weiterentwickelt. Was aus dem „Simple“ in SMTP geworden ist und was die Komplexität eines modernen Email Systems ausmacht, zeigt Dir dieser Talk.\n\nKann Spuren von RFCs enthalten.","original_language":"deu","persons":["MacLemon"],"tags":["pw18","98"],"view_count":717,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-02-20T13:15:07.279+01:00","length":2496,"duration":2496,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/98-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/98-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/98-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/98-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-98-email-wie-funktioniert-das-eigentlich-wirklich-","url":"https://api.media.ccc.de/public/events/d9171468-acf9-59f9-a7a7-ca7133bb6355","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2979,"event_guid":"e2d62f19-f20d-47fe-94eb-4a892e95875e","weight":5},{"event_id":4792,"event_guid":"6abb1f81-c163-4382-8838-8b684147d10c","weight":1},{"event_id":5960,"event_guid":"541dc917-721a-59c3-b4eb-371a7e8acc3e","weight":17},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":2},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":1},{"event_id":6453,"event_guid":"bf490104-3595-5d88-a4b1-f39899e768f7","weight":1},{"event_id":6484,"event_guid":"600ea8de-65d9-540d-abb1-a4f956e6143f","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1},{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":2},{"event_id":6688,"event_guid":"5aef4b26-baef-5e36-a077-aad3c8d19538","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":7},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":2},{"event_id":6710,"event_guid":"9a0d7e6a-00a4-5e5f-b69e-409d48b3601d","weight":1},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":17},{"event_id":6721,"event_guid":"eb95bc69-2cc1-5756-9fd7-5be37de6b936","weight":5},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":6},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":14},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":12},{"event_id":6728,"event_guid":"95929aca-0b2c-5188-aaf0-220352331ea2","weight":1},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":8},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":9},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":7},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":5},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":5}]},{"guid":"95929aca-0b2c-5188-aaf0-220352331ea2","title":"Siebzig Minuten für siebzig Jahre","subtitle":null,"slug":"pw18-31-siebzig-minuten-fr-siebzig-jahre","link":"https://cfp.privacyweek.at/pw18/talk/A7WDVZ","description":"Darf man generationsübergreifend Rat geben? \nEin Versuch.\nGeneration - Der exponentielle Wechsel, den wir seit den 1960ern selbst vorantreiben, stellt uns Menschen vor eine neue, bisher nie dagewesene Herausforderung. In der Technik folgen Generationen nach, wo die vorangegangenen noch nicht einmal ihr Potential entfaltet haben. Aber auch die Generationen der Menschen erleben eine bislang ungekannte Entfremdung, die gesellschaftlich spaltet. Altersweisheit wird hinter Startup-Spirit angestellt. Ein Diskurs über die Werte, nach denen wir leben, wird unumgänglich.\nRat - Im immer schneller werdenden Alltag unserer hochtechnisierten Welt stehen wir oft ratlos da, wenn die Realität unsere kühnsten Vorstellungen im gestreckten Galopp rechts überholt. Wo bleibt der Rat der Alten, der vor nicht allzu langer Zeit eine fixe Institution in unserer Gesellschaft war? Und muss guter Rat immer teuer werden?\n\nDarf man generationsübergreifend Rat geben? \nEin Versuch.\nGeneration - Der exponentielle Wechsel, den wir seit den 1960ern selbst vorantreiben, stellt uns Menschen vor eine neue, bisher nie dagewesene Herausforderung. In der Technik folgen Generationen nach, wo die vorangegangenen noch nicht einmal ihr Potential entfaltet haben. Aber auch die Generationen der Menschen erleben eine bislang ungekannte Entfremdung, die gesellschaftlich spaltet. Altersweisheit wird hinter Startup-Spirit angestellt. Ein Diskurs über die Werte, nach denen wir leben, wird unumgänglich.\nRat - Im immer schneller werdenden Alltag unserer hochtechnisierten Welt stehen wir oft ratlos da, wenn die Realität unsere kühnsten Vorstellungen im gestreckten Galopp rechts überholt. Wo bleibt der Rat der Alten, der vor nicht allzu langer Zeit eine fixe Institution in unserer Gesellschaft war? Und muss guter Rat immer teuer werden?","original_language":"deu","persons":["Herbert Waloschek"],"tags":["pw18","31"],"view_count":54,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2025-05-23T07:15:02.620+02:00","length":5119,"duration":5119,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/31-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/31-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/31-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/31-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-31-siebzig-minuten-fr-siebzig-jahre","url":"https://api.media.ccc.de/public/events/95929aca-0b2c-5188-aaf0-220352331ea2","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":2},{"event_id":6712,"event_guid":"e7bc0ef0-dfdf-55e1-8564-48a0580d0c7a","weight":2},{"event_id":6714,"event_guid":"dd2bd0ce-112b-5cdc-ad02-7118441a7c59","weight":3},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6726,"event_guid":"b6a94061-8fc8-5b89-b438-d6fe7f4cf0f6","weight":4},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":1},{"event_id":6731,"event_guid":"c2d4701d-bb4c-5154-aab5-541b7daf72df","weight":1},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":3},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":3},{"event_id":6738,"event_guid":"2f312311-584e-5fcc-996f-6a71e3b9e641","weight":3},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":2},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":3}]},{"guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","title":"Künstliche Intelligenz durch die Brille eines menschlichen Gehirns","subtitle":null,"slug":"pw18-53-knstliche-intelligenz-durch-die-brille-eines-menschlichen-gehirns","link":"https://cfp.privacyweek.at/pw18/talk/EAS99F","description":"Künstliche Intelligenz (KI) oder auch Artificial Intelligence (AI) ist die Heilsbringerin modernen Fortschritts. Dabei wurde das Forschungsgebiet schon 1956 begründet und bearbeitet. Lange Zeit galt es als Orchideenfach ohne praktische Anwendung (ähnlich dem Internet). Mittlerweile kommt man subjektiv ohne AI/KI in seinen Produkten kaum weiter. Dabei ist problematisch, dass viele Firmen von AI/KI reden, wenn sie etwas ganz anderes meinen. Dieser Vortrag soll beleuchten was wirklich ernst gemeint, was Statistik und was eine wirkliche Anwendung ist/sein kann. Der Vortragende wird auch versuchen den Bezug zu natürlichen Intelligenzen herzustellen, um die Herausforderungen für die Zukunft zu illustrieren.\n\nIn diesem Vortrag wird - ohne Mathematik - erklärt was die Methoden der Künstlichen Intelligenz (KI) / Artificial Intelligence (AI) ausmacht, wie sie funktionieren und welche (praktischen!) Anwendungen es gibt. Darüber hinaus wird an Beispielen erklärt was eine AI kann, wie sie lernt, wo die Grenze zwischen AI Algorithmus und angewandter Statistik liegt, und wie AIs lernen. Ganz wie bei natürlicher Intelligenz kann es nämlich auch Ausprägungen wie geistige Anomalien, Fehlfunktionen, Vorurteile oder Vorlieben geben. Darüber hinaus stellt sich die Frage wie man Denken, Geisteszustände und Bewusstsein in Algorithmen abbildet, falls es überhaupt möglich ist. Weiterhin stellen sich spannende Frage für die Privatsphäre, denn mit welchen Daten sollen AIs lernen? Wie löscht man Informationen, die durch Lernen in den Gewichten und Parametern eines neuronalen Netzwerks entstanden sind? Und selbst wenn künstliche Intelligenz nicht möglich ist, dann bietet deren glaubwürdige Simulation immer noch genug Potential für offene Fragen und ungelöste Probleme.","original_language":"deu","persons":["René 'Lynx' Pfeiffer"],"tags":["pw18","53"],"view_count":242,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-04-01T16:00:07.472+02:00","length":2383,"duration":2383,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/53-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/53-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/53-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/53-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-53-knstliche-intelligenz-durch-die-brille-eines-menschlichen-gehirns","url":"https://api.media.ccc.de/public/events/3bf7ad02-4a40-517a-bbda-7ef608d1bafa","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2779,"event_guid":"73d70ee6-807b-46d0-a39b-f6afa7baf7d4","weight":1},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":1},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":1},{"event_id":5636,"event_guid":"ba118e5f-1c35-585c-91f6-9477b0c64897","weight":1},{"event_id":5735,"event_guid":"d494138e-2442-4b08-b06b-43e1aa444701","weight":2},{"event_id":5845,"event_guid":"0b16f931-d146-54d8-8114-bc28d56980b7","weight":1},{"event_id":6000,"event_guid":"db737a14-3b5c-590c-ab96-81cbe9d3a08e","weight":6},{"event_id":6026,"event_guid":"4e71365d-0edf-4378-936d-e5df91bf9d6d","weight":1},{"event_id":6134,"event_guid":"33b23c3d-c315-42f2-b1fd-e5bb2f6d6de0","weight":1},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":2},{"event_id":6560,"event_guid":"7956605c-adae-5563-ab8c-c97b6781fefa","weight":1},{"event_id":6585,"event_guid":"2ef1d870-f2b1-583b-98c6-09574123a90f","weight":1},{"event_id":6599,"event_guid":"faa0618b-14fe-5542-b160-d6591468a897","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":1},{"event_id":6689,"event_guid":"7e315c21-fe30-527b-a7cc-6b1c58dec4dc","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":7},{"event_id":6702,"event_guid":"722db692-2d84-50a4-aa10-d37ef0dbac1e","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":1},{"event_id":6708,"event_guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","weight":2},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":12},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":4},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":4},{"event_id":6740,"event_guid":"b96a30bf-ce64-5f89-b058-d9bd92fd1f83","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":6},{"event_id":6782,"event_guid":"d8b5fb56-e8e9-5ad5-91d0-c5eb8a1740fb","weight":3}]},{"guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","title":"Logbuch:Netzpolitik 273","subtitle":"","slug":"pw18-54-logbuch-netzpolitik-livesendung-","link":"https://cfp.privacyweek.at/pw18/talk/FWPZVA","description":"Im Dialog zwischen Linus Neumann und Tim Pritlove werden die wichtigsten Themen und Ereignisse mit netzpolitischem Bezug aufgreift und diskutiert.\r\n\r\nLogbuch:Netzpolitik ist ein in der Regel wöchentlich erscheinender Podcast, der im Dialog zwischen Linus Neumann und Tim Pritlove die wichtigsten Themen und Ereignisse mit netzpolitischem Bezug aufgreift und diskutiert.\r\n\r\nhttps://logbuch-netzpolitik.de","original_language":"deu","persons":["Linus Neumann","Tim Pritlove","Thomas Lohninger"],"tags":["pw18","54"],"view_count":362,"promoted":false,"date":"2018-10-27T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-30T16:30:06.787+02:00","length":4926,"duration":4926,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/54-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/54-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/54-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/54-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-54-logbuch-netzpolitik-livesendung-","url":"https://api.media.ccc.de/public/events/d4edc795-dfcb-51e1-b2b7-08c40f7069ac","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":4},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":5},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":9},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":10},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":14},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":3},{"event_id":6718,"event_guid":"c3983e72-6fe1-5f5f-b22a-47c6562caeb8","weight":7},{"event_id":6720,"event_guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","weight":4},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":16},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":15},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":6},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":5},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":4},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":11},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":5},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":5},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":4},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":11},{"event_id":6935,"event_guid":"8d3ca632-2245-5110-a092-a8109c388c9d","weight":4}]},{"guid":"fe03537a-9aa0-5715-9aeb-fbd243b66183","title":"Österreich gegen sein Volk","subtitle":null,"slug":"pw18-55-sterreich-gegen-sein-volk","link":"https://cfp.privacyweek.at/pw18/talk/MJAMNT","description":"Anatomie des politischen Amtsmissbrauchs am Beispiel der Tierschutzcausa. Was passiert wenn Behörden ungehindert rechtsstaatliche Methoden verlassen?\n\n2018 „feiern“ wir das zehnjährige Jubiläum der Verhaftungen rund um den großen Tierschutzprozess in Wiener Neustadt. Vor 2008 hat niemand für möglich gehalten wie weit auch in Österreich gegen die eigene kritische Zivilgesellschaft vorgegangen werden kann. Wir müssen nicht nach Ungarn oder in die Türkei blicken, um besorgniserregende Beispiele von Repression zu finden.\n\nIn diesem Beitrag beleuchte ich was diesem weltweit für Aufsehen sorgenden Justizskandal vorausging, mit welchen Methoden die Betroffenen drangsaliert wurden, wie sie sich zur Wehr gesetzt haben und was wir aus all dem lernen können.\n\nDie Organisationsparagraphen 278 ff des österreichischen Strafgesetzbuchs erlangten mit ihrer dreisten Verwendung gegen die friedliche Tierschutzbewegung in Österreich traurige Berühmtheit. Aufgrund ihrer schwammigen Formulierung und höchst fragwürdiger Abläufe in Polizei und Gerichten, konnten sie benutzt werden Aktivist_innen nicht nur unter absurdem Aufwand zu verfolgen, sondern sie auch grundlos wegzusperren und zu ruinieren.\n\nDiese Erfahrungen lehrten die Tierschutzbewegung in Österreich die Bedeutung vertrauenswürdiger EDV-Lösungen. Leider hatten viele zuvor nur teilweise Verschlüsselung eingesetzt. So waren die Hauptinhalte im Prozess vor Gericht aus ihren Zusammenhängen gerissene Textfragmente, die ihre radikale Geisteshaltung belegen sollten. Es ging nicht um Taten. Die wurden im Prozess (im Gegensatz zu den Aussendungen an die Medien) gar nicht erst behauptet. Es wurde versucht mit wirren und verfälschten Zitaten den Angeklagten radikale Überzeugungen nachzuweisen, die ausreichen sollten, um sie als geistige Förder_innen einer imaginären kriminellen Organisation zur Durchsetzung von radikalen Tierschutzideen zu verurteilen.\n\nAber auch die österreichische Medienwelt befleckte sich nicht mit Ruhm. Die blinde wörtliche Übernahme von amtlichen Presseaussendungen machten es lange unmöglich über die tatsächlichen Fakten aufzuklären weil die Öffentlichkeit systematisch mit völlig haltlosen Schauermärchen zugemüllt wurde. Erst der konstante persönliche Einsatz zahlloser mutiger und motivierter Einzelmenschen und ein effektives „Freibeweisen“ konnte eine Wende hervorrufen, die nach Jahre langer Prozessführung nicht nur in Totalfreisprüche für alle Beschuldigten mündeten, sondern sogar in eine Entschärfung des in diesem Zusammenhang missbrauchten § 278 a des StGB.\n\nLeider sind wir weit davon entfernt die Gefahr gebannt zu haben. Die neue Regierung zerschlägt in einem atemberaubenden Tempo die Grundlagen unserer Gesellschaftsordnung. Verhüllungsverbot, Überwachungspaket, Staatstrojaner und Einschränkungen des Versammlungsrechts sind leider nur einzelne Beispiele eines Hagels an Angriffen gegen unsere aus gutem Grund verfassungsrechtlich geschützten Möglichkeiten ziviler Mitgestaltung. Wir müssen mehr denn je dafür eintreten unsere demokratischen Grundrechte zu verteidigen. Wir haben keine andere Wahl.\n\nWo Unrecht zu Recht wird, wird Widerstand zur Pflicht. … Niemand hat das Recht zu gehorchen.","original_language":"deu","persons":["Franz Gratzer"],"tags":["pw18","55"],"view_count":63,"promoted":false,"date":"2018-10-24T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-03-09T16:15:09.119+01:00","length":1842,"duration":1842,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/55-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/55-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/55-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/55-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-55-sterreich-gegen-sein-volk","url":"https://api.media.ccc.de/public/events/fe03537a-9aa0-5715-9aeb-fbd243b66183","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":1},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":2},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":2},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":1},{"event_id":6699,"event_guid":"ee7389df-5ede-58e2-adad-d9f293435e14","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":6},{"event_id":6725,"event_guid":"3bf7ad02-4a40-517a-bbda-7ef608d1bafa","weight":2},{"event_id":6729,"event_guid":"d9171468-acf9-59f9-a7a7-ca7133bb6355","weight":2},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":2},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":3},{"event_id":6749,"event_guid":"c0d2491d-5f01-4c12-bffd-37cb7b813f29","weight":3},{"event_id":6751,"event_guid":"d686cd55-7ee3-4e8d-ab3b-dac247c7879f","weight":2}]},{"guid":"0401b381-51f1-5e0b-aa93-b24aba39a2d8","title":"Internet of Things (IoT) Privacy \u0026 Security","subtitle":null,"slug":"pw18-67-internet-of-things-iot-privacy-security","link":"https://cfp.privacyweek.at/pw18/talk/RKWWPR","description":"Das Internet der Dinge (Internet of Things) wird immer wichtiger und \nwird auch kurzfristig Einfluss auf unsere Privatsphäre und Sicherheit \nhaben.  Einige dieser Fragen werden im Talk behandelt.\n\nInternet of Things (IoT) Privacy \u0026 Security\n\nDas Internet der Dinge (Internet of Things) wird immer wichtiger und \nwird auch kurzfristig Einfluss auf unsere Privatsphäre und Sicherheit \nhaben.  Nicht umsonst heisst ein Buch zur Sicherheit dieser Geräte \"The\nInternet of Risky Things\" [1].\n\nDer Talk wird eine Einführung in die Problematik anhand von Beispielen\ngeben, nicht nur die \"intelligenten\" Philips Hue Lampen hatten\nSicherheitsprobleme, wir haben eigentlich auch einen reichen\nErfahrungsschatz aus anderen IT-Bereichen wo in der Vergangenheit schon\neiniges schiefgegangen ist. Die Hoffnung -- die ja zuletzt stirbt --\nist, dass wir diese nicht im IoT-Bereich wiederholen.\n\nIn der Diskussion wird sich Gelegenheit ergeben, auch eigene Anekdoten\nund Erfahrungen mit IoT-Geräten beizutragen.\n\n[1] Sean Smith, \"The Internet of Risky Things -- Trusting the Devices\n    That Surround Us\", O'Reilly, 2017","original_language":"deu","persons":["Ralf Schlatterbeck"],"tags":["pw18","67"],"view_count":187,"promoted":false,"date":"2018-10-26T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2026-01-26T21:30:16.071+01:00","length":2628,"duration":2628,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/67-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/67-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/67-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/67-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-67-internet-of-things-iot-privacy-security","url":"https://api.media.ccc.de/public/events/0401b381-51f1-5e0b-aa93-b24aba39a2d8","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":2759,"event_guid":"ff3dc349-f733-4ba6-bc83-d4373fcc981d","weight":1},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":4},{"event_id":4357,"event_guid":"b673cff0-0c26-4316-8885-08a9dffeb335","weight":2},{"event_id":4567,"event_guid":"e687dabf-4edb-59f1-92d4-685b1f9ebc39","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":4},{"event_id":5959,"event_guid":"0c371809-6e2f-5094-a0ac-6190e939363a","weight":1},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":2},{"event_id":6134,"event_guid":"33b23c3d-c315-42f2-b1fd-e5bb2f6d6de0","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":2},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":1},{"event_id":6492,"event_guid":"bc545b26-8319-43fb-abc2-f624ef414ee8","weight":1},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1},{"event_id":6589,"event_guid":"afa54ff4-f64e-5426-b822-50342f5d4ce9","weight":1},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":2},{"event_id":6626,"event_guid":"5909125c-6118-4cda-931a-8b936f81dda0","weight":1},{"event_id":6633,"event_guid":"9e340a17-98f7-4ac2-8fd4-2f195c60c212","weight":1},{"event_id":6695,"event_guid":"d59adecb-8cd1-515c-b1dd-909303240438","weight":1},{"event_id":6697,"event_guid":"62228e80-fbf1-540b-b2be-5a0969f02001","weight":2},{"event_id":6700,"event_guid":"82aff162-f521-513d-aba9-47b5aae1935a","weight":3},{"event_id":6703,"event_guid":"9b9be282-765c-5dad-b62a-42a2cde4bfc5","weight":2},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":3},{"event_id":6709,"event_guid":"64f880cc-b22a-54d3-a471-97a11d0c702a","weight":3},{"event_id":6711,"event_guid":"e06c32e4-e7b5-5573-925c-20e1ed02c79c","weight":3},{"event_id":6713,"event_guid":"e4b9eb41-0ffd-546a-b56e-4c06eb676334","weight":3},{"event_id":6719,"event_guid":"dd88e389-69a5-5e2a-8920-963f300ba8f4","weight":3},{"event_id":6722,"event_guid":"0eca76b7-9294-50c1-9dfa-df5936080e62","weight":3},{"event_id":6723,"event_guid":"89e5bbf5-ed9a-58dc-962b-91ebfba80da3","weight":4},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3},{"event_id":6733,"event_guid":"b78e2c47-2fae-5266-a91f-06a6f2f9d19e","weight":2},{"event_id":6734,"event_guid":"780a8d95-2dbb-588d-9f28-d28093ba8cf2","weight":4},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":5},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":1},{"event_id":6741,"event_guid":"d1a8fbc3-8ee3-5ffd-bfa6-b7ec845b6859","weight":3},{"event_id":6742,"event_guid":"d4edc795-dfcb-51e1-b2b7-08c40f7069ac","weight":4},{"event_id":6743,"event_guid":"7a8d8045-fc52-5032-8471-1a2d98a17a38","weight":3},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":2}]},{"guid":"aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","title":"\"In der Datenblase hört dich keiner schreien\"","subtitle":"Thriller-Lesung","slug":"pw18-47--in-der-datenblase-hrt-dich-keiner-schreien-thriller-lesung","link":"https://cfp.privacyweek.at/pw18/talk/KR7NCU","description":"\u003cp\u003eLesung aus meinem neuen Roman \"Zernetzt\" ueber die Macht sozialer Medien. Im Anschluss folgt eine Diskussion zur Geschichte und natuerlich zum Facebook/Cambridge Analytica-Skandal. \u0026Uuml;ber mich: Dr. Anselm Rodenhausen,\u0026nbsp;bis vor kurzem Anwalt im Tech-Sektor (u.a. auf Mandaten f\u0026uuml;r internationale Netzwerkbetreiber), jetzt bei der EU Kommission (in der Generaldirektion f\u0026uuml;r den Digitalen Binnenmarkt, zust\u0026auml;ndig f\u0026uuml;r die Koordinierung von Themen wie KI, Cybersecurity und Online-Platformen).\u0026nbsp; Mit diesen Erfahrungen\u0026nbsp;habe ich einen Roman geschrieben, der im M\u0026auml;rz bei Droemer Knaur ver\u0026ouml;ffentlicht wurde: \u0026bdquo;Zernetzt\u0026ldquo; \u0026ndash; ein Wissenschafts-Thriller aus der vernetzten Gesellschaft. Im Mittelpunkt steht ein\u0026nbsp;deutsches Start-up, dem der Aufstieg zum internationalen Tech-Riesen gelingt, aber\u0026nbsp;um den Preis eines dunklen Geheimnisses.\u0026nbsp; \u0026Uuml;ber das Buch: Das soziale Netzwerk des Berliner Start-Ups \u0026raquo;Spannwerk\u0026laquo; hat die Macht des Silicon Valleys gebrochen. Philipp, gut vernetzter Berater rutscht in ein undurchsichtiges Forschungsprojekt des \u0026raquo;Spannwerks\u0026laquo;: Die n\u0026auml;chste Stufe des Netzwerks liest Gehirnstr\u0026ouml;me aus, speichert jeden Gedanken, verbindet die Menschen. Doch dann kommt einer seiner Kontakte unter mysteri\u0026ouml;sen Umst\u0026auml;nden ums Leben\u0026hellip;\u0026nbsp; Die Lesung dient als Aufhaenger fuer eine Diskussion mit dem Publikum: ueber die Macht von sozialen Netwerken und die Rolle des Individiums in einer immer enger vernetzten Gesellschaft.\u003c/p\u003e","original_language":"deu","persons":["Anselm Rodenhausen"],"tags":["pw18","47"],"view_count":66,"promoted":false,"date":"2018-10-22T00:00:00.000+02:00","release_date":"2019-01-28T01:00:00.000+01:00","updated_at":"2023-05-28T12:45:02.266+02:00","length":4548,"duration":4548,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2018/47-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2018/47-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2018/47-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2018/47-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw18-47--in-der-datenblase-hrt-dich-keiner-schreien-thriller-lesung","url":"https://api.media.ccc.de/public/events/aa01e2c8-13f3-54e9-9618-ba3f9f1ce40f","conference_title":"PrivacyWeek 2018","conference_url":"https://api.media.ccc.de/public/conferences/pw18","related":[{"event_id":1974,"event_guid":"5015774f62abf360","weight":1},{"event_id":6696,"event_guid":"49ccafc1-c33a-58ce-b788-e50dabdca382","weight":1},{"event_id":6701,"event_guid":"befefa91-0d58-5fc3-bb7c-cf35ab99b01e","weight":4},{"event_id":6704,"event_guid":"f1c3226b-03ad-5601-9fa8-2ce3865c5de0","weight":1},{"event_id":6707,"event_guid":"92d4043d-757a-5650-aa1e-c338386695e8","weight":5},{"event_id":6711,"event_guid":"e06c32e4-e7b5-5573-925c-20e1ed02c79c","weight":1},{"event_id":6715,"event_guid":"1fdb9edd-73fd-559e-945c-3ea9f14e7fe7","weight":1},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":5},{"event_id":6727,"event_guid":"d00b3dba-64f0-5bed-b6af-4d8cb5ff6fc4","weight":4},{"event_id":6745,"event_guid":"fc7dd329-c9be-55c3-aa8e-5ee099a93b56","weight":1}]}]}