{"acronym":"22c3","aspect_ratio":"4:3","updated_at":"2026-03-11T06:45:04.494+01:00","title":"22C3: Private Investigations","schedule_url":null,"slug":"congress/2005","event_last_released_at":"2008-01-13T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2005","logo_url":"https://static.media.ccc.de/media/congress/2005/folder-22c3.png","images_url":"https://static.media.ccc.de/media/congress/2005","recordings_url":"https://cdn.media.ccc.de/congress/2005","url":"https://api.media.ccc.de/public/conferences/22c3","events":[{"guid":"import-f436177d9ef364effd","title":"The Web according to W3C","subtitle":"How to turn your idea into a standard","slug":"22C3-429-en-w3c_web","link":"http://events.ccc.de/congress/2005/fahrplan/events/429.en.html","description":"W3C brings together experts, companies and users to define the fundamental formats and protocols of the Web. The challenge is to create a coherent system (the \"Semantic Web\") without forgetting\neverybody's short-term needs.\n","original_language":"eng","persons":["Bert Bos"],"tags":["22c3"," Community"],"view_count":24,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-22T12:15:03.738+01:00","length":3350,"duration":3350,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-429-en-w3c_web.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-429-en-w3c_web_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f436177d9ef364effd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f436177d9ef364effd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-429-en-w3c_web","url":"https://api.media.ccc.de/public/events/import-f436177d9ef364effd","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":191,"event_guid":"import-8a2821babcd0049f1b","weight":2},{"event_id":231,"event_guid":"import-ec9dc0988e70eb0bd7","weight":1},{"event_id":593,"event_guid":"import-d5d8add3bc284763a8","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":1000,"event_guid":"import-3d5766621126a21447","weight":1},{"event_id":1013,"event_guid":"import-81d644382a78a73130","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":2},{"event_id":2179,"event_guid":"e8e29f6a-11df-491a-acae-1253879ae8f9","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":1},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2229,"event_guid":"P8L4krxqjXP7zHMZToU6CQ","weight":1},{"event_id":2237,"event_guid":"k78-hNDINhkZS3TvxuLSrQ","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2241,"event_guid":"4f9TGtkPJafH9LU7RqsZnw","weight":1},{"event_id":2259,"event_guid":"35vPpFdywfzrf36_zbn6zA","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3774,"event_guid":"a26a0d23-549d-5bd6-8f1e-9803628d5850","weight":1}]},{"guid":"import-fab97d6d1228d5ad96","title":"5 Theses on Informational-Cognitive Capitalism","subtitle":null,"slug":"22C3-1083-en-informational_cognitive_capitalism","link":"http://events.ccc.de/congress/2005/fahrplan/events/1083.en.html","description":"Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth.\n","original_language":"eng","persons":["George N. Dafermos"],"tags":["22c3"," Science"],"view_count":159,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-07-23T02:00:02.859+02:00","length":2903,"duration":2903,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1083-en-informational_cognitive_capitalism.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1083-en-informational_cognitive_capitalism_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-fab97d6d1228d5ad96-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-fab97d6d1228d5ad96-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1083-en-informational_cognitive_capitalism","url":"https://api.media.ccc.de/public/events/import-fab97d6d1228d5ad96","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":20,"event_guid":"import-fed2b99f66d42a8f9a","weight":2},{"event_id":24,"event_guid":"import-df7b25850170e056b1","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":3},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":2},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":2},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":2}]},{"guid":"import-aa49a5b7081faac804","title":"Changing Realities","subtitle":"Innovation, user-creation, activism and entrepreneurship in Second Life","slug":"22C3-931-en-changing_realities","link":"http://events.ccc.de/congress/2005/fahrplan/events/931.en.html","description":"The 3D digital world of Second Life has been completely built by its residents. Running on a growing grid of computers, SL's real-time collaborative-creation tools and physical simulation allow for creativity of stunning depth and breadth.\n","original_language":"eng","persons":["Cory Ondrejka"],"tags":["22c3"," Culture"],"view_count":71,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-02T22:15:08.130+01:00","length":3496,"duration":3496,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-931-en-changing_realities.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-931-en-changing_realities_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-aa49a5b7081faac804-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-aa49a5b7081faac804-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-931-en-changing_realities","url":"https://api.media.ccc.de/public/events/import-aa49a5b7081faac804","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":3161,"event_guid":"4aeT8lX5EnteXRtPO9yYFA","weight":1}]},{"guid":"import-497b8fb8715bf2cdd6","title":"Logical Language Lojban","subtitle":"A Hackers' /Spoken/ Language?!","slug":"22C3-569-en-lojban","link":"http://events.ccc.de/congress/2005/fahrplan/events/569.en.html","description":"Lojban is an artificial language for humans. It was designed to be a more powerful means of communication between humans than \"legacy\" natural languages. Among other attractions, it is based on predicate logic and has an unambiguous grammar. It can be learnt within days.\n","original_language":"eng","persons":["Sven Moritz Hallberg"],"tags":["22c3"," Culture"],"view_count":294,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-15T07:45:03.785+01:00","length":3550,"duration":3550,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-569-en-lojban.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-569-en-lojban_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-497b8fb8715bf2cdd6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-497b8fb8715bf2cdd6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-569-en-lojban","url":"https://api.media.ccc.de/public/events/import-497b8fb8715bf2cdd6","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":109,"event_guid":"import-3db2bb3d91071a3717","weight":2},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1227,"event_guid":"import-bc8cc3f9450dfddd83","weight":1},{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":1},{"event_id":1826,"event_guid":"Ae-3k2zOoIDF16EaC2uCWA","weight":1},{"event_id":1885,"event_guid":"09540bbd511c6f57","weight":6},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":4216,"event_guid":"f90b88a0-e43e-46f4-b9ad-373995a520ee","weight":9},{"event_id":4248,"event_guid":"07a55a43-7096-49a9-9f89-38fa00e3cd47","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1}]},{"guid":"import-0f9b42526ff00c14b5","title":"Data Retention - what comes next?","subtitle":null,"slug":"22C3-504-en-data_retention","link":"http://events.ccc.de/congress/2005/fahrplan/events/504.en.html","description":"Chances and Risks of Data Retention Legislation are currently discussed in an intensive way without talking a closer look what could be the next legislative steps to increase the investigation authorities possibilities. It is well known, that offenders as well as normal users acting in networks can easily circumvents the \"risks\" caused by the complete storage of traffic data by using public access points and encryption technology.\n","original_language":"eng","persons":["Marco Gercke"],"tags":["22c3"," Science"],"view_count":8,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-01-31T08:00:03.046+01:00","length":3372,"duration":3372,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-504-en-data_retention.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-504-en-data_retention_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-0f9b42526ff00c14b5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-0f9b42526ff00c14b5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-504-en-data_retention","url":"https://api.media.ccc.de/public/events/import-0f9b42526ff00c14b5","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":992,"event_guid":"import-107a176446d333e063","weight":1}]},{"guid":"import-3879979ffb75b723f8","title":"Covert Communication in a Dark Network","subtitle":"A major new version of freenet","slug":"22C3-492-en-freenet_new_version","link":"http://events.ccc.de/congress/2005/fahrplan/events/492.en.html","description":"At Defcon 13, we presented our ideas for creating scalable networks where only trusted friends speak directly to each other. In this talk, we will elaborate on this, discussing further experiments and results, as well as our attempts to build such a network for real.\n","original_language":"eng","persons":["Ian Clarke","Oskar Sandberg"],"tags":["22c3"," Hacking"],"view_count":111,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-26T21:45:08.300+01:00","length":3871,"duration":3871,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-492-en-freenet_new_version.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-492-en-freenet_new_version_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-3879979ffb75b723f8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-3879979ffb75b723f8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-492-en-freenet_new_version","url":"https://api.media.ccc.de/public/events/import-3879979ffb75b723f8","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":798,"event_guid":"import-1c79c2ce56e02c06d9","weight":1},{"event_id":916,"event_guid":"import-34c9c7ca1b95d58b9a","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":980,"event_guid":"import-bc2aaf07ba36dce54b","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1},{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1058,"event_guid":"import-20a6b9aac8f72f4d2c","weight":1},{"event_id":1072,"event_guid":"import-a60aea0b597609400e","weight":1},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2967,"event_guid":"cabf79b8-cadc-45ef-89c8-c3c877baf379","weight":1},{"event_id":2990,"event_guid":"6de11db2-2aae-4cd1-969f-f2a16a557f8f","weight":1},{"event_id":3588,"event_guid":"93e26933-9bec-5ba5-b792-b5b576704a5c","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3638,"event_guid":"c06dd4c2-c637-445d-9c72-92204a35eeff","weight":1},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":1},{"event_id":4235,"event_guid":"e914d37b-16a4-4529-890d-654a4b22b054","weight":1},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":1},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":1},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":1},{"event_id":4979,"event_guid":"c0628cc6-b320-4377-902f-59d6078b2608","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":2},{"event_id":6491,"event_guid":"9f8b19eb-31cb-4250-80d4-5caf4e0b33dd","weight":1}]},{"guid":"import-184dd05c328f44989b","title":"Fair Code","subtitle":"Free/Open Source Software and the Digital Divide","slug":"22C3-479-en-fair_code","link":"http://events.ccc.de/congress/2005/fahrplan/events/479.en.html","description":"What has software to do with development policy? A lot. Software is not only about code, it is about  rights, control, transparency, freedom and power.\n","original_language":"eng","persons":["Meike Richter"],"tags":["22c3"," Society"],"view_count":26,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-30T20:00:28.216+01:00","length":3260,"duration":3260,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-479-en-fair_code.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-479-en-fair_code_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-184dd05c328f44989b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-184dd05c328f44989b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-479-en-fair_code","url":"https://api.media.ccc.de/public/events/import-184dd05c328f44989b","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":4578,"event_guid":"805bb174-4ec9-55c6-bd10-ebe111c212ab","weight":1},{"event_id":4734,"event_guid":"b1acc9eb-d761-509d-a726-b2409ea01a8e","weight":1},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":1},{"event_id":5052,"event_guid":"c0f6d8e7-a019-409c-9645-c5ed41af648c","weight":1},{"event_id":5706,"event_guid":"615c0099-652b-5e1f-bf9e-2e613d10b254","weight":1},{"event_id":5707,"event_guid":"37a90809-5147-5662-bbce-c669c810fec9","weight":2}]},{"guid":"import-2c717701c0484bd4cd","title":"Videoüberwachung an deutschen Hochschulen","subtitle":"oder: \"Über meine Maßnahmen gebe ich keine Auskunft\"","slug":"22C3-511-de-videoueberwachung_hochschulen","link":"http://events.ccc.de/congress/2005/fahrplan/events/511.en.html","description":"Nach den BigBrotherAwards 2004, bei denen die Universität Paderborn einen Preis für ihre Videoüberwachung abgeräumt hat, liefen einige tolle Aktionen an der Universität. Davon motiviert hat der FoeBuD e.V. zusammen mit dem fzs (freier zusammenschluss studentInnenschaften) ein Projekt ins Leben gerufen, bei dem untersucht werden sollte, wie weit Videoüberwachung an deutschen Hochschulen verbreitet ist.\n","original_language":"eng","persons":["Olode"],"tags":["22c3"," Society"],"view_count":65,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-07-18T13:00:05.778+02:00","length":3014,"duration":3014,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-511-de-videoueberwachung_hochschulen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-511-de-videoueberwachung_hochschulen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2c717701c0484bd4cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2c717701c0484bd4cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-511-de-videoueberwachung_hochschulen","url":"https://api.media.ccc.de/public/events/import-2c717701c0484bd4cd","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":2},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":3},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":3},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":4},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":2}]},{"guid":"import-16196d0642260192ac","title":"Free Software and Anarchism","subtitle":"does this compute?","slug":"22C3-517-en-free_software_and_anarchism","link":"http://events.ccc.de/congress/2005/fahrplan/events/517.en.html","description":"The mode of production in free software development is often being described as anarchical. Despite this attribution seems not initially intended in any fundamental political sense, this sense starts to transfuse the discussions. This invites to a closer look at the reference: what it is, what it's not and what it could be. And once viewed from general anarchist theory and the anarchist theory of technology, any political relation seems to vanish. But despite this first stance, a demonstrative value can still be obtained as soon as some critical remarks are acknowledged and some developmental frames would be changed.\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["22c3"," Society"],"view_count":110,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-11-18T14:45:04.948+01:00","length":3257,"duration":3257,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-517-en-free_software_and_anarchism.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-517-en-free_software_and_anarchism_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-16196d0642260192ac-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-16196d0642260192ac-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-517-en-free_software_and_anarchism","url":"https://api.media.ccc.de/public/events/import-16196d0642260192ac","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":162,"event_guid":"import-c103a561a60405ea5c","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":672,"event_guid":"import-f598f668f20869cb04","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":2},{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":996,"event_guid":"import-38c2dd9d642c6ca79a","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":2},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1083,"event_guid":"import-5c51d2ca6467e8e4a4","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":2},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":1},{"event_id":1205,"event_guid":"import-857941dfbc4586b4f7","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1292,"event_guid":"import-67317fc1b3b5c3dc8c","weight":1},{"event_id":1390,"event_guid":"import-9c82dc5bc5ce9b2674","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1564,"event_guid":"import-6719b9183f1139890a","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":2},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":1},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":2384,"event_guid":"15a42829-1e83-4ff4-aa1a-c39f6cdf2a15","weight":1},{"event_id":2784,"event_guid":"d23288d1-84a4-11e5-9649-fd71808389dd","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":2880,"event_guid":"72ad2630-b736-4d4c-8ea1-d982076426bc","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":2943,"event_guid":"969bee9e-d0bf-4d24-a649-15f93747d608","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":3340,"event_guid":"d4776b28-450d-5c72-bbcd-16b813808106","weight":1},{"event_id":3605,"event_guid":"61f9d4c6-a3de-4958-a57c-efcf941668fa","weight":1},{"event_id":3608,"event_guid":"a0c851a1-b44e-46cb-bbb8-db966bc8639b","weight":1},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":1},{"event_id":3636,"event_guid":"a1a52c4c-8233-403b-8f04-db981df016c1","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3751,"event_guid":"3226a81b-dd11-42cc-8c14-ae9f95c01bbd","weight":1},{"event_id":3756,"event_guid":"6796635e-2dd6-4f91-8f23-ba1bea7e2994","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":2},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4281,"event_guid":"271f3623-a772-4052-81da-04872d9651ce","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":4296,"event_guid":"0eff8b32-bd9e-4a69-b704-70171ca0e83e","weight":1},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":1},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":1},{"event_id":4559,"event_guid":"255b2c2a-e869-5faa-a1a1-61b9da8cc8a5","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1},{"event_id":5706,"event_guid":"615c0099-652b-5e1f-bf9e-2e613d10b254","weight":1},{"event_id":5713,"event_guid":"ecd4b6e1-efa1-581e-a44f-e905448128c0","weight":1},{"event_id":6014,"event_guid":"45336cce-788c-5800-84f1-0a7411d7e2da","weight":1},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":1},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":1},{"event_id":7246,"event_guid":"bd14bd0e-364d-5be2-aec8-2bc424f5f1af","weight":1},{"event_id":7255,"event_guid":"265fd581-ed2b-5985-879c-0d51c45c70c8","weight":1}]},{"guid":"import-c837a2404965cf7696","title":"Informationsfreiheitsgesetz","subtitle":null,"slug":"22C3-1084-de-informationsfreiheitsgesetz","link":"http://events.ccc.de/congress/2005/fahrplan/events/1084.en.html","description":"In diesem Vortrag geht es um das Informationsfreiheitsgesetz des Bundes, dass am ab 1.1.2006 in Kraft tritt.\n","original_language":"eng","persons":["Jörg Tauss"],"tags":["22c3"," Society"],"view_count":81,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-24T04:30:03.670+01:00","length":3034,"duration":3034,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1084-de-informationsfreiheitsgesetz.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1084-de-informationsfreiheitsgesetz_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-c837a2404965cf7696-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-c837a2404965cf7696-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1084-de-informationsfreiheitsgesetz","url":"https://api.media.ccc.de/public/events/import-c837a2404965cf7696","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":2},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":3583,"event_guid":"644ddfa9-2ae4-5d6f-aea8-ef23138d3f0f","weight":6},{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":2}]},{"guid":"import-714a2f9e3b449a1b2d","title":"AJAX Based Web Applications","subtitle":null,"slug":"22C3-418-en-ajax_web_applications","link":"http://events.ccc.de/congress/2005/fahrplan/events/418.en.html","description":"Isn't ironic that web applications are now as nice to use as GUI applications were before the web was invented? Well, almost as nice. We review state of the technologies that make this possible, and discuss the ramifications for the architecture of web applications.\n","original_language":"eng","persons":["(mesch) Steffen Meschkat"],"tags":["22c3"," Hacking"],"view_count":110,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-03-16T15:15:05.737+01:00","length":4210,"duration":4210,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-418-en-ajax_web_applications.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-418-en-ajax_web_applications_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-714a2f9e3b449a1b2d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-714a2f9e3b449a1b2d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-418-en-ajax_web_applications","url":"https://api.media.ccc.de/public/events/import-714a2f9e3b449a1b2d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":2},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":957,"event_guid":"import-fa398718f4c3eec297","weight":1},{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1586,"event_guid":"import-4943bb5b62764ada53","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":2},{"event_id":2179,"event_guid":"e8e29f6a-11df-491a-acae-1253879ae8f9","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":1},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2229,"event_guid":"P8L4krxqjXP7zHMZToU6CQ","weight":1},{"event_id":2237,"event_guid":"k78-hNDINhkZS3TvxuLSrQ","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2241,"event_guid":"4f9TGtkPJafH9LU7RqsZnw","weight":1},{"event_id":2259,"event_guid":"35vPpFdywfzrf36_zbn6zA","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3154,"event_guid":"axE0bWDwutJ5VgLbiJnqJQ","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3723,"event_guid":"f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4417,"event_guid":"955ab1c9-016a-4f90-a3d9-b37577b99f82","weight":1},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":1}]},{"guid":"import-f31ce8e8ede86842b2","title":"Magnetic Stripe Technology","subtitle":null,"slug":"22C3-765-en-magnetic_stripe_technology","link":"http://events.ccc.de/congress/2005/fahrplan/events/765.en.html","description":"Find out how magnetic stripe technology works, how it can be hacked, how to build a card reader with parts you can find in your 'junk drawer', and how this reader design can be used to reverse engineer proprietary formats.\n","original_language":"eng","persons":["Joseph Battaglia"],"tags":["22c3"," Hacking"],"view_count":66,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-09-10T18:15:05.050+02:00","length":2699,"duration":2699,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-765-en-magnetic_stripe_technology.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-765-en-magnetic_stripe_technology_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f31ce8e8ede86842b2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f31ce8e8ede86842b2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-765-en-magnetic_stripe_technology","url":"https://api.media.ccc.de/public/events/import-f31ce8e8ede86842b2","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":24,"event_guid":"import-df7b25850170e056b1","weight":1},{"event_id":26,"event_guid":"import-7546b8f6ee2d14b2e6","weight":1},{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2523,"event_guid":"afe359da-56c9-4e76-8f56-45ed406494e5","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4108,"event_guid":"a53b2bd1-2104-504f-8469-6eb198675c7b","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1}]},{"guid":"import-95be4c3ebe752a2303","title":"Private investigations in searching","subtitle":"How to find any book (and many other roadkills) on the Information Super-Highway","slug":"22C3-408-en-private_investigations_in_searching","link":"http://events.ccc.de/congress/2005/fahrplan/events/408.en.html","description":"You will not need to copy any more nothing on your hard disk. Once you learn some sound searching techniques, you will easily find whatever you want, whenever you want on the fly.\n","original_language":"eng","persons":["Fravia"],"tags":["22c3"," Hacking"],"view_count":152,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-29T19:00:12.397+01:00","length":3192,"duration":3192,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-408-en-private_investigations_in_searching.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-408-en-private_investigations_in_searching_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-95be4c3ebe752a2303-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-95be4c3ebe752a2303-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-408-en-private_investigations_in_searching","url":"https://api.media.ccc.de/public/events/import-95be4c3ebe752a2303","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":633,"event_guid":"import-602feb2c50f0e78d8d","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":904,"event_guid":"import-d0f7647cadbc7a6918","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":914,"event_guid":"import-3715aeea2e9dad683d","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":1},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":3},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":2402,"event_guid":"323bb94ec4500a98f8ad07ec077605bc","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":4396,"event_guid":"b5188ef7-b244-48fc-826e-7603cd1d7837","weight":1},{"event_id":4426,"event_guid":"21c4794b-1dbb-4c28-a48a-bdc5d4455cde","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":1},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":1}]},{"guid":"import-318a15cba5689b8505","title":"Wargames - Hacker Spielen","subtitle":"Männliche Identitätskonstruktion und spielerische Herangehensweisen an Computer","slug":"22C3-427-de-wargames_hacker_spielen","link":"http://events.ccc.de/congress/2005/fahrplan/events/427.en.html","description":"In diesem Vortrag unternehme ich den Versuch, einige Aspekte der Konstruktion von Geschlechteridentitäten anhand der Figur des Hackers zu beleuchten. Der Hacker als Identitätskonstruktion interessiert mich in Bezug auf den technikzentrierten Kontext, in dem er spielerisch agiert.\n","original_language":"eng","persons":["Francis Hunger"],"tags":["22c3"," Society"],"view_count":70,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-05-28T18:00:04.687+02:00","length":3797,"duration":3797,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-427-de-wargames_hacker_spielen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-427-de-wargames_hacker_spielen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-318a15cba5689b8505-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-318a15cba5689b8505-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-427-de-wargames_hacker_spielen","url":"https://api.media.ccc.de/public/events/import-318a15cba5689b8505","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":537,"event_guid":"import-4708c2ca79cda1a120","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":781,"event_guid":"import-777375527796871e60","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":2},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":3},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":964,"event_guid":"import-480d3f86e0ad1352fc","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":2},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":2},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":2},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":1},{"event_id":1342,"event_guid":"import-8f19a40ed78b95df8d","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1376,"event_guid":"import-b4f1afea850aa4a506","weight":1},{"event_id":1383,"event_guid":"import-c5cfcdb5af5a7ff87e","weight":1},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":1},{"event_id":1796,"event_guid":"z7M48Tb_4vtI0BBFVqe_ag","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":1873,"event_guid":"import-08c713ee308dfefba3","weight":1},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":1},{"event_id":2637,"event_guid":"cbb9db2e-a159-4bea-a2a3-eac73061d1f4","weight":1},{"event_id":2809,"event_guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3716,"event_guid":"70269173-72a8-4eab-b356-f22faea6cdca","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3749,"event_guid":"e26852ae-9efe-47a0-9e65-3bbd120f7422","weight":1},{"event_id":3947,"event_guid":"ZwjtZbsZpe6Xfim50cj-CA","weight":1},{"event_id":4576,"event_guid":"fc198f7f-f56d-5379-b9fc-2a3cd11e3e64","weight":1},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4700,"event_guid":"aadf222c-3ded-49b4-b80e-5a36e17d5dcb","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":1},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":1},{"event_id":5417,"event_guid":"ccba0f04-f86a-4dfc-b371-13eb56a910a4","weight":1},{"event_id":5418,"event_guid":"dae02ea8-8ab8-446f-8cd7-779e507dbfcb","weight":1},{"event_id":5425,"event_guid":"d0ff38b6-b6f9-4f4d-9314-75fd34bac04a","weight":1},{"event_id":5695,"event_guid":"28374aa2-885a-11e8-941f-f33234d12992","weight":1},{"event_id":5971,"event_guid":"1b238da1-4d57-5951-8dea-abf09df92f3e","weight":1},{"event_id":6184,"event_guid":"78e07e27-053d-55f5-92d1-16956900e402","weight":1},{"event_id":6185,"event_guid":"7ae956e6-3ad3-5c07-8f24-8e7ca0ed2607","weight":1},{"event_id":6187,"event_guid":"727ab4e8-3c10-550f-b9c9-9c9d5e2762bc","weight":1},{"event_id":6191,"event_guid":"177f3537-1744-5042-9e63-0adaa09660fc","weight":1},{"event_id":6211,"event_guid":"523819a2-6286-5f69-bbaa-d774d9ce9522","weight":1},{"event_id":6213,"event_guid":"0359a694-0b5d-5d7f-a10c-4403331c032c","weight":1},{"event_id":6218,"event_guid":"2a465579-1ef2-51e5-8807-6ef1d8f7d69d","weight":1},{"event_id":6226,"event_guid":"1558bd56-a5a6-5a9d-ade1-f7f4da7dab38","weight":1},{"event_id":6227,"event_guid":"fefc9946-3fe4-5f78-9ec1-9ef95b3bf502","weight":1},{"event_id":6229,"event_guid":"255cb75a-a2bb-5495-88f9-94be005953f1","weight":1}]},{"guid":"import-e9b440ff02ce09ca59","title":"Anonymous Data Broadcasting by Misuse of Satellite ISPs","subtitle":"An open-source project to develop a tool for broadband satellite broadcasts","slug":"22C3-589-en-anonymous_data_broadcasting","link":"http://events.ccc.de/congress/2005/fahrplan/events/589.en.html","description":"The lecture focuses on satellite ISP technology and how to misuse it for anonymously broadcasting to an unlimited number of anonymous users while only one user pays for a standard dial-up connection of a satellite ISP.\n","original_language":"eng","persons":["Sven Löschner"],"tags":["22c3"," Hacking"],"view_count":85,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-14T17:15:10.588+01:00","length":2638,"duration":2638,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-589-en-anonymous_data_broadcasting.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-589-en-anonymous_data_broadcasting_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e9b440ff02ce09ca59-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e9b440ff02ce09ca59-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-589-en-anonymous_data_broadcasting","url":"https://api.media.ccc.de/public/events/import-e9b440ff02ce09ca59","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":904,"event_guid":"import-d0f7647cadbc7a6918","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":2},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":2},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":2},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1}]},{"guid":"import-944629eb7dfcefd91f","title":"Search Engines - Oracles of the Information Society","subtitle":"The Saga continues: Search Engines, Technology, Politics, Prostitution, Corruption, Privacy and Espionage.","slug":"22C3-1104-en-search_oracle_society","link":"http://events.ccc.de/congress/2005/fahrplan/events/1104.en.html","description":"The session will focus on the influence of search engines on individuals, societies, education and politics.\n","original_language":"eng","persons":["Michael Christen","Frédéric Philipp Thiele","Wolfgang Sander-Beuermann","Hendrik Speck"],"tags":["22c3"," Society"],"view_count":32,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-30T16:15:22.148+01:00","length":3394,"duration":3394,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1104-en-search_oracle_society.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1104-en-search_oracle_society_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-944629eb7dfcefd91f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-944629eb7dfcefd91f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1104-en-search_oracle_society","url":"https://api.media.ccc.de/public/events/import-944629eb7dfcefd91f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":2249,"event_guid":"7dt2PzyGxZI8i0QQysCZ6Q","weight":1},{"event_id":2255,"event_guid":"aowmh_BVhxN_YNmkQomweQ","weight":1},{"event_id":2338,"event_guid":"e51a1062-c2e2-487c-9d94-f97b47a894af","weight":1},{"event_id":4254,"event_guid":"e6957ebe-3682-4ab3-a0f3-26736a57f3a2","weight":1},{"event_id":4467,"event_guid":"b73be6a0-292a-4a98-b9bf-f38755279f6e","weight":1},{"event_id":4743,"event_guid":"c36aa2f0-cf40-5d57-9d8a-67c4057bb17a","weight":1}]},{"guid":"import-ce8d251e2700d0da32","title":"Recent Developments in EU Data Retention proposals","subtitle":"Commission vs. Council - the lesser of two evils?","slug":"22C3-568-en-eu_data_retention_proposals","link":"http://events.ccc.de/congress/2005/fahrplan/events/568.en.html","description":"Presentation and Discussion of the EU proposals for mandatory data retention, proposed individualy by the EU council and the EU comission.\n","original_language":"eng","persons":["Klaus Landefeld"],"tags":["22c3"," Society"],"view_count":9,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-07-17T21:00:04.866+02:00","length":3153,"duration":3153,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-568-en-eu_data_retention_proposals.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-568-en-eu_data_retention_proposals_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ce8d251e2700d0da32-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ce8d251e2700d0da32-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-568-en-eu_data_retention_proposals","url":"https://api.media.ccc.de/public/events/import-ce8d251e2700d0da32","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3755,"event_guid":"2bdf3de1-417b-4a5a-b31e-4701a921fb5c","weight":1},{"event_id":6414,"event_guid":"f010dc03-13bc-413d-95ec-e8786626a2f1","weight":1},{"event_id":6418,"event_guid":"dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861","weight":1},{"event_id":6519,"event_guid":"5a8097ad-15c2-492e-8bc4-6b634fd8e963","weight":1},{"event_id":6582,"event_guid":"36635330-55d6-4297-abcd-6d22fd2d22df","weight":1},{"event_id":6607,"event_guid":"52ce1398-fa9b-4bd3-aa9e-6a49a764ac2c","weight":1}]},{"guid":"import-d4541c93c84d480010","title":"Esperanto, die internationale Sprache","subtitle":"Eine gut strukturierte Sprache für Geeks und die EU","slug":"22C3-503-de-esperanto","link":"http://events.ccc.de/congress/2005/fahrplan/events/503.en.html","description":"Esperanto ist eine leicht erlernbare Sprache, die durch ihre klare Struktur besticht. Sie soll als Zweitsprache weltweite Verständigung ermöglichen. Momentan werden Englisch und dessen Muttersprachler bevorzugt. Bei Esperanto sind alle gleich.\n","original_language":"eng","persons":["pallas (Corinna Habets)"],"tags":["22c3"," Culture"],"view_count":709,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-25T21:00:10.322+01:00","length":2645,"duration":2645,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-503-de-esperanto.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-503-de-esperanto_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d4541c93c84d480010-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d4541c93c84d480010-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-503-de-esperanto","url":"https://api.media.ccc.de/public/events/import-d4541c93c84d480010","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":4},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":1},{"event_id":808,"event_guid":"import-7c99dcae00d6905772","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":1},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":3},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":2},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":2},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":1},{"event_id":1896,"event_guid":"c0dcfed1c1eee044","weight":4},{"event_id":2146,"event_guid":"HOqeNIb6G7M4hYFKFRkCmQ","weight":1},{"event_id":2309,"event_guid":"d0c4283e-2627-49f7-807d-13c96da8a8dd","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1}]},{"guid":"import-76a40622f79a62b91d","title":"Fuzzing","subtitle":"Breaking software in an automated fashion","slug":"22C3-537-en-fuzzing","link":"http://events.ccc.de/congress/2005/fahrplan/events/537.en.html","description":"Fuzzing is the art of automatic bug finding. This is done by providing applications with somewhat broken to really broken input. During my talk I'll give an overview of current fuzzers and how to build your own.\n","original_language":"eng","persons":["Ilja"],"tags":["22c3"," Hacking"],"view_count":105,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-08T20:45:06.037+01:00","length":6448,"duration":6448,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-537-en-fuzzing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-537-en-fuzzing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-76a40622f79a62b91d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-76a40622f79a62b91d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-537-en-fuzzing","url":"https://api.media.ccc.de/public/events/import-76a40622f79a62b91d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":3005,"event_guid":"f390d1c8-9712-40bd-a09d-9d7b7508b348","weight":4},{"event_id":4257,"event_guid":"9f3c556d-5cb0-4b17-a099-3c4626a7e83b","weight":3},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":2}]},{"guid":"import-79733a0b60ccfdcda9","title":"Message generation at the info layer","subtitle":"Basic introduction in coding on unvirtual realities.","slug":"22C3-1102-en-message_generation_at_the_info_layer","link":"http://events.ccc.de/congress/2005/fahrplan/events/1102.en.html","description":"What have talking to your lover and information warfare in common? After building a simple model on human communication and some introductions we begin to play with message construction learning about how to program the matrix.\n","original_language":"eng","persons":["ulong"],"tags":["22c3"," Society"],"view_count":6,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2022-08-06T02:00:02.940+02:00","length":1647,"duration":1647,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1102-en-message_generation_at_the_info_layer.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1102-en-message_generation_at_the_info_layer_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-79733a0b60ccfdcda9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-79733a0b60ccfdcda9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1102-en-message_generation_at_the_info_layer","url":"https://api.media.ccc.de/public/events/import-79733a0b60ccfdcda9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":1109,"event_guid":"import-7837c4968ac13514ce","weight":1}]},{"guid":"import-2fe8f5f454423d73a8","title":"Hacking into TomTom Go","subtitle":"Reverse-Engineering des Embedded-Linux-Navigationssystems","slug":"22C3-603-de-hacking_tomtom_go","link":"http://events.ccc.de/congress/2005/fahrplan/events/603.en.html","description":"TomTom hat mit dem Go ein schickes und flexibles Embedded-Linux-System auf den Markt gebracht, das nur danach schreit, auch für andere Zwecke verwendet zu werden. Leider sind System-Images signiert - und hier soll gezeigt werden, wie diese Signatur geknackt wurde.\n","original_language":"eng","persons":["Christian Daniel","Thomas Kleffel"],"tags":["22c3"," Hacking"],"view_count":365,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-22T19:00:10.169+01:00","length":3146,"duration":3146,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-603-de-hacking_tomtom_go.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-603-de-hacking_tomtom_go_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2fe8f5f454423d73a8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2fe8f5f454423d73a8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-603-de-hacking_tomtom_go","url":"https://api.media.ccc.de/public/events/import-2fe8f5f454423d73a8","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":646,"event_guid":"import-7af3c11a86c7ca7fca","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":2},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":905,"event_guid":"import-a50e2a69d02db0bc4a","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":951,"event_guid":"import-fea9da9951d5fe8f3d","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":1},{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":3},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":2},{"event_id":1177,"event_guid":"import-8787f59e50a6816bed","weight":1},{"event_id":1289,"event_guid":"import-c3664da0c16eae29c2","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":2},{"event_id":1323,"event_guid":"import-5e89fe5c21c6e4d891","weight":1},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1379,"event_guid":"import-f62972ee26d8e418a1","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1711,"event_guid":"import-8381ce96744da065b9","weight":1},{"event_id":1712,"event_guid":"import-79b1beb3f18e5edc5a","weight":1},{"event_id":1783,"event_guid":"3rqxJH8xZ4waSOXtJbxrDg","weight":1},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":1},{"event_id":1825,"event_guid":"juhvY3wvW_i3TTb8KDEyeQ","weight":1},{"event_id":1993,"event_guid":"H9oyfDzQNwJdvP6ZNeK8aA","weight":1},{"event_id":2155,"event_guid":"Bnz1quB2NHq9BEXoyNm5xQ","weight":1},{"event_id":2232,"event_guid":"vw7sldBf_2ldlwNWTOF93A","weight":1},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":1},{"event_id":2876,"event_guid":"144b2208-bf0b-494c-99e5-665ed18f1e8f","weight":1},{"event_id":2948,"event_guid":"7ca8581d-a3f7-4247-8101-786cf04d9bd1","weight":1},{"event_id":3078,"event_guid":"a46b1da6-60e5-42ea-b501-75e6e20f836d","weight":1},{"event_id":3554,"event_guid":"84e9ccad-5efe-49ac-b117-b382ae6fac1f","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":5280,"event_guid":"2fb00fb8-016b-42a0-a2db-742b6fc2dc80","weight":1},{"event_id":6747,"event_guid":"5748f3e9-c6ed-5669-950b-24b9e215f1e7","weight":1}]},{"guid":"import-e7c273000224131013","title":"CCC Jahresrückblick","subtitle":"Ein Überblick über die Aktivitäten des Clubs 2005","slug":"22C3-483-de-ccc_jahresrueckblick","link":"http://events.ccc.de/congress/2005/fahrplan/events/483.en.html","description":"Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.\n","original_language":"eng","persons":["starbug","Lars Weiler","Andy Müller-Maguhn"],"tags":["22c3"," Community"],"view_count":224,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-02T04:45:03.205+01:00","length":2623,"duration":2623,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-483-de-ccc_jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-483-de-ccc_jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e7c273000224131013-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e7c273000224131013-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-483-de-ccc_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-e7c273000224131013","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":4},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":6},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":2311,"event_guid":"29dbd740-b1c8-476d-b8f1-ad98df418bb7","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":3},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4356,"event_guid":"1a7df7a4-a1c0-4cca-975b-3cb52424c874","weight":1},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":2}]},{"guid":"import-f46b9a6a2d546305c8","title":"Understanding buffer overflow exploitation","subtitle":"The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell","slug":"22C3-571-en-understanding_buffer_overflow_exploitation","link":"http://events.ccc.de/congress/2005/fahrplan/events/571.en.html","description":"Everything started with Aleph One's paper \"Smashing the Stack for Fun and Profit\". These techniques are still the basis for modern exploitation of buffer, heap and format string  vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb and how these few tools can be used to understand and write shell-code to turn simple buffer overflows into backdoors that open whole systems to potential attackers. Sure you want to know how to defend against that. We also will tell you about that!\n","original_language":"eng","persons":["Christiane Ruetten"],"tags":["22c3"," Hacking"],"view_count":563,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-11T06:45:04.492+01:00","length":3555,"duration":3555,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-571-en-understanding_buffer_overflow_exploitation.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-571-en-understanding_buffer_overflow_exploitation_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f46b9a6a2d546305c8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f46b9a6a2d546305c8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-571-en-understanding_buffer_overflow_exploitation","url":"https://api.media.ccc.de/public/events/import-f46b9a6a2d546305c8","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":4},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":772,"event_guid":"import-d6c23abc0101cdf909","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":1},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":904,"event_guid":"import-d0f7647cadbc7a6918","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":2},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":917,"event_guid":"import-2623e5399f12d9c994","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":929,"event_guid":"import-184dd05c328f44989b","weight":1},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":3},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":2},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":1},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":2},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1041,"event_guid":"import-7f7937ab691a2b98e6","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":2},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":2},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1278,"event_guid":"import-c061c38bfc1a4656a5","weight":1},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":1},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":1346,"event_guid":"import-e9df7801eb432bf49e","weight":1},{"event_id":1428,"event_guid":"import-8caea0cb6ec40f1246","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1704,"event_guid":"import-a9812440f38232930c","weight":1},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":1},{"event_id":1817,"event_guid":"GjMyYKOlFIvTVBV1gI_1SA","weight":2},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":2308,"event_guid":"f0cdbbeb-2478-4f17-b50e-ec584b44bffe","weight":1},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":1},{"event_id":2688,"event_guid":"zellulaerer_automat","weight":1},{"event_id":2820,"event_guid":"1d7d4787-c77a-4e6e-9398-f3b4dcaa3587","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":2},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":3676,"event_guid":"f6811c99-96af-44d5-b82d-5afe826b2caf","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3743,"event_guid":"72e44333-c59a-47a4-9ef3-d5e8c9637eb6","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":4391,"event_guid":"c2d5346f-bd26-43c3-8c19-bbcdf52cd6e3","weight":1},{"event_id":4396,"event_guid":"b5188ef7-b244-48fc-826e-7603cd1d7837","weight":1},{"event_id":4444,"event_guid":"338b865c-b072-45f1-a8bc-54775999e794","weight":1},{"event_id":4457,"event_guid":"da3e484f-a48f-44c6-819d-1a15669f6ed7","weight":1},{"event_id":4482,"event_guid":"8a24c98b-0092-490d-bb7d-7252795bb08c","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4789,"event_guid":"684193b5-696e-495f-88eb-04f8d3114e01","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":1},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1}]},{"guid":"import-5c42eac0076c9f5ef9","title":"The Realtime Podcast","subtitle":"Everything you need to know about Podcasting","slug":"22C3-1147-en-the_realtime_podcast","link":"http://events.ccc.de/congress/2005/fahrplan/events/1147.en.html","description":"This lecture is more of a live podcast recording session than a traditional talk. So you will be more of an audience in a radio studio while Tim is producing the podcast. In the podcast which is produced in realtime, Tim will lay out the various aspects of podcasting including history, background technology and future directions.\n","original_language":"eng","persons":["Tim Pritlove"],"tags":["22c3"," Hacking"],"view_count":57,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-28T13:15:08.674+01:00","length":3714,"duration":3714,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1147-en-the_realtime_podcast.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1147-en-the_realtime_podcast_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-5c42eac0076c9f5ef9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-5c42eac0076c9f5ef9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1147-en-the_realtime_podcast","url":"https://api.media.ccc.de/public/events/import-5c42eac0076c9f5ef9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":4},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":2},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":3},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":2},{"event_id":1161,"event_guid":"import-74174aec9e7f633fc0","weight":2},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":2},{"event_id":2479,"event_guid":"76a90ce3-42fc-4273-b1ef-89d08cd21356","weight":2},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2}]},{"guid":"import-f8d674bfb833cf8fe0","title":"Sony BMGs digitaler Hausfriedensbruch","subtitle":"Über die Durchsetzung industrieller Interessen um jeden Preis","slug":"22C3-1132-de-sony_rootkit","link":"http://events.ccc.de/congress/2005/fahrplan/events/1132.en.html","description":"\"Ich glaube, die meisten Menschen wissen gar nicht was ein Rootkit ist, warum sollen sie sich also darum kümmern?\" - Thomas Hesse, Präsident Global Digital Business-Abteilung bei Sony BMG\n","original_language":"eng","persons":["Markus Beckedahl","fukami"],"tags":["22c3"," Society"],"view_count":79,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-08T18:30:12.634+01:00","length":3396,"duration":3396,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1132-de-sony_rootkit.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1132-de-sony_rootkit_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f8d674bfb833cf8fe0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f8d674bfb833cf8fe0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1132-de-sony_rootkit","url":"https://api.media.ccc.de/public/events/import-f8d674bfb833cf8fe0","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":2},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":3},{"event_id":967,"event_guid":"import-73ea56f62062e5ea9d","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":2},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":2},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":4012,"event_guid":"c1c9672c-594f-50ec-87fe-5e112c4ed7c9","weight":1},{"event_id":4034,"event_guid":"e4130a24-fdf6-51ab-b024-a9883f8fc1d7","weight":2},{"event_id":4126,"event_guid":"ded4a05f-156c-558b-99e8-21170c7a96f6","weight":1},{"event_id":4502,"event_guid":"b99bb348-050c-5e94-93a8-3bc74e34338b","weight":1},{"event_id":4504,"event_guid":"4f5c59c8-4f8f-59c4-9036-8f4c371a373a","weight":1},{"event_id":4505,"event_guid":"2ed7a74e-13b3-585a-a307-8480d9e52255","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":5887,"event_guid":"2c8fac7f-38b0-57df-99b1-2dd60d97ddc2","weight":1},{"event_id":5925,"event_guid":"f70f65b0-4ac1-59be-86f4-d9907cb59c5e","weight":1}]},{"guid":"import-02b7f7b8a5fd60f03f","title":"WiFi Long Shots","subtitle":"Wireless connections of 20km and more","slug":"22C3-1078-en-wifi_long_shots","link":"http://events.ccc.de/congress/2005/fahrplan/events/1078.en.html","description":"What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them.\n","original_language":"eng","persons":["Elektra Wagenrad"],"tags":["22c3"," Hacking"],"view_count":164,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-11T13:45:09.650+01:00","length":3128,"duration":3128,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1078-en-wifi_long_shots.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1078-en-wifi_long_shots_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-02b7f7b8a5fd60f03f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-02b7f7b8a5fd60f03f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1078-en-wifi_long_shots","url":"https://api.media.ccc.de/public/events/import-02b7f7b8a5fd60f03f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":917,"event_guid":"import-2623e5399f12d9c994","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":1041,"event_guid":"import-7f7937ab691a2b98e6","weight":2},{"event_id":2152,"event_guid":"J9UXjl3ggsIGnkIJSxSxmw","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2375,"event_guid":"128d4236-6001-4483-9152-c5941314d2cb","weight":1},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":1},{"event_id":3246,"event_guid":"0f59250e-923d-55de-b98a-797d6c6a31a9","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":1},{"event_id":3976,"event_guid":"971c4c94-332f-55f6-a497-6c2c306d2e8c","weight":1},{"event_id":3983,"event_guid":"f21bc737-27f2-5aed-be11-48c52f144f4d","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1}]},{"guid":"import-67d60c82e456bd5ed2","title":"Hacking CCTV","subtitle":"Watching the watchers, having fun with cctv cameras, making yourself invisible","slug":"22C3-605-de-hacking_cctv","link":"http://events.ccc.de/congress/2005/fahrplan/events/605.en.html","description":"CCTV möchte für mehr öffentliche Sicherheit sorgen, bringt aber viel mehr Unsicherheit - sehen wir, was Überwacher sehen, in dem wir uns kurz mit Funkfrequenzen und mit Empfaengern - bzw was sich noch alles dafuer verwenden laesst - befassen. Welche sowieso schon erhältlichen Antennen (zB Wlan) eignen sich dafür? Welche Kameratypen gibt es, und was sind ihre Schwächen?\n","original_language":"eng","persons":["Adrian Dabrowski","Martin Slunsky"],"tags":["22c3"," Hacking"],"view_count":260,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-26T12:30:08.576+01:00","length":3373,"duration":3373,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-605-de-hacking_cctv.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-605-de-hacking_cctv_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-67d60c82e456bd5ed2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-67d60c82e456bd5ed2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-605-de-hacking_cctv","url":"https://api.media.ccc.de/public/events/import-67d60c82e456bd5ed2","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":204,"event_guid":"import-8d84b89723a69bf540","weight":1},{"event_id":545,"event_guid":"import-99caba0a95f3e2bb7b","weight":4},{"event_id":816,"event_guid":"import-cf1820bec95269f63d","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":2},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":3},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":2},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":2},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":2},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":3},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1762,"event_guid":"iGUI8vSrFaU8uQiDfjNt2w","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":3},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2565,"event_guid":"2ca563bd-9c30-432b-a01b-f564757030d4","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2879,"event_guid":"3f61827f-8b17-47b4-a43c-e0dce6532cbe","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":2},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3805,"event_guid":"d5565688-a086-42e6-b8eb-17fa54e6fc3b","weight":1},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":1}]},{"guid":"import-4646aab6f6a3e78ab9","title":"Digitale Bürgerrechte unter europäischem Beschuss","subtitle":null,"slug":"22C3-888-de-digitale_buergerrechte_in_europa","link":"http://events.ccc.de/congress/2005/fahrplan/events/888.en.html","description":"Die digitale Wissensgesellschaft wird in wesentlichen Punkten von der Europäischen Union bestimmt und häufig haben Richtlinien und andere Maßnahmen der EU direkte Auswirkungen auf unsere digitalen Bürgerrechte.\n","original_language":"eng","persons":["Oliver Passek","Markus Beckedahl"],"tags":["22c3"," Society"],"view_count":32,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2022-12-19T09:15:02.425+01:00","length":3617,"duration":3617,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-888-de-digitale_buergerrechte_in_europa.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-888-de-digitale_buergerrechte_in_europa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4646aab6f6a3e78ab9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4646aab6f6a3e78ab9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-888-de-digitale_buergerrechte_in_europa","url":"https://api.media.ccc.de/public/events/import-4646aab6f6a3e78ab9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":951,"event_guid":"import-fea9da9951d5fe8f3d","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":3},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":3565,"event_guid":"69f657a4-c06f-4865-aeff-0faf16bf6fe1","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":6494,"event_guid":"9a91d92b-0691-46b2-ba73-112bc598342f","weight":1},{"event_id":6523,"event_guid":"240fe8a1-ee33-4f07-88d0-34b8bb04db71","weight":1}]},{"guid":"import-7f7937ab691a2b98e6","title":"I See Airplanes!","subtitle":"How to build your own radar system","slug":"22C3-543-en-i_see_airplanes","link":"http://events.ccc.de/congress/2005/fahrplan/events/543.en.html","description":"The lecture describes how to build your own passive radar system using relatively low-cost hardware and free software.\n","original_language":"eng","persons":["Eric Blossom"],"tags":["22c3"," Hacking"],"view_count":272,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-16T22:45:59.481+01:00","length":3077,"duration":3077,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-543-en-i_see_airplanes.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-543-en-i_see_airplanes_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-7f7937ab691a2b98e6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-7f7937ab691a2b98e6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-543-en-i_see_airplanes","url":"https://api.media.ccc.de/public/events/import-7f7937ab691a2b98e6","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":100,"event_guid":"import-f73126cae24d750083","weight":1},{"event_id":701,"event_guid":"import-57e66dffd1c89bdcdb","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":732,"event_guid":"import-19fc7a9e94509e5fe4","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":1},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1040,"event_guid":"import-02b7f7b8a5fd60f03f","weight":2},{"event_id":1121,"event_guid":"import-db810b7b54ae90e958","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1181,"event_guid":"import-ebd1d831811af91559","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1269,"event_guid":"import-bb214036a3c1c15d6c","weight":1},{"event_id":1291,"event_guid":"import-0d14de57e2a3df27a3","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1353,"event_guid":"import-9d2e94f5baf5c7ceaf","weight":1},{"event_id":1390,"event_guid":"import-9c82dc5bc5ce9b2674","weight":1},{"event_id":1416,"event_guid":"import-0f434213c10a4ded91","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":1},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":2073,"event_guid":"4rOepRrO3-15F25YRbZPOQ","weight":1},{"event_id":2161,"event_guid":"oI8n77eKy3Uz2Fklmk4hVQ","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1},{"event_id":2375,"event_guid":"128d4236-6001-4483-9152-c5941314d2cb","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":2961,"event_guid":"ab8d2f00-69a9-4c9d-979a-9d8cd19c1f88","weight":1},{"event_id":3009,"event_guid":"0bffe7b2-a0db-4827-9a64-33434bdc98e6","weight":1},{"event_id":3043,"event_guid":"79e60f58-b2e7-4910-be32-f0a8896569e0","weight":1},{"event_id":3254,"event_guid":"7eab2c8e-e7c8-5687-a77f-05ecd52f26cc","weight":1},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3698,"event_guid":"994082de-ef8e-4f8e-8c46-ec0eb110b845","weight":1},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3741,"event_guid":"725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4212,"event_guid":"3e70713c-8276-4dfb-a028-67b83261c303","weight":1},{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":4853,"event_guid":"7f293cf6-6d19-43ed-8aa7-7371e008bd45","weight":1},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":1},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":1}]},{"guid":"import-53997037a1b9e9ceb3","title":"Rückschau auf die BigBrotherAwards 2005","subtitle":"Datenkraken beim Kragen packen","slug":"22C3-791-de-big_brother_awards","link":"http://events.ccc.de/congress/2005/fahrplan/events/791.en.html","description":"\"The winner is ...\" zumindest \"unhappy\". Wer einen BigBrotherAward erhält, hat es damit schriftlich bekommen, dass sein Verhalten \"evil\" ist. In vielen Ländern werden BigBrotherAwards, Datenschutznegativpreise für \"Datenkraken\", vergeben. Vertreterinnen und Vertreter aus Schweiz und Deutschland präsentieren die Ergebnisse, Hintergründe und Erfolge des Jahres 2005. Im Schnelldurchgang und mit Filmbeiträgen werden Preisträger, Trends und Tendenzen präsentiert.\n","original_language":"eng","persons":["padeluun","Thomas Bader","Rena Tangens"],"tags":["22c3"," Society"],"view_count":31,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-05T15:15:19.649+01:00","length":2897,"duration":2897,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-791-de-big_brother_awards.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-791-de-big_brother_awards_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-53997037a1b9e9ceb3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-53997037a1b9e9ceb3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-791-de-big_brother_awards","url":"https://api.media.ccc.de/public/events/import-53997037a1b9e9ceb3","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1732,"event_guid":"nu_IEETazySR5xcJobNckw","weight":1},{"event_id":1838,"event_guid":"d9mVPvxx94qGILfKtmCAwA","weight":1},{"event_id":2376,"event_guid":"0bc12fad-8cb0-4c89-b1b5-f9087325d0f9","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":4244,"event_guid":"28840060-781a-4143-a9b3-fe19a0eaf06d","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1}]},{"guid":"import-7066236907169c00ee","title":"Personal experiences bringing technology and new media to disaster areas","subtitle":"Experiences from Iraq and post Katrina New Orleans","slug":"22C3-478-en-desaster_areas","link":"http://events.ccc.de/congress/2005/fahrplan/events/478.en.html","description":"A discussion about technology, culture, the Creative Commons and the media with regards to disaster areas and warzones.\n","original_language":"eng","persons":["Jacob Appelbaum"],"tags":["22c3"," Society"],"view_count":206,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-22T14:15:09.110+01:00","length":3121,"duration":3121,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-478-en-desaster_areas.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-478-en-desaster_areas_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-7066236907169c00ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-7066236907169c00ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-478-en-desaster_areas","url":"https://api.media.ccc.de/public/events/import-7066236907169c00ee","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":99,"event_guid":"import-38b13899aa39910195","weight":1},{"event_id":721,"event_guid":"import-dcf334af1c126ddf07","weight":1},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":1},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":3},{"event_id":1438,"event_guid":"import-c4d094a86d6fdad7df","weight":1},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":3},{"event_id":1632,"event_guid":"import-0d984b8893f631f585","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":4},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":2},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":1},{"event_id":2502,"event_guid":"a707951f-7f9c-4c8e-8f4f-b837f3581b7b","weight":1},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":2},{"event_id":2928,"event_guid":"7504eeb1-1665-47fd-b21a-601d2641c41c","weight":1},{"event_id":3954,"event_guid":"6033c592-f777-4e83-84ee-94cef2e89338","weight":1}]},{"guid":"import-bf4c76c8a7eb2cf7b1","title":"Kochen für Nerds","subtitle":null,"slug":"22C3-790-de-nerds_kochen","link":"http://events.ccc.de/congress/2005/fahrplan/events/790.en.html","description":"Im Sinne einer humorvollen Kochshow mit parallel getatekten Tips zu Einkauf, Zubereitung und Hardware zeigen wir, dass selbst gekocht nicht mehr Aufwand ist, als in der Mikrowelle aufgewärmt.\n","original_language":"eng","persons":["Hans Knöll","Christian Jeitler"],"tags":["22c3"," Culture"],"view_count":155,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-31T14:15:11.456+01:00","length":6410,"duration":6410,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-790-de-nerds_kochen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-790-de-nerds_kochen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-bf4c76c8a7eb2cf7b1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-bf4c76c8a7eb2cf7b1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-790-de-nerds_kochen","url":"https://api.media.ccc.de/public/events/import-bf4c76c8a7eb2cf7b1","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":2},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":2},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":3},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":2},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":2},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":2},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":2}]},{"guid":"import-d1a2539c03d11cc281","title":"Geometrie ohne Punkte, Geraden \u0026 Ebenen","subtitle":"Buckminster Fullers Theorie und Praxis einer Wissenschaft zum Selberbauen","slug":"22C3-520-de-geometrie_ohne_punkte","link":"http://events.ccc.de/congress/2005/fahrplan/events/520.en.html","description":"Über die Prinzipien hinter den geodätischen Domen, einige weitere Erfindungen und die wissenschaftliche Rezeption Fullers. Das Verhältnis von Fuller zur modernen Naturwissenschaft.\n","original_language":"eng","persons":["Oona Leganovic"],"tags":["22c3"," Science"],"view_count":217,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-20T19:30:06.730+01:00","length":4024,"duration":4024,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-520-de-geometrie_ohne_punkte.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-520-de-geometrie_ohne_punkte_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d1a2539c03d11cc281-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d1a2539c03d11cc281-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-520-de-geometrie_ohne_punkte","url":"https://api.media.ccc.de/public/events/import-d1a2539c03d11cc281","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":504,"event_guid":"import-ab8dbcc7631a1e4932","weight":2},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":2},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":3},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1005,"event_guid":"import-497b8fb8715bf2cdd6","weight":2},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":10},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":2},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":2},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":3},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":2},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":4},{"event_id":1461,"event_guid":"import-4703df2362d43a594d","weight":1},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":1},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":1},{"event_id":1482,"event_guid":"import-da8c8f72ccd7d97fb9","weight":1},{"event_id":1500,"event_guid":"import-04c71afb67d8628e11","weight":2},{"event_id":1511,"event_guid":"import-50d23406ba6bbed62d","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":2},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":3644,"event_guid":"d1681340-162c-48ce-8c0b-61c3e176696d","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":1}]},{"guid":"import-14658f50e46cb66e2f","title":"Academic tools and real-life bug finding in Win32","subtitle":null,"slug":"22C3-563-en-real_life_bug_finding_in_win32","link":"http://events.ccc.de/congress/2005/fahrplan/events/563.en.html","description":"Overview of a few academic program verification/checking tools; their usefulness for practical bug finding (particularly, in Win32 PE binaries); a report on the progress of integer overflow detection tool implementation (with preliminary results).\n","original_language":"eng","persons":["Rafał Wojtczuk"],"tags":["22c3"," Hacking"],"view_count":92,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-23T16:30:03.049+02:00","length":2976,"duration":2976,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-563-en-real_life_bug_finding_in_win32.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-563-en-real_life_bug_finding_in_win32_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-14658f50e46cb66e2f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-14658f50e46cb66e2f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-563-en-real_life_bug_finding_in_win32","url":"https://api.media.ccc.de/public/events/import-14658f50e46cb66e2f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":96,"event_guid":"import-a23ebcaf68fd4692d5","weight":1},{"event_id":107,"event_guid":"import-e465bfa0bfac679a06","weight":1},{"event_id":117,"event_guid":"import-f0cd701b703d1d5606","weight":1},{"event_id":158,"event_guid":"import-a3f25884980707cd5c","weight":1},{"event_id":436,"event_guid":"import-21f792b821db8cc7d9","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":745,"event_guid":"import-8e036a3b313a2fc755","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":2},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":1014,"event_guid":"import-2d921a0dfd44909fdd","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1501,"event_guid":"import-ff92b8bbffb2bdb1ac","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2074,"event_guid":"Gv2W9O5Y0KYXXWnaC2IYXw","weight":1},{"event_id":2122,"event_guid":"DlJOnpxxq4REaMhvquDWSw","weight":1},{"event_id":2350,"event_guid":"433e598a-4a96-4be5-90f1-014b4be7b3ec","weight":1},{"event_id":2732,"event_guid":"edea100c-b9d9-4d76-bfff-224cd5f99368","weight":1},{"event_id":3017,"event_guid":"667e8e47-c44e-4213-8e58-096048f6ecfe","weight":1},{"event_id":3019,"event_guid":"e82961bc-1d29-4f87-83d4-61517edfbc5f","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3032,"event_guid":"a92fdc4b-370b-4700-86ea-e5dbf22d778e","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":1},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":1},{"event_id":6435,"event_guid":"9777cea0-ac06-4274-85db-908c1e87e2f4","weight":1},{"event_id":6481,"event_guid":"948fee49-de6f-42b1-82f8-045af2aa155e","weight":1}]},{"guid":"import-4dbc731f04100e2b32","title":"22C3 Closing Event","subtitle":"Famous last words","slug":"22C3-776-en-closing_event","link":"http://events.ccc.de/congress/2005/fahrplan/events/776.en.html","description":"Please join us as we look back to what happened and look forward to what's next on our agenda.\n","original_language":"eng","persons":["Tim Pritlove"],"tags":["22c3"],"view_count":195,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-25T00:00:08.845+01:00","length":2670,"duration":2670,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-776-en-closing_event.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-776-en-closing_event_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4dbc731f04100e2b32-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4dbc731f04100e2b32-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-776-en-closing_event","url":"https://api.media.ccc.de/public/events/import-4dbc731f04100e2b32","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":24,"event_guid":"import-df7b25850170e056b1","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":2},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":6},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":3},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":2},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":3},{"event_id":1077,"event_guid":"import-501635afc9ab5db2ce","weight":3},{"event_id":1161,"event_guid":"import-74174aec9e7f633fc0","weight":4},{"event_id":1180,"event_guid":"import-5fa00c37cb75885d36","weight":4},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":2},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":2},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1753,"event_guid":"0i_XOY92eUOxB3jQO_Zj4g","weight":3},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":1},{"event_id":2233,"event_guid":"7bdbb7a1-63f2-400f-97a1-d7abfc455f73","weight":1},{"event_id":2479,"event_guid":"76a90ce3-42fc-4273-b1ef-89d08cd21356","weight":1},{"event_id":2486,"event_guid":"439d64b1-b08b-4313-87f9-c469211d4206","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":3},{"event_id":2734,"event_guid":"a1533367-f889-4b07-8d2f-b2718ad6b9a6","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":3},{"event_id":2738,"event_guid":"d4b2f5e6-417f-454c-981e-df75465d956d","weight":1},{"event_id":2807,"event_guid":"77a03013-82df-48f7-8c0f-65a9e9f23490","weight":1},{"event_id":2844,"event_guid":"b753dbd8-32bb-437c-9f15-db0d7ac1811a","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":2},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":2978,"event_guid":"1e7ea0be-38c8-47f2-99bb-9f0ce71a53ee","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3234,"event_guid":"9e71c0f8-20f3-4b50-9106-2daa2bb809b0","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1},{"event_id":3685,"event_guid":"5c9003b7-543d-476a-89f0-eee5ed36327c","weight":1},{"event_id":3688,"event_guid":"226e244c-4781-47e4-8dd7-2d74607ae02f","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3711,"event_guid":"a2e9e432-b74b-4a6d-bee7-d926ccf0cfd1","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":3743,"event_guid":"72e44333-c59a-47a4-9ef3-d5e8c9637eb6","weight":1},{"event_id":3753,"event_guid":"f79171fd-67ca-4b74-90c8-9dd382103eb0","weight":1},{"event_id":3755,"event_guid":"2bdf3de1-417b-4a5a-b31e-4701a921fb5c","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":2},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1}]},{"guid":"import-2c21d5bbe59bd1fc5e","title":"COMPLETE Hard Disk Encryption with FreeBSD","subtitle":"Learn how to effectively protect not only your data but also your applications","slug":"22C3-1139-en-complete_harddisk_encryption_with_freebsd","link":"http://events.ccc.de/congress/2005/fahrplan/events/1139.en.html","description":"Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high.\nThis talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.\n","original_language":"eng","persons":["Marc Schiesser"],"tags":["22c3"," Hacking"],"view_count":117,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-18T17:15:13.897+01:00","length":3967,"duration":3967,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1139-en-complete_harddisk_encryption_with_freebsd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1139-en-complete_harddisk_encryption_with_freebsd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2c21d5bbe59bd1fc5e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2c21d5bbe59bd1fc5e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1139-en-complete_harddisk_encryption_with_freebsd","url":"https://api.media.ccc.de/public/events/import-2c21d5bbe59bd1fc5e","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":410,"event_guid":"import-ec05f2b312ee438d99","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":2},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":3},{"event_id":1271,"event_guid":"import-f8b849a9e3b83d4724","weight":1},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":2},{"event_id":2950,"event_guid":"83fa2955-80df-4f47-9421-9e81b9f6f2c0","weight":1},{"event_id":3823,"event_guid":"4046cd27-1560-59af-b708-eede781ce5ec","weight":1},{"event_id":3915,"event_guid":"c341f69d-a163-4a8e-a121-7961ee355791","weight":3},{"event_id":4227,"event_guid":"80884192-2031-4559-b1f2-e2f2f7dbe9cb","weight":1},{"event_id":4640,"event_guid":"673928f6-6777-4da7-aac3-e36dfea16063","weight":1},{"event_id":4932,"event_guid":"d30b21b9-726d-4ceb-bc68-6858cd158e36","weight":3}]},{"guid":"import-7731036a6ad7782f4f","title":"Quantum Entanglement","subtitle":"An introduction","slug":"22C3-1077-en-quantum_entanglement","link":"http://events.ccc.de/congress/2005/fahrplan/events/1077.en.html","description":"Entanglement is possibly the most intriguing element of quantum theory. This talk gives a gentle introduction to the phenomenon of entanglement and nonlocality. Uses of entanglement in quantum cryptography and quantum computing are also presented.\n","original_language":"eng","persons":["Stephanie Wehner"],"tags":["22c3"," Science"],"view_count":512,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-01T00:00:04.450+01:00","length":2311,"duration":2311,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1077-en-quantum_entanglement.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1077-en-quantum_entanglement_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-7731036a6ad7782f4f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-7731036a6ad7782f4f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1077-en-quantum_entanglement","url":"https://api.media.ccc.de/public/events/import-7731036a6ad7782f4f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":538,"event_guid":"import-7a8d7cd7685ff4574a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":2},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":2},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":6},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":42},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":37},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":2},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":14},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":15},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1550,"event_guid":"import-0a4b167b1f0882d707","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":19},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1852,"event_guid":"U-8wOAtiUft8JjHbW-HAEA","weight":2},{"event_id":2221,"event_guid":"defd3b01-c39d-433f-b3c4-dbea1ea2fe00","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":6},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":26},{"event_id":2866,"event_guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":2},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":3087,"event_guid":"8374cf06-ca54-4c67-b450-d302295637c3","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":8},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":4229,"event_guid":"6a40f977-5db3-4051-8257-3c30e84816a4","weight":3},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":1},{"event_id":4306,"event_guid":"8db39cdd-7700-4123-a22d-22393e282154","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":1}]},{"guid":"import-dcdeb7cfd3ac31cff6","title":"Black Ops Of TCP/IP 2005.5","subtitle":"New Explorations: Large Graphs, Larger Threats","slug":"22C3-1108-en-black_ops_of_tcp_ip","link":"http://events.ccc.de/congress/2005/fahrplan/events/1108.en.html","description":"I will discuss new experiences and potential directions involving scanning massive networks, such as the entire world's DNS infrastructure.\n","original_language":"eng","persons":["Dan Kaminsky"],"tags":["22c3"," Hacking"],"view_count":290,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-16T15:45:15.855+01:00","length":3615,"duration":3615,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1108-en-black_ops_of_tcp_ip.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1108-en-black_ops_of_tcp_ip_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-dcdeb7cfd3ac31cff6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-dcdeb7cfd3ac31cff6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1108-en-black_ops_of_tcp_ip","url":"https://api.media.ccc.de/public/events/import-dcdeb7cfd3ac31cff6","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":909,"event_guid":"import-a5a928eef896416b07","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":985,"event_guid":"import-c0c97d7b572b39d4f7","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":3515,"event_guid":"d29f4c97-caca-46dc-830f-eac1c60ff9e0","weight":1}]},{"guid":"import-2818f218a4456bad05","title":"Die Technik im neuen ePass","subtitle":null,"slug":"22C3-550-de-epass_und_biop2","link":"http://events.ccc.de/congress/2005/fahrplan/events/550.en.html","description":"Der Vortrag wird sich mit der Technik des neuen ePasses beschäftigen.\n","original_language":"eng","persons":["starbug"],"tags":["22c3"," Hacking"],"view_count":128,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-11T14:30:17.096+01:00","length":3736,"duration":3736,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-550-de-epass_und_biop2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-550-de-epass_und_biop2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2818f218a4456bad05-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2818f218a4456bad05-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-550-de-epass_und_biop2","url":"https://api.media.ccc.de/public/events/import-2818f218a4456bad05","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":198,"event_guid":"import-b962abe26523d75e2c","weight":1},{"event_id":483,"event_guid":"import-d30458e3d16d8486cd","weight":1},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":3},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":3},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":2},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":2},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1260,"event_guid":"import-f1d0a60134429a1004","weight":1},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":1},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":1},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":3},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":4},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":3855,"event_guid":"868c1ce8-2592-4d61-8de9-e19e36e48fee","weight":1},{"event_id":3864,"event_guid":"63dd83b9-27e4-4122-8a45-48ca7c92e13e","weight":1},{"event_id":3873,"event_guid":"da554088-7556-43ca-81f0-1de27299973a","weight":1},{"event_id":3897,"event_guid":"3ba8d1a1-f291-473d-9c1f-87f615394123","weight":1},{"event_id":3899,"event_guid":"3dd64605-0402-4a89-955c-3a48a4dc1ff8","weight":1},{"event_id":3924,"event_guid":"c6af1050-4194-4ce9-a54f-8c19c6e13b88","weight":1},{"event_id":3941,"event_guid":"2607e58e-cd97-47ba-94db-ce349be3f0c4","weight":1},{"event_id":3944,"event_guid":"c6b1fc76-2f70-4051-9767-46487ab457b3","weight":1},{"event_id":3949,"event_guid":"a57914e1-cd19-4fc6-9d8d-8fdc67c9a651","weight":1},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":1}]},{"guid":"import-e34e417f1bb6d66d12","title":"Intrusion Detection Systems","subtitle":"Elevated to the Next Level","slug":"22C3-561-en-intrusion_detection_systems","link":"http://events.ccc.de/congress/2005/fahrplan/events/561.en.html","description":"Currently there exist many different IDS techniques. However, none of them is the superior one. Best results can only be determined by a combination of them. We introduce an approach how to do that efficiently.\n","original_language":"eng","persons":["Matthias Petermann","Alien8"],"tags":["22c3"," Hacking"],"view_count":127,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-28T21:00:12.003+01:00","length":3113,"duration":3113,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-561-en-intrusion_detection_systems.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-561-en-intrusion_detection_systems_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e34e417f1bb6d66d12-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e34e417f1bb6d66d12-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-561-en-intrusion_detection_systems","url":"https://api.media.ccc.de/public/events/import-e34e417f1bb6d66d12","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3730,"event_guid":"a6b27767-e42d-4610-a8d5-5a1f20587b34","weight":1},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":1},{"event_id":4217,"event_guid":"8da84e68-73c0-11e7-ac71-d3b143ff9640","weight":2},{"event_id":4299,"event_guid":"63b79857-ca2c-4fb4-b56c-b7807f947c01","weight":1},{"event_id":4645,"event_guid":"f0851394-22b0-440c-aafc-e8690fc1cf51","weight":2},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":1},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":1},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":1},{"event_id":4945,"event_guid":"540aaf40-03b5-11e8-8b91-e7b5e3e254af","weight":1},{"event_id":5617,"event_guid":"952292a6-923e-534a-a4ae-9522777f092c","weight":1},{"event_id":5705,"event_guid":"dfd165d9-bdec-59ab-bfc9-ad79fd5c7343","weight":1},{"event_id":6058,"event_guid":"7fe2a84b-bbed-4a4e-80fb-85b581c14b13","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1}]},{"guid":"import-ba38a65ca8318536aa","title":"Learning cryptography through handcyphers","subtitle":"Shaping a digital future with ancient wisdom","slug":"22C3-469-en-learning_cryptography","link":"http://events.ccc.de/congress/2005/fahrplan/events/469.en.html","description":"For many people cryptography is something that they consider too complicated. But actually one can understand the principles very well if they only try. By looking at old handcyphers used for coding one can begin to understand modern cryptography.\n","original_language":"eng","persons":["Brenno de Winter"],"tags":["22c3"," Science"],"view_count":78,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2008-01-13T01:00:00.000+01:00","updated_at":"2026-03-02T22:00:07.487+01:00","length":2137,"duration":2137,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-469-en-learning_cryptography.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-469-en-learning_cryptography_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ba38a65ca8318536aa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ba38a65ca8318536aa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-469-en-learning_cryptography","url":"https://api.media.ccc.de/public/events/import-ba38a65ca8318536aa","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1}]},{"guid":"import-2ff36318c8162b957e","title":"Collateral Damage","subtitle":"Consequences of Spam and Virus Filtering for the E-Mail System","slug":"22C3-505-en-collateral_damage","link":"http://events.ccc.de/congress/2005/fahrplan/events/505.en.html","description":"This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system.\n","original_language":"eng","persons":["Peter Eisentraut"],"tags":["22c3"," Hacking"],"view_count":25,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2022-08-18T17:00:04.452+02:00","length":3283,"duration":3283,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-505-en-collateral_damage.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-505-en-collateral_damage_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2ff36318c8162b957e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2ff36318c8162b957e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-505-en-collateral_damage","url":"https://api.media.ccc.de/public/events/import-2ff36318c8162b957e","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":1952,"event_guid":"e7ca6d029c833227","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":6901,"event_guid":"7b1d9179-5315-5a70-860d-265624dcae8d","weight":1},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":1}]},{"guid":"import-c0c97d7b572b39d4f7","title":"WarTracking","subtitle":"Satellite Tracking, harvesting and security","slug":"22C3-580-en-wartracking","link":"http://events.ccc.de/congress/2005/fahrplan/events/580.en.html","description":"An spiced up introduction into the world of satellite telecommunications. We'll begin at reception setup. Explain theory behind the technical part of satellite telecommunications and finally present the variety of signals flowing down from orbit to the reciever. Several hack-valued topics will be covered. Such as \"Be your own satellite broadcaster\", fascinating data traffic, \"Who else is listening?\" and self made recieving/transmitting gear.\n","original_language":"eng","persons":["Thomas B. Rücker - dm8tbr","Miguel Elias"],"tags":["22c3"," Hacking"],"view_count":44,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-11-05T08:30:02.628+01:00","length":3185,"duration":3185,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-580-en-wartracking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-580-en-wartracking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-c0c97d7b572b39d4f7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-c0c97d7b572b39d4f7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-580-en-wartracking","url":"https://api.media.ccc.de/public/events/import-c0c97d7b572b39d4f7","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":236,"event_guid":"import-17d6a5439f69d41e5e","weight":1},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":1},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1612,"event_guid":"import-708b15f151751c94c5","weight":1},{"event_id":1788,"event_guid":"-isG7Swsi8DaA62qztr0Kw","weight":3},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1}]},{"guid":"import-d02b5f19d4a0061e94","title":"Lyrical I","subtitle":"Abschluss des CCC-Poesie-Wettbewerbs","slug":"22C3-532-de-lyrical_i","link":"http://events.ccc.de/congress/2005/fahrplan/events/532.en.html","description":"Auf der Abschlußveranstaltung des CCC-Poesie-Wettbewerbs \"Lyrical I\" werden die schönsten und originellsten Beiträge vorgestellt.\n","original_language":"eng","persons":["Martin Haase/maha","Jens Ohlig","Henriette Fiebig"],"tags":["22c3"," Culture"],"view_count":117,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-08-13T17:45:05.087+02:00","length":2805,"duration":2805,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-532-de-lyrical_i.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-532-de-lyrical_i_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d02b5f19d4a0061e94-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d02b5f19d4a0061e94-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-532-de-lyrical_i","url":"https://api.media.ccc.de/public/events/import-d02b5f19d4a0061e94","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":2},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":2},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1425,"event_guid":"import-323048cb5a520dac74","weight":3},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1}]},{"guid":"import-38c2dd9d642c6ca79a","title":"Writing better code (in Dylan)","subtitle":"Fast development of object-oriented functional programs","slug":"22C3-800-en-better_code","link":"http://events.ccc.de/congress/2005/fahrplan/events/800.en.html","description":"An overview of the highly dynamic, object-oriented, functional programming language Dylan will be given. As an example a web-based network management tool will be demonstrated.\n","original_language":"eng","persons":["Hannes Mehnert","Andreas Bogk"],"tags":["22c3"," Hacking"],"view_count":107,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-16T11:45:09.125+01:00","length":3583,"duration":3583,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-800-en-better_code.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-800-en-better_code_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-38c2dd9d642c6ca79a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-38c2dd9d642c6ca79a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-800-en-better_code","url":"https://api.media.ccc.de/public/events/import-38c2dd9d642c6ca79a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":540,"event_guid":"import-e5345e460009383076","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":3},{"event_id":2587,"event_guid":"89b01590-66cd-4804-9235-f63f073da68d","weight":1},{"event_id":2674,"event_guid":"42e8e9f8-4e9c-4845-b871-bf8ce525594d","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3785,"event_guid":"fc1e2aee-7cea-4633-944e-66cf3533cefd","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":2},{"event_id":5233,"event_guid":"4a433356-4456-2020-2020-202020202020","weight":2},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":2}]},{"guid":"import-d36e7bab6f1646de7f","title":"Software Patenting","subtitle":"Adequate means of protection for software.","slug":"22C3-593-en-software_patenting","link":"http://events.ccc.de/congress/2005/fahrplan/events/593.en.html","description":"Patent attorneys and a few large corporations advocate patent law as an appropriate protection tool for software development. Most economists, software professionals and SMEs disagree. They believe patent law does not serve market needs. This year the European Parliament rejected a 'Directive on the patentability of computer-implemented inventions'. However, as the European Patent Offices continues to grant them problems remain. Our expert panel with discuss further developments.\n","original_language":"eng","persons":["Tonnerre Lombard","André Rebentisch"],"tags":["22c3"," Society"],"view_count":22,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-01-12T04:45:02.720+01:00","length":2839,"duration":2839,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-593-en-software_patenting.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-593-en-software_patenting_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d36e7bab6f1646de7f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d36e7bab6f1646de7f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-593-en-software_patenting","url":"https://api.media.ccc.de/public/events/import-d36e7bab6f1646de7f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":726,"event_guid":"import-1189217471366c5a15","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":2},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":2},{"event_id":4221,"event_guid":"c4980da2-60ad-459f-a375-3db135641d9f","weight":1},{"event_id":4367,"event_guid":"f284b8f1-f27b-466e-9084-c3de794f8fd3","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":1},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":1}]},{"guid":"import-468a1864daab0c9d56","title":"GNU/Linux für Blinde und Sehbehinderte","subtitle":"Erfahrungen aus der Praxis","slug":"22C3-1109-de-linux_fuer_blinde_und_sehbehinderte","link":"http://events.ccc.de/congress/2005/fahrplan/events/1109.en.html","description":"In diesem Vortrag wird erläutert, wie Blinde und Sehbehinderte Menschen mit dem Computer generell und speziell mit OpenSource-Lösungen arbeiten. Dabei werden sowohl Hard- als auch Softwarelösungen vorgestellt. \n","original_language":"eng","persons":["Sebastian Andres","Lars Stetten"],"tags":["22c3"," Hacking"],"view_count":82,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-12T13:15:28.578+01:00","length":3205,"duration":3205,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-468a1864daab0c9d56-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-468a1864daab0c9d56-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte","url":"https://api.media.ccc.de/public/events/import-468a1864daab0c9d56","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":1},{"event_id":4120,"event_guid":"902f722c-a0a9-5fc1-b57d-c7f4fea73387","weight":4}]},{"guid":"import-efd81356bad7b1f7b3","title":"Paper-Prototyping Workshop","subtitle":"Eine Usability-Methode","slug":"22C3-498-de-paper_prototyping_workshop","link":"http://events.ccc.de/congress/2005/fahrplan/events/498.en.html","description":"Paper Prototyping ist eine schnelle und effiziente Methode, um User Interfaces ohne Programmieraufwand zu modellieren und mit echten Nutzern zu testen. Benötigt werden nur ein paar Blatt Papier, eine Schere und ein Stift.\n","original_language":"eng","persons":["Antenne Springborn","Ellen Reitmayr"],"tags":["22c3"," Hacking"],"view_count":299,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-26T09:30:07.585+01:00","length":2780,"duration":2780,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-498-de-paper_prototyping_workshop.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-498-de-paper_prototyping_workshop_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-efd81356bad7b1f7b3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-efd81356bad7b1f7b3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-498-de-paper_prototyping_workshop","url":"https://api.media.ccc.de/public/events/import-efd81356bad7b1f7b3","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":957,"event_guid":"import-fa398718f4c3eec297","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":1},{"event_id":2089,"event_guid":"F4PROIwL9VVgBhW7SqnWNQ","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":1},{"event_id":2465,"event_guid":"d1f3810f-43b1-4856-b8ee-7c767234d185","weight":1},{"event_id":3678,"event_guid":"47eedd9d-adf7-40d6-80fa-40f560fd3794","weight":1},{"event_id":3685,"event_guid":"5c9003b7-543d-476a-89f0-eee5ed36327c","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1}]},{"guid":"import-a5b28e74fa416095e9","title":"Transparenz der Verantwortung in Behörden","subtitle":null,"slug":"22C3-521-de-transparenz_der_verantwortung_in_behoerden","link":"http://events.ccc.de/congress/2005/fahrplan/events/521.en.html","description":"Wir brauchen eine neue, gesellschaftlich breit überzeugende Lösung für das Problem mit dem Datenschutz. So wie es jetzt läuft geht die Aushöhlung der Persönlichkeitsrechte durch schrittweise Einschränkung des Datenschutzes immer weiter. Statt dem gläsernen Bürger brauchen wir die gläserne Verwaltung.\n","original_language":"eng","persons":["Philipp Sonntag"],"tags":["22c3"," Society"],"view_count":34,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-06-22T16:45:06.490+02:00","length":3228,"duration":3228,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-521-de-transparenz_der_verantwortung_in_behoerden.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-521-de-transparenz_der_verantwortung_in_behoerden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a5b28e74fa416095e9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a5b28e74fa416095e9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-521-de-transparenz_der_verantwortung_in_behoerden","url":"https://api.media.ccc.de/public/events/import-a5b28e74fa416095e9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":2},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":2},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":4},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":3},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":2}]},{"guid":"import-bc2aaf07ba36dce54b","title":"Autodafé: An Act of Software Torture","subtitle":"Presentation of an innovative buffer overflow uncovering technique called \"Fuzzing by weighting attacks with markers\"","slug":"22C3-606-en-autodafe","link":"http://events.ccc.de/congress/2005/fahrplan/events/606.en.html","description":"Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software.\n","original_language":"eng","persons":["Martin Vuagnoux"],"tags":["22c3"," Hacking"],"view_count":67,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-29T22:30:14.269+01:00","length":2323,"duration":2323,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-606-en-autodafe.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-606-en-autodafe_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-bc2aaf07ba36dce54b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-bc2aaf07ba36dce54b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-606-en-autodafe","url":"https://api.media.ccc.de/public/events/import-bc2aaf07ba36dce54b","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":133,"event_guid":"import-68a0bc786541d30fa0","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":1},{"event_id":719,"event_guid":"import-aef220e2a9fcc65152","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":978,"event_guid":"import-b7d69fc8c75382206a","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":1008,"event_guid":"import-3879979ffb75b723f8","weight":1},{"event_id":1483,"event_guid":"import-d37adcac32db0b17c2","weight":1},{"event_id":2278,"event_guid":"d8fb48bd-c5af-45fe-b942-3a55a7681d8f","weight":1},{"event_id":2283,"event_guid":"47f2e2cd-46a7-412e-9784-8eabd1ad7867","weight":1},{"event_id":2287,"event_guid":"8a908634-6d94-4183-beaf-9bfb3f82648c","weight":1},{"event_id":5231,"event_guid":"38433858-5443-2020-2020-202020202020","weight":1},{"event_id":6005,"event_guid":"67dbfc12-f4ad-4a4d-8370-118f1c72e98b","weight":1}]},{"guid":"import-3c9eb002e2e94056cd","title":"Cybercrime Convention","subtitle":"Hacking on its way to become a criminal act?","slug":"22C3-405-en-cybercrime_convention","link":"http://events.ccc.de/congress/2005/fahrplan/events/405.en.html","description":"Within the topic of international regulation attempts in the field of Cybercrime (CoE Convention on Cybercrime \u0026 EU Council Framework Decision on Attacks against Information Systems) a number of Member States is planning to implement \"hacking\"-provisions in their national criminal law. This development could lead to a criminal sanctions not only for hacking acts committed with criminal intent but also for testing network security.\n","original_language":"eng","persons":["Marco Gercke"],"tags":["22c3"," Society"],"view_count":36,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-05-05T00:45:02.982+02:00","length":3453,"duration":3453,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-405-en-cybercrime_convention.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-405-en-cybercrime_convention_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-3c9eb002e2e94056cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-3c9eb002e2e94056cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-405-en-cybercrime_convention","url":"https://api.media.ccc.de/public/events/import-3c9eb002e2e94056cd","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":600,"event_guid":"import-7a1e18a97f9b81e0d5","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1082,"event_guid":"import-d11d50d901f7d39189","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1}]},{"guid":"import-ac419b4bf7a1293785","title":"Urheberrecht","subtitle":"Fakten, Mythen, Geschichte(n) und mögliche Zukünfte","slug":"22C3-782-de-urheberrecht","link":"http://events.ccc.de/congress/2005/fahrplan/events/782.en.html","description":"Viel wird erzählt, viel ist auch falsch, anderes wird verschwiegen Jenny-Louise Becker (Autorin des Buches \"Sounds Right!\" und Julian Finn (Attac, Entropia (CCC Karlsruhe)) führen den Zuhörer auf eine Reise von den Anfängen des Urheberrechtes bis hin zur heutigen Zeit, räumen mit den Mythen auf und bieten Visionen an, wohin es gehen könnte. Natürlich nicht ohne die Gefahren und Abgründe zu erwähnen, die sich auftun oder noch auftun könnten.\n","original_language":"eng","persons":["Jenny-Louise Becker","Julian 'hds' Finn"],"tags":["22c3"," Society"],"view_count":47,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-09-23T10:30:03.434+02:00","length":3239,"duration":3239,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-782-de-urheberrecht.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-782-de-urheberrecht_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ac419b4bf7a1293785-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ac419b4bf7a1293785-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-782-de-urheberrecht","url":"https://api.media.ccc.de/public/events/import-ac419b4bf7a1293785","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":615,"event_guid":"import-88be6eaed423980de3","weight":2},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":929,"event_guid":"import-184dd05c328f44989b","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":952,"event_guid":"import-84a9c6cfe2e198d2c4","weight":1},{"event_id":956,"event_guid":"import-f359526c699a9955b4","weight":1},{"event_id":963,"event_guid":"import-efd81356bad7b1f7b3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":3},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":3},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":3032,"event_guid":"a92fdc4b-370b-4700-86ea-e5dbf22d778e","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":3791,"event_guid":"37e9af94-4aad-4417-8f88-1863ecfef4d1","weight":1},{"event_id":3810,"event_guid":"4b7f0cd9-ff4b-47ce-827f-eea82a90e300","weight":1},{"event_id":4391,"event_guid":"c2d5346f-bd26-43c3-8c19-bbcdf52cd6e3","weight":1},{"event_id":4396,"event_guid":"b5188ef7-b244-48fc-826e-7603cd1d7837","weight":1},{"event_id":4444,"event_guid":"338b865c-b072-45f1-a8bc-54775999e794","weight":1},{"event_id":4457,"event_guid":"da3e484f-a48f-44c6-819d-1a15669f6ed7","weight":1},{"event_id":4482,"event_guid":"8a24c98b-0092-490d-bb7d-7252795bb08c","weight":1}]},{"guid":"import-aff35a6cca25642871","title":"\"Xbox\" and \"Xbox 360\" Hacking","subtitle":"17 Mistakes Microsoft Made in the Xbox Security System \u0026 Xbox 360 Hacking","slug":"22C3-559-en-xbox_hacking","link":"http://events.ccc.de/congress/2005/fahrplan/events/559.en.html","description":"A lot about Xbox hacking has been published earlier. This talk summarizes all this, explains some very cool new hacks and analyzes the 15 mistakes Microsoft made in the Xbox security system. It also gives an introduction on the Xbox 360.\n","original_language":"eng","persons":["Felix Domke","Michael Steil"],"tags":["22c3"," Hacking"],"view_count":1698,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-10T18:45:08.873+01:00","length":6786,"duration":6786,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-559-en-xbox_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-559-en-xbox_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-aff35a6cca25642871-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-aff35a6cca25642871-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-559-en-xbox_hacking","url":"https://api.media.ccc.de/public/events/import-aff35a6cca25642871","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":5},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":6},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":9},{"event_id":735,"event_guid":"import-8292b0b8200c093615","weight":5},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":4},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":5},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":3},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":3},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":17},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":8},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":17},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":8},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":9},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":18},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":6},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":3},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":4},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":7},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":13},{"event_id":3660,"event_guid":"69ce21df-4bf5-43ce-a500-ac7707ee64b7","weight":3},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":13}]},{"guid":"import-3e37e1a967e7d75df2","title":"The Right Track","subtitle":"A new approach to copyright in the digital world","slug":"22C3-562-en-the_right_track","link":"http://events.ccc.de/congress/2005/fahrplan/events/562.en.html","description":"A discussion of the Intellectual Contributions model and the Rights Office system as an alternative for regulating copyright in a digital environment.\n","original_language":"eng","persons":["Nicholas Bentley"],"tags":["22c3"," Society"],"view_count":4,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2019-09-29T01:16:27.077+02:00","length":3486,"duration":3486,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-562-en-the_right_track.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-562-en-the_right_track_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-3e37e1a967e7d75df2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-3e37e1a967e7d75df2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-562-en-the_right_track","url":"https://api.media.ccc.de/public/events/import-3e37e1a967e7d75df2","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[]},{"guid":"import-f71a9e4a4b47e42bd3","title":"The Future Challenges for a Hacker","subtitle":null,"slug":"22C3-1295-en-future_challenges","link":"http://events.ccc.de/congress/2005/fahrplan/events/1295.en.html","description":"In the near future, hackers are facing new challenges that can't easily be compared to the ones in the recent years. Operating systems have been hardened and the task of taking advantage of bugs and flaws is getting more complicated every day.\n","original_language":"eng","persons":["van Hauser","Dan Kaminsky"],"tags":["22c3"," Hacking"],"view_count":128,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-12-28T15:15:04.936+01:00","length":2586,"duration":2586,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1295-en-future_challenges.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1295-en-future_challenges_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f71a9e4a4b47e42bd3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f71a9e4a4b47e42bd3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1295-en-future_challenges","url":"https://api.media.ccc.de/public/events/import-f71a9e4a4b47e42bd3","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":162,"event_guid":"import-c103a561a60405ea5c","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":2},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1071,"event_guid":"import-08b5f79a93224f180b","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":1},{"event_id":1159,"event_guid":"import-db54e58bf23eac0f57","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1292,"event_guid":"import-67317fc1b3b5c3dc8c","weight":1},{"event_id":1322,"event_guid":"import-d02ddb495b4b473e05","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1564,"event_guid":"import-6719b9183f1139890a","weight":1},{"event_id":1719,"event_guid":"import-1975766c6d4f873c2c","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1843,"event_guid":"frveytbMWLT-K_WVy3MUYA","weight":1},{"event_id":1850,"event_guid":"n-OE9MQoWcUq2LFZB2e6DQ","weight":1},{"event_id":2257,"event_guid":"rSiFVNguzdBmx13Lb-gobg","weight":1},{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4281,"event_guid":"271f3623-a772-4052-81da-04872d9651ce","weight":1},{"event_id":4282,"event_guid":"0c99ddbc-a8e5-44b3-b99e-5528a66b185d","weight":1},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":1},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":1},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":1}]},{"guid":"import-4a0db9160a6cea65f5","title":"Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded?","subtitle":"Eine unendliche Geschichte - Kapitel: Die Sümpfe der Traurigkeit","slug":"22C3-546-de-gesundheitskarte","link":"http://events.ccc.de/congress/2005/fahrplan/events/546.en.html","description":"Wenige Tage noch, dann bricht die schöne, neue Welt der elektronischen Gesundheitskarte an.\nAlles wird besser -- bloß für wen? Damit will sich dieser Vortrag befassen, und insbesondere mit den Konsequenzen für diejenigen, für die es nicht besser wird.\n","original_language":"eng","persons":["ThoMaus"],"tags":["22c3"," Society"],"view_count":443,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-27T21:30:11.572+01:00","length":10045,"duration":10045,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-546-de-gesundheitskarte.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-546-de-gesundheitskarte_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4a0db9160a6cea65f5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4a0db9160a6cea65f5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-546-de-gesundheitskarte","url":"https://api.media.ccc.de/public/events/import-4a0db9160a6cea65f5","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":2},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":3},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":2},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":2},{"event_id":2114,"event_guid":"TanZs17TL9oukPaNzCAw0A","weight":3},{"event_id":5722,"event_guid":"906c5611-7e85-4593-8a4e-b33dedfce19e","weight":3},{"event_id":6391,"event_guid":"1601bf3b-ce4a-44c9-993f-7d28fa65168d","weight":3},{"event_id":6634,"event_guid":"71bdcf60-c567-4cf6-94f4-5681b1d008b4","weight":5}]},{"guid":"import-2d921a0dfd44909fdd","title":"A guided tour to European IT lobbying","subtitle":"An investigation into intransparency","slug":"22C3-591-en-european_it_lobbying","link":"http://events.ccc.de/congress/2005/fahrplan/events/591.en.html","description":"Information overflow is a general problem of today's open information infrastructures. Everything can be found on the web but unfortunately not by everyone. Getting informed about the European Union and its projects is a task which you cannot leave to the Commission's public relations department. You should better start your own investigation.\n","original_language":"eng","persons":["André Rebentisch"],"tags":["22c3"," Community"],"view_count":71,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2023-12-17T17:45:03.315+01:00","length":3876,"duration":3876,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-591-en-european_it_lobbying.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-591-en-european_it_lobbying_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2d921a0dfd44909fdd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2d921a0dfd44909fdd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-591-en-european_it_lobbying","url":"https://api.media.ccc.de/public/events/import-2d921a0dfd44909fdd","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":16,"event_guid":"import-539bcb7fe84721a1b5","weight":1},{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":96,"event_guid":"import-a23ebcaf68fd4692d5","weight":1},{"event_id":107,"event_guid":"import-e465bfa0bfac679a06","weight":1},{"event_id":117,"event_guid":"import-f0cd701b703d1d5606","weight":1},{"event_id":126,"event_guid":"import-176ad1853fc7e8cdd1","weight":1},{"event_id":436,"event_guid":"import-21f792b821db8cc7d9","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":796,"event_guid":"import-802e39aaed267dfb47","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":1501,"event_guid":"import-ff92b8bbffb2bdb1ac","weight":1},{"event_id":1570,"event_guid":"import-52fc6549033f1e7535","weight":1},{"event_id":1581,"event_guid":"import-950ce3bbed73872ac6","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":1},{"event_id":2074,"event_guid":"Gv2W9O5Y0KYXXWnaC2IYXw","weight":1},{"event_id":2350,"event_guid":"433e598a-4a96-4be5-90f1-014b4be7b3ec","weight":1},{"event_id":2961,"event_guid":"ab8d2f00-69a9-4c9d-979a-9d8cd19c1f88","weight":1},{"event_id":3017,"event_guid":"667e8e47-c44e-4213-8e58-096048f6ecfe","weight":1},{"event_id":3019,"event_guid":"e82961bc-1d29-4f87-83d4-61517edfbc5f","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3032,"event_guid":"a92fdc4b-370b-4700-86ea-e5dbf22d778e","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3165,"event_guid":"IPvmWP0FuV9b5q-gEI6iHw","weight":1},{"event_id":3199,"event_guid":"Zz12nSU5j4wZHqNs1C9ktg","weight":1},{"event_id":3209,"event_guid":"9lMPMu99GEqkOTTmlsA4eQ","weight":1},{"event_id":3211,"event_guid":"ueGMupXG4pqfidkoyMKTgg","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3624,"event_guid":"600ca67d-e18d-49d8-8e5d-08d5b38ec528","weight":1},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":1},{"event_id":3757,"event_guid":"9d6db804-1074-4116-8210-cca78b335a1a","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":1}]},{"guid":"import-ca377fadd50f41d378","title":"RFID - overview of protocols, librfid implementation and passive sniffing","subtitle":"ISO14443, ISO15693, their GPL librfid implementation and passive sniffing hardware","slug":"22C3-769-en-rfid_protocols","link":"http://events.ccc.de/congress/2005/fahrplan/events/769.en.html","description":"The presentation will cover an introduction into the two popular RFID Standards, ISO14443 and ISO15693, as well as the author's Free Software implementation \"librfid\"\n","original_language":"eng","persons":["Harald Welte","Milosch Meriac"],"tags":["22c3"," Hacking"],"view_count":150,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-15T15:15:13.981+01:00","length":2848,"duration":2848,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-769-en-rfid_protocols.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-769-en-rfid_protocols_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ca377fadd50f41d378-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ca377fadd50f41d378-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-769-en-rfid_protocols","url":"https://api.media.ccc.de/public/events/import-ca377fadd50f41d378","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":3},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1055,"event_guid":"import-7ec4d5ccef835f7fdf","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1167,"event_guid":"import-f1078d534b35506b91","weight":1},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":1},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":3},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":1475,"event_guid":"import-6494b3c268a64f31b0","weight":2},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":2},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":1},{"event_id":5222,"event_guid":"42464643-3358-2020-2020-202020202020","weight":1},{"event_id":5237,"event_guid":"44544851-574d-2020-2020-202020202020","weight":1},{"event_id":5243,"event_guid":"41524d50-3344-2020-2020-202020202020","weight":2},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":2}]},{"guid":"import-0243ea368590839b2d","title":"Bluetooth Hacking - The State of The Art","subtitle":"A roundup and live demonstrations of all currently known Bluetooth vulnerabilities.","slug":"22C3-536-en-bluetooth_hacking","link":"http://events.ccc.de/congress/2005/fahrplan/events/536.en.html","description":"This talk will provide an overview of all currently know Bluetooth exploits, as well as live demonstrations, including Bluebugging, Snarfing, Dumping, PIN cracking and Car Whispering.\n","original_language":"eng","persons":["Marcel Holtmann","Martin Herfurt","Adam Laurie"],"tags":["22c3"," Hacking"],"view_count":1798,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-22T10:15:13.389+01:00","length":5580,"duration":5580,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-536-en-bluetooth_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-536-en-bluetooth_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-0243ea368590839b2d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-0243ea368590839b2d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-536-en-bluetooth_hacking","url":"https://api.media.ccc.de/public/events/import-0243ea368590839b2d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":18,"event_guid":"import-3a3291458168550dc9","weight":1},{"event_id":24,"event_guid":"import-df7b25850170e056b1","weight":1},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":1},{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":1},{"event_id":229,"event_guid":"import-84ac09898882828ddb","weight":1},{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":1},{"event_id":428,"event_guid":"import-aac153935209b2785c","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":2},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":3},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":3},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":957,"event_guid":"import-fa398718f4c3eec297","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":963,"event_guid":"import-efd81356bad7b1f7b3","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":2},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1115,"event_guid":"import-1a4080ee807514e9de","weight":5},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1211,"event_guid":"import-476a1a21f28a910dbd","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":1},{"event_id":1719,"event_guid":"import-1975766c6d4f873c2c","weight":1},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":1},{"event_id":1892,"event_guid":"98b17d0799a31053","weight":1},{"event_id":1952,"event_guid":"e7ca6d029c833227","weight":1},{"event_id":1965,"event_guid":"WBJGKVQxGRFSjHRdIIQEtA","weight":1},{"event_id":1969,"event_guid":"qhHYA8W5FgbkHqAdYePmEQ","weight":1},{"event_id":2075,"event_guid":"og51ww-R2NDBGuA6LeTfRA","weight":1},{"event_id":2089,"event_guid":"F4PROIwL9VVgBhW7SqnWNQ","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":1},{"event_id":2312,"event_guid":"b0fedd21-0b02-45d7-93e5-45935b24e15d","weight":1},{"event_id":2388,"event_guid":"e9a54249-b4a7-4562-91fe-421a6bde0831","weight":2},{"event_id":2420,"event_guid":"02b7f942-d9e9-468e-85cd-12837f48bc16","weight":1},{"event_id":2436,"event_guid":"83b785ad-0882-4552-9ad4-0cde123f3837","weight":1},{"event_id":2523,"event_guid":"afe359da-56c9-4e76-8f56-45ed406494e5","weight":1},{"event_id":2526,"event_guid":"e8f03c57-f500-492a-9028-b91acffe7695","weight":1},{"event_id":2637,"event_guid":"cbb9db2e-a159-4bea-a2a3-eac73061d1f4","weight":3},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":2},{"event_id":2865,"event_guid":"b2a8a8fe-646f-4e32-a4d8-67a163573e36","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":1},{"event_id":3073,"event_guid":"deadbcbf-a450-4005-99d1-054b38e58b86","weight":1},{"event_id":3252,"event_guid":"3c8a53c9-bf68-5739-801c-0f0d2207fd50","weight":2},{"event_id":3272,"event_guid":"e2fff38d-16eb-52b0-872a-ef9f4489ed5c","weight":1},{"event_id":3405,"event_guid":"8c834770-a8d7-44a8-8405-abd4c10f6a17","weight":1},{"event_id":3449,"event_guid":"55e72dd9-5014-4eca-bd26-3fbbad1fd89f","weight":1},{"event_id":3477,"event_guid":"e53862bd-2c21-40d4-85df-d77bcd025114","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":2},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":2},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":2},{"event_id":3807,"event_guid":"32ed6ce9-cefa-4e7b-9191-6c61678db765","weight":1},{"event_id":3858,"event_guid":"39d3b2d0-6f82-4aa6-b0c0-6ae18caa2c3c","weight":1},{"event_id":3944,"event_guid":"c6b1fc76-2f70-4051-9767-46487ab457b3","weight":1},{"event_id":4365,"event_guid":"7b8075fb-aafa-4037-beb9-168b5461c831","weight":7},{"event_id":4374,"event_guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","weight":1},{"event_id":4569,"event_guid":"2017bf48-f589-5de0-af34-e19076559508","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":1},{"event_id":4971,"event_guid":"bac4a0c4-8ee0-485d-8fc8-92ea06357881","weight":1},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":2},{"event_id":5557,"event_guid":"d6e55ac4-08b0-5c60-a88c-daa5496dfbf6","weight":1},{"event_id":5567,"event_guid":"cb4WPl8YMJeHGRt-929MBQ","weight":1},{"event_id":5569,"event_guid":"d37bc91e-f1dd-4fbb-b793-c08b2436eecb","weight":6},{"event_id":5959,"event_guid":"0c371809-6e2f-5094-a0ac-6190e939363a","weight":2},{"event_id":6024,"event_guid":"04b15cf2-0797-464d-92c1-245bff59b4bc","weight":3},{"event_id":6058,"event_guid":"7fe2a84b-bbed-4a4e-80fb-85b581c14b13","weight":2},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":2}]},{"guid":"import-d0f7647cadbc7a6918","title":"EvoCell - free software for evolving cellular automata","subtitle":"Exploring the huge space of possible cellular automata by evolution","slug":"22C3-407-en-evocell","link":"http://events.ccc.de/congress/2005/fahrplan/events/407.en.html","description":"This talk is for everyone who liked to play around with the game of life when he/she was a kid (or older).\n\nThe goal of this talk is to present EvoCell, a free software project released under the GPL. EvoCell can simulate arbitrarily many cellular automata in parallel with any neigbourhood, any number of states (RAM is the limit) and any transition rules.\n\nThe really interesting part is that you can evolve the transition rules. By using genetic algorithms EvoCell allows you to explore the huge space of possible cellular automata. Strange worlds of gliders, replicators, blinkers and other cellular machines are awaiting you.\n\nIn the talk I'll try to explain some fundamental principles of artificial life and demonstrate how the can be seen in cellular automata.\n","original_language":"eng","persons":["Philipp Tiefenbacher"],"tags":["22c3"," Science"],"view_count":124,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-15T15:15:08.978+01:00","length":3560,"duration":3560,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-407-en-evocell.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-407-en-evocell_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d0f7647cadbc7a6918-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d0f7647cadbc7a6918-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-407-en-evocell","url":"https://api.media.ccc.de/public/events/import-d0f7647cadbc7a6918","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":2},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":1},{"event_id":3787,"event_guid":"f3358998-1465-4445-885e-74d880be57d0","weight":1}]},{"guid":"import-cea0421c21369603a5","title":"Have you hugged your Mac today?","subtitle":"Ein audiovisuelles Live-Feature","slug":"22C3-867-de-have_you_hugged_your_mac_today","link":"http://events.ccc.de/congress/2005/fahrplan/events/867.en.html","description":"Live-Performance der Hörspielwerkstatt der Humboldt-Universität Berlin in deutscher und englischer Sprache über Apple, Steve Jobs und Steve Wozniak.\n","original_language":"eng","persons":["Kai Kittler","Ina Kwasniewski","Jens-Martin Loebel","Jochen Koubek","Marcus Richter","Constanze Kurz"],"tags":["22c3"," Culture"],"view_count":75,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-04T18:30:10.598+01:00","length":2788,"duration":2788,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-867-de-have_you_hugged_your_mac_today.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-867-de-have_you_hugged_your_mac_today_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-cea0421c21369603a5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-cea0421c21369603a5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-867-de-have_you_hugged_your_mac_today","url":"https://api.media.ccc.de/public/events/import-cea0421c21369603a5","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":165,"event_guid":"import-5ca925d47840ae0d48","weight":1},{"event_id":229,"event_guid":"import-84ac09898882828ddb","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":2},{"event_id":1238,"event_guid":"import-476755400a574b9fe2","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":3075,"event_guid":"703aa5ef-1a1d-4209-8251-1e9218f900a4","weight":1},{"event_id":3331,"event_guid":"41452287-6fc1-595a-a59a-12bd117de029","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":3864,"event_guid":"63dd83b9-27e4-4122-8a45-48ca7c92e13e","weight":1},{"event_id":3954,"event_guid":"6033c592-f777-4e83-84ee-94cef2e89338","weight":1},{"event_id":4222,"event_guid":"bfaf0024-a741-4015-85df-49663c462cf8","weight":1},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":1},{"event_id":6154,"event_guid":"1e8b4e7a-557c-0b1a-98ff-0aaa0af2a15b","weight":1},{"event_id":6404,"event_guid":"5b947f86-8ba1-4b99-adbe-7c5030deea0c","weight":1},{"event_id":6477,"event_guid":"c85de43e-107e-4247-b550-946f376e2ec4","weight":1},{"event_id":6486,"event_guid":"7ebee226-66bc-558f-b76f-435a8ce91543","weight":1}]},{"guid":"import-8e7ab593b77c31ffdd","title":"Vulnerability markets","subtitle":"What is the economic value of a zero-day exploit?","slug":"22C3-801-en-vulnerability_markets","link":"http://events.ccc.de/congress/2005/fahrplan/events/801.en.html","description":"What is the market value of a zero-day exploit?\n","original_language":"eng","persons":["Rainer Böhme"],"tags":["22c3"," Science"],"view_count":76,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-10T06:30:05.861+01:00","length":3579,"duration":3579,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-801-en-vulnerability_markets.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-801-en-vulnerability_markets_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-8e7ab593b77c31ffdd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-8e7ab593b77c31ffdd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-801-en-vulnerability_markets","url":"https://api.media.ccc.de/public/events/import-8e7ab593b77c31ffdd","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":1}]},{"guid":"import-a50e2a69d02db0bc4a","title":"Old Skewl Hacking - InfraRed updated","subtitle":"MMIrDA - Major Malfunction's InfraRed Discovery Application","slug":"22C3-535-en-old_skewl_hacking","link":"http://events.ccc.de/congress/2005/fahrplan/events/535.en.html","description":"An updated look at InfraRed hacking, and the state of the art in owning hotel TV systems.\n","original_language":"eng","persons":["Major Malfunction"],"tags":["22c3"," Hacking"],"view_count":84,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-29T17:45:08.906+01:00","length":2997,"duration":2997,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-535-en-old_skewl_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-535-en-old_skewl_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a50e2a69d02db0bc4a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a50e2a69d02db0bc4a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-535-en-old_skewl_hacking","url":"https://api.media.ccc.de/public/events/import-a50e2a69d02db0bc4a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":2},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":2},{"event_id":1323,"event_guid":"import-5e89fe5c21c6e4d891","weight":1},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1379,"event_guid":"import-f62972ee26d8e418a1","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1523,"event_guid":"import-831af8d32e6e76f52c","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":2948,"event_guid":"7ca8581d-a3f7-4247-8101-786cf04d9bd1","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":7255,"event_guid":"265fd581-ed2b-5985-879c-0d51c45c70c8","weight":1}]},{"guid":"import-107a176446d333e063","title":"Hacking Data Retention","subtitle":"How bureaucrats fail to fight terror","slug":"22C3-466-en-hacking_data_retention","link":"http://events.ccc.de/congress/2005/fahrplan/events/466.en.html","description":"Data retention is presented as a solution for fighting child pornography and terror, but in reality the measures will fail. Circumventing is easy and mistakes are waiting to happen. This presentation shows the hard evidence to hack data rentention.\n","original_language":"eng","persons":["Brenno de Winter"],"tags":["22c3"," Hacking"],"view_count":20,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-02-15T18:15:04.748+01:00","length":2972,"duration":2972,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-466-en-hacking_data_retention.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-466-en-hacking_data_retention_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-107a176446d333e063-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-107a176446d333e063-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-466-en-hacking_data_retention","url":"https://api.media.ccc.de/public/events/import-107a176446d333e063","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":914,"event_guid":"import-3715aeea2e9dad683d","weight":1},{"event_id":1010,"event_guid":"import-0f9b42526ff00c14b5","weight":1}]},{"guid":"import-34c9c7ca1b95d58b9a","title":"A way to fuzzy democracy","subtitle":"Using modern communication to transform the way we make political decisions","slug":"22C3-572-en-fuzzy_democracy","link":"http://events.ccc.de/congress/2005/fahrplan/events/572.en.html","description":"As we can see by the German voting results in 2005, there is a huge disenchantment with politics in modern democracies. The voting people feel powerless in a governance where the power should originally belong to the people. \"Democracy\" only tends to be the best compromise among other types of government, but it could be different.\n\nThose modern means of communication most of us already use on a daily basis, like internet forums, webs of trust and possibly e-voting systems, can be used as a basis for political discussion and decision making as long as we are aware of their benefits as well as their\nlimitations. This talk puts our traditional believes about democracy into question by closely looking at its roots in history. A careful deconstruction of that monolithic term will instantly lead to a very different perspective on the ideals behind it. It then becomes very easy to see how much closer modern technology might take us to the original\nidea of democracy.\n\nTo sum it up: There are much better strategies of mobilizing and informing people than consuming TV ads and then voting the lesser evil every 4 years.\n","original_language":"eng","persons":["Svenja Schröder","Christiane Ruetten"],"tags":["22c3"," Society"],"view_count":133,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-23T18:15:07.162+01:00","length":3733,"duration":3733,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-572-en-fuzzy_democracy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-572-en-fuzzy_democracy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-34c9c7ca1b95d58b9a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-34c9c7ca1b95d58b9a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-572-en-fuzzy_democracy","url":"https://api.media.ccc.de/public/events/import-34c9c7ca1b95d58b9a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":129,"event_guid":"import-030c0d0c772923374e","weight":1},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":798,"event_guid":"import-1c79c2ce56e02c06d9","weight":1},{"event_id":1008,"event_guid":"import-3879979ffb75b723f8","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1058,"event_guid":"import-20a6b9aac8f72f4d2c","weight":1},{"event_id":1072,"event_guid":"import-a60aea0b597609400e","weight":1},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":1},{"event_id":1428,"event_guid":"import-8caea0cb6ec40f1246","weight":1},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":1},{"event_id":6022,"event_guid":"4246c0a5-45e2-42be-b439-f03fbf9b0166","weight":1}]},{"guid":"import-b766adc19ddd01d9b4","title":"Secure Code","subtitle":"Why developing Secure Software is like playing Marble Madness","slug":"22C3-530-en-seccode","link":"http://events.ccc.de/congress/2005/fahrplan/events/530.en.html","description":"This talk will introduce new strategies for dealing with entire bug classes, and removing bug attractors from development environments.\n","original_language":"eng","persons":["Paul Böhm"],"tags":["22c3"," Hacking"],"view_count":38,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-02-08T11:15:05.510+01:00","length":3460,"duration":3460,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-530-en-seccode.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-530-en-seccode_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-b766adc19ddd01d9b4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-b766adc19ddd01d9b4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-530-en-seccode","url":"https://api.media.ccc.de/public/events/import-b766adc19ddd01d9b4","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":918,"event_guid":"import-d64bd455642b344372","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":929,"event_guid":"import-184dd05c328f44989b","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":996,"event_guid":"import-38c2dd9d642c6ca79a","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":1},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1}]},{"guid":"import-b24d0c472e7357b1a5","title":"Terminator Genes and GURT - Biological Restrictions Management","subtitle":"Five Years after the announcement of a quasi moratorium","slug":"22C3-828-en-terminator_genes_and_gurt","link":"http://events.ccc.de/congress/2005/fahrplan/events/828.en.html","description":"Terminator Technology prevents plants from producing reproducible seeds, acting as a sort of copy protection technology for plants. In this talk we want to talk about the technological background, explaining the bits of genetic code that can switch reproduction on and off. Also we want to focus on the implication of this technology, the parallels to our struggles as hackers, and the resistance to its introduction.\n","original_language":"eng","persons":["Julian 'hds' Finn","Oliver Moldenhauer"],"tags":["22c3"," Science"],"view_count":17,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2022-09-02T23:15:04.727+02:00","length":2547,"duration":2547,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-828-en-terminator_genes_and_gurt.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-828-en-terminator_genes_and_gurt_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-b24d0c472e7357b1a5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-b24d0c472e7357b1a5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-828-en-terminator_genes_and_gurt","url":"https://api.media.ccc.de/public/events/import-b24d0c472e7357b1a5","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":4318,"event_guid":"341c90d6-aaea-4284-8c8e-c80096cf13d5","weight":1}]},{"guid":"import-73ea56f62062e5ea9d","title":"Lightning Talks Day 3","subtitle":"Nine five minutes talks by various speakers","slug":"22C3-913-en-lightning_talk_day_3","link":"http://events.ccc.de/congress/2005/fahrplan/events/913.en.html","description":"There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin.\n","original_language":"eng","persons":["fukami"],"tags":["22c3"],"view_count":41,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-13T08:30:12.393+01:00","length":3923,"duration":3923,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-913-en-lightning_talk_day_3.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-913-en-lightning_talk_day_3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-73ea56f62062e5ea9d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-73ea56f62062e5ea9d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-913-en-lightning_talk_day_3","url":"https://api.media.ccc.de/public/events/import-73ea56f62062e5ea9d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":993,"event_guid":"import-616bc3bf6f05941c54","weight":2},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":1},{"event_id":2950,"event_guid":"83fa2955-80df-4f47-9421-9e81b9f6f2c0","weight":1},{"event_id":3759,"event_guid":"c6decee9-310c-40b9-90af-5937df22e1aa","weight":1},{"event_id":4012,"event_guid":"c1c9672c-594f-50ec-87fe-5e112c4ed7c9","weight":1},{"event_id":4034,"event_guid":"e4130a24-fdf6-51ab-b024-a9883f8fc1d7","weight":1},{"event_id":4126,"event_guid":"ded4a05f-156c-558b-99e8-21170c7a96f6","weight":1},{"event_id":4502,"event_guid":"b99bb348-050c-5e94-93a8-3bc74e34338b","weight":1},{"event_id":4504,"event_guid":"4f5c59c8-4f8f-59c4-9036-8f4c371a373a","weight":1},{"event_id":4505,"event_guid":"2ed7a74e-13b3-585a-a307-8480d9e52255","weight":1},{"event_id":5887,"event_guid":"2c8fac7f-38b0-57df-99b1-2dd60d97ddc2","weight":1},{"event_id":5925,"event_guid":"f70f65b0-4ac1-59be-86f4-d9907cb59c5e","weight":1}]},{"guid":"import-fa398718f4c3eec297","title":"VoIPhreaking","subtitle":"Introduction to SIP Hacking","slug":"22C3-565-en-voiphreaking","link":"http://events.ccc.de/congress/2005/fahrplan/events/565.en.html","description":"Within the last year VoIP devices and applications flooded the market. SIP (Session Initiation Protocol) became the industry standard although it's still under constant development. VoIP networks converge with the\nPSTN and thus offer ways and means for new (and old) attacks. The talk gives a brief introduction on how various components in the VoIP universe interact. The main part deals with implementation problems within SIP in both end user as well as ISP site devices and applications.\n","original_language":"eng","persons":["Hendrik Scholz"],"tags":["22c3"," Hacking"],"view_count":69,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-06-20T19:00:04.525+02:00","length":2950,"duration":2950,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-565-en-voiphreaking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-565-en-voiphreaking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-fa398718f4c3eec297-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-fa398718f4c3eec297-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-565-en-voiphreaking","url":"https://api.media.ccc.de/public/events/import-fa398718f4c3eec297","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":963,"event_guid":"import-efd81356bad7b1f7b3","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":2},{"event_id":1134,"event_guid":"import-1c9d472a2babaafdf2","weight":1},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":1},{"event_id":1892,"event_guid":"98b17d0799a31053","weight":1},{"event_id":3008,"event_guid":"65ea5a93-74e9-4a33-b08e-f9f1a4de46ee","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3823,"event_guid":"4046cd27-1560-59af-b708-eede781ce5ec","weight":1},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":1},{"event_id":5287,"event_guid":"5d5e3275-0f1a-41ae-a1ad-a98ba66f1390","weight":1},{"event_id":5621,"event_guid":"6c03170f-fc25-55f7-801b-587e5336145c","weight":1}]},{"guid":"import-521402fa4a05486425","title":"Corp vs. Corp","subtitle":"Profiling Modern Espionage","slug":"22C3-423-en-corp_vs_corp","link":"http://events.ccc.de/congress/2005/fahrplan/events/423.en.html","description":"An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation will also cover a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets.\n","original_language":"eng","persons":["Fabio Ghioni","Roberto Preatoni"],"tags":["22c3"," Hacking"],"view_count":36,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-03-15T17:15:05.622+01:00","length":3378,"duration":3378,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-423-en-corp_vs_corp.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-423-en-corp_vs_corp_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-521402fa4a05486425-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-521402fa4a05486425-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-423-en-corp_vs_corp","url":"https://api.media.ccc.de/public/events/import-521402fa4a05486425","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1066,"event_guid":"import-bb84670204b0b48b3f","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1137,"event_guid":"import-c1d9076bebc9186722","weight":1},{"event_id":3673,"event_guid":"9e02145e-1d65-4398-b8e2-bd4c1faee0fa","weight":1},{"event_id":6537,"event_guid":"70b257cc-d26a-4044-b95e-5d3e6d8c7597","weight":1}]},{"guid":"import-4788ad9117174c432f","title":"Peer-to-peer under the hood","subtitle":"An in-depth look at p2p algorithmics","slug":"22C3-461-en-peer_to_peer_under_the_hood","link":"http://events.ccc.de/congress/2005/fahrplan/events/461.en.html","description":"About p2p-algorithms for fully distributed, totally serverless, fully scalable peer-to-peer systems. Not about specific p2p-softwares. This will only be a very brief overview of p2p-algorithms.\n","original_language":"eng","persons":["David Göthberg"],"tags":["22c3"," Hacking"],"view_count":63,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-08-05T17:00:05.426+02:00","length":2862,"duration":2862,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-461-en-peer_to_peer_under_the_hood_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4788ad9117174c432f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4788ad9117174c432f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-461-en-peer_to_peer_under_the_hood","url":"https://api.media.ccc.de/public/events/import-4788ad9117174c432f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":605,"event_guid":"import-60fa6616589c809595","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":2990,"event_guid":"6de11db2-2aae-4cd1-969f-f2a16a557f8f","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3195,"event_guid":"K7ISDA3myTR4X5AI3udD6w","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":1}]},{"guid":"import-0d0583302765040a34","title":"Open Source, EU funding and Agile Methods","subtitle":"Sprint methodology in funded OSS projects","slug":"22C3-585-en-agile_business_and_eu_funding","link":"http://events.ccc.de/congress/2005/fahrplan/events/585.en.html","description":"There is a growing number of open-source developers organized and connected to company and money related work. We report our experiences from the first year of the PyPy project which has a 7 company/university consortium and a 1.3 Million Euro research grant from the European Union.\n","original_language":"eng","persons":["Holger Krekel","Beatrice Düring"],"tags":["22c3"," Community"],"view_count":130,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-06T12:30:10.208+01:00","length":3523,"duration":3523,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-585-en-agile_business_and_eu_funding.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-585-en-agile_business_and_eu_funding_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-0d0583302765040a34-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-0d0583302765040a34-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-585-en-agile_business_and_eu_funding","url":"https://api.media.ccc.de/public/events/import-0d0583302765040a34","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1022,"event_guid":"import-375407da26688f3035","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":2},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":2808,"event_guid":"3101dcca-7460-45e2-bdb1-c9f597eb462e","weight":2},{"event_id":3428,"event_guid":"7d2ccfda-ae1f-47a9-8d0a-c1c6c270614a","weight":1},{"event_id":3436,"event_guid":"bff919d7-0756-4e00-9901-9f9311415f9a","weight":1},{"event_id":3438,"event_guid":"ec1ceb0a-9da3-44f1-bf23-00c1d52486ff","weight":1},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3804,"event_guid":"23a68819-b112-435d-8d5d-c6a6ecf52875","weight":1}]},{"guid":"import-375407da26688f3035","title":"PyPy - the new Python implementation on the block","subtitle":"Language/VM R\u0026D, whole program type inference, translation to low level backends, fun","slug":"22C3-586-en-pypy","link":"http://events.ccc.de/congress/2005/fahrplan/events/586.en.html","description":"We present our first self-contained Python virtual machine that uses parts of itself to translate itself to low level languages (\"the Muenchhausen approach\"). The PyPy approach could solve problems at language/interpreter-level that formerly required complex frameworkish solutions at user-level.\n","original_language":"eng","persons":["Armin Rigo","Carl Friedrich Bolz","Holger Krekel"],"tags":["22c3"," Hacking"],"view_count":241,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-11-30T14:15:12.046+01:00","length":3686,"duration":3686,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-586-en-pypy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-586-en-pypy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-375407da26688f3035-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-375407da26688f3035-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-586-en-pypy","url":"https://api.media.ccc.de/public/events/import-375407da26688f3035","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":1008,"event_guid":"import-3879979ffb75b723f8","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1213,"event_guid":"import-8f6a5878fb4c40a1ac","weight":1},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":1},{"event_id":1408,"event_guid":"import-b7cf56b6bbe50e728c","weight":1},{"event_id":1477,"event_guid":"import-633bd84860f65db047","weight":2},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":1},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1552,"event_guid":"import-c0e9ee0d0ffbfc6e2b","weight":1},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":1},{"event_id":1668,"event_guid":"import-d52f066cf03458c746","weight":1},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":1},{"event_id":1777,"event_guid":"tEudCvm8e6XS2VQP3BR5yw","weight":1},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":1},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":1},{"event_id":1839,"event_guid":"tnCge6rYmFPy9O0KjvtBAQ","weight":1},{"event_id":2499,"event_guid":"fc4e6338-452d-48c3-a21b-ecdcb658bce7","weight":1},{"event_id":2862,"event_guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","weight":1},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":3381,"event_guid":"c1d9f8e6-94ec-4d40-92d9-da5b74c4087a","weight":1},{"event_id":3428,"event_guid":"7d2ccfda-ae1f-47a9-8d0a-c1c6c270614a","weight":1},{"event_id":3436,"event_guid":"bff919d7-0756-4e00-9901-9f9311415f9a","weight":2},{"event_id":3438,"event_guid":"ec1ceb0a-9da3-44f1-bf23-00c1d52486ff","weight":1},{"event_id":3605,"event_guid":"61f9d4c6-a3de-4958-a57c-efcf941668fa","weight":1},{"event_id":3628,"event_guid":"4de841b2-0f34-494e-ba5b-0b79ba2c88cd","weight":1},{"event_id":3636,"event_guid":"a1a52c4c-8233-403b-8f04-db981df016c1","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":3804,"event_guid":"23a68819-b112-435d-8d5d-c6a6ecf52875","weight":2},{"event_id":4499,"event_guid":"b6b5253f-396c-5146-95bf-df12f61fae6b","weight":2},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":1},{"event_id":4848,"event_guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":1},{"event_id":5256,"event_guid":"c2474049-40f0-4d92-935e-e22090e3d343","weight":1},{"event_id":6476,"event_guid":"feb18113-3325-4053-93a0-76d4980b137c","weight":1},{"event_id":6512,"event_guid":"25c54ce3-598c-42ee-8832-52fe9deae7ad","weight":1}]},{"guid":"import-1fd7b39f0ac4933695","title":"Honeymonkeys","subtitle":"Chasing hackers with a bunch of monkeys","slug":"22C3-871-en-honeymonkeys","link":"http://events.ccc.de/congress/2005/fahrplan/events/871.en.html","description":"As part of their ongoing efforts to secure the use of the web for Windows-based systems Microsoft recently launched a new research initiative called Honeymonkeys. This talk will introduce the basic  concepts and ideas behind this initiative and will present the speakers' latest research project to gain more knowledge about implementing client-based honeypots.\n","original_language":"eng","persons":["Krisztian Piller","Sebastian Wolfgarten"],"tags":["22c3"," Hacking"],"view_count":54,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-01-29T10:00:08.537+01:00","length":2774,"duration":2774,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-871-en-honeymonkeys.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-871-en-honeymonkeys_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-1fd7b39f0ac4933695-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-1fd7b39f0ac4933695-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-871-en-honeymonkeys","url":"https://api.media.ccc.de/public/events/import-1fd7b39f0ac4933695","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":157,"event_guid":"import-0ac93750a395b0f59f","weight":1},{"event_id":204,"event_guid":"import-8d84b89723a69bf540","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1116,"event_guid":"import-3358e29cb284c40d70","weight":1},{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":1},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":5628,"event_guid":"480aa632-0d92-5b04-9af0-30df192e5ebe","weight":1},{"event_id":6340,"event_guid":"95aab8ea-e8ec-539f-9e96-b31da306f682","weight":1},{"event_id":6342,"event_guid":"8340fbc9-2735-5560-b3f4-ac36f8f5a35d","weight":1},{"event_id":6351,"event_guid":"f3c974f2-52c2-54e1-a69a-069c4ffec695","weight":1}]},{"guid":"import-e9cc4f3ee3c026c887","title":"Disassembler Internals II: Automated Data Structure Recognition","subtitle":null,"slug":"22C3-926-en-disassembler_internals","link":"http://events.ccc.de/congress/2005/fahrplan/events/926.en.html","description":"Disassembler Internals II is an advanced look at the power of programmatic disassembly analysis. The talk will focus on data structure recognition for the purposes of reducing time spent reverse engineering protocols and proprietary file formats.\n","original_language":"eng","persons":["Richard Johnson"],"tags":["22c3"," Hacking"],"view_count":31,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-03-27T09:30:03.704+01:00","length":2612,"duration":2612,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-926-en-disassembler_internals.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-926-en-disassembler_internals_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e9cc4f3ee3c026c887-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e9cc4f3ee3c026c887-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-926-en-disassembler_internals","url":"https://api.media.ccc.de/public/events/import-e9cc4f3ee3c026c887","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":1},{"event_id":1806,"event_guid":"IE5aOu8FUaPfpFv5v4rtJg","weight":1},{"event_id":1934,"event_guid":"tFBTD_3Ih6LzwUZFnvCYqA","weight":1},{"event_id":2052,"event_guid":"-bugdKsCZJrfOHlkVIfXOw","weight":1},{"event_id":2507,"event_guid":"2e6e3f84-3f82-4e72-981e-fd90e23d8112","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":3309,"event_guid":"9335f1f1-c0c5-5378-b686-fffd6781c5ce","weight":1},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":1},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":5501,"event_guid":"YEJOkxvQJMR7HSFH9bSSNA","weight":1},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":1}]},{"guid":"import-257e025a6c89266a71","title":"The truth about Nanotechnology","subtitle":"A concise introduction to what NT is, what it can't do yet and what we should be aware of","slug":"22C3-336-en-nanotechnology","link":"http://events.ccc.de/congress/2005/fahrplan/events/336.en.html","description":"Nanotechnology marks the merger of different technologies in structures smaller than 100 nm. While it could yield some powerful applications for sustainability, medicine and electronics, some hazards begin to appear that have to be addressed urgently\n","original_language":"eng","persons":["Niels Boeing"],"tags":["22c3"," Science"],"view_count":75,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-18T22:15:12.730+01:00","length":3228,"duration":3228,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-336-en-nanotechnology.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-336-en-nanotechnology_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-257e025a6c89266a71-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-257e025a6c89266a71-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-336-en-nanotechnology","url":"https://api.media.ccc.de/public/events/import-257e025a6c89266a71","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1339,"event_guid":"import-1750405b344a79e865","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":5524,"event_guid":"WnUprZFOjGuyVTwXu1V-aQ","weight":1},{"event_id":6412,"event_guid":"d7aa8828-4e06-4029-b962-1009815efa58","weight":1},{"event_id":6544,"event_guid":"3745513b-c2e6-449a-abd0-2e32f738f168","weight":1}]},{"guid":"import-43228b352678b0ded0","title":"Zauberhafte Naturwissenschaften","subtitle":null,"slug":"22C3-778-de-zauberhafte_naturwissenschaften","link":"http://events.ccc.de/congress/2005/fahrplan/events/778.en.html","description":"Zur Anregung, sich mit Naturwissenschaften zu beschäftigen und „einfache, selbstverständliche“ Sachverhalte wieder fragwürdig und problemhaltig zu machen.\n","original_language":"eng","persons":["Wolfgang Hahn"],"tags":["22c3"," Science"],"view_count":122,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-18T16:15:13.350+01:00","length":3093,"duration":3093,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-778-de-zauberhafte_naturwissenschaften.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-778-de-zauberhafte_naturwissenschaften_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-43228b352678b0ded0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-43228b352678b0ded0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-778-de-zauberhafte_naturwissenschaften","url":"https://api.media.ccc.de/public/events/import-43228b352678b0ded0","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":146,"event_guid":"import-1c1453a65749c731f6","weight":1},{"event_id":691,"event_guid":"import-e07970a31bd07defcf","weight":1},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":3},{"event_id":732,"event_guid":"import-19fc7a9e94509e5fe4","weight":2},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":4},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":2},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":2},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":3},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":2},{"event_id":1227,"event_guid":"import-bc8cc3f9450dfddd83","weight":1},{"event_id":1228,"event_guid":"import-2d90297dec2e7ff4a7","weight":1},{"event_id":2289,"event_guid":"a02daeb8-034a-45bb-998e-65d74ac29ea1","weight":2},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1}]},{"guid":"import-7317225cacc9eb4d71","title":"Finding and Preventing Buffer Overflows","subtitle":"An overview of static and dynamic approaches","slug":"22C3-556-en-preventing_buffer_overflows","link":"http://events.ccc.de/congress/2005/fahrplan/events/556.en.html","description":"A talk that will present academic tools, which are designed to find or disarm security problems in C code\n","original_language":"eng","persons":["Martin Johns"],"tags":["22c3"," Hacking"],"view_count":102,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-30T18:00:09.099+01:00","length":2749,"duration":2749,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-556-en-preventing_buffer_overflows.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-556-en-preventing_buffer_overflows_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-7317225cacc9eb4d71-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-7317225cacc9eb4d71-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-556-en-preventing_buffer_overflows","url":"https://api.media.ccc.de/public/events/import-7317225cacc9eb4d71","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":964,"event_guid":"import-480d3f86e0ad1352fc","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":2},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":1},{"event_id":1796,"event_guid":"z7M48Tb_4vtI0BBFVqe_ag","weight":1},{"event_id":2371,"event_guid":"318a2c32-3c4e-44b3-8037-778f022dad03","weight":1},{"event_id":2599,"event_guid":"47ec62f7-fead-49b4-a89a-382f9343df5a","weight":1},{"event_id":2631,"event_guid":"8a9c7888-b460-45a4-a746-2cd21caffbf3","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3418,"event_guid":"e22d9cbc-8dfe-4b87-a0e0-56fb76a62511","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":3849,"event_guid":"afcad2d0-34e7-11e7-b75a-bf6c18dd9a31","weight":1},{"event_id":4257,"event_guid":"9f3c556d-5cb0-4b17-a099-3c4626a7e83b","weight":1}]},{"guid":"import-a5a928eef896416b07","title":"Covert channels in TCP/IP: attack and defence","subtitle":"Creation and detection of IP steganography for covert channels and device fingerprinting","slug":"22C3-798-en-tcpip_covert_channels","link":"http://events.ccc.de/congress/2005/fahrplan/events/798.en.html","description":"This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used.\n","original_language":"eng","persons":["Steven J. Murdoch"],"tags":["22c3"," Hacking"],"view_count":67,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-28T06:00:04.035+01:00","length":2555,"duration":2555,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-798-en-tcpip_covert_channels.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-798-en-tcpip_covert_channels_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a5a928eef896416b07-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a5a928eef896416b07-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-798-en-tcpip_covert_channels","url":"https://api.media.ccc.de/public/events/import-a5a928eef896416b07","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":1},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":1},{"event_id":1512,"event_guid":"import-79dd14a9f3d562f20e","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3154,"event_guid":"axE0bWDwutJ5VgLbiJnqJQ","weight":1},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":3986,"event_guid":"ff2bf44f-3417-5914-a017-9777087662f7","weight":1}]},{"guid":"import-380a620688f8b30ed1","title":"A discussion about modern disk encryption systems","subtitle":null,"slug":"22C3-1112-en-modern_disk_encryption","link":"http://events.ccc.de/congress/2005/fahrplan/events/1112.en.html","description":"Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues.\n","original_language":"eng","persons":["Jacob Appelbaum"],"tags":["22c3"," Hacking"],"view_count":461,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-05T13:30:12.867+01:00","length":3562,"duration":3562,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1112-en-modern_disk_encryption.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1112-en-modern_disk_encryption_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-380a620688f8b30ed1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-380a620688f8b30ed1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1112-en-modern_disk_encryption","url":"https://api.media.ccc.de/public/events/import-380a620688f8b30ed1","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":3},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":2},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":3},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":1},{"event_id":1123,"event_guid":"import-b44a02e908289fda31","weight":4},{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":2},{"event_id":1799,"event_guid":"Lv-uOMbLZH1T17ZxxJ-TEQ","weight":3},{"event_id":1828,"event_guid":"kkMSS4JoEJtzbF9jc2JJ4A","weight":2},{"event_id":2812,"event_guid":"a30bcf2c-1abf-4b7b-9554-a6dacbaeba52","weight":1},{"event_id":2818,"event_guid":"fca4934b-5f01-4680-8cda-03fa206aac17","weight":1},{"event_id":2836,"event_guid":"56e8d345-8c04-4281-9811-d4ed9da8603e","weight":1},{"event_id":2858,"event_guid":"17259b49-65ef-4726-ae03-a0b90e45806a","weight":1},{"event_id":2866,"event_guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":5},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":1},{"event_id":3033,"event_guid":"ea530d4e-c315-4fc4-86ef-f34f3a18f663","weight":1},{"event_id":3554,"event_guid":"84e9ccad-5efe-49ac-b117-b382ae6fac1f","weight":2},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":3}]},{"guid":"import-c8564d288716d88de3","title":"Sicherheit vs. Überwachung","subtitle":"Videoüberwachung am Beispiel des Congressgebäudes","slug":"22C3-1148-de-sicherheitueberwachung","link":"http://events.ccc.de/congress/2005/fahrplan/events/1148.en.html","description":"Fortsetzung der Kameradiskussion zum Congress\n","original_language":"eng","persons":["Jens Ohlig","padeluun","Andy Müller-Maguhn","Frank Rosengart"],"tags":["22c3"," Society"],"view_count":114,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-07-23T18:00:05.235+02:00","length":3462,"duration":3462,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1148-de-sicherheitueberwachung.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1148-de-sicherheitueberwachung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-c8564d288716d88de3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-c8564d288716d88de3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1148-de-sicherheitueberwachung","url":"https://api.media.ccc.de/public/events/import-c8564d288716d88de3","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":2},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":2},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":4},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":2},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":4},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":4},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":6},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":2}]},{"guid":"import-af4384252d9f0d7190","title":"Technological art off the trodden tracks","subtitle":"Artists (mis)using technology","slug":"22C3-1085-en-technological_art","link":"http://events.ccc.de/congress/2005/fahrplan/events/1085.en.html","description":"A review of today's technological art scene, with examples and discussion of their impact on our technology-driven society.\n","original_language":"eng","persons":["Régine Débatty","Jussi Ängeslevä"],"tags":["22c3"," Culture"],"view_count":28,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2022-10-28T22:45:04.551+02:00","length":3320,"duration":3320,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1085-en-technological_art.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1085-en-technological_art_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-af4384252d9f0d7190-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-af4384252d9f0d7190-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1085-en-technological_art","url":"https://api.media.ccc.de/public/events/import-af4384252d9f0d7190","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":775,"event_guid":"import-b6cd88dc4ad69cbd83","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":917,"event_guid":"import-2623e5399f12d9c994","weight":1},{"event_id":1073,"event_guid":"import-48b970c65ea1ddb27b","weight":1},{"event_id":4624,"event_guid":"9b01013a-2e85-3074-5c29-33a2f606f5a2","weight":1}]},{"guid":"import-21d05b6ae105e4a388","title":"On working memory and mental imagery","subtitle":"How does the brain learn to think?","slug":"22C3-464-en-working_memory_mental_imagery","link":"http://events.ccc.de/congress/2005/fahrplan/events/464.en.html","description":"A representation of an untrained human brain, call it B(0), is encoded in the human genome -- its size can hardly exceed a few megabytes.  In contrast, a  representation of a trained brain, B(t), after big enough time t (say t=20years) must be very long (terabytes?) – it must include a representation of the brain's individual experience. How can a \"simple\" B(0) change into an extremely complex B(t) in the course of learning?\n","original_language":"eng","persons":["Victor Eliashberg"],"tags":["22c3"," Science"],"view_count":55,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-17T22:45:04.304+02:00","length":3641,"duration":3641,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-464-en-working_memory_mental_imagery.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-464-en-working_memory_mental_imagery_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-21d05b6ae105e4a388-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-21d05b6ae105e4a388-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-464-en-working_memory_mental_imagery","url":"https://api.media.ccc.de/public/events/import-21d05b6ae105e4a388","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":147,"event_guid":"import-8fc3552b8dc23b5f8d","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":904,"event_guid":"import-d0f7647cadbc7a6918","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":2},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":1},{"event_id":1755,"event_guid":"O-7g6jlu6DmenVdxO6t2Mg","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2167,"event_guid":"1116a02b-0312-4949-9921-d605148bfccb","weight":1},{"event_id":2267,"event_guid":"9RncwfCW37x4dhs15BQqBQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":2855,"event_guid":"52706f90-a2f9-48be-a4c3-786257fce233","weight":1},{"event_id":2943,"event_guid":"969bee9e-d0bf-4d24-a649-15f93747d608","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4248,"event_guid":"07a55a43-7096-49a9-9f89-38fa00e3cd47","weight":1},{"event_id":4450,"event_guid":"cb892f65-89b4-4c50-8ff6-e38725c67438","weight":1},{"event_id":6324,"event_guid":"c5b84ee4-7143-46f6-a76f-013b00eded6e","weight":1}]},{"guid":"import-3d5766621126a21447","title":"Breaking Down the Web of Trust","subtitle":null,"slug":"22C3-545-en-web_of_trust","link":"http://events.ccc.de/congress/2005/fahrplan/events/545.en.html","description":"Even with tutorials on the WoT and good trust policies the concept of \"trust\" can still be hard to grasp. Here we'll look at trust metrics, ways of using current trust systems better, and some non-crypto applications of trust.\n","original_language":"eng","persons":["Seth Hardy"],"tags":["22c3"," Hacking"],"view_count":63,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-22T21:30:15.858+01:00","length":4205,"duration":4205,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-545-en-web_of_trust.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-545-en-web_of_trust_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-3d5766621126a21447-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-3d5766621126a21447-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-545-en-web_of_trust","url":"https://api.media.ccc.de/public/events/import-3d5766621126a21447","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":5},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2}]},{"guid":"import-92989b1326a6bb2436","title":"Data Mining für den Weltfrieden","subtitle":null,"slug":"22C3-490-de-data_mining_weltfrieden","link":"http://events.ccc.de/congress/2005/fahrplan/events/490.en.html","description":"Wir drehen den Spiess um: Wie die Quintessenz die NSA analysiert hat. Warum die Bedrohung durch schmutzige Bomben eine fiktive ist. Wie zerlegt man systematisch eine Angst und Hysterie schürende Informationspolitik?\n","original_language":"eng","persons":["Jule Riede-Buechele"],"tags":["22c3"," Society"],"view_count":90,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-18T16:15:16.322+01:00","length":3029,"duration":3029,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-490-de-data_mining_weltfrieden.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-490-de-data_mining_weltfrieden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-92989b1326a6bb2436-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-92989b1326a6bb2436-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-490-de-data_mining_weltfrieden","url":"https://api.media.ccc.de/public/events/import-92989b1326a6bb2436","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":952,"event_guid":"import-84a9c6cfe2e198d2c4","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":3},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":4},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":3},{"event_id":1148,"event_guid":"import-a8982b9c792b3df8d3","weight":1},{"event_id":1160,"event_guid":"import-a05afcf3d77e5f5471","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":2},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":2},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":1},{"event_id":1342,"event_guid":"import-8f19a40ed78b95df8d","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1376,"event_guid":"import-b4f1afea850aa4a506","weight":1},{"event_id":1383,"event_guid":"import-c5cfcdb5af5a7ff87e","weight":1},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1493,"event_guid":"import-e0153826abfc289658","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":1563,"event_guid":"import-1996db286bced17658","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1680,"event_guid":"import-86bd8af37de0465a01","weight":1},{"event_id":1789,"event_guid":"rglYVLzBOIMfYpF873lgjQ","weight":1},{"event_id":1793,"event_guid":"H_FrxWgE7lz3DIkh_j8TbA","weight":1},{"event_id":1834,"event_guid":"8h6abIcZ9FOaWm7N3o3v9g","weight":1},{"event_id":1845,"event_guid":"HimAg2Mox6GCcmhbE0NWkQ","weight":1},{"event_id":1873,"event_guid":"import-08c713ee308dfefba3","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":1},{"event_id":2648,"event_guid":"10caf8e2-e910-41f4-a0e4-8589eeddf2d7","weight":1},{"event_id":3058,"event_guid":"56846834-12f4-495f-b92f-8cae32b8f1c2","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":4573,"event_guid":"0a06447c-95e2-5d84-b1fc-2601e846ffbe","weight":1},{"event_id":4576,"event_guid":"fc198f7f-f56d-5379-b9fc-2a3cd11e3e64","weight":1},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4700,"event_guid":"aadf222c-3ded-49b4-b80e-5a36e17d5dcb","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":1},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":1},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":1}]},{"guid":"import-4c93897d43ca54bf73","title":"Hacker Jeopardy","subtitle":"The one and only hacker quizshow","slug":"22C3-789-en-hacker_jeopardy","link":"http://events.ccc.de/congress/2005/fahrplan/events/789.en.html","description":"The well known quizshow format, but of course covering topics not usually seen on television \n","original_language":"eng","persons":["Stefan 'Sec' Zehl","Ray"],"tags":["22c3"," Community"],"view_count":503,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-05T18:30:10.552+01:00","length":6441,"duration":6441,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-789-en-hacker_jeopardy.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-789-en-hacker_jeopardy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4c93897d43ca54bf73-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4c93897d43ca54bf73-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-789-en-hacker_jeopardy","url":"https://api.media.ccc.de/public/events/import-4c93897d43ca54bf73","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":156,"event_guid":"import-c7e7d888608d4936d1","weight":3},{"event_id":781,"event_guid":"import-777375527796871e60","weight":26},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":3},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":3},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":4},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":3},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":3},{"event_id":1062,"event_guid":"import-802f5484cabc4b8027","weight":21},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":3},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":15},{"event_id":1338,"event_guid":"import-a19180493d3c82f29b","weight":5},{"event_id":1426,"event_guid":"import-65c32b95bca41915d5","weight":4},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":4},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":4},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":5},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":3},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":8},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":3},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":3}]},{"guid":"import-4e5c5dbe459b62aa89","title":"Robots for fun and research","subtitle":null,"slug":"22C3-588-en-robots_for_fun_and_research","link":"http://events.ccc.de/congress/2005/fahrplan/events/588.en.html","description":"In this talk, several examples of cutting-edge research in robotics will be presented, and their implications for the future of robotics will be discussed.\n","original_language":"eng","persons":["Verena Hafner"],"tags":["22c3"," Hacking"],"view_count":123,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-15T21:00:05.617+01:00","length":3274,"duration":3274,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-588-en-robots_for_fun_and_research.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-588-en-robots_for_fun_and_research_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4e5c5dbe459b62aa89-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4e5c5dbe459b62aa89-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-588-en-robots_for_fun_and_research","url":"https://api.media.ccc.de/public/events/import-4e5c5dbe459b62aa89","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":14},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1220,"event_guid":"import-ee82a6cc59c4dbd288","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1521,"event_guid":"import-c9c2edebbb14a1e77f","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":1},{"event_id":1554,"event_guid":"import-54bf3922b45e891012","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":1984,"event_guid":"x_WQ2S6tY0WwtCOcllmJ7w","weight":1},{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":3709,"event_guid":"919752c2-5d10-4543-b4be-1b8178a14618","weight":1},{"event_id":5063,"event_guid":"10f07e44-10fb-11e8-9867-57ae00d1b19d","weight":1},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":1},{"event_id":5679,"event_guid":"ff2d0541-82f5-53ea-8b54-9cacd17039f3","weight":1},{"event_id":5685,"event_guid":"f986be37-20dc-5eb6-b874-2ff6bdd0a687","weight":1},{"event_id":5887,"event_guid":"2c8fac7f-38b0-57df-99b1-2dd60d97ddc2","weight":1},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":1},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":1},{"event_id":6509,"event_guid":"14016199-6d4b-5f13-8b2f-a057afeb3abd","weight":1},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":1},{"event_id":6553,"event_guid":"a667d070-483e-4e2b-9bf9-d9a5475b6356","weight":1},{"event_id":6560,"event_guid":"7956605c-adae-5563-ab8c-c97b6781fefa","weight":1},{"event_id":6583,"event_guid":"623fd999-d7dd-4fd8-896c-75e51a21df1e","weight":1},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":1},{"event_id":6619,"event_guid":"35e80689-6330-49fe-b5c5-46972418f5b6","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":1}]},{"guid":"import-43cdf8a139f4c9aa7d","title":"Security Nightmares 2006","subtitle":"Oder: worüber wir nächstes Jahr lachen werden","slug":"22C3-600-de-security_nightmares","link":"http://events.ccc.de/congress/2005/fahrplan/events/600.en.html","description":"Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick fürs nächste Jahr.\n","original_language":"eng","persons":["Ron","Frank Rieger"],"tags":["22c3"," Hacking"],"view_count":644,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-03T01:45:04.684+01:00","length":3871,"duration":3871,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-600-de-security_nightmares.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-600-de-security_nightmares_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-43cdf8a139f4c9aa7d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-43cdf8a139f4c9aa7d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-600-de-security_nightmares","url":"https://api.media.ccc.de/public/events/import-43cdf8a139f4c9aa7d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":14},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":25},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":4},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":7},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":2},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":25},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":4},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":13},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":11},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":6},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":3},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":8},{"event_id":2403,"event_guid":"d542eb645157198eb09eaf63efc7914c","weight":3},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":3},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":2},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":2},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":6}]},{"guid":"import-a2d753a1d1e21d0b29","title":"Media System Deployment using Python","subtitle":null,"slug":"22C3-508-en-media_system_deployment","link":"http://events.ccc.de/congress/2005/fahrplan/events/508.en.html","description":"Using Python, a large variety of media-oriented systems can be scripted with very little effort. The talk will explore the available libraries for 2d and 3d graphics, video and sound and describe real-world experiences in deploying these systems.\n","original_language":"eng","persons":["Ulrich von Zadow"],"tags":["22c3"," Hacking"],"view_count":30,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-06T03:30:13.277+01:00","length":3227,"duration":3227,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-508-en-media_system_deployment.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-508-en-media_system_deployment_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a2d753a1d1e21d0b29-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a2d753a1d1e21d0b29-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-508-en-media_system_deployment","url":"https://api.media.ccc.de/public/events/import-a2d753a1d1e21d0b29","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":1},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1138,"event_guid":"import-e7ef1b335f3993af93","weight":1},{"event_id":1153,"event_guid":"import-9ab6de393c480e625b","weight":2},{"event_id":2179,"event_guid":"e8e29f6a-11df-491a-acae-1253879ae8f9","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":1},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2229,"event_guid":"P8L4krxqjXP7zHMZToU6CQ","weight":1},{"event_id":2237,"event_guid":"k78-hNDINhkZS3TvxuLSrQ","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2241,"event_guid":"4f9TGtkPJafH9LU7RqsZnw","weight":1},{"event_id":2259,"event_guid":"35vPpFdywfzrf36_zbn6zA","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":2513,"event_guid":"bd046a46-8398-4b6f-b4e3-34f34e6f1ecc","weight":1},{"event_id":2807,"event_guid":"77a03013-82df-48f7-8c0f-65a9e9f23490","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3743,"event_guid":"72e44333-c59a-47a4-9ef3-d5e8c9637eb6","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4789,"event_guid":"684193b5-696e-495f-88eb-04f8d3114e01","weight":1},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":1},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":1},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":1},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":1},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":1}]},{"guid":"import-be2891faa7c05bac07","title":"Erste Hilfe für Nerds und Geeks","subtitle":"Wie überlebe ich (ohne nennenswerten Schäden) einen Congress?","slug":"22C3-558-de-erste_hilfe_fuer_nerds_und_geeks","link":"http://events.ccc.de/congress/2005/fahrplan/events/558.en.html","description":"Wie überlebe ich einen vier Tage langen Chaos Communication Congress ohne nennenswerte Schäden davonzutragen? Dieser Vortrag ist speziell für Nerds und Geeks geeignet.\n","original_language":"eng","persons":["SaniFox aka Sven Vößing"],"tags":["22c3"," Community"],"view_count":155,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-02-25T11:30:06.811+01:00","length":3231,"duration":3231,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-be2891faa7c05bac07-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-be2891faa7c05bac07-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks","url":"https://api.media.ccc.de/public/events/import-be2891faa7c05bac07","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":3},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":3},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":2},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":2},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":2}]},{"guid":"import-91c47303bb135d962c","title":"Applied Machine Learning","subtitle":"Brief Introduction into Machine Learning followed by application examples.","slug":"22C3-544-en-applied_machine_learning","link":"http://events.ccc.de/congress/2005/fahrplan/events/544.en.html","description":"Overview of the current state of research in Machine Learning including the general motivation, setup of learning problems, state-of-the-art learning algorithms and applications like our brain computer interface.\n","original_language":"eng","persons":["Timon Schroeter","Sören Sonnenburg","Konrad Rieck"],"tags":["22c3"," Science"],"view_count":130,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-06T07:45:04.708+01:00","length":2944,"duration":2944,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-544-en-applied_machine_learning.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-544-en-applied_machine_learning_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-91c47303bb135d962c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-91c47303bb135d962c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-544-en-applied_machine_learning","url":"https://api.media.ccc.de/public/events/import-91c47303bb135d962c","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1050,"event_guid":"import-68c94579cb323fe39d","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":2933,"event_guid":"c50c5193-7389-4858-9352-14ea6d74b77a","weight":1},{"event_id":4450,"event_guid":"cb892f65-89b4-4c50-8ff6-e38725c67438","weight":1},{"event_id":4539,"event_guid":"384d5955-3745-2020-2020-202020202020","weight":2},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":1},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":1},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":1},{"event_id":6525,"event_guid":"955e9c12-cd90-4f48-88f0-b879269a5421","weight":1}]},{"guid":"import-a56ca0ff971cff4045","title":"Towards the first Free Software GSM Phone","subtitle":"Reverse Engineering the Motorola EZX (A768,A780,E680) series of Linux-based GSM phones","slug":"22C3-768-en-free_software_gsm_phone","link":"http://events.ccc.de/congress/2005/fahrplan/events/768.en.html","description":"This presentation describes the progress of hacking and extending the Motorola series of Linux based Smartphones, with the ultimate goal to replace all proprietary applications with 100% free software.\n","original_language":"eng","persons":["Harald Welte"],"tags":["22c3"," Hacking"],"view_count":87,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-19T04:30:03.009+01:00","length":3408,"duration":3408,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-768-en-free_software_gsm_phone.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-768-en-free_software_gsm_phone_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a56ca0ff971cff4045-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a56ca0ff971cff4045-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-768-en-free_software_gsm_phone","url":"https://api.media.ccc.de/public/events/import-a56ca0ff971cff4045","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":181,"event_guid":"import-fed39f34a5140121e2","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":2},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":1},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":1},{"event_id":1149,"event_guid":"import-54ac75812fba306f63","weight":1},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":1},{"event_id":1303,"event_guid":"import-8a69e7b1ee3f8cc625","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":4},{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":3},{"event_id":1368,"event_guid":"import-2f5b6d9d75ad65da1d","weight":1},{"event_id":1390,"event_guid":"import-9c82dc5bc5ce9b2674","weight":1},{"event_id":1396,"event_guid":"import-75b2d58a4dc12e1a88","weight":2},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":1505,"event_guid":"import-aab17311f8754984a4","weight":1},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":1},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":2},{"event_id":1765,"event_guid":"sh_vDLYCDlmW5sFWsI4KSg","weight":1},{"event_id":2205,"event_guid":"gRbk7OprwZBqF3cv0NddMQ","weight":1},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":2},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":1},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":1},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":2},{"event_id":3771,"event_guid":"32e9b904-0c52-4262-8e56-03cee2342424","weight":1},{"event_id":3820,"event_guid":"f7716b25-9c12-5d69-be42-3a8fec10b2a6","weight":2},{"event_id":3831,"event_guid":"3fbcc011-9ccb-53bf-beae-75e0235f90e5","weight":2},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4296,"event_guid":"0eff8b32-bd9e-4a69-b704-70171ca0e83e","weight":1},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":2},{"event_id":5231,"event_guid":"38433858-5443-2020-2020-202020202020","weight":1},{"event_id":5233,"event_guid":"4a433356-4456-2020-2020-202020202020","weight":1},{"event_id":5235,"event_guid":"52535255-5245-2020-2020-202020202020","weight":1},{"event_id":5240,"event_guid":"39474e46-4733-2020-2020-202020202020","weight":1},{"event_id":5247,"event_guid":"48454348-4e44-2020-2020-202020202020","weight":1},{"event_id":5248,"event_guid":"39415445-385a-2020-2020-202020202020","weight":1},{"event_id":7193,"event_guid":"04bf4490-fa07-59fc-bf9b-0a521e57c55b","weight":2}]},{"guid":"import-4e9369743d33a6b819","title":"WSIS - The Review","subtitle":"Hacking a Dictatorship","slug":"22C3-470-en-wsis_review","link":"http://events.ccc.de/congress/2005/fahrplan/events/470.en.html","description":"Der zweite World Summit on the Information Society (WSIS) findet im November in Tunis statt. Die beiden beherrschenden Themen Internet Governance und Financing Mechanism sind nicht besonders spannend. Allerdings wird der WSIS2 in Tunesien stattfinden, einem Land mit einer Diktatur, wo Menschenrechte mit Füssen getreten werden und die gesamte ICT-Infrastruktur überwacht und zensiert wird.\n","original_language":"eng","persons":["Robert Guerra","Markus Beckedahl","Ralf Bendrath"],"tags":["22c3"," Society"],"view_count":34,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-30T18:45:12.607+01:00","length":3397,"duration":3397,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-470-en-wsis_review.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-470-en-wsis_review_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-4e9369743d33a6b819-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-4e9369743d33a6b819-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-470-en-wsis_review","url":"https://api.media.ccc.de/public/events/import-4e9369743d33a6b819","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":2},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":3},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":2},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":2},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1287,"event_guid":"import-555a982abc9d8b293e","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":2174,"event_guid":"67baa392-2af9-4213-a9ce-bf63331d43a4","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":1},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":1},{"event_id":3577,"event_guid":"bcec5baa-fd40-5313-b54a-890557c21d8b","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1}]},{"guid":"import-93b430e54f1cd30042","title":"Privaterra - Report from the field","subtitle":"IT Security and Human Rights organizations - The needs, the challenges \u0026 recommendations","slug":"22C3-473-en-privaterra","link":"http://events.ccc.de/congress/2005/fahrplan/events/473.en.html","description":"An overview of the work being done by Privaterra and other organizations to help identify and mitigate security vulnerabilities faced by Human Rights Organizations.\n","original_language":"eng","persons":["Robert Guerra"],"tags":["22c3"," Society"],"view_count":6,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-03-20T19:30:02.858+01:00","length":3209,"duration":3209,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-473-en-privaterra.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-473-en-privaterra_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-93b430e54f1cd30042-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-93b430e54f1cd30042-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-473-en-privaterra","url":"https://api.media.ccc.de/public/events/import-93b430e54f1cd30042","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[]},{"guid":"import-e73b28a79b20ba52f4","title":"Syscall proxying fun and applications","subtitle":"Introduction to syscall proxying and applications for in the wild exploitations","slug":"22C3-553-en-syscall_proxying","link":"http://events.ccc.de/congress/2005/fahrplan/events/553.en.html","description":"This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october.\n","original_language":"eng","persons":["csk"],"tags":["22c3"," Hacking"],"view_count":117,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-01T01:45:04.722+02:00","length":2953,"duration":2953,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-553-en-syscall_proxying.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-553-en-syscall_proxying_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e73b28a79b20ba52f4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e73b28a79b20ba52f4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-553-en-syscall_proxying","url":"https://api.media.ccc.de/public/events/import-e73b28a79b20ba52f4","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":1064,"event_guid":"import-95d8bc2858a58621e6","weight":1},{"event_id":2825,"event_guid":"56721a59-30c0-4201-8744-5d2a9846ed28","weight":1},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3700,"event_guid":"b5be9501-88f1-4d9f-a5aa-269c8ff22d37","weight":1},{"event_id":3706,"event_guid":"3f76be27-6ff5-4a23-a6c6-512eaff00f28","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3721,"event_guid":"b092a437-b612-4887-ba55-f08ddfe333b9","weight":1},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":1},{"event_id":3732,"event_guid":"8270c91a-d6e2-4f1c-9ebb-cdf10708d921","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":1},{"event_id":5987,"event_guid":"2fdcdadb-0575-5a47-a59f-8376db33f0a6","weight":1},{"event_id":6014,"event_guid":"45336cce-788c-5800-84f1-0a7411d7e2da","weight":1},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":1}]},{"guid":"import-880e457905ba3f2b90","title":"Hopalong Casualty","subtitle":"On automated video analysis of human behaviour","slug":"22C3-531-en-hopalong_casualty","link":"http://events.ccc.de/congress/2005/fahrplan/events/531.en.html","description":"Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations.\n","original_language":"eng","persons":["Ingo Lütkebohle"],"tags":["22c3"," Hacking"],"view_count":9,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-07-24T18:15:03.204+02:00","length":2711,"duration":2711,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-531-en-hopalong_casualty.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-531-en-hopalong_casualty_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-880e457905ba3f2b90-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-880e457905ba3f2b90-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-531-en-hopalong_casualty","url":"https://api.media.ccc.de/public/events/import-880e457905ba3f2b90","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[]},{"guid":"import-c77f160f0e555cfe61","title":"Lightning Talks Day 1","subtitle":"Nine five minutes talks by various speakers","slug":"22C3-911-en-lightning_talk_day_1","link":"http://events.ccc.de/congress/2005/fahrplan/events/911.en.html","description":"There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin.\n","original_language":"eng","persons":["mc.fly"],"tags":["22c3"],"view_count":90,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-13T08:15:12.659+01:00","length":2638,"duration":2638,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-911-en-lightning_talk_day_1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-911-en-lightning_talk_day_1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-c77f160f0e555cfe61-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-c77f160f0e555cfe61-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-911-en-lightning_talk_day_1","url":"https://api.media.ccc.de/public/events/import-c77f160f0e555cfe61","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":1},{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1413,"event_guid":"import-15e012cd8c759b0240","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":2},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2179,"event_guid":"e8e29f6a-11df-491a-acae-1253879ae8f9","weight":1},{"event_id":2186,"event_guid":"c3efec0b-cfb1-4e59-88fd-f519dd31d9a6","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":1},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2229,"event_guid":"P8L4krxqjXP7zHMZToU6CQ","weight":1},{"event_id":2237,"event_guid":"k78-hNDINhkZS3TvxuLSrQ","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2241,"event_guid":"4f9TGtkPJafH9LU7RqsZnw","weight":1},{"event_id":2259,"event_guid":"35vPpFdywfzrf36_zbn6zA","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":2872,"event_guid":"df2f6e8a-f1fb-4736-8b4e-7e197ead73c2","weight":1},{"event_id":3104,"event_guid":"b2bc162c-1745-4f45-ba56-766b4174095b","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3124,"event_guid":"4a66dce1-5a17-5d8d-b1a0-bbeba886cb3b","weight":1},{"event_id":3518,"event_guid":"0bedee26-ff74-54c7-bbe0-bf1a22ad736c","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":3650,"event_guid":"ff044b6a-d567-4309-b9a8-ec9384b16a27","weight":1},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":1},{"event_id":3759,"event_guid":"c6decee9-310c-40b9-90af-5937df22e1aa","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":1},{"event_id":4939,"event_guid":"439d7085-4f24-45ac-843f-987f89c4446d","weight":1},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":1},{"event_id":5793,"event_guid":"05d2f707-19a8-491d-a375-13280c771034","weight":1},{"event_id":5940,"event_guid":"dc7c8da3-4a16-5258-9b4b-5e1a2207fb7e","weight":1}]},{"guid":"import-2623e5399f12d9c994","title":"Exploring Protocols and Services on Internet Connected Embedded Devices","subtitle":"Looking for Insecurities","slug":"22C3-602-en-protocols_services_embedded_devices","link":"http://events.ccc.de/congress/2005/fahrplan/events/602.en.html","description":"Embedded devices are set to take centre stage in the coming internet connected revolution where anything and everything will be connected to the internet. But are the Devices, Operating Systems, Protocols and Services mature enough for what the future holds for them? This session looks at the requirements of an internet connected embedded device and the necessary protocols and services required and available, then, it goes into some implications of the currently known vulnerabilities.\n","original_language":"eng","persons":["Sarbjit Sembhi"],"tags":["22c3"," Hacking"],"view_count":10,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-08-16T06:15:02.457+02:00","length":3610,"duration":3610,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-602-en-protocols_services_embedded_devices.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-602-en-protocols_services_embedded_devices_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-2623e5399f12d9c994-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-2623e5399f12d9c994-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-602-en-protocols_services_embedded_devices","url":"https://api.media.ccc.de/public/events/import-2623e5399f12d9c994","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":775,"event_guid":"import-b6cd88dc4ad69cbd83","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":912,"event_guid":"import-da0bb8cad825323479","weight":1},{"event_id":939,"event_guid":"import-af4384252d9f0d7190","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1040,"event_guid":"import-02b7f7b8a5fd60f03f","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1278,"event_guid":"import-c061c38bfc1a4656a5","weight":1},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":1},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":1346,"event_guid":"import-e9df7801eb432bf49e","weight":1},{"event_id":2152,"event_guid":"J9UXjl3ggsIGnkIJSxSxmw","weight":1},{"event_id":3246,"event_guid":"0f59250e-923d-55de-b98a-797d6c6a31a9","weight":1},{"event_id":4624,"event_guid":"9b01013a-2e85-3074-5c29-33a2f606f5a2","weight":1}]},{"guid":"import-522b456890530bf341","title":"Literarisches Code-Quartett","subtitle":"The good, the bad, and the ugly","slug":"22C3-598-de-literarisches_code_quartett","link":"http://events.ccc.de/congress/2005/fahrplan/events/598.en.html","description":"Die Parallelen bei Software und Büchern gehen von dem kreativen Schaffensprozeß über Konsumverhalten, Entlohnung bis zu Fragen wie Lizenzen und Verwertungsmodelle. Wir werden das dieses Jahr noch etwas weiter treiben, indem wir analog zur bekannten Fernsehsendung besonders prägnante Codestücke auf der Bühne mit Publikum kritisieren werden.\n","original_language":"eng","persons":["Andreas Bogk","Felix von Leitner","Lisa Thalheim","FX of Phenoelit"],"tags":["22c3"," Culture"],"view_count":669,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-06T19:45:05.836+01:00","length":3549,"duration":3549,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-598-de-literarisches_code_quartett.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-598-de-literarisches_code_quartett_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-522b456890530bf341-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-522b456890530bf341-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-598-de-literarisches_code_quartett","url":"https://api.media.ccc.de/public/events/import-522b456890530bf341","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":89,"event_guid":"import-3de147fa3727b16db9","weight":3},{"event_id":95,"event_guid":"import-f104f94cebc865765a","weight":11},{"event_id":106,"event_guid":"import-c6b33fcb2523d7b8e4","weight":6},{"event_id":629,"event_guid":"import-e8ee54170329e5e523","weight":2},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":4},{"event_id":740,"event_guid":"import-17db1511dcc50ce552","weight":3},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":4},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":4},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":3},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":5},{"event_id":1120,"event_guid":"import-6208bdaf46f4c64c2b","weight":5},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":5},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":7},{"event_id":1219,"event_guid":"import-c1b343dc3dc4828a06","weight":4},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":3},{"event_id":1300,"event_guid":"import-5386a3e6361b34fd2c","weight":4},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":13},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1621,"event_guid":"import-6b9d989911d88e19ca","weight":2},{"event_id":2406,"event_guid":"680d0aea18aa6ba03f104efcd2bac2f3","weight":8},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2},{"event_id":3596,"event_guid":"b8e0eb47-4832-4726-bc9b-9015bd96becf","weight":3},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":2},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":2},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":5},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":4}]},{"guid":"import-57a636234323b47cae","title":"Access to Knowledge","subtitle":"Copyright, Patents and Politics at the World Intellectual Property Organisation","slug":"22C3-499-en-access_to_knowledge","link":"http://events.ccc.de/congress/2005/fahrplan/events/499.en.html","description":"Your Access to Knowledge is at stake. At the World Intellectual Property Organisation, where international treaties on copyright and patents are decided on, a revolution is taking place. Big rightsholders have been getting their way until now, restricting the free use of ideas. A Treaty on Access to Knowledge is needed to guarantee your rights, and the Free Software Foundation Europe is working on it.\n","original_language":"eng","persons":["Karsten Gerloff"],"tags":["22c3"," Community"],"view_count":63,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-08T22:45:06.966+01:00","length":2965,"duration":2965,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-499-en-access_to_knowledge.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-499-en-access_to_knowledge_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-57a636234323b47cae-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-57a636234323b47cae-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-499-en-access_to_knowledge","url":"https://api.media.ccc.de/public/events/import-57a636234323b47cae","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":428,"event_guid":"import-aac153935209b2785c","weight":1},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":3},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":2},{"event_id":1026,"event_guid":"import-aa49a5b7081faac804","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":3},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":1732,"event_guid":"nu_IEETazySR5xcJobNckw","weight":1},{"event_id":1838,"event_guid":"d9mVPvxx94qGILfKtmCAwA","weight":1},{"event_id":2376,"event_guid":"0bc12fad-8cb0-4c89-b1b5-f9087325d0f9","weight":1},{"event_id":3161,"event_guid":"4aeT8lX5EnteXRtPO9yYFA","weight":1},{"event_id":4244,"event_guid":"28840060-781a-4143-a9b3-fe19a0eaf06d","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":2}]},{"guid":"import-d64bd455642b344372","title":"e-Voting: The silent decline of public control","subtitle":"Why German voting machines do not meet the requirements of democratic elections.","slug":"22C3-1134-en-the_silent_decline_of_public_control","link":"http://events.ccc.de/congress/2005/fahrplan/events/1134.en.html","description":"The voting machines widely used in Germany's recent elections fail to follow both fundamental democratic principles and German legal requirements. Highlights of a recent Irish report on security issues of these machines will be provided.\n","original_language":"eng","persons":["Ulrich Wiesner"],"tags":["22c3"," Society"],"view_count":33,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-04-08T09:30:04.671+02:00","length":3549,"duration":3549,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1134-en-the_silent_decline_of_public_control.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1134-en-the_silent_decline_of_public_control_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d64bd455642b344372-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d64bd455642b344372-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1134-en-the_silent_decline_of_public_control","url":"https://api.media.ccc.de/public/events/import-d64bd455642b344372","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":1042,"event_guid":"import-b766adc19ddd01d9b4","weight":1},{"event_id":3663,"event_guid":"56b62043-b92d-4b32-b5d0-b78d8fbcbb24","weight":1},{"event_id":5054,"event_guid":"1ac43fa1-ecbf-449e-a5d0-310b74309a35","weight":3},{"event_id":6386,"event_guid":"87083bf8-f1e8-433d-8b51-ffece756bbd7","weight":1},{"event_id":7047,"event_guid":"40829380-cbd9-414e-8afe-b51c12d5e707","weight":1}]},{"guid":"import-fea9da9951d5fe8f3d","title":"Lightning Talks Day 2","subtitle":"Nine five minutes talks by various speakers","slug":"22C3-912-en-lightning_talk_day_2","link":"http://events.ccc.de/congress/2005/fahrplan/events/912.en.html","description":"There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin.\n","original_language":"eng","persons":["fh"],"tags":["22c3"],"view_count":27,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-13T08:15:13.347+01:00","length":2227,"duration":2227,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-912-en-lightning_talk_day_2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-912-en-lightning_talk_day_2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-fea9da9951d5fe8f3d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-fea9da9951d5fe8f3d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-912-en-lightning_talk_day_2","url":"https://api.media.ccc.de/public/events/import-fea9da9951d5fe8f3d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":2891,"event_guid":"3a1241e9-1e0b-4539-a44c-7d04257ae16d","weight":1}]},{"guid":"import-d9a34dd8bf60695047","title":"The Cell Processor","subtitle":"Computing of Tomorrow or Yesterday","slug":"22C3-519-en-the_cell_processor","link":"http://events.ccc.de/congress/2005/fahrplan/events/519.en.html","description":"The x86 architecture has been the de facto standard for many years. Attempts to take the turn, like Intel tried with the VLIW Itanium Architetcture were desastrous. But the x86 architecture is not able to fulfil the demands of today's market. Several additions have been proposed (MMX,3dNow,SSE1-3), but the Cell approach takes them to the next level.\n","original_language":"eng","persons":["Torsten Hoefler"],"tags":["22c3"," Hacking"],"view_count":65,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-24T00:30:05.669+01:00","length":3893,"duration":3893,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-519-en-the_cell_processor.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-519-en-the_cell_processor_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d9a34dd8bf60695047-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d9a34dd8bf60695047-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-519-en-the_cell_processor","url":"https://api.media.ccc.de/public/events/import-d9a34dd8bf60695047","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":563,"event_guid":"import-ef2be2cea3b7d868a1","weight":1},{"event_id":616,"event_guid":"import-0b321044b3776c48dd","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":905,"event_guid":"import-a50e2a69d02db0bc4a","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":1},{"event_id":1157,"event_guid":"import-d09b45ac831b75ea90","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":1},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":1},{"event_id":1323,"event_guid":"import-5e89fe5c21c6e4d891","weight":1},{"event_id":1334,"event_guid":"import-999159d42d326f39e3","weight":2},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1379,"event_guid":"import-f62972ee26d8e418a1","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":2},{"event_id":2300,"event_guid":"mzNAGavKy2KOcwOjGqC8pw","weight":1},{"event_id":2948,"event_guid":"7ca8581d-a3f7-4247-8101-786cf04d9bd1","weight":1},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3650,"event_guid":"ff044b6a-d567-4309-b9a8-ec9384b16a27","weight":1},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":1},{"event_id":3749,"event_guid":"e26852ae-9efe-47a0-9e65-3bbd120f7422","weight":1},{"event_id":4459,"event_guid":"723dbee1-a73a-469c-bbb0-6bc90b21ebae","weight":1},{"event_id":4471,"event_guid":"8590e34b-db76-42ed-a741-016951a2e626","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":3},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":1},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":1},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":1}]},{"guid":"import-b1cf6830ab9448a621","title":"Learning JavaScript with the Google Maps API","subtitle":null,"slug":"22C3-417-en-learning_js_with_google_maps","link":"http://events.ccc.de/congress/2005/fahrplan/events/417.en.html","description":"The web application programming interface (API) that allows to embed google maps in web pages is quite simple, if you speak javascript, yet it employs some of the more sophisticated concepts of the language, such as custom objects and closures. So if you don't speak javascript yet, but want to learn it, using the google maps API\ngives you a head start.\n","original_language":"eng","persons":["(mesch) Steffen Meschkat"],"tags":["22c3"," Hacking"],"view_count":83,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-29T23:45:11.874+01:00","length":3606,"duration":3606,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-417-en-learning_js_with_google_maps.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-417-en-learning_js_with_google_maps_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-b1cf6830ab9448a621-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-b1cf6830ab9448a621-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-417-en-learning_js_with_google_maps","url":"https://api.media.ccc.de/public/events/import-b1cf6830ab9448a621","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":1},{"event_id":930,"event_guid":"import-72982e43dc1e8c1cbc","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":2},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1462,"event_guid":"import-b9197fb95bae24cee3","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":1727,"event_guid":"Yag3mXGNWO6pdV6uryzhJA","weight":1},{"event_id":1783,"event_guid":"3rqxJH8xZ4waSOXtJbxrDg","weight":1},{"event_id":1806,"event_guid":"IE5aOu8FUaPfpFv5v4rtJg","weight":1},{"event_id":1812,"event_guid":"DmBpFwREEQWrsaTmW3zVew","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2035,"event_guid":"kJSIlK3OHkgc3hwXbIiGFQ","weight":1},{"event_id":2861,"event_guid":"01da121b-bd49-4805-aaaf-a6ec1f4f941f","weight":1},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":3915,"event_guid":"c341f69d-a163-4a8e-a121-7961ee355791","weight":1},{"event_id":4062,"event_guid":"91499ed8-0eb5-544a-8154-fa61f971337a","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1}]},{"guid":"import-72982e43dc1e8c1cbc","title":"The very early Computer Game History","subtitle":"How the games have become the first digital mass product","slug":"22C3-424-en-the_very_early_computer_game_history","link":"http://events.ccc.de/congress/2005/fahrplan/events/424.en.html","description":"Andreas Lange will show the very early computer games before they became a commercial product. If you ever want to know, what was really the first game this session will be the right one for you.\n","original_language":"eng","persons":["Andreas Lange"],"tags":["22c3"," Culture"],"view_count":61,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-30T17:30:11.062+01:00","length":3217,"duration":3217,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-424-en-the_very_early_computer_game_history.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-424-en-the_very_early_computer_game_history_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-72982e43dc1e8c1cbc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-72982e43dc1e8c1cbc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-424-en-the_very_early_computer_game_history","url":"https://api.media.ccc.de/public/events/import-72982e43dc1e8c1cbc","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":904,"event_guid":"import-d0f7647cadbc7a6918","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1086,"event_guid":"import-ce6e6cb99ffa1eeecb","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1231,"event_guid":"import-84e7d1004fd236a83d","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1462,"event_guid":"import-b9197fb95bae24cee3","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":4947,"event_guid":"42a13e11-7a59-5234-94d7-45327616e6b2","weight":1},{"event_id":5695,"event_guid":"28374aa2-885a-11e8-941f-f33234d12992","weight":1}]},{"guid":"import-84a9c6cfe2e198d2c4","title":"Bad TRIPs","subtitle":"What the WTO Treaty did in Hongkong and what that means for us","slug":"22C3-781-en-bad_trips","link":"http://events.ccc.de/congress/2005/fahrplan/events/781.en.html","description":"The TRIPS Treaty is one of the most discussed within the WTO. Its impact on knowledge and so-called intellectual property rights is huge, not only for developing countries. This talk will give the listener a short introduction on the main principles of TRIPS, who stands behind it and what chances a different treaty could bring. As the WTO meeting in Hong Kong is just two weeks in advance of the 22c3, there will be much news on the progress of the treaty. With Oliver Moldenhauer being an NGO representative at the WTO conference we'll have first-hand experience on the debates amongst NGOs and press in Hong Kong.\n","original_language":"eng","persons":["Oliver Moldenhauer","Julian 'hds' Finn"],"tags":["22c3"," Society"],"view_count":46,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-09-19T01:30:03.774+02:00","length":3294,"duration":3294,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-781-en-bad_trips.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-781-en-bad_trips_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-84a9c6cfe2e198d2c4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-84a9c6cfe2e198d2c4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-781-en-bad_trips","url":"https://api.media.ccc.de/public/events/import-84a9c6cfe2e198d2c4","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":91,"event_guid":"import-241512d8d87c620213","weight":1},{"event_id":679,"event_guid":"import-896e00155e91edd7b8","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1371,"event_guid":"import-f0dd38629978185349","weight":1},{"event_id":3666,"event_guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","weight":1},{"event_id":4318,"event_guid":"341c90d6-aaea-4284-8c8e-c80096cf13d5","weight":1}]},{"guid":"import-8fb016024e60722cef","title":"Hacking OpenWRT","subtitle":null,"slug":"22C3-1099-en-hacking_openwrt","link":"http://events.ccc.de/congress/2005/fahrplan/events/1099.en.html","description":"OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects.\n","original_language":"eng","persons":["Felix Fietkau"],"tags":["22c3"," Hacking"],"view_count":482,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-12T22:00:19.389+01:00","length":2906,"duration":2906,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1099-en-hacking_openwrt.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1099-en-hacking_openwrt_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-8fb016024e60722cef-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-8fb016024e60722cef-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1099-en-hacking_openwrt","url":"https://api.media.ccc.de/public/events/import-8fb016024e60722cef","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":2},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":2},{"event_id":1783,"event_guid":"3rqxJH8xZ4waSOXtJbxrDg","weight":6},{"event_id":2753,"event_guid":"34ff5c71-6829-4415-8ab4-d94dfb9ac15c","weight":4},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":7},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":2},{"event_id":4954,"event_guid":"3607faf5-fa5e-4a1b-a687-46697b072c20","weight":2},{"event_id":4968,"event_guid":"f588fca0-d2c1-45e2-ba34-4b055a369b2a","weight":12},{"event_id":5006,"event_guid":"d5afa965-4bfb-4d28-8ff9-ad5eef4bec3e","weight":2}]},{"guid":"import-9d34a07f70755058e7","title":"Atmel AVR für Dummies","subtitle":"Was ist denn nun eigentlich so ein 'Interrupt'?","slug":"22C3-482-de-atmel_avr_for_dummies","link":"http://events.ccc.de/congress/2005/fahrplan/events/482.en.html","description":"Mikrocontroller sind heutzutage als Embedded Devices kaum noch wegzudenken. Dieser Workshop soll anhand vom Beispiel fnordlicht[1] zeigen, wie ein Atmel AVR Controller funktioniert und programmiert wird.\n","original_language":"eng","persons":["fd0"],"tags":["22c3"," Hacking"],"view_count":307,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-13T07:45:03.342+01:00","length":2767,"duration":2767,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-482-de-atmel_avr_for_dummies.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-482-de-atmel_avr_for_dummies_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-9d34a07f70755058e7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-9d34a07f70755058e7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-482-de-atmel_avr_for_dummies","url":"https://api.media.ccc.de/public/events/import-9d34a07f70755058e7","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":2},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":4},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":2},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":3},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":2},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":5}]},{"guid":"import-480d3f86e0ad1352fc","title":"Hosting a Hacking Challenge - CTF-style","subtitle":"Background information on CIPHER, an international Capture-The-Flag contest","slug":"22C3-428-en-hacking_challenge","link":"http://events.ccc.de/congress/2005/fahrplan/events/428.en.html","description":"The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked.\n","original_language":"eng","persons":["Lexi Pimendis"],"tags":["22c3"," Community"],"view_count":90,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-05-22T13:00:09.527+02:00","length":2736,"duration":2736,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-428-en-hacking_challenge.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-428-en-hacking_challenge_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-480d3f86e0ad1352fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-480d3f86e0ad1352fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-428-en-hacking_challenge","url":"https://api.media.ccc.de/public/events/import-480d3f86e0ad1352fc","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1796,"event_guid":"z7M48Tb_4vtI0BBFVqe_ag","weight":1},{"event_id":1919,"event_guid":"e8iZTSvuc7GVdf4438MeJg","weight":2},{"event_id":2426,"event_guid":"1ddc32d5-765d-495b-91ae-fe7e2588e5d2","weight":1},{"event_id":2471,"event_guid":"a26b9be9-36ce-4a7f-9baa-4612251615c5","weight":1},{"event_id":2895,"event_guid":"1cac5105-cfdc-42e9-9a87-0ee71fc2443c","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":1},{"event_id":5832,"event_guid":"fcae0fe2-fc3b-466f-85d5-4777cd46099d","weight":1},{"event_id":6574,"event_guid":"54c671a2-1803-4085-a923-a875ca11723a","weight":1},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1},{"event_id":6932,"event_guid":"3ac46290-51e0-5ee2-93a0-8fb4b99cf67c","weight":1}]},{"guid":"import-da0bb8cad825323479","title":"The grey commons","subtitle":"Strategic considerations in the copyfight.","slug":"22C3-1101-en-the_grey_commons","link":"http://events.ccc.de/congress/2005/fahrplan/events/1101.en.html","description":"Piratbyran.org in Sweden has since 2003\n","original_language":"eng","persons":["Palle Torsson","Rasmus Fleischer"],"tags":["22c3"," Society"],"view_count":26,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-11-04T17:45:07.182+01:00","length":3612,"duration":3612,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1101-en-the_grey_commons.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1101-en-the_grey_commons_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-da0bb8cad825323479-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-da0bb8cad825323479-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1101-en-the_grey_commons","url":"https://api.media.ccc.de/public/events/import-da0bb8cad825323479","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":1},{"event_id":716,"event_guid":"import-194c93a98f08232d2e","weight":1},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":1},{"event_id":739,"event_guid":"import-c737c39b1b07cb8799","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":1},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":1},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":1},{"event_id":775,"event_guid":"import-b6cd88dc4ad69cbd83","weight":1},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":870,"event_guid":"import-bd0a3920b25e83b5ca","weight":1},{"event_id":880,"event_guid":"import-d24d60d8726b688985","weight":1},{"event_id":917,"event_guid":"import-2623e5399f12d9c994","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":939,"event_guid":"import-af4384252d9f0d7190","weight":1},{"event_id":986,"event_guid":"import-a2d753a1d1e21d0b29","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1287,"event_guid":"import-555a982abc9d8b293e","weight":1},{"event_id":2179,"event_guid":"e8e29f6a-11df-491a-acae-1253879ae8f9","weight":1},{"event_id":2202,"event_guid":"i_Dt13BFiawklEaokv3pKg","weight":1},{"event_id":2211,"event_guid":"bX1J_FaFjsFbyn15h7OGdg","weight":1},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2229,"event_guid":"P8L4krxqjXP7zHMZToU6CQ","weight":1},{"event_id":2237,"event_guid":"k78-hNDINhkZS3TvxuLSrQ","weight":1},{"event_id":2240,"event_guid":"iWU6RrYVPk7Q-fLuBE-LoQ","weight":1},{"event_id":2241,"event_guid":"4f9TGtkPJafH9LU7RqsZnw","weight":1},{"event_id":2259,"event_guid":"35vPpFdywfzrf36_zbn6zA","weight":1},{"event_id":2270,"event_guid":"hYXcWw5YzxirnRJZDuYiSQ","weight":1},{"event_id":2271,"event_guid":"f69efb76-d030-4371-83e1-d7b2b8d408b9","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":4624,"event_guid":"9b01013a-2e85-3074-5c29-33a2f606f5a2","weight":1}]},{"guid":"import-044a4bc90d533f8e0d","title":"3G Investigations","subtitle":"Scanning your GPRS/UMTS IP network for fun and profit","slug":"22C3-567-en-3g_investigations","link":"http://events.ccc.de/congress/2005/fahrplan/events/567.en.html","description":"We are giving an overview of ip networks used for \u003e=2.5G technologies. Our main focus is on scanning the overlaying ip network, on different Voice-over-IP filter implementations and the possibilities to circumvent them.\n","original_language":"eng","persons":["Achim 'ahzf' Friedland","Daniel 'btk' Kirstenpfad"],"tags":["22c3"," Hacking"],"view_count":197,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-28T12:00:13.148+01:00","length":3125,"duration":3125,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-567-en-3g_investigations.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-567-en-3g_investigations_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-044a4bc90d533f8e0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-044a4bc90d533f8e0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-567-en-3g_investigations","url":"https://api.media.ccc.de/public/events/import-044a4bc90d533f8e0d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":4},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":5},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":2},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":3},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":2},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":3}]},{"guid":"import-dab9cded184d032210","title":"Das Geheimnis - Reloaded","subtitle":null,"slug":"22C3-864-de-das_geheimnis_reloaded","link":"http://events.ccc.de/congress/2005/fahrplan/events/864.en.html","description":"Seit jeher war es das Gegenteil von Information, ihr dunkler Bruder: das Geheimnis. Jetzt ist es wieder mit aller Macht im Kommen. Peter Glaser über den Weg in die Geheimnisgesellschaft.\n","original_language":"eng","persons":["Peter Glaser"],"tags":["22c3"," Culture"],"view_count":432,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-08-05T15:30:07.546+02:00","length":1927,"duration":1927,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-864-de-das_geheimnis_reloaded.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-864-de-das_geheimnis_reloaded_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-dab9cded184d032210-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-dab9cded184d032210-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-864-de-das_geheimnis_reloaded","url":"https://api.media.ccc.de/public/events/import-dab9cded184d032210","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":4},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":2},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":6},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":42},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":7},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":7},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":3},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":7},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":3},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":29},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":16},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":19},{"event_id":1566,"event_guid":"import-6942ef79beefffaaf3","weight":34},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":5},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":53},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":6},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":5},{"event_id":6374,"event_guid":"c6342a4e-f237-11e8-89b1-4bb7585a36fd","weight":3}]},{"guid":"import-8e4db8a2b00a32ca6a","title":"The Realtime thing","subtitle":"What the heck is realtime - and what to do with it","slug":"22C3-575-en-the_realtime_thing","link":"http://events.ccc.de/congress/2005/fahrplan/events/575.en.html","description":"An overview on realtime software design, with explanations of commonly used terms and methods.\n","original_language":"eng","persons":["Felix Erkinger","Erwin Erkinger"],"tags":["22c3"," Hacking"],"view_count":41,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-28T02:00:05.106+01:00","length":2696,"duration":2696,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-575-en-the_realtime_thing.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-575-en-the_realtime_thing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-8e4db8a2b00a32ca6a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-8e4db8a2b00a32ca6a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-575-en-the_realtime_thing","url":"https://api.media.ccc.de/public/events/import-8e4db8a2b00a32ca6a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":3},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":3424,"event_guid":"915aced0-8526-4087-b0c3-769710ef6322","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1}]},{"guid":"import-e96f451e7f1825878a","title":"Advanced Buffer Overflow Methods [or] Smack the Stack","subtitle":"Cracking the VA-Patch","slug":"22C3-491-en-advanced_buffer_overflow_methods","link":"http://events.ccc.de/congress/2005/fahrplan/events/491.en.html","description":"A quick review of the standard buffer overflow exploit structure VA Patch, What it is and what it does to prevent buffer overflows.\n","original_language":"eng","persons":["Izik"],"tags":["22c3"," Hacking"],"view_count":90,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-29T19:00:05.776+01:00","length":714,"duration":714,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-491-en-advanced_buffer_overflow_methods.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-491-en-advanced_buffer_overflow_methods_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e96f451e7f1825878a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e96f451e7f1825878a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-491-en-advanced_buffer_overflow_methods","url":"https://api.media.ccc.de/public/events/import-e96f451e7f1825878a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":16,"event_guid":"import-539bcb7fe84721a1b5","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":1},{"event_id":743,"event_guid":"import-183e79f219e4094116","weight":1},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":1},{"event_id":877,"event_guid":"import-adc67a0660f250c812","weight":1},{"event_id":905,"event_guid":"import-a50e2a69d02db0bc4a","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":3},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":2},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":1},{"event_id":1323,"event_guid":"import-5e89fe5c21c6e4d891","weight":1},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1379,"event_guid":"import-f62972ee26d8e418a1","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":2485,"event_guid":"10864b98-db0f-4184-a71a-55ec5942d837","weight":1},{"event_id":2948,"event_guid":"7ca8581d-a3f7-4247-8101-786cf04d9bd1","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":2},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":1}]},{"guid":"import-d928c1ca02266729e6","title":"Entschwörungstheorie","subtitle":"Verschwörungstheoretiker sind hinter mir her!","slug":"22C3-426-de-entschwoerungstheorie","link":"http://events.ccc.de/congress/2005/fahrplan/events/426.en.html","description":"Anschließend an den letztjährigen Vortrag über die bedauerliche Mangel- und Fehlrezeption Robert Anton Wilsons soll die Gesellschaft, in der sich populäre Verschwörungstheorien über 9/11 und \"USrael\" befinden, vorgestellt werden. Verschwörungstheorien können ein lustiges Spielzeug sein, wenn sie nicht geglaubt werden. In der bewußtseinserweiternden Tradition von Wilson könnten Hacker für assoziativen Mindfuck werben. Warum jedoch werden Verschwörungstheorien so selten dekonstruiert und so oft gepusht?\n","original_language":"eng","persons":["Daniel Kulla"],"tags":["22c3"," Society"],"view_count":284,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-16T15:45:12.192+01:00","length":4176,"duration":4176,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-426-de-entschwoerungstheorie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-426-de-entschwoerungstheorie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d928c1ca02266729e6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d928c1ca02266729e6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-426-de-entschwoerungstheorie","url":"https://api.media.ccc.de/public/events/import-d928c1ca02266729e6","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":3},{"event_id":943,"event_guid":"import-8a6151e11ffe1e0e41","weight":3},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":3},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":4},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":2},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":3},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":2},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":3},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":4},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":9},{"event_id":1205,"event_guid":"import-857941dfbc4586b4f7","weight":4},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":2},{"event_id":3078,"event_guid":"a46b1da6-60e5-42ea-b501-75e6e20f836d","weight":3},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":3},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":2},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":3},{"event_id":4948,"event_guid":"61044a55-e6d6-4b9c-add9-a7f07c65da70","weight":3},{"event_id":6560,"event_guid":"7956605c-adae-5563-ab8c-c97b6781fefa","weight":2}]},{"guid":"import-cb5f27e03d80c27f3f","title":"Fnord Jahresrückblick","subtitle":"Was wirklich geschah","slug":"22C3-601-de-fnord_jahresrueckblick","link":"http://events.ccc.de/congress/2005/fahrplan/events/601.en.html","description":"The underreported stories of the year, sorted by bizarreness.\n","original_language":"eng","persons":["Felix von Leitner","Frank Rieger"],"tags":["22c3"," Society"],"view_count":1066,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-09T12:15:09.181+01:00","length":2302,"duration":2302,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-601-de-fnord_jahresrueckblick.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-601-de-fnord_jahresrueckblick_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-cb5f27e03d80c27f3f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-cb5f27e03d80c27f3f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-601-de-fnord_jahresrueckblick","url":"https://api.media.ccc.de/public/events/import-cb5f27e03d80c27f3f","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":6},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":14},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":11},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":43},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":9},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":7},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":7},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":61},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":7},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":6},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":32},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":19},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":14},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":13},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":7},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":6},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":9},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":14}]},{"guid":"import-e31124eb287156c040","title":"Community mesh networking","subtitle":"Ubiquitous wireless mesh clouds with olsrd from olsr.org","slug":"22C3-1103-en-community_mesh_networking","link":"http://events.ccc.de/congress/2005/fahrplan/events/1103.en.html","description":"Olsr.org's improved algorithm (compared to the initial INRIA OLSR draft) and how it may influence the development of ubiquitous free wireless networks.\n","original_language":"eng","persons":["Elektra Wagenrad"],"tags":["22c3"," Hacking"],"view_count":122,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-01T20:15:07.753+01:00","length":3266,"duration":3266,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1103-en-community_mesh_networking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1103-en-community_mesh_networking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-e31124eb287156c040-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-e31124eb287156c040-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1103-en-community_mesh_networking","url":"https://api.media.ccc.de/public/events/import-e31124eb287156c040","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":107,"event_guid":"import-e465bfa0bfac679a06","weight":5},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1732,"event_guid":"nu_IEETazySR5xcJobNckw","weight":1},{"event_id":1747,"event_guid":"Ziraj84D16VJmXakvJGNEg","weight":1},{"event_id":1769,"event_guid":"wkZOlAmoT5ydaMLNV0xCSw","weight":1},{"event_id":1838,"event_guid":"d9mVPvxx94qGILfKtmCAwA","weight":1},{"event_id":1873,"event_guid":"import-08c713ee308dfefba3","weight":1},{"event_id":2316,"event_guid":"5468e017-bf80-4910-9616-4efd93efb9a2","weight":1},{"event_id":2369,"event_guid":"b216f717-7373-4a67-b6be-41e4a1e9747b","weight":2},{"event_id":2376,"event_guid":"0bc12fad-8cb0-4c89-b1b5-f9087325d0f9","weight":1},{"event_id":2473,"event_guid":"f83350dc-8152-422c-921f-379b018c0fa2","weight":2},{"event_id":2675,"event_guid":"2c07385a-4640-4ecd-b0bc-15b85afadfd0","weight":1},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":1},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":1},{"event_id":3702,"event_guid":"5fb5e620-383a-4679-b37a-beef20bcd4fe","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":3960,"event_guid":"a816ab3e-408f-5de3-81e2-da38f1a2a771","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":5},{"event_id":4244,"event_guid":"28840060-781a-4143-a9b3-fe19a0eaf06d","weight":1},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":1},{"event_id":4675,"event_guid":"b03c36c2-b9aa-4dfd-961b-6e49d54e3200","weight":2},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":1},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4942,"event_guid":"684c65c0-f61d-11e7-a1a3-57c648cc8333","weight":2}]},{"guid":"import-81d644382a78a73130","title":"muXTCP","subtitle":"Writing your own flexible Userland TCP/IP Stack - Ninja Style!!!","slug":"22C3-529-en-muxtcp","link":"http://events.ccc.de/congress/2005/fahrplan/events/529.en.html","description":"This talk will discuss design approaches for writing flexible userland tcp/ip stacks for network hacking tools.\n","original_language":"eng","persons":["Paul Böhm"],"tags":["22c3"," Hacking"],"view_count":36,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-24T14:15:09.257+01:00","length":3046,"duration":3046,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-529-en-muxtcp.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-529-en-muxtcp_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-81d644382a78a73130-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-81d644382a78a73130-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-529-en-muxtcp","url":"https://api.media.ccc.de/public/events/import-81d644382a78a73130","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":1000,"event_guid":"import-3d5766621126a21447","weight":1},{"event_id":1030,"event_guid":"import-f436177d9ef364effd","weight":1},{"event_id":1098,"event_guid":"import-c74e7042968738ecd2","weight":1},{"event_id":1366,"event_guid":"import-4d61c156a091d746c4","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":1682,"event_guid":"import-424b431b28ea3a4a99","weight":1},{"event_id":3774,"event_guid":"a26a0d23-549d-5bd6-8f1e-9803628d5850","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1}]},{"guid":"import-f40727e65f49ca9683","title":"Internet Voting in Estonia","subtitle":"First-ever pan-national official occasion.","slug":"22C3-1098-en-internet_voting_in_estonia","link":"http://events.ccc.de/congress/2005/fahrplan/events/1098.en.html","description":"Tarvi, the project manager for Estonian e-voting, is going to explain how the Internet voting system is built and how the Internet voting was made possible for the Estonian voters.\n","original_language":"eng","persons":["Tarvi Martens"],"tags":["22c3"," Society"],"view_count":137,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-09-27T13:45:10.646+02:00","length":3262,"duration":3262,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1098-en-internet_voting_in_estonia.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1098-en-internet_voting_in_estonia_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f40727e65f49ca9683-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f40727e65f49ca9683-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1098-en-internet_voting_in_estonia","url":"https://api.media.ccc.de/public/events/import-f40727e65f49ca9683","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":111,"event_guid":"import-31134a7353491372ef","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":918,"event_guid":"import-d64bd455642b344372","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1283,"event_guid":"import-344183234c859e8d21","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":2183,"event_guid":"yMuYr5eW4o9FpJMw-NwXrg","weight":7},{"event_id":2262,"event_guid":"EN5SvbzMs0D7iCFyfK1Ubw","weight":1},{"event_id":3663,"event_guid":"56b62043-b92d-4b32-b5d0-b78d8fbcbb24","weight":3},{"event_id":6386,"event_guid":"87083bf8-f1e8-433d-8b51-ffece756bbd7","weight":1},{"event_id":7047,"event_guid":"40829380-cbd9-414e-8afe-b51c12d5e707","weight":1},{"event_id":7779,"event_guid":"ced3727e-d015-11e9-9d8f-abf1a48dcb21","weight":1},{"event_id":7788,"event_guid":"6986d495-b3e9-5388-851b-cb4d4f0a79ff","weight":1},{"event_id":7789,"event_guid":"c7b37487-6577-582c-a344-c0fc5d833ebf","weight":1},{"event_id":7792,"event_guid":"f08b6984-6ce2-5d9c-96f6-528bc05cd54d","weight":1},{"event_id":7794,"event_guid":"624c002f-4996-56ea-8130-28fbcdb53869","weight":1}]},{"guid":"import-f359526c699a9955b4","title":"VoIP 2005 - Regulierte Revolution","subtitle":"Ansätze für die Regulierung von VoIP und NGN im vergangenen Jahr","slug":"22C3-577-de-voip_2005_regulierte_revolution","link":"http://events.ccc.de/congress/2005/fahrplan/events/577.en.html","description":"Der Vortrag gibt einen Überblick über die Aktivitäten der amerikanischen und\neuropäischen Regulierungsbehörden - insbesondere der Bundesnetzagentur (vormals RegTP) im Bereich Voice over IP (VoIP) und Next Generation Networks (NGN).\n","original_language":"eng","persons":["Jörg Müller-Kindt"],"tags":["22c3"," Society"],"view_count":14,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-06-20T17:30:04.925+02:00","length":3582,"duration":3582,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-577-de-voip_2005_regulierte_revolution.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-577-de-voip_2005_regulierte_revolution_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-f359526c699a9955b4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-f359526c699a9955b4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-577-de-voip_2005_regulierte_revolution","url":"https://api.media.ccc.de/public/events/import-f359526c699a9955b4","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1}]},{"guid":"import-db35a9da7d341ac0c2","title":"Die BioP-II-Studie des BSI","subtitle":"Biometrische Feldtests in Europa","slug":"22C3-1094-de-biop_2_studie","link":"http://events.ccc.de/congress/2005/fahrplan/events/1094.en.html","description":"Die BioP-II-Studie sollte eigentlich als Entscheidungshilfe für den Gesetzgeber die Einsatztauglichkeit der biometrischen Merkmale von Finger, Gesicht und Iris in Reisedokumenten testen. Leider wurde ihr Erscheinen um mehrere Monate verzögert und die entsprechenden Gesetze in der Zwischenzeit verabschiedet. Resigniert stellen die Macher der Studie fest, daß sie von der politischen Entscheidung überholt und vor vollendete Tatsachen gestellt wurden. Man hätte lieber auf die Ergebisse warten sollen.\n","original_language":"eng","persons":["Constanze Kurz","starbug"],"tags":["22c3"," Society"],"view_count":108,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-18T13:15:09.855+01:00","length":3233,"duration":3233,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1094-de-biop_2_studie.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1094-de-biop_2_studie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-db35a9da7d341ac0c2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-db35a9da7d341ac0c2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1094-de-biop_2_studie","url":"https://api.media.ccc.de/public/events/import-db35a9da7d341ac0c2","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":198,"event_guid":"import-b962abe26523d75e2c","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1085,"event_guid":"import-ed295055914a8eea4a","weight":2},{"event_id":2150,"event_guid":"0CpZm9-0S1ja92XDOICX0Q","weight":1},{"event_id":2155,"event_guid":"Bnz1quB2NHq9BEXoyNm5xQ","weight":1},{"event_id":2158,"event_guid":"n2DFvyl_lWjW-gm317vT3A","weight":1},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":1},{"event_id":2296,"event_guid":"sAZoeOc6Qu4bMPxrU8yEpw","weight":1},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":1},{"event_id":3578,"event_guid":"5c131502-5ff3-5bd6-80f7-231a44575164","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":1},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":1}]},{"guid":"import-478f36257839b58bfe","title":"W3C on Mobile, CSS, Multimodal and more","subtitle":"A look at the upcoming standards by W3C","slug":"22C3-933-en-w3c_mobil_css_multimodal","link":"http://events.ccc.de/congress/2005/fahrplan/events/933.en.html","description":"W3C is developing several new Web technologies and modules for existing technologies, many of which have to do with the requirements of new, mobile devices. This talk will look at a few of them.\n","original_language":"eng","persons":["Bert Bos"],"tags":["22c3"," Science"],"view_count":10,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-08-17T00:45:04.683+02:00","length":3297,"duration":3297,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-933-en-w3c_mobil_css_multimodal.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-933-en-w3c_mobil_css_multimodal_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-478f36257839b58bfe-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-478f36257839b58bfe-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-933-en-w3c_mobil_css_multimodal","url":"https://api.media.ccc.de/public/events/import-478f36257839b58bfe","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[]},{"guid":"import-d22042184df162ad5d","title":"22C3 Network Review","subtitle":null,"slug":"22C3-496-en-22c3_network","link":"http://events.ccc.de/congress/2005/fahrplan/events/496.en.html","description":"An Introduction into the structure and design of the congress network - featuring a description of hardware setup and focusing on the uplink to the internet.\n","original_language":"eng","persons":["Sebastian Werner","Stefan Wahl"],"tags":["22c3"," Hacking"],"view_count":127,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-15T16:00:08.928+01:00","length":1976,"duration":1976,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-496-en-22c3_network.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-496-en-22c3_network_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d22042184df162ad5d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d22042184df162ad5d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-496-en-22c3_network","url":"https://api.media.ccc.de/public/events/import-d22042184df162ad5d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":105,"event_guid":"import-699c2f9e58bb11f2d6","weight":2},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":5},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":789,"event_guid":"import-22d7fca70258bbf57a","weight":7},{"event_id":804,"event_guid":"import-31c9ce21788db44716","weight":1},{"event_id":822,"event_guid":"import-c7588115cc796ab3e7","weight":1},{"event_id":852,"event_guid":"import-ee7ad68100703a6507","weight":1},{"event_id":860,"event_guid":"import-25e7da9a84d7431bdf","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":875,"event_guid":"import-af588154ff7d6d3317","weight":1},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":3},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":1},{"event_id":891,"event_guid":"import-e33afefda42fb6de03","weight":1},{"event_id":892,"event_guid":"import-8db13adee78594ad9e","weight":1},{"event_id":894,"event_guid":"import-20edce84e2b2f0e929","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":2},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":2},{"event_id":948,"event_guid":"import-28674b64c7c10289a3","weight":1},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":2},{"event_id":1014,"event_guid":"import-2d921a0dfd44909fdd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1107,"event_guid":"import-575502e1e9906233c7","weight":1},{"event_id":1108,"event_guid":"import-8f7bed0042eb4f1860","weight":5},{"event_id":1624,"event_guid":"import-db10023d490c5866ad","weight":3},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1678,"event_guid":"import-499496e1f8d0dc96ab","weight":1},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":1},{"event_id":1727,"event_guid":"Yag3mXGNWO6pdV6uryzhJA","weight":1},{"event_id":1765,"event_guid":"sh_vDLYCDlmW5sFWsI4KSg","weight":1},{"event_id":2664,"event_guid":"b6fed585-0e5c-4235-8611-dababee42261","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":3110,"event_guid":"b7935ff9-54e1-4b97-9ce4-1febd50e6f82","weight":1},{"event_id":3111,"event_guid":"f5dd54b0-b67b-4024-a25e-eb941aeb89aa","weight":1},{"event_id":3115,"event_guid":"c680e01e-8145-5a76-98e4-783c14a2bfe2","weight":1},{"event_id":3120,"event_guid":"195d0a4f-d592-565f-9837-9f7d93173327","weight":1},{"event_id":3122,"event_guid":"1541abda-da85-52fa-b792-6180200b64b3","weight":1},{"event_id":3132,"event_guid":"07a3fd0d-5d1b-5323-a6b5-5db5201bab37","weight":1},{"event_id":3133,"event_guid":"27149d46-693d-5659-b7b9-c2a1b1892d1a","weight":1},{"event_id":3135,"event_guid":"af5d2551-c73e-55ba-ab55-5858e937b1a5","weight":1},{"event_id":3137,"event_guid":"2d14289c-ba83-5bb0-b998-eca58e977062","weight":1},{"event_id":3139,"event_guid":"21557190-d311-58e6-8543-87176a56ac24","weight":1},{"event_id":3141,"event_guid":"0b64b17b-d001-54bb-b438-0132e30cbeb5","weight":1},{"event_id":3142,"event_guid":"d8fe4ff5-fc62-543f-8df2-e58809dc86b0","weight":1},{"event_id":3498,"event_guid":"3cd1ad54-bede-444f-9339-9ed86e1836f6","weight":1},{"event_id":3499,"event_guid":"f5f638dd-fccc-460c-8829-38f69f872ada","weight":1},{"event_id":3522,"event_guid":"a1576b05-f6b7-5fae-84c4-5f7bd0fd9a87","weight":1},{"event_id":3533,"event_guid":"aa0e9e70-9601-55cc-8f1b-3697b4e9ad98","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3685,"event_guid":"5c9003b7-543d-476a-89f0-eee5ed36327c","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":3786,"event_guid":"9f730bc5-eb12-44e0-94e7-a65fd86490d9","weight":1},{"event_id":3803,"event_guid":"3a85b5ca-222d-11e7-b6e0-a743b98e1890","weight":2},{"event_id":4127,"event_guid":"5cd06be6-1796-4768-83fe-fbde436724bb","weight":1},{"event_id":4218,"event_guid":"1e6d5592-73c1-11e7-b0d6-e344c45ec229","weight":1},{"event_id":4379,"event_guid":"406d9e92-690e-4a35-97cd-49af5fe33764","weight":1},{"event_id":4652,"event_guid":"8069546e-0e69-4340-a2a7-f28b5b663de9","weight":1},{"event_id":4675,"event_guid":"b03c36c2-b9aa-4dfd-961b-6e49d54e3200","weight":1},{"event_id":4676,"event_guid":"a3898a69-9035-48ec-8389-5ac7b3f12e7f","weight":1}]},{"guid":"import-9675478b5a106686ad","title":"Military intelligence for terrorists(tm)","subtitle":"A lamer's introduction to retrieving \"sensitive\" intelligence information","slug":"22C3-513-en-military_intelligence","link":"http://events.ccc.de/congress/2005/fahrplan/events/513.en.html","description":"Since 9/11, the US government is especially picky about which information is to be published. This lecture shows how you can still get some very interesting and \"sensitive\" geographical information.\n","original_language":"eng","persons":["Andreas Krennmair"],"tags":["22c3"," Hacking"],"view_count":306,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-23T18:30:08.640+01:00","length":3158,"duration":3158,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-513-en-military_intelligence.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-513-en-military_intelligence_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-9675478b5a106686ad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-9675478b5a106686ad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-513-en-military_intelligence","url":"https://api.media.ccc.de/public/events/import-9675478b5a106686ad","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":914,"event_guid":"import-3715aeea2e9dad683d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":2},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1}]},{"guid":"import-8bf1e2b44448e3f277","title":"22C3: Private Investigations","subtitle":"Opening Show and Keynote Speech","slug":"22C3-390-en-private_investigations","link":"http://events.ccc.de/congress/2005/fahrplan/events/390.en.html","description":"\u003cp\u003eIntroductory opening session by Tim Pritlove and keynote speech on the 22C3 topic \"Private Investigations\" by Joi Ito.\u003c/p\u003e","original_language":"eng","persons":["Tim Pritlove","Joi Ito"],"tags":["22c3","Community"],"view_count":275,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-02T11:15:10.975+01:00","length":3513,"duration":3513,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-390-en-private_investigations.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-390-en-private_investigations_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-8bf1e2b44448e3f277-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-8bf1e2b44448e3f277-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-390-en-private_investigations","url":"https://api.media.ccc.de/public/events/import-8bf1e2b44448e3f277","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":4},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":3},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":4},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":938,"event_guid":"import-044a4bc90d533f8e0d","weight":4},{"event_id":944,"event_guid":"import-4dbc731f04100e2b32","weight":3},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":3},{"event_id":1023,"event_guid":"import-fab97d6d1228d5ad96","weight":3},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":3},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":2},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":2},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":2},{"event_id":3236,"event_guid":"3ed24374-7c3e-4d29-a13a-a0adb06e72f9","weight":2},{"event_id":3753,"event_guid":"f79171fd-67ca-4b74-90c8-9dd382103eb0","weight":2}]},{"guid":"import-28674b64c7c10289a3","title":"The Future of Virtualization","subtitle":"The \"anyOS\" paradigm and its implications through virtualization","slug":"22C3-788-en-the_future_of_virtualization","link":"http://events.ccc.de/congress/2005/fahrplan/events/788.en.html","description":"Modern virtualization technics are changing the point of  view used to build software and its infrastructure.\nExplaining the techniques used in cutting edge virtualization software, this talk gives an introspection how virtualization is solving design issues in heterogenos computing environments.\n","original_language":"eng","persons":["Felix Erkinger"],"tags":["22c3"," Hacking"],"view_count":30,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-05-17T15:15:03.366+02:00","length":3341,"duration":3341,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-788-en-the_future_of_virtualization.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-788-en-the_future_of_virtualization_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-28674b64c7c10289a3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-28674b64c7c10289a3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-788-en-the_future_of_virtualization","url":"https://api.media.ccc.de/public/events/import-28674b64c7c10289a3","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":1},{"event_id":950,"event_guid":"import-e34e417f1bb6d66d12","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":972,"event_guid":"import-e96f451e7f1825878a","weight":2},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1036,"event_guid":"import-1fd7b39f0ac4933695","weight":1},{"event_id":1047,"event_guid":"import-9a29d7fecce7ac000e","weight":1},{"event_id":1390,"event_guid":"import-9c82dc5bc5ce9b2674","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":2267,"event_guid":"9RncwfCW37x4dhs15BQqBQ","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":1},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":1},{"event_id":4296,"event_guid":"0eff8b32-bd9e-4a69-b704-70171ca0e83e","weight":1},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":1},{"event_id":5835,"event_guid":"ef93ad8e-5953-5844-9a7f-e4573b2ebf34","weight":1}]},{"guid":"import-616bc3bf6f05941c54","title":"Lightning Talks Day 4","subtitle":"Nine five minutes talks by various speakers","slug":"22C3-915-en-lightning_talk_day_4","link":"http://events.ccc.de/congress/2005/fahrplan/events/915.en.html","description":"There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin.\n","original_language":"eng","persons":["prometoys"],"tags":["22c3"],"view_count":39,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-07T18:00:09.302+02:00","length":2976,"duration":2976,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-915-en-lightning_talk_day_4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-915-en-lightning_talk_day_4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-616bc3bf6f05941c54-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-616bc3bf6f05941c54-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-915-en-lightning_talk_day_4","url":"https://api.media.ccc.de/public/events/import-616bc3bf6f05941c54","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":967,"event_guid":"import-73ea56f62062e5ea9d","weight":2},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":1196,"event_guid":"import-00a47e46bd1e9aad89","weight":1},{"event_id":2950,"event_guid":"83fa2955-80df-4f47-9421-9e81b9f6f2c0","weight":1},{"event_id":3752,"event_guid":"fc56c971-c65e-43ca-a92c-d98c7fb47bd6","weight":1},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":1},{"event_id":3756,"event_guid":"6796635e-2dd6-4f91-8f23-ba1bea7e2994","weight":1},{"event_id":3759,"event_guid":"c6decee9-310c-40b9-90af-5937df22e1aa","weight":1},{"event_id":4382,"event_guid":"df4bb630-afff-44d6-a075-438a1e1dc99b","weight":1}]},{"guid":"import-ed1c1621de6cb7a72a","title":"Anonymität im Internet","subtitle":"Rechtliche und technische Aspekte","slug":"22C3-785-de-anon_tor_jap","link":"http://events.ccc.de/congress/2005/fahrplan/events/785.en.html","description":"Der Vortrag bietet einen Überblick über die verfügbaren Systeme und Implementierungen, ihre Entwicklungsgeschichte und die technischen Grundlagen. Darüber hinaus schildert er die rechtlichen Rahmenbedingungen und Gesetzgebungsbestrebungen. Es folgt ein kurzer Abriss der Erfahrungen als Betreiber eines Node.\n","original_language":"eng","persons":["Julius Mittenzwei","Andreas Lehner","Peter Franck"],"tags":["22c3"," Society"],"view_count":197,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-17T11:45:12.345+01:00","length":3369,"duration":3369,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-785-de-anon_tor_jap.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-785-de-anon_tor_jap_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ed1c1621de6cb7a72a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ed1c1621de6cb7a72a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-785-de-anon_tor_jap","url":"https://api.media.ccc.de/public/events/import-ed1c1621de6cb7a72a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":4},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":2},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":2},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":3},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":2},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":3},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":3},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":2},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":4},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":2},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":2},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":3},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":2},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":3},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":2},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":7},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":4},{"event_id":1033,"event_guid":"import-db35a9da7d341ac0c2","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":3},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":2},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":5},{"event_id":1438,"event_guid":"import-c4d094a86d6fdad7df","weight":3},{"event_id":1728,"event_guid":"3poSeUcpc6woNaI5dhATcQ","weight":2},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":4},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":2},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":2},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":2},{"event_id":3754,"event_guid":"0cf3ff5b-9d86-4831-8eac-588d92771f63","weight":2},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":3},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":2},{"event_id":4944,"event_guid":"868fbf54-2007-4c0e-9af3-63384bed9fa6","weight":2}]},{"guid":"import-33271665ad7b91afd1","title":"Lawful Interception in VoIP networks","subtitle":"Old Laws and New Technology the German Way","slug":"22C3-468-en-lawful_interception_of_voip_networks","link":"http://events.ccc.de/congress/2005/fahrplan/events/468.en.html","description":"Lawful Interception (aka voice and signalling sniffing) equipment has been deployed and is in use for both traditional PSTN networks and internet connections. With the advent of Voice over IP applications the governments step-by-step adopted laws to extend PSTN interception to VoIP. The talk gives an introduction to the applying laws, rules of conduct and the basic PSTN setup.\n","original_language":"eng","persons":["Hendrik Scholz"],"tags":["22c3"," Hacking"],"view_count":71,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-05T17:30:11.408+01:00","length":2979,"duration":2979,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-468-en-lawful_interception_of_voip_networks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-468-en-lawful_interception_of_voip_networks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-33271665ad7b91afd1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-33271665ad7b91afd1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-468-en-lawful_interception_of_voip_networks","url":"https://api.media.ccc.de/public/events/import-33271665ad7b91afd1","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":731,"event_guid":"import-bf118c75c91fbf6195","weight":4},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":957,"event_guid":"import-fa398718f4c3eec297","weight":2},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":1},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":1},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1274,"event_guid":"import-b24e96b14b74162533","weight":1},{"event_id":1380,"event_guid":"import-88b547b1ad8db477bd","weight":1},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1685,"event_guid":"import-3e4a92a7169b065ca1","weight":1},{"event_id":1746,"event_guid":"il4lmTSfWPAY3ks_KW7SHg","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2134,"event_guid":"1__cd06WAoENTm6JjzMJVA","weight":1},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":2544,"event_guid":"2cce4d76-619d-4f60-b7e9-28e8ee9d6483","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":1},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":3823,"event_guid":"4046cd27-1560-59af-b708-eede781ce5ec","weight":1},{"event_id":3860,"event_guid":"03059218-e5f8-4404-9d6b-f41e7f26ef55","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1},{"event_id":4336,"event_guid":"962f467f-8c6b-44cc-98cd-673128a9aef5","weight":1},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":1},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":1},{"event_id":5042,"event_guid":"c8913456-cd69-467a-a446-2330ae8b5299","weight":1},{"event_id":5684,"event_guid":"00fd8c56-524c-5bcc-9aa4-75fe2b54f35e","weight":1},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1}]},{"guid":"import-475cf38d0e695ee755","title":"We lost the war","subtitle":"Welcome to the world of tomorrow","slug":"22C3-920-en-we_lost_the_war","link":"http://events.ccc.de/congress/2005/fahrplan/events/920.en.html","description":"\u003cp\u003eCome to terms with the imminent loss of privacy and civil rights without going lethargic. We will analyse current events, how we think they will affect the issues we care about and how we can be most effective given the new circumstances. Or possibly how to simply survive the times ahead.\u003c/p\u003e","original_language":"eng","persons":["Rop Gonggrijp","Frank Rieger"],"tags":["22c3","Society"],"view_count":3149,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-10T11:00:12.540+01:00","length":4426,"duration":4426,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-920-en-we_lost_the_war.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-920-en-we_lost_the_war_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-475cf38d0e695ee755-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-475cf38d0e695ee755-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-920-en-we_lost_the_war","url":"https://api.media.ccc.de/public/events/import-475cf38d0e695ee755","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":7},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":3},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":2},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":14},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":7},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":5},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":18},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":3},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":14},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":5},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":5},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":6},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":2},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":10},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":16},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":6},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":7},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":5},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":20},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":7},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":27},{"event_id":2899,"event_guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","weight":125},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":6},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":5},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":4},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":4},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":3},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":3},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":6},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":3},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":2},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":19},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":4},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":4},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":3}]},{"guid":"import-22d125435243ffe467","title":"Developing Intelligent Search Engines","subtitle":null,"slug":"22C3-415-en-developing_intelligent_search_engines","link":"http://events.ccc.de/congress/2005/fahrplan/events/415.en.html","description":"The presentation will give a short overview of the architecture of search engines and how machine learning can help improving search engines. In addition some projects you can take part in will be briefly introduced.\n","original_language":"eng","persons":["Isabel Drost"],"tags":["22c3"," Science"],"view_count":34,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-01-11T15:15:08.834+01:00","length":2680,"duration":2680,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-415-en-developing_intelligent_search_engines.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-415-en-developing_intelligent_search_engines_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-22d125435243ffe467-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-22d125435243ffe467-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-415-en-developing_intelligent_search_engines","url":"https://api.media.ccc.de/public/events/import-22d125435243ffe467","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":922,"event_guid":"import-668b5fa4d370105b30","weight":2},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":1},{"event_id":2541,"event_guid":"58068b84-9261-4f5c-bb73-5c674fa5c45b","weight":1},{"event_id":4062,"event_guid":"91499ed8-0eb5-544a-8154-fa61f971337a","weight":2}]},{"guid":"import-cef348db35fa246453","title":"Memory allocator security","subtitle":null,"slug":"22C3-574-en-memory_allocator_security","link":"http://events.ccc.de/congress/2005/fahrplan/events/574.en.html","description":"This talk will discuss a variety of memory allocators that are available for C and C++ and how they can be exploited. Afterwards I will describe our modification to one of these memory allocators that makes it more resilient to attacks.\n","original_language":"eng","persons":["Yves Younan"],"tags":["22c3"," Hacking"],"view_count":14,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2023-06-25T14:30:02.084+02:00","length":2287,"duration":2287,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-574-en-memory_allocator_security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-574-en-memory_allocator_security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-cef348db35fa246453-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-cef348db35fa246453-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-574-en-memory_allocator_security","url":"https://api.media.ccc.de/public/events/import-cef348db35fa246453","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[]},{"guid":"import-668b5fa4d370105b30","title":"Digital Identity and the Ghost in the Machine","subtitle":"\"Once I Was Lost But Now I've Been Found\"","slug":"22C3-549-en-digital_identity","link":"http://events.ccc.de/congress/2005/fahrplan/events/549.en.html","description":"The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself.\n","original_language":"eng","persons":["Max Kilger"],"tags":["22c3"," Society"],"view_count":49,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-05T15:15:19.688+01:00","length":3170,"duration":3170,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-549-en-digital_identity.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-549-en-digital_identity_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-668b5fa4d370105b30-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-668b5fa4d370105b30-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-549-en-digital_identity","url":"https://api.media.ccc.de/public/events/import-668b5fa4d370105b30","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":2},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":2},{"event_id":925,"event_guid":"import-2c21d5bbe59bd1fc5e","weight":2},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":2},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":2},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":969,"event_guid":"import-4788ad9117174c432f","weight":2},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":1},{"event_id":1003,"event_guid":"import-b1cf6830ab9448a621","weight":2},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1019,"event_guid":"import-e9b440ff02ce09ca59","weight":2},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1043,"event_guid":"import-21d05b6ae105e4a388","weight":1},{"event_id":1044,"event_guid":"import-c77f160f0e555cfe61","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1856,"event_guid":"import-6d72f0bd8985473bff","weight":1},{"event_id":1857,"event_guid":"import-99c75aefb14537b1b4","weight":1},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":1},{"event_id":3109,"event_guid":"73aed10c-75f8-436a-97b0-d995d49e2a95","weight":1},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":1},{"event_id":4205,"event_guid":"ee199a82-0af8-4b4e-ad47-b83562fc3042","weight":1}]},{"guid":"import-94276250016fb6922a","title":"Was ist technisches Wissen?","subtitle":"Philosophische Grundlagen technischer Wissenschaften","slug":"22C3-516-de-was_ist_technisches_wissen","link":"http://events.ccc.de/congress/2005/fahrplan/events/516.en.html","description":"Unter dem steigenden Interesse der Technikphilosophen und der Diversifizierung der philosophischen Wissenschaftstheorie erscheinen erste Untersuchungen über technisches Wissen. Der Vortrag zeigt an, auf welchen Pfaden und mit welchen Fragen die Wissenschaftsphilosophie an die Technik derzeit heran tritt. Davon ausgehend soll auch das gegenwärtige philosophische Bild vom technischen Wissen gezeigt werden.\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["22c3"," Science"],"view_count":66,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-20T21:00:08.025+01:00","length":3920,"duration":3920,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-516-de-was_ist_technisches_wissen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-516-de-was_ist_technisches_wissen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-94276250016fb6922a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-94276250016fb6922a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-516-de-was_ist_technisches_wissen","url":"https://api.media.ccc.de/public/events/import-94276250016fb6922a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":1},{"event_id":522,"event_guid":"import-8e09678728188bebdf","weight":2},{"event_id":688,"event_guid":"import-74d091362cd1fd91d2","weight":1},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":805,"event_guid":"import-a7100f85ea482235a4","weight":1},{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":1},{"event_id":813,"event_guid":"import-c37d6e2bd9f4f412fa","weight":1},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":1},{"event_id":821,"event_guid":"import-a1a1cc355460e393a5","weight":1},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":1},{"event_id":845,"event_guid":"import-9aa26412eb8a583273","weight":1},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":1},{"event_id":853,"event_guid":"import-d5b993915f58107a0b","weight":1},{"event_id":858,"event_guid":"import-0fa6485c220df5e791","weight":1},{"event_id":862,"event_guid":"import-0f3021b09bdc4b986b","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":869,"event_guid":"import-76a88a1e7144ed0e8b","weight":1},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":1},{"event_id":885,"event_guid":"import-21a7d876450c6cf8e6","weight":1},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":2},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":2},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":2},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":1},{"event_id":995,"event_guid":"import-4a0db9160a6cea65f5","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":2},{"event_id":1017,"event_guid":"import-468a1864daab0c9d56","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":1},{"event_id":1039,"event_guid":"import-f31ce8e8ede86842b2","weight":1},{"event_id":1054,"event_guid":"import-4be8d960e783fac67d","weight":1},{"event_id":1084,"event_guid":"import-0ff5380c0b7ca9062b","weight":1},{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":1},{"event_id":1429,"event_guid":"import-491788383a692aaae6","weight":1},{"event_id":3719,"event_guid":"d851c029-9f83-41af-befd-a54209453d41","weight":1},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":1},{"event_id":3988,"event_guid":"0dfdf83e-5cc3-4443-930e-fc149a84c812","weight":1},{"event_id":4060,"event_guid":"21007d64-466c-5f2c-aa3c-28612871d17e","weight":1},{"event_id":4120,"event_guid":"902f722c-a0a9-5fc1-b57d-c7f4fea73387","weight":1},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":1},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":1},{"event_id":5726,"event_guid":"699d4df8-182e-11e8-a51e-1766dd9762f3","weight":1}]},{"guid":"import-8a6151e11ffe1e0e41","title":"Hexenbesen und heiliger Gral","subtitle":"Vorläufige und subjektive Gedanken zur inhaltlichen Qualität von Wikipedia-Artikeln","slug":"22C3-1111-de-hexenbesen_und_heiliger_gral","link":"http://events.ccc.de/congress/2005/fahrplan/events/1111.en.html","description":"Einige vorläufige und ausgesprochen subjektive Gedanken zur Artikelqualität in der Wikipedia aus der Sicht eines Geisteswissenschaftlers. Dabei interessiert weniger die Frage nach den sogenannten „Relevanzkriterien”, als vielmehr die Frage danach, inwieweit die Arbeitsweise in und mit der Wikipedia den Ansprüchen an eine wissenschaftliche Arbeitsweise genügt. Ein Anleitung auch für den, der sich fragt, ob man den Informationen eines Wikipedia-Artikels denn überhaupt trauen kann.\n","original_language":"eng","persons":["Henriette Fiebig"],"tags":["22c3"," Community"],"view_count":70,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-27T20:30:09.893+01:00","length":2982,"duration":2982,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-1111-de-hexenbesen_und_heiliger_gral.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-1111-de-hexenbesen_und_heiliger_gral_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-8a6151e11ffe1e0e41-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-8a6151e11ffe1e0e41-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-1111-de-hexenbesen_und_heiliger_gral","url":"https://api.media.ccc.de/public/events/import-8a6151e11ffe1e0e41","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":617,"event_guid":"import-dbe20ee1c46bbc4094","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":3},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":2},{"event_id":988,"event_guid":"import-43228b352678b0ded0","weight":2},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":1},{"event_id":1076,"event_guid":"import-57e0e95fca3dedeec9","weight":1},{"event_id":1100,"event_guid":"import-c27ad5734973ec4439","weight":3},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":2},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1659,"event_guid":"import-fc9f264162a3c61c59","weight":1},{"event_id":1723,"event_guid":"4xOGbMd8E3ezI9zpD6BO4A","weight":1},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":1},{"event_id":2247,"event_guid":"iU5CnqxotZz_KK2P-uVMsQ","weight":1},{"event_id":2279,"event_guid":"d42702a8-d760-473d-bc21-0a53b7ea9603","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3857,"event_guid":"880588ea-3e65-4eee-a4b9-e240c4c187e8","weight":1},{"event_id":4698,"event_guid":"87de639d-024d-48d7-8955-3f529befc9f5","weight":1},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1}]},{"guid":"import-a4452fd3aba0890cf1","title":"Biometrics in Science Fiction","subtitle":null,"slug":"22C3-882-de-biometrics_in_science_fiction","link":"http://events.ccc.de/congress/2005/fahrplan/events/882.en.html","description":"Gezeigt und kommentiert werden Ausschnitte und Szenen biometrischer Techniken aus Film und Fernsehen. \n","original_language":"eng","persons":["Roland Kubica","Constanze Kurz"],"tags":["22c3"," Culture"],"view_count":514,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-17T10:45:07.934+01:00","length":3542,"duration":3542,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-882-de-biometrics_in_science_fiction.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-882-de-biometrics_in_science_fiction_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-a4452fd3aba0890cf1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-a4452fd3aba0890cf1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-882-de-biometrics_in_science_fiction","url":"https://api.media.ccc.de/public/events/import-a4452fd3aba0890cf1","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":1},{"event_id":697,"event_guid":"import-6e41e3f78f87e167ab","weight":1},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":1},{"event_id":736,"event_guid":"import-93add0c79a0a5e23dd","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":913,"event_guid":"import-a56ca0ff971cff4045","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":921,"event_guid":"import-92989b1326a6bb2436","weight":2},{"event_id":927,"event_guid":"import-4e9369743d33a6b819","weight":1},{"event_id":935,"event_guid":"import-d9a34dd8bf60695047","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":4},{"event_id":952,"event_guid":"import-84a9c6cfe2e198d2c4","weight":1},{"event_id":954,"event_guid":"import-4e5c5dbe459b62aa89","weight":1},{"event_id":966,"event_guid":"import-e31124eb287156c040","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":3},{"event_id":976,"event_guid":"import-53997037a1b9e9ceb3","weight":1},{"event_id":981,"event_guid":"import-f40727e65f49ca9683","weight":1},{"event_id":982,"event_guid":"import-0d0583302765040a34","weight":1},{"event_id":984,"event_guid":"import-8e7ab593b77c31ffdd","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":1},{"event_id":1007,"event_guid":"import-91c47303bb135d962c","weight":1},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":1},{"event_id":1015,"event_guid":"import-257e025a6c89266a71","weight":1},{"event_id":1021,"event_guid":"import-3c9eb002e2e94056cd","weight":1},{"event_id":1029,"event_guid":"import-dab9cded184d032210","weight":5},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1032,"event_guid":"import-22d125435243ffe467","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":14},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1049,"event_guid":"import-4d0f52c0d863e63b49","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1092,"event_guid":"import-581b252506da8022c4","weight":1},{"event_id":1094,"event_guid":"import-33fb0d803b5b408751","weight":1},{"event_id":1103,"event_guid":"import-6e414b43d8c4576d29","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":49},{"event_id":1117,"event_guid":"import-4db021b498e759c3e0","weight":1},{"event_id":1122,"event_guid":"import-a24ed08b895b751d60","weight":1},{"event_id":1131,"event_guid":"import-a114fda3b438854fec","weight":1},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":16},{"event_id":1164,"event_guid":"import-79ae19c603ca8c97ea","weight":1},{"event_id":1171,"event_guid":"import-ea30123926f8b1a081","weight":1},{"event_id":1176,"event_guid":"import-aeca1d442393997d98","weight":30},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":1},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":1222,"event_guid":"import-a69893c7877bfc9463","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1234,"event_guid":"import-40f46db34917f8d7da","weight":1},{"event_id":1236,"event_guid":"import-16ec3c15e8c1912ab4","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":2},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":15},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1615,"event_guid":"import-a12ea6cce80bbfdbef","weight":1},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":30},{"event_id":1721,"event_guid":"BRHpBVii4wmCt1nd94vCYg","weight":1},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":17},{"event_id":1844,"event_guid":"qkjXyXK2qXXjRYOUI9nT0Q","weight":17},{"event_id":1983,"event_guid":"HvR3MGqT1NqC3G3aIZJv7A","weight":1},{"event_id":1990,"event_guid":"APxc5qnadHeafxzU1z7FXw","weight":1},{"event_id":2087,"event_guid":"Q6L18QbEioigZeg3rGDRCA","weight":1},{"event_id":2090,"event_guid":"c4gbQ38eY2kXHUabLC33uA","weight":1},{"event_id":2091,"event_guid":"T8J_lgEMOIf-ArYXZCguQQ","weight":1},{"event_id":2178,"event_guid":"7G4FQIXg2eb7D6F_jNwuxA","weight":4},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":16},{"event_id":2351,"event_guid":"94e1281c-b1c8-46b3-82ad-6d6df6fe3580","weight":1},{"event_id":2388,"event_guid":"e9a54249-b4a7-4562-91fe-421a6bde0831","weight":1},{"event_id":2500,"event_guid":"6587bc79-27e5-4cf3-847b-77b0acc96682","weight":16},{"event_id":2520,"event_guid":"c992aea0-c7b2-4b8b-ae5e-758cabd0ca47","weight":1},{"event_id":2552,"event_guid":"32ff3348-9b9e-4d92-9e9b-7f6b81868d9c","weight":2},{"event_id":2676,"event_guid":"b1ef9c05-4ad8-4258-8fd7-9d937b630d1b","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":8},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":2},{"event_id":3043,"event_guid":"79e60f58-b2e7-4910-be32-f0a8896569e0","weight":1},{"event_id":3227,"event_guid":"0fd77819-0594-4127-bee3-a1d2fe7b1dd3","weight":1},{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":8},{"event_id":3807,"event_guid":"32ed6ce9-cefa-4e7b-9191-6c61678db765","weight":1},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":9},{"event_id":3858,"event_guid":"39d3b2d0-6f82-4aa6-b0c0-6ae18caa2c3c","weight":1},{"event_id":3944,"event_guid":"c6b1fc76-2f70-4051-9767-46487ab457b3","weight":1},{"event_id":6376,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb895","weight":9}]},{"guid":"import-ba30979084bcfcc8f9","title":"Hashing Trusted Computing","subtitle":"Der aktuelle Stand","slug":"22C3-495-de-hash_trust_compute","link":"http://events.ccc.de/congress/2005/fahrplan/events/495.en.html","description":"Wir präsentieren ein generisches Angriffs-Framework und zeige exemplarisch neue pratische Angriffe auf digitale Signaturen, die Zertifikats-Infrastruktur und die Bootkontrollsequenzen basierend auf neuen Resultaten zur Hashfunktion SHA-1. Diese Ergebnisse komprimtieren grundlegend die Sicherheit der TCG Architektur.\n","original_language":"eng","persons":["Rüdiger Weis"],"tags":["22c3"," Science"],"view_count":52,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-10-07T22:00:09.929+02:00","length":3523,"duration":3523,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-495-de-hash_trust_compute.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-495-de-hash_trust_compute_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-ba30979084bcfcc8f9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-ba30979084bcfcc8f9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-495-de-hash_trust_compute","url":"https://api.media.ccc.de/public/events/import-ba30979084bcfcc8f9","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":79,"event_guid":"import-2654c06bae3e5515d7","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":1},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":2219,"event_guid":"2yBK0TAIqddmCWa1MJUNQQ","weight":1},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":3696,"event_guid":"9d36932f-616a-4677-b924-60c1986fbbfc","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":7885,"event_guid":"3c8f6eff-42ef-5c5d-abfd-00fb58b4d6e8","weight":1}]},{"guid":"import-d06544991d5aea8d3c","title":"Attacking the IPv6 Protocol Suite","subtitle":null,"slug":"22C3-772-en-attacking_ipv6","link":"http://events.ccc.de/congress/2005/fahrplan/events/772.en.html","description":"After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit, which includes all IPv6 attacks as well as a low level packet library for easy crafting packets.\n","original_language":"eng","persons":["van Hauser"],"tags":["22c3"," Hacking"],"view_count":153,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-01-09T05:15:05.839+01:00","length":3483,"duration":3483,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-772-en-attacking_ipv6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-772-en-attacking_ipv6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-d06544991d5aea8d3c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-d06544991d5aea8d3c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-772-en-attacking_ipv6","url":"https://api.media.ccc.de/public/events/import-d06544991d5aea8d3c","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":748,"event_guid":"import-ecb02c4dfaabbaf766","weight":1},{"event_id":750,"event_guid":"import-691e5b62d72613fe8d","weight":2},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":1},{"event_id":867,"event_guid":"import-951b951bbc36e5c5d7","weight":1},{"event_id":946,"event_guid":"import-d22042184df162ad5d","weight":2},{"event_id":970,"event_guid":"import-dcdeb7cfd3ac31cff6","weight":2},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":985,"event_guid":"import-c0c97d7b572b39d4f7","weight":1},{"event_id":1031,"event_guid":"import-9d34a07f70755058e7","weight":1},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":2},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":1},{"event_id":1317,"event_guid":"import-4e688d68d9cb334a9f","weight":1},{"event_id":1466,"event_guid":"import-ff0545dcff90fcd929","weight":2},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1678,"event_guid":"import-499496e1f8d0dc96ab","weight":2},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":1},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":3608,"event_guid":"a0c851a1-b44e-46cb-bbb8-db966bc8639b","weight":1},{"event_id":3983,"event_guid":"f21bc737-27f2-5aed-be11-48c52f144f4d","weight":2}]},{"guid":"import-3715aeea2e9dad683d","title":"Hacking health","subtitle":"Electronic Patient Records in The Netherlands","slug":"22C3-489-en-hacking_health","link":"http://events.ccc.de/congress/2005/fahrplan/events/489.en.html","description":"I have been researching the implementation of electronic patient records (EPR) in NL. The first part of EPRs - a national database of medication that each patient is described - will become mandatory in early 2006.\n","original_language":"eng","persons":["Karin Spaink"],"tags":["22c3"," Society"],"view_count":57,"promoted":false,"date":"2005-12-27T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-03T20:00:07.526+01:00","length":2823,"duration":2823,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-489-en-hacking_health.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-489-en-hacking_health_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-3715aeea2e9dad683d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-3715aeea2e9dad683d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-489-en-hacking_health","url":"https://api.media.ccc.de/public/events/import-3715aeea2e9dad683d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":1},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":1},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":1},{"event_id":937,"event_guid":"import-a5b28e74fa416095e9","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":960,"event_guid":"import-9675478b5a106686ad","weight":1},{"event_id":962,"event_guid":"import-95be4c3ebe752a2303","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":992,"event_guid":"import-107a176446d333e063","weight":1},{"event_id":1012,"event_guid":"import-c837a2404965cf7696","weight":1},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":6493,"event_guid":"2375222b-7dae-4bca-a5b0-aea227ab0d76","weight":1},{"event_id":6577,"event_guid":"49fe1044-4038-4cec-8e80-71621c9e7d6e","weight":1},{"event_id":6625,"event_guid":"ef9c53e5-b01b-431a-b141-9218f79b6c5a","weight":1}]},{"guid":"import-eceb398fdedfd15263","title":"Blackberry: call to arms, some provided","subtitle":"Teach yourself upper management in 22 days","slug":"22C3-596-en-blackberry","link":"http://events.ccc.de/congress/2005/fahrplan/events/596.en.html","description":"RIM Blackberry devices and servers are hidden behind a curtain of FUD and secrecy. The purpose of this talk is to lift the curtain a little and show what can and could be done.\n","original_language":"eng","persons":["FX of Phenoelit"],"tags":["22c3"," Hacking"],"view_count":74,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-03-03T11:00:07.263+01:00","length":3192,"duration":3192,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-596-en-blackberry.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-596-en-blackberry_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-eceb398fdedfd15263-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-eceb398fdedfd15263-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-596-en-blackberry","url":"https://api.media.ccc.de/public/events/import-eceb398fdedfd15263","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":1},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":2},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":1},{"event_id":906,"event_guid":"import-2fe8f5f454423d73a8","weight":1},{"event_id":920,"event_guid":"import-0243ea368590839b2d","weight":1},{"event_id":940,"event_guid":"import-4646aab6f6a3e78ab9","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":951,"event_guid":"import-fea9da9951d5fe8f3d","weight":1},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":3},{"event_id":989,"event_guid":"import-a4452fd3aba0890cf1","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":3},{"event_id":1176,"event_guid":"import-aeca1d442393997d98","weight":1},{"event_id":1181,"event_guid":"import-ebd1d831811af91559","weight":1},{"event_id":1214,"event_guid":"import-c69f699231e3cb9b06","weight":1},{"event_id":1227,"event_guid":"import-bc8cc3f9450dfddd83","weight":1},{"event_id":1480,"event_guid":"import-c20b0541d532512134","weight":1},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":1},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":1},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":1},{"event_id":1628,"event_guid":"import-974e41c3857176ef9f","weight":1},{"event_id":1803,"event_guid":"c3Q-MbMX7FDXWv6rYj2bFw","weight":1},{"event_id":2388,"event_guid":"e9a54249-b4a7-4562-91fe-421a6bde0831","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3807,"event_guid":"32ed6ce9-cefa-4e7b-9191-6c61678db765","weight":1},{"event_id":3858,"event_guid":"39d3b2d0-6f82-4aa6-b0c0-6ae18caa2c3c","weight":1},{"event_id":3944,"event_guid":"c6b1fc76-2f70-4051-9767-46487ab457b3","weight":1}]},{"guid":"import-b7d69fc8c75382206a","title":"Seaside: Agile Web Application Development with Squeak","subtitle":null,"slug":"22C3-599-en-seaside_squeak","link":"http://events.ccc.de/congress/2005/fahrplan/events/599.en.html","description":"Seaside represents a new generation of web frameworks: It makes web development simple and fun. Using advanced features of Squeak, Seaside is able to provide easy to use abstractions for true agile development.\n","original_language":"eng","persons":["Marcus Denker"],"tags":["22c3"," Hacking"],"view_count":12,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2026-02-17T21:00:10.335+01:00","length":3278,"duration":3278,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-599-en-seaside_squeak.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-599-en-seaside_squeak_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-b7d69fc8c75382206a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-b7d69fc8c75382206a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-599-en-seaside_squeak","url":"https://api.media.ccc.de/public/events/import-b7d69fc8c75382206a","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":1},{"event_id":980,"event_guid":"import-bc2aaf07ba36dce54b","weight":1},{"event_id":2725,"event_guid":"fN2VG6r6YRMprwHlActIQA","weight":2},{"event_id":3380,"event_guid":"f67e27f3-eef4-4233-8e21-a8296b486056","weight":1}]}]}