{"events":[{"guid":"import-ccc7ab9e9cbfbae1b5","title":"nazi ufos and other reality (547)","subtitle":null,"slug":"Camp_2003_-547_Nazi_ufos_and_other_reality","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["camp03"],"view_count":0,"promoted":false,"date":"2003-01-01T01:00:00.000+01:00","release_date":"2014-01-01T01:00:00.000+01:00","updated_at":"2015-12-30T12:39:14.153+01:00","length":0,"duration":0,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2003/Dokumentation_CamP2003/day_2/tent_B/Camp_2003 -547 Nazi ufos and other reality.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2003","timeline_url":"https://static.media.ccc.de/media/conferences/camp2003","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2003","frontend_link":"https://media.ccc.de/v/Camp_2003_-547_Nazi_ufos_and_other_reality","url":"https://api.media.ccc.de/public/events/import-ccc7ab9e9cbfbae1b5","conference_title":"Chaos Communication Camp 2003","conference_url":"https://api.media.ccc.de/public/conferences/camp2003","related":[]},{"guid":"import-3d4f45af4cb6fb9ed2","title":"2001-11-26 ard-nachtmagazin","subtitle":null,"slug":"2001-11-26-ard-nachtmagazin","link":"http://ccc.de","description":"\n","original_language":"eng","persons":[],"tags":["blinkenlights"],"view_count":0,"promoted":false,"date":"2001-01-01T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2015-12-30T12:39:13.264+01:00","length":0,"duration":0,"thumb_url":"https://static.media.ccc.de/media/blinkenlights/press/2001-11-26-ard-nachtmagazin.jpg","poster_url":"https://static.media.ccc.de/media/blinkenlights","timeline_url":"https://static.media.ccc.de/media/blinkenlights","thumbnails_url":"https://static.media.ccc.de/media/blinkenlights","frontend_link":"https://media.ccc.de/v/2001-11-26-ard-nachtmagazin","url":"https://api.media.ccc.de/public/events/import-3d4f45af4cb6fb9ed2","conference_title":"Blinkenlights","conference_url":"https://api.media.ccc.de/public/conferences/blinkenlights","related":[]},{"guid":"b95fc9c1-56d4-428f-9642-e55eca1c96dc","title":"Klimawandel statt Klimakollaps","subtitle":"Was wir als letzte Generation von der Hanse lernen (können)","slug":"2023-11-04-klimawandel-statt-klimakollaps","link":"https://2023.nook-luebeck.de/talks/klimawandel-statt-klimakollaps/","description":"Was hat die Hanse mit Energiewende, veganem Leben oder Internet zu tun? Historische Forschung hilft, nicht nur die Vergangenheit, sondern auch die Gegenwart zu verstehen. Ich sammle querbeet durch die technische, wirtschaftliche und soziale Entwicklung vom Mittelalter bis heute das, was es braucht, um uns eine lebenswerte Zukunft zu retten.\n\nDie Night of Open Knowledge (Nook) in Lübeck ist eine offene Vortragsveranstaltung, die einem weiten Publikum Einblicke in die verschiedene Bereiche der Informatik, aber auch technikfremde Themen bietet. Die Nook wird vom Chaotikum e.V. aus Lübeck und der studentischen Gruppe MetaMeute der Uni Lübeck veranstaltet. https://nook-luebeck.de/\n \nThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY NC ND 4.0). https://creativecommons.org/licenses/by-nc-nd/4.0/\n\t\t\t","original_language":"deu","persons":["Sebastian Büttner"],"tags":["nook23","1502","2023"],"view_count":75,"promoted":false,"date":"2023-11-04T15:00:00.000+01:00","release_date":"2024-01-26T00:00:00.000+01:00","updated_at":"2025-10-27T19:30:05.858+01:00","length":2469,"duration":2469,"thumb_url":"https://static.media.ccc.de/media/events/nook/2023/1502-b95fc9c1-56d4-428f-9642-e55eca1c96dc.jpg","poster_url":"https://static.media.ccc.de/media/events/nook/2023/1502-b95fc9c1-56d4-428f-9642-e55eca1c96dc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/nook/2023/1502-b95fc9c1-56d4-428f-9642-e55eca1c96dc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/nook/2023/1502-b95fc9c1-56d4-428f-9642-e55eca1c96dc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2023-11-04-klimawandel-statt-klimakollaps","url":"https://api.media.ccc.de/public/events/b95fc9c1-56d4-428f-9642-e55eca1c96dc","conference_title":"Nook 2023","conference_url":"https://api.media.ccc.de/public/conferences/nook23","related":[]},{"guid":"96021566-1143-5562-89bc-68747cfdfaed","title":"(How) could we win? Strategies for contemporary anarchism","subtitle":null,"slug":"how-could-we-win-strategies-for-contemporary-anarchism","link":"https://organize.anarchy2023.org/event/4kWbWH5MEYX8585RW/how-could-we-win-strategies-for-contemporary-anarchism","description":"Part of the beauty and continued relevance of anarchism comes from the diversity and constant evolution of its theoretical and practical approaches. However, anarchists in different locations, different subcultures, different social groups, etc often do not collaborate, talk to each other, or even know about each other.  Rarely do they see themselves as all acting together to pursue overarching strategies. After a short input to help frame the discussion, this session invites participants to 'map' different contemporary approaches and practices that are either explicitly anarchist or closely related to it, discuss if/how they can be combined, and how links of practical solidarity can be established, thereby  potentially identifying emergent strategies beyond the short-term.","original_language":"eng","persons":["St-Imier 2023","Workshops"],"tags":["anarchy23","699250216","2023"],"view_count":110,"promoted":false,"date":"2023-07-20T14:00:00.000+02:00","release_date":"2023-10-15T00:00:00.000+02:00","updated_at":"2025-12-26T22:15:04.584+01:00","length":2361,"duration":2361,"thumb_url":"https://static.media.ccc.de/media/contributors/anarchy23/699250216-96021566-1143-5562-89bc-68747cfdfaed.jpg","poster_url":"https://static.media.ccc.de/media/contributors/anarchy23/699250216-96021566-1143-5562-89bc-68747cfdfaed_preview.jpg","timeline_url":"https://static.media.ccc.de/media/contributors/anarchy23/699250216-96021566-1143-5562-89bc-68747cfdfaed.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/contributors/anarchy23/699250216-96021566-1143-5562-89bc-68747cfdfaed.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/how-could-we-win-strategies-for-contemporary-anarchism","url":"https://api.media.ccc.de/public/events/96021566-1143-5562-89bc-68747cfdfaed","conference_title":"Anarchy 2023","conference_url":"https://api.media.ccc.de/public/conferences/anarchy23","related":[]},{"guid":"a7fd3f93-ee2a-557a-8517-eb18595d0e2c","title":"How to fuzz an FPGA – My experience documenting Gowin FPGAs","subtitle":null,"slug":"rc3-739325-how_to_fuzz_an_fpga_my_experience_documenting_gowin_fpgas","link":"https://cfp.chaoszone.cz/csr20/talk/ER3K98/","description":"Over the last few years yosys and nextpnr have gained traction with a fully open source flow for Latice iCE40 and ECP5 FPGAs, with several efforts for other FPGAs on the way. In this talk I will share my work on Gowin FPGAs, and explain key concepts needed to contribute to more widely supported FOSS tools.","original_language":"eng","persons":["Pepijn de Vos"],"tags":["rc3-chaoszone","79","2020","ChaosZone"],"view_count":899,"promoted":false,"date":"2020-12-29T17:00:00.000+01:00","release_date":"2021-01-01T00:00:00.000+01:00","updated_at":"2026-03-31T19:45:05.134+02:00","length":2318,"duration":2318,"thumb_url":"https://static.media.ccc.de/media/events/rc3/79-a7fd3f93-ee2a-557a-8517-eb18595d0e2c.jpg","poster_url":"https://static.media.ccc.de/media/events/rc3/79-a7fd3f93-ee2a-557a-8517-eb18595d0e2c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/rc3/79-a7fd3f93-ee2a-557a-8517-eb18595d0e2c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/rc3/79-a7fd3f93-ee2a-557a-8517-eb18595d0e2c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/rc3-739325-how_to_fuzz_an_fpga_my_experience_documenting_gowin_fpgas","url":"https://api.media.ccc.de/public/events/a7fd3f93-ee2a-557a-8517-eb18595d0e2c","conference_title":"Remote Chaos Experience","conference_url":"https://api.media.ccc.de/public/conferences/rc3","related":[]},{"guid":"3a9b969c-6620-54a2-8fdc-cd1915779bcb","title":"Die Cloud hat Open Source gefressen","subtitle":null,"slug":"fossgis2021-9013-die-cloud-hat-open-source-gefressen","link":"https://pretalx.com/fossgis2021/talk/WSUSUX/","description":"Das Open Source Core Lizenzmodell scheitert an der Cloud. Was nun? Hintergründe zu Open Source Lizenz- und Geschäftsmodellen.\n\nLetztes Beispiel eines gescheiterten Open Source Core Lizenzmodells in der Geowelt (zum Zeitpunkt der Einreichung) ist der Rückzug von MapBox. Gerade grundlegende Open Source Projekte haben es schwer, ein Geschäftsmodell jenseits der proprietären Lizenz zu finden. Woran liegt das und was können wir tun?","original_language":"deu","persons":["Arnulf Christl"],"tags":["fossgis2021","9013","2021","Neuigkeiten aus den Open-Source-Projekten","Geo","OpenStreeetMap","FOSS","Online"],"view_count":660,"promoted":false,"date":"2021-06-07T10:15:00.000+02:00","release_date":"2021-06-08T00:00:00.000+02:00","updated_at":"2026-03-25T06:45:04.225+01:00","length":327,"duration":327,"thumb_url":"https://static.media.ccc.de/media/events/fossgis/2021/9013-3a9b969c-6620-54a2-8fdc-cd1915779bcb.jpg","poster_url":"https://static.media.ccc.de/media/events/fossgis/2021/9013-3a9b969c-6620-54a2-8fdc-cd1915779bcb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/fossgis/2021/9013-3a9b969c-6620-54a2-8fdc-cd1915779bcb.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/fossgis/2021/9013-3a9b969c-6620-54a2-8fdc-cd1915779bcb.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fossgis2021-9013-die-cloud-hat-open-source-gefressen","url":"https://api.media.ccc.de/public/events/3a9b969c-6620-54a2-8fdc-cd1915779bcb","conference_title":"FOSSGIS 2021","conference_url":"https://api.media.ccc.de/public/conferences/fossgis2021","related":[]},{"guid":"f76d61c2-07fe-5dd9-bfef-2b5c81497544","title":"Internet Governance","subtitle":null,"slug":"gpn11-18-internet_governance","link":"https://c3voc.de","description":"Ein Streifzug durch die Geschichte des Internet Governance.","original_language":"deu","persons":["hannes"],"tags":["gpn11","18"],"view_count":19,"promoted":false,"date":"2011-06-25T00:00:00.000+02:00","release_date":"2017-07-13T02:00:00.000+02:00","updated_at":"2025-06-22T11:00:03.832+02:00","length":4885,"duration":4885,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn11/18-sd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn11/18-sd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn11/f76d61c2-07fe-5dd9-bfef-2b5c81497544-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn11/f76d61c2-07fe-5dd9-bfef-2b5c81497544-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn11-18-internet_governance","url":"https://api.media.ccc.de/public/events/f76d61c2-07fe-5dd9-bfef-2b5c81497544","conference_title":"Gulaschprogrammiernacht 11","conference_url":"https://api.media.ccc.de/public/conferences/gpn11","related":[{"event_id":1198,"event_guid":"import-0776e02dc294b4dfb3","weight":1},{"event_id":1976,"event_guid":"b0167f2efcd6a228","weight":1},{"event_id":2300,"event_guid":"mzNAGavKy2KOcwOjGqC8pw","weight":1},{"event_id":2436,"event_guid":"83b785ad-0882-4552-9ad4-0cde123f3837","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3100,"event_guid":"2791f0ea-dcea-4f04-95b8-743705c03a0c","weight":1},{"event_id":3101,"event_guid":"b5a3f409-0a5e-4cca-ad5a-bd5f2969bbd0","weight":1},{"event_id":3566,"event_guid":"40332b3d-c3b6-5c10-be52-1014af10f5ad","weight":1},{"event_id":3570,"event_guid":"adc46ce2-f407-51b3-8fe9-7cd63d3a290b","weight":1},{"event_id":3581,"event_guid":"9c6d3dca-ef43-548a-97e8-b574b8e08891","weight":1},{"event_id":4087,"event_guid":"820868d1-c4b6-5bfe-8b31-03a617df99e9","weight":1},{"event_id":4088,"event_guid":"448bb3d1-e38f-5599-9959-4b30deb93314","weight":1},{"event_id":4091,"event_guid":"89301773-77c1-5a36-bb6d-63ab391f6d33","weight":1},{"event_id":4099,"event_guid":"5dac22f7-4055-553d-bc6a-9efc80f985dd","weight":1},{"event_id":4104,"event_guid":"be21ba43-d19d-5bc3-a550-b286614e6875","weight":1},{"event_id":4106,"event_guid":"65f9bcd6-5566-56be-ae6b-40ff6c507a9e","weight":1},{"event_id":4107,"event_guid":"b31704da-d9aa-5f59-967c-75cc34986cbf","weight":1},{"event_id":4112,"event_guid":"d1b9bb0a-c04a-541f-9ea3-497c8b53b76d","weight":1},{"event_id":4113,"event_guid":"3c5c1035-ecee-51eb-8122-6e33e8e25d1e","weight":3},{"event_id":4114,"event_guid":"7f94fa5d-97c3-532a-b4c9-cfa00cddab91","weight":1},{"event_id":4115,"event_guid":"f83ea741-df6d-5ca3-8869-43d3ba51bd8e","weight":2},{"event_id":4116,"event_guid":"4ac9fd4c-c351-55c8-bac6-1bb16a5bb44e","weight":1},{"event_id":4123,"event_guid":"9eaf7e5d-9802-5e62-8ef3-31565134237f","weight":1},{"event_id":4125,"event_guid":"897bb094-af65-54c8-bb30-4e8a6d4aef0b","weight":1},{"event_id":4760,"event_guid":"b14c9516-d104-465e-8c7c-b2eae5d31f5a","weight":1}]},{"guid":"f46ac468-11dc-5ca1-b4ec-155c61a6c6a0","title":"Klimagerechte Rohstoffwende","subtitle":null,"slug":"bitsundbaeume-19921-klimagerechte-rohstoffwende","link":"https://fahrplan22.bits-und-baeume.org/bitsundbaeume/talk/HESEH9/","description":"Angeblich ist der Ausbau der Erneuerbaren Treiber des Ausbaus von Bergbau? Wir werfen einen genaueren Blick auf die Verbräuche und zeigen auf, wie eine Rohstoffwende sowohl Energie- als auch Mobilitätswende mitdenken kann.\n\nSogenannte grüne Technologien wie Windkraft- oder PV-Anlagen sowie Elektromobilität benötigen metallische Rohstoffe. Viele Studien prognostizieren einen Anstieg des Bergbaus. Dieser ist sehr stark mit negativen Auswirkungen für Menschen, Umwelt und Klima verbunden. Wir schauen uns daher an, welche Sektoren sind Treiber für den Metallverbrauch? Wie kann eine Reduktion von Bergbau bei gleichzeitigem Ausbau von Erneuerbaren gelingen?","original_language":"deu","persons":["Michael Reckordt"],"tags":["bub2022","19921","2022","Ökonomie und Ressourcen"],"view_count":80,"promoted":false,"date":"2022-10-02T13:10:00.000+02:00","release_date":"2022-10-02T00:00:00.000+02:00","updated_at":"2025-12-07T18:45:05.356+01:00","length":2464,"duration":2464,"thumb_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/19921-f46ac468-11dc-5ca1-b4ec-155c61a6c6a0.jpg","poster_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/19921-f46ac468-11dc-5ca1-b4ec-155c61a6c6a0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/19921-f46ac468-11dc-5ca1-b4ec-155c61a6c6a0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/19921-f46ac468-11dc-5ca1-b4ec-155c61a6c6a0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/bitsundbaeume-19921-klimagerechte-rohstoffwende","url":"https://api.media.ccc.de/public/events/f46ac468-11dc-5ca1-b4ec-155c61a6c6a0","conference_title":"Bits \u0026 Bäume 2022","conference_url":"https://api.media.ccc.de/public/conferences/bub2022","related":[]},{"guid":"77bac9c8-c792-43e3-aff3-0b4db8213340","title":"Automatische Gesichtserkennung: Braucht es ein nationales Verbot?","subtitle":null,"slug":"dgwk2024-56184-automatische-gesichtserke","link":"https://winterkongress.ch/2024/talks/automatische_gesichtserkennung_braucht_es_ein_nationales_verbot/","description":"Die Kampagne «Gesichtserkennung stoppen», die am Winterkongress 2021 lanciert wurde, führte in mehreren Städten und Kantonen zu Verboten biometrischer Massenüberwachung. Auch auf europäischer Ebene wird im Rahmen des «AI Act» ein solches Verbot verhandelt. Sollen wir jetzt ein Verbot auf nationaler Ebene fordern? Oder riskieren wir mit einem Gesetz, diese Überwachung überhaupt erst zu ermöglichen? Podiumsdiskussion: Nationalrätin Marionna Schlatter (Grüne), Prof. Dr. Monika Simmler (Uni St. Gallen) und Estelle Pannatier (AlgorithmWatch CH). Moderation: Patrick Walder (Amnesty International)\n\nDie Kampagne «Gesichtserkennung stoppen» führte zu Erfolgen: Verbote von Gesichtserkennung im öffentlichen Raum in mehreren Städten und Kantonen sind bereits beschlossen oder in Diskussion. Und laut smartvote-Umfrage vor den eidgenössischen Wahlen, ist die klare Mehrheit der Kandidierende für ein Verbot. Wie können wir den Einsatz dieser Überwachung am besten verhindern? Podiumsdiskussion mit Q\u0026A, organisiert von AlgorithmWatch CH, Amnesty International und Digitale Gesellschaft","original_language":"deu","persons":["Patrick Walder","Estelle Pannatier","Marionna Schlatter","Monika Simmler"],"tags":["import","56184","2024","Recht \u0026 Politik"],"view_count":87,"promoted":false,"date":"2024-03-02T13:00:00.000+01:00","release_date":"2024-03-08T00:00:00.000+01:00","updated_at":"2026-03-30T11:45:05.816+02:00","length":2691,"duration":2691,"thumb_url":"https://static.media.ccc.de/media/conferences/dgwk/2024/56184-77bac9c8-c792-43e3-aff3-0b4db8213340.jpg","poster_url":"https://static.media.ccc.de/media/conferences/dgwk/2024/56184-77bac9c8-c792-43e3-aff3-0b4db8213340_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/dgwk/2024/56184-77bac9c8-c792-43e3-aff3-0b4db8213340.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/dgwk/2024/56184-77bac9c8-c792-43e3-aff3-0b4db8213340.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/dgwk2024-56184-automatische-gesichtserke","url":"https://api.media.ccc.de/public/events/77bac9c8-c792-43e3-aff3-0b4db8213340","conference_title":"Winterkongress 2024","conference_url":"https://api.media.ccc.de/public/conferences/dgwk2024","related":[]},{"guid":"9a3c1186-10d6-4959-9b51-cadfdff585de","title":"TVLuke über Geschichte(n) erzählen [Fünf-Minuten-Termine]","subtitle":"","slug":"chaotikum-geschichten-erzaehlen","link":"chaotikum.org","description":"TVLuke hat einen Twitter-Bot geschrieben, der z.B. geschichtliche Ereignisse in komprimierter Form wiedergeben kann. Dabei hat er sich ein wenig Gedanken darüber gemacht, wie man Geschichten auf Twitter überhaupt erzählen will.  Der Code zum Bot liegt unter https://git.chaotikum.org/twistory/twistory-bot Ein Vortrag im Rahmen der Fünf-Minuten-Termine at Home. Die Idee ist eigentlich einfach: An jedem vierten Mittwoch des Monats nutzen wir das volle Haus zum Open Space / Chaostreff und jede Person, die möchte, kann kurz vorstellen, was auch immer ihr vorschwebt. Diesmal wegen Corona-Krise von Zuhause.","original_language":"deu","persons":["TVLuke"],"tags":["chaotikum","64","2020","augenpruefraum"],"view_count":63,"promoted":false,"date":"2020-04-22T21:00:00.000+02:00","release_date":"2020-12-14T00:00:00.000+01:00","updated_at":"2024-04-16T17:15:07.524+02:00","length":333,"duration":333,"thumb_url":"https://static.media.ccc.de/media/regional/luebeck/chaotikum/64-hd.jpg","poster_url":"https://static.media.ccc.de/media/regional/luebeck/chaotikum/64-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/luebeck/chaotikum/64-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/luebeck/chaotikum/64-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/chaotikum-geschichten-erzaehlen","url":"https://api.media.ccc.de/public/events/9a3c1186-10d6-4959-9b51-cadfdff585de","conference_title":"Chaotikum","conference_url":"https://api.media.ccc.de/public/conferences/chaotikum","related":[]},{"guid":"471420c9-3ba2-5cea-a4f6-e37768bb4258","title":"The Future of Invention","subtitle":null,"slug":"emf2018-82-the-future-of-invention","link":"https://c3voc.de","description":"Advances in NLP and machine learning are allowing automatic processing of knowledge. An untapped potential of this revolution is the augmentation and possible automation of the invention process. \n\nEveryone has a perception of an inventor as a crazy guy in a shed who is somehow, suddenly inspired. I would like to challenge this view by exploring the process of famous historical inventors to present day inventors and disruptors to give an understanding of how novel ideas come about, before moving onto what invention might look like in the future.\n\nIn particular, I would like to share a vision of AI augmented inventors and what this will mean for the democratisation of invention, drawing on my experience as a modern inventor with example patents and progress that has been made so far using new approaches.  \n\n\nAdvances in NLP and machine learning are allowing automatic processing of knowledge. An untapped potential of this revolution is the augmentation and possible automation of the invention process. \n\nEveryone has a perception of an inventor as a crazy guy in a shed who is somehow, suddenly inspired. I would like to challenge this view by exploring the process of famous historical inventors to present day inventors and disruptors to give an understanding of how novel ideas come about, before moving onto what invention might look like in the future.\n\nIn particular, I would like to share a vision of AI augmented inventors and what this will mean for the democratisation of invention, drawing on my experience as a modern inventor with example patents and progress that has been made so far using new approaches.  \n","original_language":"eng","persons":["Chris Wright"],"tags":["emf2018","82"],"view_count":56,"promoted":false,"date":"2018-08-31T00:00:00.000+02:00","release_date":"2018-09-01T02:00:00.000+02:00","updated_at":"2025-10-18T17:15:04.258+02:00","length":1591,"duration":1591,"thumb_url":"https://static.media.ccc.de/media/events/emf/2018/82-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2018/82-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2018/471420c9-3ba2-5cea-a4f6-e37768bb4258-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2018/471420c9-3ba2-5cea-a4f6-e37768bb4258-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2018-82-the-future-of-invention","url":"https://api.media.ccc.de/public/events/471420c9-3ba2-5cea-a4f6-e37768bb4258","conference_title":"Electromagnetic Field 2018","conference_url":"https://api.media.ccc.de/public/conferences/emf2018","related":[{"event_id":5833,"event_guid":"57c53ddd-36aa-5578-80e2-44d85a51a172","weight":1},{"event_id":5839,"event_guid":"fd6ba9b5-4482-5a6d-ab8f-6e128ecd1b4b","weight":2},{"event_id":5840,"event_guid":"5765a692-a730-5704-aa41-9b14d40a55fe","weight":2},{"event_id":5846,"event_guid":"8ce0a3d6-ed6b-5832-9c59-7db20a3158ad","weight":2},{"event_id":5847,"event_guid":"7651c657-a86b-5de8-a82a-6d0f8a5eef8c","weight":2},{"event_id":5850,"event_guid":"75ce0be1-9882-5bba-b1d7-8a20cdeac639","weight":1},{"event_id":5855,"event_guid":"727edb06-a061-5f61-9ae8-52d12e0720e4","weight":2},{"event_id":5858,"event_guid":"4339da85-f3d3-559d-8e1f-d7d0f93708f6","weight":2},{"event_id":5859,"event_guid":"792c26ac-4163-5255-8f45-6dfb89bb8f08","weight":2},{"event_id":5861,"event_guid":"f330ec40-7092-5614-8472-084ddd863402","weight":1},{"event_id":5862,"event_guid":"ede0cf3c-7349-5c9d-875f-2a4e48e58b42","weight":2},{"event_id":5863,"event_guid":"42163914-9c80-5fdb-b322-eefd772041c6","weight":3},{"event_id":5866,"event_guid":"9fd35e81-99c9-5a4c-baa4-eb75e8ddc571","weight":2},{"event_id":5867,"event_guid":"1b2fc0eb-7735-5586-8efb-2295d4cfd35b","weight":1},{"event_id":5870,"event_guid":"418a46d9-8acb-5030-9e94-6394a0c65dbd","weight":1},{"event_id":5871,"event_guid":"8ddfba5f-ae64-5d76-a1ba-67f420e6731e","weight":1},{"event_id":5878,"event_guid":"345f57b7-c955-51ab-a19d-2f4d5dd63932","weight":2},{"event_id":5882,"event_guid":"5d51e9a5-ea43-5c16-b3e3-ca9d44f95795","weight":3},{"event_id":5883,"event_guid":"eb2bb4b6-8954-59fc-88df-0335068cfc04","weight":1},{"event_id":5886,"event_guid":"02a6d145-4bec-5664-9861-387e528808cb","weight":2},{"event_id":5894,"event_guid":"b77fbaf6-e8f1-5224-a941-fad004514dac","weight":1},{"event_id":5898,"event_guid":"75d5f015-a01c-5ca9-a009-313702fa88ba","weight":3},{"event_id":5903,"event_guid":"cef28a66-1a2a-55af-a9a1-b82aefcc672e","weight":1},{"event_id":5905,"event_guid":"18cc30cd-1e8c-5215-8b37-3ef5ef858361","weight":2},{"event_id":5911,"event_guid":"734952f2-9c9a-52db-9067-b804f112156d","weight":1},{"event_id":5913,"event_guid":"996785ea-5073-5ce6-9ee5-702840d83eee","weight":2},{"event_id":5915,"event_guid":"912b0562-9d53-5815-b992-5af4a1253faa","weight":3},{"event_id":5917,"event_guid":"50e2efb7-6d8b-5043-b60c-260cb7cb22d9","weight":2},{"event_id":5928,"event_guid":"f6d18214-6800-5121-a454-4eba2b15251e","weight":1},{"event_id":5941,"event_guid":"bf3544cc-06a2-5ca2-8a0d-b1d2155092eb","weight":3}]},{"guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","title":"Lockpicking and IT Security","subtitle":null,"slug":"SHA2017-25-lockpicking_and_it_security","link":"https://c3voc.de","description":"What do design flaws, implementation errors, 0days etc. look like in physical locks?\n#PhysicalSecurity #Software","original_language":"eng","persons":["Walter Belgers"],"tags":["SHA2017","25"],"view_count":1206,"promoted":false,"date":"2017-08-08T00:00:00.000+02:00","release_date":"2017-08-08T02:00:00.000+02:00","updated_at":"2026-04-08T22:45:05.025+02:00","length":3490,"duration":3490,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/25-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/25-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/22c3d7ca-e490-40d1-b0e4-d321392d53ad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/22c3d7ca-e490-40d1-b0e4-d321392d53ad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-25-lockpicking_and_it_security","url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":14},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":42},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":31},{"event_id":4293,"event_guid":"dd774554-e12d-4557-b91c-3f6039cd4aeb","weight":19},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":16},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":188},{"event_id":4344,"event_guid":"e856b1b3-ac67-42a4-ab7a-50a8d58d413e","weight":22},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":149},{"event_id":4352,"event_guid":"05007c06-fc8b-468a-b1e9-b4ff9ec8149e","weight":33},{"event_id":4353,"event_guid":"24d83f1e-e578-413a-b406-1dd2244c90fd","weight":14},{"event_id":4355,"event_guid":"0f3f0964-b30e-46a3-83e8-2f426ab59bfc","weight":17},{"event_id":4360,"event_guid":"159484b6-5989-4e61-b0bb-20f12a8b65d1","weight":15},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":48},{"event_id":4362,"event_guid":"67b3b3d4-6098-4694-896c-3e6f76b400d7","weight":41},{"event_id":4363,"event_guid":"6b3c4c2a-45ab-445d-bfc1-8989775235a4","weight":18},{"event_id":4364,"event_guid":"18911a7a-2c27-419e-86c4-4b4878991379","weight":33},{"event_id":4365,"event_guid":"7b8075fb-aafa-4037-beb9-168b5461c831","weight":19},{"event_id":4367,"event_guid":"f284b8f1-f27b-466e-9084-c3de794f8fd3","weight":38},{"event_id":4369,"event_guid":"5f25fc58-113d-4605-9fc0-9e98407cd9a3","weight":19},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":15},{"event_id":4371,"event_guid":"509a87d3-75dd-4ea1-b2ca-79b03ff90749","weight":18},{"event_id":4372,"event_guid":"01d07c5c-8a4e-4dbf-acf5-126d738a1ddf","weight":23},{"event_id":4373,"event_guid":"ce865c40-0cce-4ad5-9c51-f4f1d4aea377","weight":20}]},{"guid":"9e0065b6-d49e-4bad-b8e5-0a9fd7e8bed7","title":"DNSSEC","subtitle":null,"slug":"froscon2016-1710-dnssec","link":null,"description":"Mit DNSSEC wurde eine Möglichkeit geschaffen, DNS-Einträge zu\nauthentisieren. Heute ist diese Erweiterung weit verfügbar, zum\nBeispiel auch für .de und .org Domains.\n\nIn diesem Vortrag wird die grundsätzliche Funktionalität von DNSSEC\nvorgestellt und folgende Fragen beantwortet: Wie sieht eine so\ngeschützte Zone aus? Woher kommt die Sicherheit? Was kann DNSSEC nicht\nleisten? Welche neuen Anwendungen (DANE) ergeben sich daraus für das\nDomain-Name-System?\n\nZum Schluss geht der Vortrag auch darauf ein, wie DNSSEC in der Praxis\nfür den einzelnen aussehen kann -- sowohl als Konsument als auch auf\nder Serverseite.","original_language":"deu","persons":["Christoph Egger"],"tags":["Security"],"view_count":262,"promoted":false,"date":"2016-08-21T15:15:00.000+02:00","release_date":"2016-08-21T02:00:00.000+02:00","updated_at":"2026-01-04T19:00:21.519+01:00","length":2741,"duration":2741,"thumb_url":"https://static.media.ccc.de/media/events/froscon/2016/1710-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/froscon/2016/1710-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/froscon/2016/9e0065b6-d49e-4bad-b8e5-0a9fd7e8bed7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/froscon/2016/9e0065b6-d49e-4bad-b8e5-0a9fd7e8bed7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/froscon2016-1710-dnssec","url":"https://api.media.ccc.de/public/events/9e0065b6-d49e-4bad-b8e5-0a9fd7e8bed7","conference_title":"FrOSCon 2016","conference_url":"https://api.media.ccc.de/public/conferences/froscon2016","related":[{"event_id":2013,"event_guid":"_1gVt5y_RrWJMx4P36Virw","weight":3},{"event_id":2326,"event_guid":"870e6541-0633-4a92-a1a6-7f9b5480c838","weight":11},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":3},{"event_id":3418,"event_guid":"e22d9cbc-8dfe-4b87-a0e0-56fb76a62511","weight":3},{"event_id":3424,"event_guid":"915aced0-8526-4087-b0c3-769710ef6322","weight":4},{"event_id":3429,"event_guid":"34a5d181-732f-483a-a40c-f41620357465","weight":5},{"event_id":3436,"event_guid":"bff919d7-0756-4e00-9901-9f9311415f9a","weight":3},{"event_id":3438,"event_guid":"ec1ceb0a-9da3-44f1-bf23-00c1d52486ff","weight":4},{"event_id":3442,"event_guid":"b467ea0d-15c2-4e1b-a430-fc3ee9be445f","weight":5},{"event_id":3472,"event_guid":"4a8e6448-b1c5-4e63-8661-f23c835f04df","weight":12}]},{"guid":"f3c974f2-52c2-54e1-a69a-069c4ffec695","title":"Die Geschichte der rotierenden Prefixe","subtitle":null,"slug":"denog10-20-die-geschichte-der-rotierenden-prefixe","link":"https://cfp.denog.de/denog10/talk/QBFXQG","description":"Customers get dynamic prefixes for outgoing connections and a static one for self hosting. This talk is about how it works and what the practical experiences are.\n\nThe old project[1] is not dead. Let's talk about the new developments.\n\n1 https://lutz.donnerhacke.de/Blog/Datenschutzfreundliches-IPv6-ueber-PPP-mit-der-FritzBox","original_language":"eng","persons":["Lutz Donnerhacke"],"tags":["denog10","20"],"view_count":295,"promoted":false,"date":"2018-11-22T00:00:00.000+01:00","release_date":"2018-11-22T01:00:00.000+01:00","updated_at":"2025-11-17T17:45:03.923+01:00","length":705,"duration":705,"thumb_url":"https://static.media.ccc.de/media/events/denog/denog10/20-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/denog/denog10/20-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/denog/denog10/f3c974f2-52c2-54e1-a69a-069c4ffec695-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/denog/denog10/f3c974f2-52c2-54e1-a69a-069c4ffec695-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/denog10-20-die-geschichte-der-rotierenden-prefixe","url":"https://api.media.ccc.de/public/events/f3c974f2-52c2-54e1-a69a-069c4ffec695","conference_title":"DENOG 10","conference_url":"https://api.media.ccc.de/public/conferences/denog10","related":[{"event_id":6333,"event_guid":"c7ce944c-dedc-55b0-b5fa-8f3ca1236695","weight":14},{"event_id":6336,"event_guid":"535ef03a-4e9c-5364-8a9c-60cd995b7067","weight":17},{"event_id":6337,"event_guid":"c8f76b25-20e6-5083-9cc0-ca99eec81eb6","weight":18},{"event_id":6338,"event_guid":"34449bcc-efc3-5c53-8723-887ae2c632a8","weight":13},{"event_id":6339,"event_guid":"e323a8be-0bc6-553f-b54b-2ffc0b226c12","weight":28},{"event_id":6340,"event_guid":"95aab8ea-e8ec-539f-9e96-b31da306f682","weight":25},{"event_id":6342,"event_guid":"8340fbc9-2735-5560-b3f4-ac36f8f5a35d","weight":22},{"event_id":6343,"event_guid":"b05a50fb-0f40-52a1-8f39-ebbca73564c2","weight":21},{"event_id":6346,"event_guid":"7c795e89-1cb5-500e-9299-c2896391959f","weight":14},{"event_id":6347,"event_guid":"36f3330d-6ed9-5f33-9a32-a2897c1c7631","weight":12},{"event_id":6348,"event_guid":"68bfa511-4aab-510b-a631-aa515976841e","weight":31},{"event_id":6349,"event_guid":"9b14c4bd-ae07-514c-9145-3db405b27a89","weight":11},{"event_id":6350,"event_guid":"6053cc14-64d3-556e-93e0-543a5458cb29","weight":46},{"event_id":6353,"event_guid":"d6500362-96db-5451-a0db-769560a1624b","weight":15}]},{"guid":"bd5b4445-87ae-5692-ba3d-526849e8fe70","title":"DB Schnüffelnavigator","subtitle":null,"slug":"camp2023-57089-db_schnueffelnavigator","link":"https://pretalx.c3voc.de/camp2023/talk/9FSGY8/","description":"Die Bahn-App „DB Navigator” ist voll mit Trackern. Digitalcourage klagt zusammen mit IT-Sicherheitsexperten Mike Kuketz und dem Fachanwalt für Datenschutz Peter Hense dagegen. Denn wir wollen Bahn fahren – nicht Daten liefern.\n\nIm Talk werfen wir einen Blick auf den DB Navigator und den bisherigen Verlauf der Klage und erklären, warum solche Klagen viel für die Allgemeinheit bringen können.","original_language":"deu","persons":["Julia Witte"],"tags":["camp2023","57089","2023","Digitalcourage",""],"view_count":7730,"promoted":false,"date":"2023-08-16T21:00:00.000+02:00","release_date":"2023-08-18T00:00:00.000+02:00","updated_at":"2026-04-13T08:30:04.793+02:00","length":2216,"duration":2216,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2023/57089-bd5b4445-87ae-5692-ba3d-526849e8fe70.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2023/57089-bd5b4445-87ae-5692-ba3d-526849e8fe70_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2023/57089-bd5b4445-87ae-5692-ba3d-526849e8fe70.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2023/57089-bd5b4445-87ae-5692-ba3d-526849e8fe70.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/camp2023-57089-db_schnueffelnavigator","url":"https://api.media.ccc.de/public/events/bd5b4445-87ae-5692-ba3d-526849e8fe70","conference_title":"Chaos Communication Camp 2023","conference_url":"https://api.media.ccc.de/public/conferences/camp2023","related":[]},{"guid":"3d7c3c13-7e31-11e5-b91e-d53e0c381d65","title":"Buffering Sucks","subtitle":"","slug":"denog7-2015-4-Buffering_Sucks","link":"","description":"\u003cp\u003eCurrent status of Peering, Interconnection, Regulation, CDN Netneutralitiy. How you can help to minimize buffering and make your end-customer happy. Update of Init7 vs. the Big Ones. Why we do it. Status of the interconnection case pending at the Swiss regulator.\u003c/p\u003e","original_language":"eng","persons":["Fredy Künzler"],"tags":["DENOG"],"view_count":747,"promoted":false,"date":null,"release_date":"2015-11-09T01:00:00.000+01:00","updated_at":"2025-11-28T01:15:05.543+01:00","length":2196,"duration":2196,"thumb_url":"https://static.media.ccc.de/media/events/denog/denog7/4-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/denog/denog7/4-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/denog/denog7/3d7c3c13-7e31-11e5-b91e-d53e0c381d65-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/denog/denog7/3d7c3c13-7e31-11e5-b91e-d53e0c381d65-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/denog7-2015-4-Buffering_Sucks","url":"https://api.media.ccc.de/public/events/3d7c3c13-7e31-11e5-b91e-d53e0c381d65","conference_title":"DENOG7","conference_url":"https://api.media.ccc.de/public/conferences/denog7","related":[{"event_id":2378,"event_guid":"213f5667-d2b5-4f7c-b3f7-90ef3f6322a0","weight":2},{"event_id":2766,"event_guid":"3d7c49e7-7e31-11e5-b91e-b21625562c7b","weight":3},{"event_id":2773,"event_guid":"3d7c46bd-7e31-11e5-b91e-d5b71048004c","weight":2},{"event_id":2774,"event_guid":"3d7c45af-7e31-11e5-b91e-84b7d9780b35","weight":5},{"event_id":2775,"event_guid":"3d7c4060-7e31-11e5-b91e-c23ca85e9bc3","weight":2},{"event_id":2776,"event_guid":"3d7c416e-7e31-11e5-b91e-f1d2b07f83cb","weight":2},{"event_id":2777,"event_guid":"3d7c3f51-7e31-11e5-b91e-e74da05edcc2","weight":2},{"event_id":2778,"event_guid":"3d7c4272-7e31-11e5-b91e-aaaeb62766e3","weight":3},{"event_id":2955,"event_guid":"c3731bcd-04a8-49ba-a472-d1180944c106","weight":6},{"event_id":3586,"event_guid":"cd6ab67f-ea8b-5119-af38-ba7c308f8da2","weight":3},{"event_id":3774,"event_guid":"a26a0d23-549d-5bd6-8f1e-9803628d5850","weight":4},{"event_id":4389,"event_guid":"91d3f23c-ef7a-45d9-9e26-a5df4f19b130","weight":2},{"event_id":4645,"event_guid":"f0851394-22b0-440c-aafc-e8690fc1cf51","weight":2}]},{"guid":"import-0cbc51129c41c14879","title":"LiMux: freie Software und offene Standards in München","subtitle":null,"slug":"EH2010-3784-de-limux","link":"http://eh2010.muc.ccc.de/fahrplan/events/3784.en.html","description":"Die Landeshauptstadt München setzt mit dem Projekt LiMux auf freie Software für ihre 15.000 Arbeitsplatzrechner.\nDem erfolgreich abgeschlossenen Umstieg auf OpenOffice.org folgt seit 2010 der Flächenrollout des Linuxclients. Herausforderungen sind die Integration in heterogene IT-Strukturen, die Verfügbarkeit von Fachanwendungen und die Optimierung des Releaseprozesses. Der Schwerpunkt liegt dabei auf der Integration der Dienststellen in das Anforderungsmanagement und die Testphasen.\n","original_language":"eng","persons":["Florian Schießl"],"tags":["eh2010"],"view_count":170,"promoted":false,"date":"2010-04-02T02:00:00.000+02:00","release_date":"2010-04-20T02:00:00.000+02:00","updated_at":"2023-12-19T07:45:02.488+01:00","length":3694,"duration":3694,"thumb_url":"https://static.media.ccc.de/media/conferences/eh2010/EH2010-3784-de-limux.jpg","poster_url":"https://static.media.ccc.de/media/conferences/eh2010/EH2010-3784-de-limux_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/eh2010/import-0cbc51129c41c14879-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/eh2010/import-0cbc51129c41c14879-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/EH2010-3784-de-limux","url":"https://api.media.ccc.de/public/events/import-0cbc51129c41c14879","conference_title":"Easterhegg 2010","conference_url":"https://api.media.ccc.de/public/conferences/eh2010","related":[{"event_id":202,"event_guid":"import-ee4e2da9f8579fe7e5","weight":2},{"event_id":205,"event_guid":"import-17e2f2334e694b4d28","weight":4},{"event_id":210,"event_guid":"import-c21113759a7e94d624","weight":2}]},{"guid":"7e4ff2e4-ae05-4473-bbd1-5074c4807aca","title":"Azure networking integration challenges","subtitle":null,"slug":"ASG2017-93-azure_networking_integration_challenges","link":"https://c3voc.de","description":"The introduction on Accelerated Networking on Azure created challenges integrating support in Linux distributions. The original method using bonding had issues that were solved by introducing a new mode called \"Transparent VF\". This mode solves issues with udev, cloudinit and distribution specific network initialization. This talk will also cover the process of how Linux support for Azure is integrated with upstreamand distributions.","original_language":"eng","persons":["Stephen Hemminger"],"tags":["ASG2017","93"],"view_count":81,"promoted":false,"date":"2017-10-21T00:00:00.000+02:00","release_date":"2017-10-21T02:00:00.000+02:00","updated_at":"2025-07-20T20:30:04.288+02:00","length":1755,"duration":1755,"thumb_url":"https://static.media.ccc.de/media/events/all_systems_go/2017/93-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/all_systems_go/2017/93-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/all_systems_go/2017/7e4ff2e4-ae05-4473-bbd1-5074c4807aca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/all_systems_go/2017/7e4ff2e4-ae05-4473-bbd1-5074c4807aca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ASG2017-93-azure_networking_integration_challenges","url":"https://api.media.ccc.de/public/events/7e4ff2e4-ae05-4473-bbd1-5074c4807aca","conference_title":"All Systems Go! 2017","conference_url":"https://api.media.ccc.de/public/conferences/asg2017","related":[{"event_id":4632,"event_guid":"caeece7b-a23c-4863-ba1b-f3cdde62a1b3","weight":5},{"event_id":4637,"event_guid":"2e65bd62-4bcd-4501-80f4-e0a9fe375ba7","weight":4},{"event_id":4638,"event_guid":"4701a208-608c-44b7-ad04-5d708cc347da","weight":4},{"event_id":4640,"event_guid":"673928f6-6777-4da7-aac3-e36dfea16063","weight":13},{"event_id":4644,"event_guid":"b607796c-ce58-43ee-afbd-f5fe2008ac66","weight":5},{"event_id":4650,"event_guid":"ce9a7617-e017-4aa5-a712-794536501848","weight":4},{"event_id":4659,"event_guid":"92f88662-abe1-4083-b9c1-e1f124f19d2c","weight":4},{"event_id":4662,"event_guid":"49a6ce08-7503-47f3-af1a-b14520f1e1f2","weight":4},{"event_id":4674,"event_guid":"22578f18-885b-4dce-a952-32ea3973ca15","weight":4},{"event_id":4676,"event_guid":"a3898a69-9035-48ec-8389-5ac7b3f12e7f","weight":4},{"event_id":4677,"event_guid":"27118229-ee0d-4edd-9771-9858ae27222b","weight":7},{"event_id":4682,"event_guid":"205cb3b4-7d5d-40b6-81c6-9d4da046b47d","weight":4}]},{"guid":"6d62f4e7-ffb0-5409-adb8-acfb25b5d468","title":"Maintainable Embedded Linux Solutions","subtitle":null,"slug":"eh21-60-maintainable-embedded-linux-solutions","link":"https://fahrplan.eh21.easterhegg.eu/eh/talk/VNAD9N/","description":"Today, two common approaches for building embedded Linux solutions are in use.\n\nMany hobby projects start from a distribution like Raspberry Pi OS, and implement the solution in a running system, resulting in a tightly coupled and not reusable implementation.\n\nCommercial development often starts from distribution build toolkits like Yocto or Buildroot. These tools allow to build an optimized solution from source, but do not provide good solutions for keeping the solution secure.\n\nTools like elbe-rfs allow a third approach. They enable building a custom embedded solution from well maintained binary packages, while separating the solution form the base. This approach helps hobbyists and small teams to develop more optimized, reusable and long term maintainable embedded Linux solutions with limited effort.","original_language":"eng","persons":["Thomas Irgang","Simone Weiß"],"tags":["eh21","60","2024"],"view_count":242,"promoted":false,"date":"2024-03-31T13:30:00.000+02:00","release_date":"2024-03-31T00:00:00.000+01:00","updated_at":"2026-03-27T10:15:04.782+01:00","length":3454,"duration":3454,"thumb_url":"https://static.media.ccc.de/media/conferences/eh2024/60-6d62f4e7-ffb0-5409-adb8-acfb25b5d468.jpg","poster_url":"https://static.media.ccc.de/media/conferences/eh2024/60-6d62f4e7-ffb0-5409-adb8-acfb25b5d468_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/eh2024/60-6d62f4e7-ffb0-5409-adb8-acfb25b5d468.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/eh2024/60-6d62f4e7-ffb0-5409-adb8-acfb25b5d468.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/eh21-60-maintainable-embedded-linux-solutions","url":"https://api.media.ccc.de/public/events/6d62f4e7-ffb0-5409-adb8-acfb25b5d468","conference_title":"Easterhegg 2024: Rabbit Prototyping","conference_url":"https://api.media.ccc.de/public/conferences/eh21","related":[]},{"guid":"import-4a70b3c91995988e51","title":"Post Memory Corruption Memory Analysis","subtitle":"Automating exploitation of invalid memory writes","slug":"28c3-4660-en-post_memory_corruption_memory_analysis","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4660.en.html","description":"Pmcma is a tool aimed at automating the most time consuming taskes of\nexploitation. It for instance determine why an application is triggering\na segmentention fault, evaluate if the faulting instruction can be used\nto write to memory or execute arbitrary code, and list all the function\npointers potentially called from a given point in time by an application.\n\nPmcma is a totally new kind of debugger, which allows for easy\nexperimentation with a process in memory by forcing it to fork. The\nexact replicas of the process created in memory can then be intrumented\nwhile keeping the properties (eg: state of variables, ASLR,\npermissions...) of the original process.\n\nPmcma is an easily extensible framework available under the Apache 2.0\nlicense from http://www.pmcma.org/ .\n","original_language":"eng","persons":["endrazine"],"tags":["28c3"," Hacking"],"view_count":72,"promoted":false,"date":"2011-12-28T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-04-09T10:45:08.803+02:00","length":3763,"duration":3763,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4660-en-post_memory_corruption_memory_analysis_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4660-en-post_memory_corruption_memory_analysis_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-4a70b3c91995988e51-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-4a70b3c91995988e51-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4660-en-post_memory_corruption_memory_analysis","url":"https://api.media.ccc.de/public/events/import-4a70b3c91995988e51","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":1},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":1},{"event_id":1670,"event_guid":"import-eda1ce5993c46fddf0","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1818,"event_guid":"hsTftEgTn8vhPMLEZF2DVA","weight":1},{"event_id":2720,"event_guid":"zboXEMtoT7r3Aurvymmg5Q","weight":1},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":1},{"event_id":4312,"event_guid":"d16501c8-374f-416c-896c-c50daadcc6bc","weight":1},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":1}]},{"guid":"import-d4de5211f99a82e86b","title":"Parabolic Plane Flights – Research in Weightlessness","subtitle":null,"slug":"konferenz_mp6_og_-_2013-07-05_14:00_-_parabolic_plane_flights_research_in_weightlessness_-_dr_jens_hauslage_-_5047","link":"https://sigint.ccc.de/schedule/events/5047.html","description":"In order to investigate the effects of weightlessness on cells, organisms, material, computer systems etc., it is desirable to achieve this condition by Earth-bound devices, since space missions are extremely costly and rarely to obtain. A simple but very effective method is to perform a parabolic flight. Here, the acceleration of the aircraft – flying a parabola - in outward direction compensates the Earthly gravity vector, which points downward. In effect, parabolic flight weightlessness is earned in the upper part of flown parabolas. Some key benefits are, that the proposed experiments can be controlled by the researcher himself right in the course of a flight and that the used experiment facilities are manufactured by the scientist. Thus, one can run an equipment directly from the homelab. Only minimal changes usually have to be done due to flight safety. The topics investigated range from augmented reality based on virtual reality systems to the investigation of gravisensing algae, fungi, plants and animals via material sciences, such as examining the behavior of different melted alloys under microgravity analyzing the emitted light flash during the phase of solidification etc..\nThe proposed talk will give an overview about different parabolic plane flight missions and the nominal process. Building of flight hardware, testing, scientific questions, certification of hardware etc. and also living in the region of Bordeaux for two weeks are facets in a parabolic plane flight campaign.\n","original_language":"eng","persons":["Dr. Jens Hauslage"],"tags":["sigint13"," Science"],"view_count":44,"promoted":false,"date":"2013-07-05T02:00:00.000+02:00","release_date":"2013-07-22T02:00:00.000+02:00","updated_at":"2024-05-20T13:45:04.659+02:00","length":1468,"duration":1468,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint13/konferenz_mp6_og_-_2013-07-05_14:00_-_parabolic_plane_flights_research_in_weightlessness_-_dr_jens_hauslage_-_5047.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint13/konferenz_mp6_og_-_2013-07-05_14:00_-_parabolic_plane_flights_research_in_weightlessness_-_dr_jens_hauslage_-_5047_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint13/import-d4de5211f99a82e86b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint13/import-d4de5211f99a82e86b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/konferenz_mp6_og_-_2013-07-05_14:00_-_parabolic_plane_flights_research_in_weightlessness_-_dr_jens_hauslage_-_5047","url":"https://api.media.ccc.de/public/events/import-d4de5211f99a82e86b","conference_title":"sigint13","conference_url":"https://api.media.ccc.de/public/conferences/sigint13","related":[{"event_id":662,"event_guid":"import-080f507b93b240a5d0","weight":1},{"event_id":664,"event_guid":"import-70c200884c5a8b15b6","weight":1},{"event_id":681,"event_guid":"import-a4488ad1248b1c6017","weight":1},{"event_id":691,"event_guid":"import-e07970a31bd07defcf","weight":1},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":1},{"event_id":4314,"event_guid":"28382535-b6a4-4a6f-9f36-576285a1b1df","weight":1},{"event_id":4588,"event_guid":"75ec22d6-e0ec-54f3-9d7a-965500ee5f77","weight":1},{"event_id":4592,"event_guid":"5b4ae48e-b69e-4724-a02a-923885aeedba","weight":1}]},{"guid":"d1f78c2e-06d2-4160-8f3e-eca8eda55670","title":"Starkes Passwort, sichere Identität","subtitle":null,"slug":"ccchh-extras-56165-starkes-passwort-sich","link":"https://c3voc.de","description":"Digitale Selbstverteidigung (CCCHH) - Passwörter\n\nGute Passwörter schützen unser digitales Leben vor Diebstahl, Missbrauch und Verlust. Aber was genau macht gute Passwörter aus? Und kann ich was falsch machen beim Umgang damit?\nIn diesem Vortrag des Chaos Computer Clubs Hamburg in der Zentralbibliothek erklären wir, wie Kriminelle arbeiten und was das für uns bedeutet. Wir sprechen darüber, welche Regeln bei Erstellung und Umgang mit Passwörtern wichtig sind und welchen Mehrwert Passwortmanager oder 2-Faktor-Authentisierung bieten.","original_language":"deu","persons":["stephanius","w1ntermute","n0th1ng"],"tags":["import","56165","2024"],"view_count":2068,"promoted":false,"date":"2024-01-26T18:00:00.000+01:00","release_date":"2024-02-04T00:00:00.000+01:00","updated_at":"2026-04-12T16:30:05.207+02:00","length":6493,"duration":6493,"thumb_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.jpg","poster_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/ccchh/extras/56165-d1f78c2e-06d2-4160-8f3e-eca8eda55670.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ccchh-extras-56165-starkes-passwort-sich","url":"https://api.media.ccc.de/public/events/d1f78c2e-06d2-4160-8f3e-eca8eda55670","conference_title":"Chaosstudio Hamburg","conference_url":"https://api.media.ccc.de/public/conferences/ccchh-extras","related":[]},{"guid":"069a6809-2727-55c7-b584-03776939ee96","title":"Yew a Rust+WebAssembly framework for client-side web apps","subtitle":null,"slug":"rustfest18-4-yew_a_rust_webassembly_framework_for_client_side_web_apps","link":"https://c3voc.de","description":"This is a talk about the architecture of yew — a Rust framework for frontend development, inspired by Elm and ReactJS and designed for creating single-page webapps with Rust. You will get to know how it was created: wasm compilation issues, JSX-like templates created with a pure Rust macro, how lifetime rules helps to avoid copying of the model, and how to create a framework without a garbage collector to compete in the JavaScript world.","original_language":"eng","persons":["Denis Kolodin"],"tags":["rustfest18","4"],"view_count":431,"promoted":false,"date":"2018-05-26T00:00:00.000+02:00","release_date":"2018-05-26T02:00:00.000+02:00","updated_at":"2025-08-26T17:45:02.768+02:00","length":1819,"duration":1819,"thumb_url":"https://static.media.ccc.de/media/conferences/rustfest/2018/4-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/rustfest/2018/4-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/rustfest/2018/069a6809-2727-55c7-b584-03776939ee96-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/rustfest/2018/069a6809-2727-55c7-b584-03776939ee96-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/rustfest18-4-yew_a_rust_webassembly_framework_for_client_side_web_apps","url":"https://api.media.ccc.de/public/events/069a6809-2727-55c7-b584-03776939ee96","conference_title":"Rustfest 2018 Paris","conference_url":"https://api.media.ccc.de/public/conferences/rustfest18","related":[{"event_id":5545,"event_guid":"33a78b77-a1fa-5bf8-a719-15a8663593dd","weight":15},{"event_id":5548,"event_guid":"1adcd4eb-7655-5f62-9917-add6bf2b2eee","weight":20},{"event_id":5549,"event_guid":"7c66d3ba-35e9-52ed-9cdd-6266ee1ca114","weight":24},{"event_id":5551,"event_guid":"1cde6c4f-3c96-5b27-ba65-a02fbe4138a3","weight":19},{"event_id":5554,"event_guid":"41ebd647-9d5f-5779-9dba-3d3623b673bb","weight":16},{"event_id":5555,"event_guid":"6d6e883d-b0b9-5c23-9d05-14686411da58","weight":18},{"event_id":5557,"event_guid":"d6e55ac4-08b0-5c60-a88c-daa5496dfbf6","weight":18}]},{"guid":"ADQBjEa7855PcoO3lYE6Wg","title":"Wehrhafte Demokratie","subtitle":null,"slug":"gpn14_-_5864_-_de_-_zkm-vortragssaal_-_201406201430_-_wehrhafte_demokratie_-_kindx","link":"http://bl0rg.net/~andi/gpn14-fahrplan/events/5864.html","description":"Demokratische Systeme scheinen einer Reihe von Bedrohungen ausgesetzt zu sein. Daher wurden Schutzmechanismen, welche Demokratien vor genau diesen, hauptsächlich inneren, Bedrohungen bewahren sollen in den demokratischen Grundsätzen verankert. Darunter fallen beispielsweise das Widerstandsrecht, die Einschränkung der Meinungsfreiheit, der Verfassungsschutz und das Parteienverbot.\n\nIm Vortrag sollen diese Schutzmechanismen und die dahinter stehenden Ideen mit Fokus auf Deutschland diskutiert werden.","original_language":"eng","persons":["kindx"],"tags":[null],"view_count":570,"promoted":false,"date":"2014-06-20T02:00:00.000+02:00","release_date":"2014-06-21T02:00:00.000+02:00","updated_at":"2026-03-09T09:15:06.714+01:00","length":3423,"duration":3423,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn14/5864.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn14/5864_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn14/ADQBjEa7855PcoO3lYE6Wg-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn14/ADQBjEa7855PcoO3lYE6Wg-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn14_-_5864_-_de_-_zkm-vortragssaal_-_201406201430_-_wehrhafte_demokratie_-_kindx","url":"https://api.media.ccc.de/public/events/ADQBjEa7855PcoO3lYE6Wg","conference_title":"Gulaschprogrammiernacht 14","conference_url":"https://api.media.ccc.de/public/conferences/gpn14","related":[{"event_id":469,"event_guid":"import-b37309c8e3e0ae69cb","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":1},{"event_id":1892,"event_guid":"98b17d0799a31053","weight":1},{"event_id":1900,"event_guid":"305a20dbdb0a965b","weight":1},{"event_id":1916,"event_guid":"En1esQV6Uk-JI5raXw1KKg","weight":1},{"event_id":1918,"event_guid":"ix6eImcX7hzVSBSn6_CHdA","weight":1},{"event_id":1925,"event_guid":"xs6A-BMxum4Go9aVNmyqDw","weight":2},{"event_id":1929,"event_guid":"CP_K09W8epdyx0z67uW2Ug","weight":2},{"event_id":1933,"event_guid":"V2t_6OflOdJGK8g9sOcJow","weight":2},{"event_id":1947,"event_guid":"mFwPbKJz4_31yvZMcQY-9A","weight":1},{"event_id":4534,"event_guid":"5a5a4546-5248-2020-2020-202020202020","weight":1}]},{"guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","title":"31C3 Opening Event","subtitle":null,"slug":"31c3_-_6561_-_en_-_saal_1_-_201412271100_-_31c3_opening_event_-_erdgeist_-_geraldine_de_bastion","link":"http://events.ccc.de/congress/2014/Fahrplan/events/6561.html","description":null,"original_language":"eng","persons":["erdgeist","Geraldine de Bastion"],"tags":["CCC"],"view_count":4294,"promoted":false,"date":"2014-12-27T11:00:00.000+01:00","release_date":"2014-12-27T01:00:00.000+01:00","updated_at":"2026-04-09T12:45:07.021+02:00","length":1529,"duration":1529,"thumb_url":"https://static.media.ccc.de/media/congress/2014/6561-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2014/6561-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2014/29aecfd7-2e44-4f49-ab86-29b5e0877325-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2014/29aecfd7-2e44-4f49-ab86-29b5e0877325-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/31c3_-_6561_-_en_-_saal_1_-_201412271100_-_31c3_opening_event_-_erdgeist_-_geraldine_de_bastion","url":"https://api.media.ccc.de/public/events/29aecfd7-2e44-4f49-ab86-29b5e0877325","conference_title":"31C3: a new dawn","conference_url":"https://api.media.ccc.de/public/conferences/31c3","related":[{"event_id":1646,"event_guid":"import-3f6920f8040f18da31","weight":7},{"event_id":1753,"event_guid":"0i_XOY92eUOxB3jQO_Zj4g","weight":38},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":2},{"event_id":2145,"event_guid":"8c4e647f-813e-41ef-b05b-65469dd841c3","weight":7},{"event_id":2200,"event_guid":"T7aunKcOFBLl5b8IGVqJWQ","weight":2},{"event_id":2217,"event_guid":"Mw1wjnNzwxzSkM3Ip5Lg0g","weight":2},{"event_id":2274,"event_guid":"eddb2328-37c3-4e86-86cc-c8541d14b4d7","weight":8},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":4},{"event_id":2806,"event_guid":"654331ae-1710-42e5-bdf4-65a03a80c614","weight":26},{"event_id":2935,"event_guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","weight":3},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":5},{"event_id":3596,"event_guid":"b8e0eb47-4832-4726-bc9b-9015bd96becf","weight":22},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":3},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":11},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":3},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":3},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":6},{"event_id":6468,"event_guid":"809b164e-a331-4005-a1d8-ebe55d61d64c","weight":3}]},{"guid":"04795634-2cdf-51da-a0d6-15440e6c6fb6","title":"Infrastructure Review","subtitle":null,"slug":"emf2024-552-infrastructure-review","link":"https://www.emfcamp.org/schedule/2024/552-infrastructure-review","description":"Members of the EMF infrastructure teams (network, power, lighting, video, telephony) will talk about how we made the event happen this year. There will be graphs.\n\nLicensed to the public under https://creativecommons.org/licenses/by-sa/4.0/","original_language":"eng","persons":["EMF Team"],"tags":["552","emf2024","talk","Stage A","2024","Day 4"],"view_count":219,"promoted":false,"date":"2024-06-02T19:00:00.000+02:00","release_date":"2024-11-20T00:00:00.000+01:00","updated_at":"2026-04-09T14:30:08.421+02:00","length":2707,"duration":2707,"thumb_url":"https://static.media.ccc.de/media/events/emf/2024/552-04795634-2cdf-51da-a0d6-15440e6c6fb6.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2024/552-04795634-2cdf-51da-a0d6-15440e6c6fb6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2024/552-04795634-2cdf-51da-a0d6-15440e6c6fb6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2024/552-04795634-2cdf-51da-a0d6-15440e6c6fb6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2024-552-infrastructure-review","url":"https://api.media.ccc.de/public/events/04795634-2cdf-51da-a0d6-15440e6c6fb6","conference_title":"Electromagnetic Field 2024","conference_url":"https://api.media.ccc.de/public/conferences/emf2024","related":[]},{"guid":"ffaadd96-8dde-4c1d-bdcd-466774acc85c","title":"Make the web more fair and social","subtitle":"Using decentralized tools","slug":"cosin-18-make_the_web_more_fair_and_social","link":"https://www.cosin.ch/fahrplan/2019/events/18.html","description":"Present the fairsocialnet association and its activities. Invite people to join the decentralized web and present alternatives to big social media websites like Facebook and Twitter. \n\nExplain the concept of decentralization in a network and the benefits it can bring. Explain special terms like the fediverse and technology like activity Pub. ","original_language":"eng","persons":["FairSocialNet"],"tags":["cosin2019","18","Software"],"view_count":107,"promoted":false,"date":"2019-06-16T00:00:00.000+02:00","release_date":"2019-06-25T02:00:00.000+02:00","updated_at":"2024-12-02T21:30:03.339+01:00","length":1615,"duration":1615,"thumb_url":"https://static.media.ccc.de/media/events/cosin/2019/18-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/cosin/2019/18-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/cosin/2019/18-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/cosin/2019/18-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/cosin-18-make_the_web_more_fair_and_social","url":"https://api.media.ccc.de/public/events/ffaadd96-8dde-4c1d-bdcd-466774acc85c","conference_title":"Cosin 2019","conference_url":"https://api.media.ccc.de/public/conferences/cosin2019","related":[{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":3},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":6461,"event_guid":"f42631ca-d3ec-5baf-8642-85c0b1cadc89","weight":1},{"event_id":6736,"event_guid":"c939e872-ac04-5729-a8e4-7c75af9d56be","weight":4},{"event_id":7213,"event_guid":"3ad77889-fccb-55ca-a014-82551329c013","weight":1},{"event_id":7216,"event_guid":"e5ea4d79-bc98-58e3-80ef-e0e228d60164","weight":1},{"event_id":7219,"event_guid":"fb9f05b1-9d4f-4a7c-8947-aa8266494afc","weight":3},{"event_id":7220,"event_guid":"35cbed60-bbed-4ff9-8819-a77055eba262","weight":4},{"event_id":7222,"event_guid":"2cdf16f6-51db-4f8b-9982-210d49851d4e","weight":2},{"event_id":7223,"event_guid":"1a1de145-1e96-4705-9c4c-cfbd896af3d5","weight":1},{"event_id":7224,"event_guid":"d9192322-3008-4e87-a0c1-d6f7476f6106","weight":1},{"event_id":7225,"event_guid":"b2fd4460-5a2e-4d53-a846-b161a244aea3","weight":1},{"event_id":7226,"event_guid":"f7df52c8-b762-489e-accd-c65d63fe88df","weight":4},{"event_id":7227,"event_guid":"49b011e2-1dcf-42a5-a14b-48f80d46d277","weight":1},{"event_id":7228,"event_guid":"9e23846f-10b7-45c7-81c3-f190692ea60e","weight":1},{"event_id":7229,"event_guid":"6fd0a54b-3c2f-4ef7-ae4b-44e06a09bbf1","weight":4},{"event_id":7230,"event_guid":"2a284ec6-b4ca-41f3-b027-37fb0e3d9efb","weight":1},{"event_id":7231,"event_guid":"6e585f42-52f3-4015-8a7a-f2e204f7afe8","weight":4},{"event_id":7232,"event_guid":"526bc948-ab22-47e4-85df-36077b1b9d62","weight":5},{"event_id":7234,"event_guid":"8996a0a1-1829-4eef-a534-c67dc52a3707","weight":4},{"event_id":7238,"event_guid":"2f82bad2-97cb-59a2-b1da-428048e5baab","weight":2}]},{"guid":"e3563136-5e8a-5cca-b00a-1579d8dfa77f","title":"CrashIT! Eine Security Gruselgeschichte","subtitle":"","slug":"crashit-eine-security-gruselgeschichte","link":"https://sessions.hack-mas.at/event/9yNBZjgCs2k9PhJdA/crashit-eine-security-gruselgeschichte","description":"Vor mehr als 2 Jahren habe ich einem österreichischen Einmannunternehmen mehrere kritische Schwachstellen in der Software, die sie an Kunden vertreiben, gemeldet. Trotz Unterstützung des österreichischen CERT.at gelingt es mir seit 2 Jahren nicht, sie dazu zu bringen, diese Lücken zu schließen, was mich zum unfreiwilligen Admin von mehr als 100 Registrierkassen österreichischer Unternehmen macht. Ich würde gerne in einem kurzen (mit viel Galgenhumor gespickten) Vortrag erzählen, wie es dazu gekommen ist.","original_language":"deu","persons":["TTH"],"tags":["hackmas2024","2004308610","2024"],"view_count":2196,"promoted":false,"date":"2024-08-30T17:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-04-05T19:30:04.558+02:00","length":2900,"duration":2900,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/crashit-eine-security-gruselgeschichte","url":"https://api.media.ccc.de/public/events/e3563136-5e8a-5cca-b00a-1579d8dfa77f","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6","title":"Launching a Rocket, Suspended by a Balloon (Rockoon), from the Stratosphere","subtitle":null,"slug":"emf2022-12-launching-a-rocket-suspended-by-a-balloon-rockoon","link":"https://c3voc.de","description":"The B2Space satellite launch solution is based on the “rockoon” concept (rocket + balloon), and will comprise of a stratospheric balloon, which will lift a self-operative platform from which the launcher is deployed. A solid propellant rocket will deliver the satellites into the required customer orbits (Within Low Earth Orbits [LEO] ), which are orbits with altitudes ranging from 200km to 1000 km, approximately).\nThe talk will describe the concept and the steps taken to develop the rockoon project.","original_language":"eng","persons":["DAVID JOHNSON"],"tags":["emf2022","12","2022"],"view_count":166,"promoted":false,"date":"2022-06-04T17:30:00.000+02:00","release_date":"2024-01-07T00:00:00.000+01:00","updated_at":"2026-04-13T13:30:03.495+02:00","length":1303,"duration":1303,"thumb_url":"https://static.media.ccc.de/media/events/emf/2022/12-2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2022/12-2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2022/12-2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2022/12-2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2022-12-launching-a-rocket-suspended-by-a-balloon-rockoon","url":"https://api.media.ccc.de/public/events/2e293b01-88d9-5ce1-9aeb-ef5f765ebfa6","conference_title":"Electromagnetic Field 2022","conference_url":"https://api.media.ccc.de/public/conferences/emf2022","related":[]},{"guid":"f91571a6-05c7-58d3-add6-5934e640fc8c","title":"Aluhouter","subtitle":null,"slug":"jh-berlin-2018-46-aluhouter","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Asqiir","Noah","Lucas"],"tags":["jh18-berlin","46"],"view_count":237,"promoted":false,"date":"2018-10-21T00:00:00.000+02:00","release_date":"2018-10-22T02:00:00.000+02:00","updated_at":"2025-03-13T08:30:03.450+01:00","length":366,"duration":366,"thumb_url":"https://static.media.ccc.de/media/events/jugendhackt/2018/46-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/jugendhackt/2018/46-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/jugendhackt/2018/f91571a6-05c7-58d3-add6-5934e640fc8c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/jugendhackt/2018/f91571a6-05c7-58d3-add6-5934e640fc8c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/jh-berlin-2018-46-aluhouter","url":"https://api.media.ccc.de/public/events/f91571a6-05c7-58d3-add6-5934e640fc8c","conference_title":"Jugend hackt 2018","conference_url":"https://api.media.ccc.de/public/conferences/jh18","related":[{"event_id":5416,"event_guid":"cdbaeeb3-8291-4974-b36e-264cf2b882ac","weight":3},{"event_id":5426,"event_guid":"5200da56-4ba5-4a0c-aa27-413299d3ad58","weight":11},{"event_id":5832,"event_guid":"fcae0fe2-fc3b-466f-85d5-4777cd46099d","weight":6},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":6},{"event_id":6115,"event_guid":"93b7d8a6-345b-405a-a3f2-0dc09ddd2e28","weight":6},{"event_id":6183,"event_guid":"0d9a8ed7-d571-5f68-8c7a-b9575db30ccd","weight":10},{"event_id":6184,"event_guid":"78e07e27-053d-55f5-92d1-16956900e402","weight":11},{"event_id":6185,"event_guid":"7ae956e6-3ad3-5c07-8f24-8e7ca0ed2607","weight":13},{"event_id":6186,"event_guid":"2fe9ef91-846a-5616-8088-9dc6aadbdfaa","weight":10},{"event_id":6187,"event_guid":"727ab4e8-3c10-550f-b9c9-9c9d5e2762bc","weight":13},{"event_id":6188,"event_guid":"6a7f1749-036e-5368-a0f5-b26cd75aa9c1","weight":3},{"event_id":6189,"event_guid":"d6e07140-7e64-5404-9a88-007f54545a24","weight":14},{"event_id":6190,"event_guid":"033c05e8-0563-52e5-ac29-145898350fc2","weight":3},{"event_id":6191,"event_guid":"177f3537-1744-5042-9e63-0adaa09660fc","weight":3},{"event_id":6208,"event_guid":"35028e6c-d2aa-5d6c-ba9e-98388efdd4ae","weight":10},{"event_id":6209,"event_guid":"ddf4fa10-76ea-5241-a45d-3f04386dd30b","weight":6},{"event_id":6211,"event_guid":"523819a2-6286-5f69-bbaa-d774d9ce9522","weight":10},{"event_id":6214,"event_guid":"b77dda06-f304-5369-9de7-3a38e1c1f9e4","weight":18},{"event_id":6219,"event_guid":"2efe6192-a6c6-5926-9748-59ba7de38d1d","weight":13},{"event_id":6221,"event_guid":"ed3dee00-15b8-54f1-b68c-51baea4890a6","weight":10},{"event_id":6226,"event_guid":"1558bd56-a5a6-5a9d-ade1-f7f4da7dab38","weight":12},{"event_id":6227,"event_guid":"fefc9946-3fe4-5f78-9ec1-9ef95b3bf502","weight":11},{"event_id":6229,"event_guid":"255cb75a-a2bb-5495-88f9-94be005953f1","weight":16},{"event_id":6230,"event_guid":"1642ffb9-de52-5206-8327-23c27efb82bc","weight":11},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":22},{"event_id":6370,"event_guid":"15cf6e43-dc3a-5126-9fdb-0cf729e2ddcf","weight":12}]},{"guid":"3e0b5823-eab0-5e4e-824c-b25e3b7ef0da","title":"Behaviour-Based Quality Assessment of OpenStreetMap Data in Data Scarce Area Using Unsupervised Machine Learning","subtitle":null,"slug":"sotm2025-osm-science-71105-behaviour-based-quality-assessment-of-openstreetmap-data-in-data-scarce-area-using-unsupervised-machine-learning","link":"https://2025.stateofthemap.org/sessions/GCAXF9/","description":"This study introduces a behavior-dependent, unsupervised machine learning approach to assess the intrinsic quality of OpenStreetMap (OSM) data in Dhaka, which is both data-starved and urbanizing rapidly urbanizing area. Leveraging enriched contributor metadata and Principal Component Analysis (PCA), latent behavioral patterns and segmented contributors identified using KMeans and HDBSCAN. The silhouette score for PCA-based clustering was 0.951. The results show superior interpretability of KMeans over HDBSCAN. This repeatable methodology provides a scalable and reference-free solution to take quality assurance of VGI datasets to the front-line, in cases of limited or no authoritative data.\n\nOpenStreetMap (OSM) is an important source of geospatial information in data-starved urban areas, where official geospatial data are scarce, outdated, or are not readily available. Increasing need for current and accurate geospatial data in fast urbanizing and under surveyed regions makes the use of OpenStreetMap (OSM) an essential resource. As one of the most representative Volunteered Geographic Information (VGI), OSM offers a free world map that is editable and can be contributed by millions of people [1]. The tool is an essential component for urban analytics, transport planning, disaster risk reduction, and spatial modeling in the world [2], [3], [4]. Although widely used, the quality of OSM data varies greatly across regions and contributor skill level, and there is no unified, system level quality assurance mechanism [5]. This heterogeneity can be risk inducing for users making use of this data for precision tasks (e.g., routing, land use modeling and infrastructure design) [2], [6].\nTraditional OSM quality assessments rely on extrinsic comparisons with satellite imagery or authoritative datasets, which are often unavailable in the very regions that need the data the most [7], [8]. To overcome this challenge, a reproducible, unsupervised machine learning framework propose to assess OSM data quality intrinsically, based on contributor behavior metadata alone. Specifically, Dhaka —a data-scarce and fast-growing megacity in Bangladesh select as a study area—using the hypothesis that distinct contributor behavioral patterns correlate with different levels of data reliability. This behavior-centric perspective leverages the insight that contributor frequency, recency, thematic focus, and spatial editing behavior can serve as meaningful proxies for feature quality [5], [9].\nRoads and buildings for Dhaka extracts by using by a.osm.pbf with the Pyrosm library. Then enriched feature vector creates for each unique contributor, composed of (total_edits, edit_rate, active_days, spatial_extent, pct_road, pct_building, weekday_activity, days_since_last_edit). Principal Component Analysis (PCA) applies for dimensionality reduction and shows that PC1 roughly represents global mapping activity, while PC2 corresponds to thematic attention (road versus building), and PC3 represents the geographical coverage of contributions. These observations are supported by a feature contribution heatmap (Figure 1.(a)), which indicates that it is reasonable to consider the behavioral features to be interpretable and highly separable in the component-reduced space. PCA has also the purpose of reducing noise and gets the data ready for clustering [10].\nNext, KMeans clustering (with k = 4) and HDBSCAN, a density-based clustering is performed on the PCA-transformed feature set. The silhouette score of the KMeans model was 0.951, suggesting high cohesion within the clusters and good separation between the clusters of behaviors. The PCA cluster scatterplot (Figure 1.(c)) indicates four separated clusters: (1) most participants (Figure 1. (b)) fall in cluster 0, which mainly encompasses casual or one-hit contributors who probably participate in sporadic mapathons, or make large scale imports, (2) cluster 1 and 2 consist of moderate to heavy contributors, who are relatively more or less stable, with richer semantic tagging, and whose edits are spatially distributed, (3) cluster 3 is composed of a small group of “power users,” who are characterized by high activity volume and a large geographical distribution.\nHDBSCAN also use on the same dataset in order to analyze its capability of separating varies densities in clusters and noise. HDBSCAN found small, dense clusters, and labeled a large percentage of contributors as noise. Although helpful for identifying anomalousness and potential vandalism, HDBSCAN was unable to produce as clear clusters for the main contributors as KMeans, likely because the extreme imbalance in contributor engagement. This benchmarking demonstrated that KMeans comes with a better interpretability and cluster stability, and is therefore preferred for behavioral segmentation at the high volumes of OSM dataset.\nTo further verify the clustering, the changes in edit volume over time per cluster investigated, and calculated feature distributions per cluster. The contributor distribution bar chart (Figure 1. (b)) shows that the participation structure in OSM is highly skewed, which is also in line with previous VGI studies [11], [12]. Feature analysis showed that clusters associated with more recent, frequent, and thematically rich editing were also responsible for higher-quality contributions—consistent with prior work linking contributor experience to data quality [5], [9], [13].\nA key contribution of this work is its extensible and repeatable approach. All data processing, feature engineering, PCA and clustering have been performed in Python (Colab) with open-source packages (scikit-learn, geopandas, pyrosm, matplotlib). This method doesn't need any external validation databases, so it is particularly adapted for developing countries and isolated locations, where reference data are limited or unavailable [8].\nThis study contributes methodologically to three areas in the sciences, more precisely to the area of geospatial data science, unsupervised machine learning, and VGI quality assurance in showing how user behavior can be harnessed for deriving inherent data quality. It complements the literature about behavior-based contributor profiling, incorporates dimensionality reduction to facilitate the interpretation of results, and is an argument against central quality assessment as well as one for local quality assessment, which seems feasible even in urban settings with complex mobility patterns.\nPragmatically, this work can help NGOs, local authorities and the OSM community to support the allocation of resources toward data validation and enrichment where coverage is primarily in lower-quality contribution clusters. It also allows hybrid-quality models with behavior signals are augmented with selective extrinsic checks (such as anomaly detection or community verification). For example, contributors from Cluster 3 (power users) may be assigned higher trust weights in quality models, while edits from Cluster 0 may be flagged for further review or enrichment.\nIn conclusion, a new behaviour-based quality assessment of OSM report based on the specific usage of unsupervised machine learning. This cluster- and PCA-driven design is transparent, and interpretable, and completely reproducible. It is a model that addresses the challenges of working in data scarce urban areas and it paves the way for a behavior driven VGI quality models in the framework of urban resilience, infrastructure planning and humanitarian mapping. Future studies will incorporate spatial error measures and use this methodology with longitudinal OSM data for quality evolution monitoring.\n\nCreative Commons Attribution 3.0 Unported https://creativecommons.org/licenses/by/3.0/","original_language":"eng","persons":["Maruf Ahmed"],"tags":["71105","2025","sotm2025","Pulag","sotm2025-eng","OSM","OpenStreetMap","Day 1"],"view_count":2,"promoted":false,"date":"2025-10-03T10:35:00.000+02:00","release_date":"2026-03-29T00:00:00.000+01:00","updated_at":"2026-04-01T15:15:09.956+02:00","length":319,"duration":319,"thumb_url":"https://static.media.ccc.de/media/events/sotm/2025/71105-3e0b5823-eab0-5e4e-824c-b25e3b7ef0da.jpg","poster_url":"https://static.media.ccc.de/media/events/sotm/2025/71105-3e0b5823-eab0-5e4e-824c-b25e3b7ef0da_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/sotm/2025/71105-3e0b5823-eab0-5e4e-824c-b25e3b7ef0da.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/sotm/2025/71105-3e0b5823-eab0-5e4e-824c-b25e3b7ef0da.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/sotm2025-osm-science-71105-behaviour-based-quality-assessment-of-openstreetmap-data-in-data-scarce-area-using-unsupervised-machine-learning","url":"https://api.media.ccc.de/public/events/3e0b5823-eab0-5e4e-824c-b25e3b7ef0da","conference_title":"State of the Map 2025","conference_url":"https://api.media.ccc.de/public/conferences/sotm2025","related":[]},{"guid":"import-b6ee8eeadb87d2384c","title":"softwarekunstprojekt runme.org (623)","subtitle":null,"slug":"20C3-623-Softwarekunstprojekt_runme_org","link":"http://www.ccc.de/congress/2003/fahrplan/event/623.en.html","description":"\n","original_language":"eng","persons":[],"tags":["20c3"],"view_count":87,"promoted":false,"date":"2003-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2025-12-03T21:45:10.717+01:00","length":1890,"duration":1890,"thumb_url":"https://static.media.ccc.de/media/congress/2003/20C3-623-Softwarekunstprojekt_runme.org.jpg","poster_url":"https://static.media.ccc.de/media/congress/2003/20C3-623-Softwarekunstprojekt_runme.org_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2003/import-b6ee8eeadb87d2384c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2003/import-b6ee8eeadb87d2384c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/20C3-623-Softwarekunstprojekt_runme_org","url":"https://api.media.ccc.de/public/events/import-b6ee8eeadb87d2384c","conference_title":"20C3: Not a Number","conference_url":"https://api.media.ccc.de/public/conferences/20c3","related":[{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":2},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":1},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":1},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":1},{"event_id":730,"event_guid":"import-ff979c2f6c330b3a57","weight":1},{"event_id":733,"event_guid":"import-8596f6465a398aab20","weight":1},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":1},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":1},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":1},{"event_id":770,"event_guid":"import-45631ec4e36434bfcc","weight":1},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":1},{"event_id":779,"event_guid":"import-3fc3fd435d6c28ebca","weight":1},{"event_id":793,"event_guid":"import-5e16b5a09e0ffdc1da","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":1},{"event_id":1511,"event_guid":"import-50d23406ba6bbed62d","weight":1},{"event_id":1596,"event_guid":"import-d8314b471f27e20439","weight":1},{"event_id":1779,"event_guid":"0OMMJkoMY79GCUUx9LULgA","weight":1},{"event_id":1849,"event_guid":"qU7LRRIvEiZBJAvAY5z_Ig","weight":1}]},{"guid":"36af5db9-9c56-4b82-8882-6e27d3d940c0","title":"Wahlpaka","subtitle":null,"slug":"jh22-dresden-4180-wahlpaka","link":"https://c3voc.de","description":"„Wahlpaka“ ist eine Webseite, die Vereinen oder festen Gruppen dabei helfen soll Abstimmungen durchzuführen! Die Idee ist eine versendbare Umfrage, deren Ergebnis bei wichtigen Entscheidungen helfen soll.\n\n","original_language":"deu","persons":["Aemilia","Max T.","Felix","Simon","Peter"],"tags":["import","4180","2022"],"view_count":34,"promoted":false,"date":"2022-04-24T15:30:00.000+02:00","release_date":"2022-09-01T00:00:00.000+02:00","updated_at":"2025-08-14T18:30:06.420+02:00","length":341,"duration":341,"thumb_url":"https://static.media.ccc.de/media/events/jugendhackt/2022/4180-36af5db9-9c56-4b82-8882-6e27d3d940c0.jpg","poster_url":"https://static.media.ccc.de/media/events/jugendhackt/2022/4180-36af5db9-9c56-4b82-8882-6e27d3d940c0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/jugendhackt/2022/4180-36af5db9-9c56-4b82-8882-6e27d3d940c0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/jugendhackt/2022/4180-36af5db9-9c56-4b82-8882-6e27d3d940c0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/jh22-dresden-4180-wahlpaka","url":"https://api.media.ccc.de/public/events/36af5db9-9c56-4b82-8882-6e27d3d940c0","conference_title":"Jugend hackt 2022","conference_url":"https://api.media.ccc.de/public/conferences/jh22","related":[]},{"guid":"45336cce-788c-5800-84f1-0a7411d7e2da","title":"Wie man in 69 Jahren einen Überwachungsstaat aufbaut.","subtitle":null,"slug":"np14-18-wie_man_in_69_jahren_einen_ueberwachungsstaat_aufbaut","link":"https://c3voc.de","description":"Vor einem Jahr veröffentlichte netzpolitik.org die „Chronik des Überwachungsstaates“ und listete deskriptiv Gesetze auf, \"die Überwachung ausbauen und Freiheiten einschränken\". Nun wollen wir nachschauen und analysieren: Welche Parteien beteiligten sich in der Deutschen Geschichte am meisten? Welche Dienste werden oft bevorteilt? Welche sonstigen Muster gibt es?","original_language":"deu","persons":["Lennart Mühlenmeier"],"tags":["14np","18"],"view_count":316,"promoted":false,"date":"2018-09-21T00:00:00.000+02:00","release_date":"2018-09-22T02:00:00.000+02:00","updated_at":"2025-12-31T18:30:17.727+01:00","length":934,"duration":934,"thumb_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/18-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/18-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/45336cce-788c-5800-84f1-0a7411d7e2da-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/45336cce-788c-5800-84f1-0a7411d7e2da-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/np14-18-wie_man_in_69_jahren_einen_ueberwachungsstaat_aufbaut","url":"https://api.media.ccc.de/public/events/45336cce-788c-5800-84f1-0a7411d7e2da","conference_title":"Das ist Netzpolitik! #14np","conference_url":"https://api.media.ccc.de/public/conferences/14np","related":[{"event_id":5987,"event_guid":"2fdcdadb-0575-5a47-a59f-8376db33f0a6","weight":24},{"event_id":5988,"event_guid":"1f79fa0c-2d1a-51f6-b6cc-1df95691e966","weight":27},{"event_id":5989,"event_guid":"0e2666be-0e1d-548b-914c-fb4060bfc49b","weight":23},{"event_id":5993,"event_guid":"84cad71a-df40-568b-abfe-9de8ab295a28","weight":27},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":62},{"event_id":6001,"event_guid":"97bd059a-b44f-5d06-b325-ee634a5ad4c1","weight":41},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":19},{"event_id":6008,"event_guid":"b6643005-0d63-53df-ae6c-54575a04987f","weight":20},{"event_id":6011,"event_guid":"4b7f1896-a3e2-5627-87ef-9637dc6ebc1d","weight":7},{"event_id":6013,"event_guid":"de0029b3-f6d7-5cab-81a8-27c3d4ef84d2","weight":5},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":61},{"event_id":6017,"event_guid":"91e0e0df-7642-54b8-97e5-e881f146c5e5","weight":44},{"event_id":6018,"event_guid":"c31fc06b-dd24-53d2-99cc-ee40a58acabf","weight":21},{"event_id":6019,"event_guid":"720cbd83-2341-53d1-94d6-d7ecd909ff68","weight":30}]},{"guid":"lmZqYJ2kRNjkGHrCQ_EqRw","title":"Kexec/Kdump under the hood ","subtitle":"A look on the internals on arm64","slug":"1789-kexec-kdump-under-the-hood","link":"https://c3voc.de","description":"Kdump is a vital tool for debugging severe kernel crashes, especially if the failure can't be reproduced easily or an direct access to the system is not possible.\n\nWhen an sever error happens in the kernel, a new crash kernel get loaded which saves the memory of the crashed system. These dump can be used to analyze the state of the machine and hopefully give insights on what has happened.\n\nThis talks will dive into the internals of kexec and kdump. How the crash kernel get set-up, how it's execution get triggered. We will also look into kexec-tool, the user-space part needed to set up a system to use kdump. Where necessary, the architectural specific details will be explained by looking at the arm64 implementation. This talk is thought for people who want to have an insight into how kdump is working.\n\nKdump is a vital tool for debugging severe kernel crashes, especially if the failure can't be reproduced easily or an direct access to the system is not possible.\n\nWhen an sever error happens in the kernel, a new crash kernel get loaded which saves the memory of the crashed system. These dump can be used to analyze the state of the machine and hopefully give insights on what has happened.\n\nThis talks will dive into the internals of kexec and kdump. How the crash kernel get set-up, how it's execution get triggered. We will also look into kexec-tool, the user-space part needed to set up a system to use kdump. Where necessary, the architectural specific details will be explained by looking at the arm64 implementation. This talk is thought for people who want to have an insight into how kdump is working.","original_language":"eng","persons":["Matthias Brugger"],"tags":["osc18","1789","Open Source"],"view_count":61,"promoted":false,"date":"2018-05-25T00:00:00.000+02:00","release_date":"2018-05-25T02:00:00.000+02:00","updated_at":"2025-03-04T15:15:03.849+01:00","length":2565,"duration":2565,"thumb_url":"https://static.media.ccc.de/media/events/osc/2018/1789-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/osc/2018/1789-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/osc/2018/lmZqYJ2kRNjkGHrCQ_EqRw-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/osc/2018/lmZqYJ2kRNjkGHrCQ_EqRw-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/1789-kexec-kdump-under-the-hood","url":"https://api.media.ccc.de/public/events/lmZqYJ2kRNjkGHrCQ_EqRw","conference_title":"openSUSE Conference 2018","conference_url":"https://api.media.ccc.de/public/conferences/osc18","related":[{"event_id":5501,"event_guid":"YEJOkxvQJMR7HSFH9bSSNA","weight":2},{"event_id":5507,"event_guid":"lCd2eP4dZfnl5eXWz14qIQ","weight":2},{"event_id":5508,"event_guid":"PSNj5CJgKM1WthKxWpfZ6g","weight":2},{"event_id":5509,"event_guid":"Wy6jqnZ_111KAk-Vr3FLXA","weight":2},{"event_id":5520,"event_guid":"xgeracUcSNLdmofWET4R6A","weight":1},{"event_id":5528,"event_guid":"22g21-9kzH5VYk6hwXsmlA","weight":2}]},{"guid":"b6643005-0d63-53df-ae6c-54575a04987f","title":"Die Lage der Nation live bei \"Das ist Netzpolitik!\"","subtitle":null,"slug":"np14-29-die_lage_der_nation_live_bei_das_ist_netzpolitik","link":"https://c3voc.de","description":"Der Berliner Podcast \"Lage der Nation\" gehört zu den erfolgreichsten Politik-Podcasts Deutschlands. In der Berliner Volksbühne können die Zuschauer der \"Das ist Netzpolitik!\"-Konferenz live dabei sein, wenn der Journalist Philip Banse und Ulf Buermeyer, wissenschaftlicher Mitarbeiter am Berliner Verfassungsgerichtshof, vor Publikum das aktuelle politische Weltgeschehen unterhaltsam und kompetent unter die Lupe nehmen.","original_language":"deu","persons":["Ulf Buermeyer","Philipp Banse"],"tags":["14np","29"],"view_count":549,"promoted":false,"date":"2018-09-21T00:00:00.000+02:00","release_date":"2018-09-22T02:00:00.000+02:00","updated_at":"2026-03-22T23:30:05.950+01:00","length":4342,"duration":4342,"thumb_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/29-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/29-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/b6643005-0d63-53df-ae6c-54575a04987f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/netzpolitik/14np/b6643005-0d63-53df-ae6c-54575a04987f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/np14-29-die_lage_der_nation_live_bei_das_ist_netzpolitik","url":"https://api.media.ccc.de/public/events/b6643005-0d63-53df-ae6c-54575a04987f","conference_title":"Das ist Netzpolitik! #14np","conference_url":"https://api.media.ccc.de/public/conferences/14np","related":[{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":5987,"event_guid":"2fdcdadb-0575-5a47-a59f-8376db33f0a6","weight":36},{"event_id":5988,"event_guid":"1f79fa0c-2d1a-51f6-b6cc-1df95691e966","weight":34},{"event_id":5989,"event_guid":"0e2666be-0e1d-548b-914c-fb4060bfc49b","weight":31},{"event_id":5993,"event_guid":"84cad71a-df40-568b-abfe-9de8ab295a28","weight":27},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":49},{"event_id":6000,"event_guid":"db737a14-3b5c-590c-ab96-81cbe9d3a08e","weight":12},{"event_id":6001,"event_guid":"97bd059a-b44f-5d06-b325-ee634a5ad4c1","weight":38},{"event_id":6003,"event_guid":"19b499fd-fc69-5648-9699-19e94e3185c4","weight":37},{"event_id":6011,"event_guid":"4b7f1896-a3e2-5627-87ef-9637dc6ebc1d","weight":18},{"event_id":6013,"event_guid":"de0029b3-f6d7-5cab-81a8-27c3d4ef84d2","weight":16},{"event_id":6014,"event_guid":"45336cce-788c-5800-84f1-0a7411d7e2da","weight":20},{"event_id":6015,"event_guid":"2565d7fd-510e-57b4-a4e8-2566d6c85915","weight":45},{"event_id":6017,"event_guid":"91e0e0df-7642-54b8-97e5-e881f146c5e5","weight":25},{"event_id":6019,"event_guid":"720cbd83-2341-53d1-94d6-d7ecd909ff68","weight":13}]},{"guid":"0208d912-e399-57ba-9bb3-7c7690d3f374","title":"Build your own hackersguild!","subtitle":null,"slug":"hackerhotel-2024-95-build-your-own-hackersguild-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/K39SKE/","description":"This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting internal pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization's security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds' potential for a more secure future.\n\nThis talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization's security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds' potential for a more secure future.","original_language":"nld","persons":["Sp0Q"],"tags":["hackerhotel2024","95","2024","Talks"],"view_count":124,"promoted":false,"date":"2024-02-10T11:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-06-20T21:30:05.628+02:00","length":2405,"duration":2405,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-95-build-your-own-hackersguild-","url":"https://api.media.ccc.de/public/events/0208d912-e399-57ba-9bb3-7c7690d3f374","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"9832f3cc-95e9-5199-be5f-a0a9a85aa080","title":"Scholia","subtitle":null,"slug":"wikidatacon2017-10010-scholia","link":"https://c3voc.de","description":"The project and web service Scholia displays information from Wikidata. As the core functionality, it shows scientific bibliographic information: list of publications of specific authors, venues, organization, etc. Bar charts of number of citations, graphs of co-authors. It makes extensive use of the Wikidata Query Service. It attempts to make a complete researcher profile/CV as well as a tool to help researchers navigate the scientific literature. Scholia runs from https://tools.wmflabs.org/scholia/ and is developed in an open source fashion from https://github.com/fnielsen/scholia.","original_language":"eng","persons":["Finn Årup Nielsen "],"tags":["wikidatacon2017","10010"],"view_count":32,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2017-10-28T02:00:00.000+02:00","updated_at":"2021-09-06T03:15:02.983+02:00","length":2119,"duration":2119,"thumb_url":"https://static.media.ccc.de/media/events/wikidatacon/2017/10010-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/wikidatacon/2017/10010-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/wikidatacon/2017/9832f3cc-95e9-5199-be5f-a0a9a85aa080-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/wikidatacon/2017/9832f3cc-95e9-5199-be5f-a0a9a85aa080-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/wikidatacon2017-10010-scholia","url":"https://api.media.ccc.de/public/events/9832f3cc-95e9-5199-be5f-a0a9a85aa080","conference_title":"WikidataCon 2017","conference_url":"https://api.media.ccc.de/public/conferences/wikidatacon2017","related":[{"event_id":4711,"event_guid":"4c554a17-525f-570f-ba79-d2fcdd4aee4c","weight":5},{"event_id":4716,"event_guid":"870ebc84-4df0-57f0-beb5-3113dfc65179","weight":4},{"event_id":4721,"event_guid":"4e19087d-3aa5-5be9-8a36-17f4d28e3a11","weight":4}]},{"guid":"33ec3f8d-2734-5ca8-be30-3f458b539afb","title":"Transparency? Not from the European Commission","subtitle":"","slug":"38c3-transparency-not-from-the-european-commission","link":"https://events.ccc.de/congress/2024/hub/event/transparency-not-from-the-european-commission/","description":"The European Commission is the executive branch of the European Union with the duty to uphold the law. The transparency of the Commission´s actions and decisions range from questionable to abysmal. Attempts by the public to access information are often thwarted. This talk will cover the Commission´s lack of transparency, challenges faced by the public in accessing information, Commission´s tactics and examples of the European Ombudsman´s interventions to improve the situation. Whether you are interested in ChatControl, AI or public procurement, this talk will have you covered.\r\n\r\n~~Redacted~~\r\n\r\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Kris Shrishak"],"tags":["38c3","372","2024","Ethics, Society \u0026 Politics","Saal GLITCH"],"view_count":4887,"promoted":false,"date":"2024-12-27T12:55:00.000+01:00","release_date":"2024-12-27T00:00:00.000+01:00","updated_at":"2026-03-26T10:15:06.202+01:00","length":2157,"duration":2157,"thumb_url":"https://static.media.ccc.de/media/congress/2024/372-33ec3f8d-2734-5ca8-be30-3f458b539afb.jpg","poster_url":"https://static.media.ccc.de/media/congress/2024/372-33ec3f8d-2734-5ca8-be30-3f458b539afb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2024/372-33ec3f8d-2734-5ca8-be30-3f458b539afb.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2024/372-33ec3f8d-2734-5ca8-be30-3f458b539afb.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/38c3-transparency-not-from-the-european-commission","url":"https://api.media.ccc.de/public/events/33ec3f8d-2734-5ca8-be30-3f458b539afb","conference_title":"38C3: Illegal Instructions","conference_url":"https://api.media.ccc.de/public/conferences/38c3","related":[]},{"guid":"56385739-444c-2020-2020-202020202020","title":"Einführung in ESP32 Microcontroller + MicroPython","subtitle":null,"slug":"V8W9DL","link":"https://c3voc.de","description":"MicroPython und der ESP32-MicroController\nkomfortabel Programmieren auf einem gut ausgestatteten MicroController.\n\nEinsteiger-Vortrag für die, die MicroPython und/oder\nESP32-MicroController noch nicht kennen.\n\nWas kann ein ESP32-Microcontroller? Was können typische ESP32-Boards und\nworauf sollte man achten? Warum will man in bestimmten Anwendungen nen\nESP32 benutzen (und nicht nen Raspi oder Arduino)?\n\nWas ist MicroPython? Wie kann man damit komfortabel auf MicroControllern\narbeiten?\n\nMessen und Steuern mit MicroPython auf dem ESP32, ggf. praktische Demo.","original_language":"deu","persons":["tw_42"],"tags":["eh18","88"],"view_count":2216,"promoted":false,"date":"2018-04-01T00:00:00.000+02:00","release_date":"2018-04-02T02:00:00.000+02:00","updated_at":"2026-04-13T22:45:04.710+02:00","length":3362,"duration":3362,"thumb_url":"https://static.media.ccc.de/media/conferences/eh2018/88-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/eh2018/88-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/eh2018/56385739-444c-2020-2020-202020202020-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/eh2018/56385739-444c-2020-2020-202020202020-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/V8W9DL","url":"https://api.media.ccc.de/public/events/56385739-444c-2020-2020-202020202020","conference_title":"Easterhegg 2018","conference_url":"https://api.media.ccc.de/public/conferences/eh18","related":[{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":35},{"event_id":5221,"event_guid":"58524548-4a4c-2020-2020-202020202020","weight":23},{"event_id":5222,"event_guid":"42464643-3358-2020-2020-202020202020","weight":27},{"event_id":5223,"event_guid":"4647424c-5553-2020-2020-202020202020","weight":30},{"event_id":5228,"event_guid":"44434a47-4b41-2020-2020-202020202020","weight":26},{"event_id":5229,"event_guid":"53464646-4151-2020-2020-202020202020","weight":51},{"event_id":5231,"event_guid":"38433858-5443-2020-2020-202020202020","weight":38},{"event_id":5233,"event_guid":"4a433356-4456-2020-2020-202020202020","weight":48},{"event_id":5234,"event_guid":"43435a46-5951-2020-2020-202020202020","weight":19},{"event_id":5235,"event_guid":"52535255-5245-2020-2020-202020202020","weight":36},{"event_id":5238,"event_guid":"48334a59-4e4a-2020-2020-202020202020","weight":19},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":64},{"event_id":5240,"event_guid":"39474e46-4733-2020-2020-202020202020","weight":41},{"event_id":5243,"event_guid":"41524d50-3344-2020-2020-202020202020","weight":5},{"event_id":5244,"event_guid":"4a473753-5039-2020-2020-202020202020","weight":36},{"event_id":5246,"event_guid":"33515633-5950-2020-2020-202020202020","weight":28},{"event_id":5247,"event_guid":"48454348-4e44-2020-2020-202020202020","weight":20}]},{"guid":"import-b434c1bed6ba5d62df","title":"Techniken zur Identifizierung von Netzwerk-Protokollen","subtitle":null,"slug":"27c3-4097-de-identifizierung_von_netzwerkprotokollen","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4097.en.html","description":"Der Vortrag soll Techniken aufzeigen, mit denen man Netzwerk-Protokolle identifizieren kann, die in Layer 7 des OSI-Modells angesiedelt sind. Alle Techniken - darunter auch die Deep Packet Inspection (DPI) - werden technisch erläutert und kritisch bewertet.\n","original_language":"eng","persons":["Florian Adamsky"],"tags":["27c3"," Science"],"view_count":204,"promoted":false,"date":"2010-12-28T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2026-04-13T23:30:05.957+02:00","length":2657,"duration":2657,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4097-de-identifizierung_von_netzwerkprotokollen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4097-de-identifizierung_von_netzwerkprotokollen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-b434c1bed6ba5d62df-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-b434c1bed6ba5d62df-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4097-de-identifizierung_von_netzwerkprotokollen","url":"https://api.media.ccc.de/public/events/import-b434c1bed6ba5d62df","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1441,"event_guid":"import-0ed61800336f786fca","weight":1},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":1},{"event_id":1447,"event_guid":"import-6b22151f92f9683519","weight":2},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1458,"event_guid":"import-d91ee307eb6ced5743","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1467,"event_guid":"import-a8048485bc5b1c889d","weight":1},{"event_id":1473,"event_guid":"import-929c3529e5a0128662","weight":1},{"event_id":1504,"event_guid":"import-5fd47fda6b0beea4de","weight":1},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":2},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":2},{"event_id":1697,"event_guid":"import-3d743102bd3d845235","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1700,"event_guid":"import-badb660dc5d862b268","weight":1},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":2},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":3619,"event_guid":"84ce6d72-3f4f-445b-801e-37f6a1331bed","weight":1}]},{"guid":"import-eae4fa54c6a772aa28","title":"1024 bit rsa ist unsicher (546)","subtitle":null,"slug":"20C3-546-1024_bit_RSA_ist_unsicher","link":"http://www.ccc.de/congress/2003/fahrplan/event/546.en.html","description":"\n","original_language":"eng","persons":[],"tags":["20c3"],"view_count":260,"promoted":false,"date":"2003-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2026-01-27T18:00:15.999+01:00","length":2923,"duration":2923,"thumb_url":"https://static.media.ccc.de/media/congress/2003/20C3-546-1024_bit_RSA_ist_unsicher.jpg","poster_url":"https://static.media.ccc.de/media/congress/2003/20C3-546-1024_bit_RSA_ist_unsicher_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2003/import-eae4fa54c6a772aa28-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2003/import-eae4fa54c6a772aa28-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/20C3-546-1024_bit_RSA_ist_unsicher","url":"https://api.media.ccc.de/public/events/import-eae4fa54c6a772aa28","conference_title":"20C3: Not a Number","conference_url":"https://api.media.ccc.de/public/conferences/20c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":2},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":4},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":4},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":2},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":2},{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":2},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":2},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":3},{"event_id":773,"event_guid":"import-e7e90640ac98acba3e","weight":2},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":2},{"event_id":781,"event_guid":"import-777375527796871e60","weight":3},{"event_id":783,"event_guid":"import-888da0e302611c285a","weight":5},{"event_id":787,"event_guid":"import-af83df1b1cdc8049c6","weight":7},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":2},{"event_id":796,"event_guid":"import-802e39aaed267dfb47","weight":2},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":2},{"event_id":819,"event_guid":"import-e998285d2df414cb5a","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":2},{"event_id":886,"event_guid":"import-bf3cd69c919622674e","weight":2},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":2},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":2},{"event_id":2279,"event_guid":"d42702a8-d760-473d-bc21-0a53b7ea9603","weight":2},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":2},{"event_id":3630,"event_guid":"e5bc47de-461b-4705-adbd-0ad444e2f3f8","weight":2},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":2},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":2}]},{"guid":"import-a3fcc2760e7f838c9b","title":"Dancing: Direct Action in Disguise","subtitle":"New Strategies for Street Protest","slug":"SIGINT09_3207_en_dancing_direct_action_in_disguise","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3207.en.html","description":"Why do we demonstrate? Why do we go out into the streets and march for what we believe in? Marching in solidarity for your beliefs is a powerful personal experience. However, as a method of communicating an outward message, it is frequently twisted and manipulated against the purposes direct action seeks to advocate. Peaceful demonstrations in the US occasionally fall prey to provocateurs, devolve into riots or become targets for illegal detention. What to do about it? Dance!  \n","original_language":"eng","persons":["Nick Farr"],"tags":["sigint09"],"view_count":10,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-09-04T01:00:02.408+02:00","length":2641,"duration":2641,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3207_en_dancing_direct_action_in_disguise.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3207_en_dancing_direct_action_in_disguise_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a3fcc2760e7f838c9b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a3fcc2760e7f838c9b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3207_en_dancing_direct_action_in_disguise","url":"https://api.media.ccc.de/public/events/import-a3fcc2760e7f838c9b","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":428,"event_guid":"import-aac153935209b2785c","weight":1}]},{"guid":"edbe01e0-7699-5d98-833f-6ebbe50a853f","title":"\"Schrems II\"","subtitle":null,"slug":"pw20-374--schrems-ii-","link":"https://cfp.privacyweek.at/pw20/talk/KQSFS3/","description":"Der Fall des Privacy Shield und darüber hinaus\n\nMitte Juli hat der Europäische Gerichtshof (EuGh) das Urteil über EU-US-Datenübermittlungen ausgesprochen: Privacy Shield wurde außer Kraft gesetzt und die Gültigkeit von Standardvertragsklauseln wurde definiert. Somit hat der Gerichtshof klargestellt, dass die weitreichenden US-amerikanischen Überwachungsgesetze im Widerspruch zu den Grundrechten der EU stehen.\n\nEinen Monat nach dem Urteil hat noyb 101 Beschwerden gegen EU-Unternehmen, Google USA und Facebook USA wegen anhaltenden EU-US Datentransfers eingereicht. noyb plant, den Druck auf Unternehmen aus der EU und den USA schrittweise zu erhöhen, damit sie ihre Datentransfers überprüfen und sich an die klare Entscheidung des EuGH halten.","original_language":"deu","persons":["Max Schrems"],"tags":["pw20","374","2020","Recht und Politik"],"view_count":501,"promoted":false,"date":"2020-10-27T19:00:00.000+01:00","release_date":"2020-11-07T00:00:00.000+01:00","updated_at":"2026-03-20T23:00:07.266+01:00","length":3015,"duration":3015,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2020/374-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2020/374-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2020/374-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2020/374-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw20-374--schrems-ii-","url":"https://api.media.ccc.de/public/events/edbe01e0-7699-5d98-833f-6ebbe50a853f","conference_title":"PrivacyWeek 2020","conference_url":"https://api.media.ccc.de/public/conferences/pw20","related":[]},{"guid":"134a9ee0-53b5-4a62-81d8-9406c85767c9","title":"Gehackt. Und nu?","subtitle":"Wie reagiert man, wenn man gehackt wurde?","slug":"ds19-10393-gehackt_und_nu","link":"https://datenspuren.de/2019/fahrplan/events/10393.html","description":"Wer etwas auf sich hält, wird heutzutage auch mal gehackt. Das gilt insbesondere für Unternehmen.\nDoch wie geht es dann weiter? \n\nDieser Vortrag beschreibt die unterschiedlichen Phasen eines Hackerangriffs und wie man als gehackter professionell reagiert, neudeutsch \"Incident Response\" betreibt. ","original_language":"deu","persons":["klobs"],"tags":["DS2019","10393","2019","Datenspuren"],"view_count":496,"promoted":false,"date":"2019-09-21T00:00:00.000+02:00","release_date":"2019-09-21T02:00:00.000+02:00","updated_at":"2026-01-22T13:45:10.290+01:00","length":2661,"duration":2661,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2019/10393-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds19-10393-gehackt_und_nu","url":"https://api.media.ccc.de/public/events/134a9ee0-53b5-4a62-81d8-9406c85767c9","conference_title":"Datenspuren 2019","conference_url":"https://api.media.ccc.de/public/conferences/DS2019","related":[{"event_id":5792,"event_guid":"f5c68cea-eb34-49ae-bb15-d0fc1085985b","weight":1},{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":9},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":8},{"event_id":7931,"event_guid":"3dfebbb5-eb33-4779-9440-c9c902983b82","weight":7},{"event_id":7932,"event_guid":"f1e4f555-53f0-40b9-9c70-eb7034b9e675","weight":22},{"event_id":7934,"event_guid":"6238c286-33b4-4388-9637-9c4024f0d9e8","weight":1},{"event_id":7937,"event_guid":"312797c4-bcc5-4113-bcee-e331da77774a","weight":6},{"event_id":7938,"event_guid":"1401efe8-8951-4097-81c3-bedc789a12c2","weight":20},{"event_id":7939,"event_guid":"1dc2d483-bed1-4f86-b1c5-c7b23e7917e9","weight":15},{"event_id":7962,"event_guid":"da46e33d-bcf4-4d5b-88f9-e5715a6190f6","weight":6},{"event_id":7966,"event_guid":"a6a44328-e573-4606-ab8f-b12c746b76ce","weight":9},{"event_id":7969,"event_guid":"b474e3fe-0a57-4dfb-8c34-42e2497e92c0","weight":23},{"event_id":7974,"event_guid":"6c23bcc6-2c83-4d15-913c-4b59cb8eb40d","weight":11},{"event_id":7975,"event_guid":"aa7eeb68-2328-48b9-af5f-25e7d98333d6","weight":12},{"event_id":7986,"event_guid":"f2b0193d-0eea-4aa6-a3cb-e05252a65577","weight":7},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":20},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":65},{"event_id":8011,"event_guid":"c8dc6567-0601-4489-b38d-49f6553890b0","weight":9}]},{"guid":"1c3fce8d-3113-5d03-b0ec-41b58603bfd1","title":"Kommunale Plattformen nachhaltig gestalten: Vorstellung eines Kriterienkatalogs","subtitle":null,"slug":"bitsundbaeume-20665-kommunale-plattformen-nachhaltig-gestalten-vorstellung-eines-kriterienkatalogs","link":"https://fahrplan22.bits-und-baeume.org/bitsundbaeume/talk/WNFRYE/","description":"Kriterienkatalog zur Analyse von Nachhaltigkeitspotenzialen und -risiken unterschiedlicher digitaler kommunaler Plattformmodelle.\n\nDigitale Plattformen avancieren zu einem wichtigen Teil der kommunalen Daseinsvorsorge. Richtig eingesetzt, können plattformbasierte Leistungen ein wirksames Instrument für eine nachhaltige Kommunalentwicklung darstellen. In einer Kurzstudie, die im Rahmen der CO:DINA-Forschunglinie \"Zukunftsfähige Daseinsvorsorge\" entstand, wird ein Kriterienkatalog erarbeitet, anhand dessen die Nachhaltigkeitspotenziale und -risiken unterschiedlicher Plattformmodelle beschrieben und untersucht werden können. Die Studie und der Kriterienkatalog sollen hier vorgestellt werden.\n\n*Referentin:* Nicole Wolf, Nachhaltige digitale Lösungen\n\nDie Kurzstudie steht hier zum Download bereit: https://codina-transformation.de/aktuelles/","original_language":"deu","persons":["Nicole Wolf"],"tags":["bub2022","20665","2022","Technikgestaltung, Machtverhältnisse und Eigentum"],"view_count":82,"promoted":false,"date":"2022-10-02T11:10:00.000+02:00","release_date":"2022-10-02T00:00:00.000+02:00","updated_at":"2026-01-09T22:00:28.375+01:00","length":2471,"duration":2471,"thumb_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/20665-1c3fce8d-3113-5d03-b0ec-41b58603bfd1.jpg","poster_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/20665-1c3fce8d-3113-5d03-b0ec-41b58603bfd1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/20665-1c3fce8d-3113-5d03-b0ec-41b58603bfd1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/bitsundbaeume/2022/20665-1c3fce8d-3113-5d03-b0ec-41b58603bfd1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/bitsundbaeume-20665-kommunale-plattformen-nachhaltig-gestalten-vorstellung-eines-kriterienkatalogs","url":"https://api.media.ccc.de/public/events/1c3fce8d-3113-5d03-b0ec-41b58603bfd1","conference_title":"Bits \u0026 Bäume 2022","conference_url":"https://api.media.ccc.de/public/conferences/bub2022","related":[]},{"guid":"95a42f01-2074-5589-863e-2b4a45978000","title":"Was hat Kolonialismus mit Technikentwicklung zu tun?","subtitle":" Einblicke in Kenias Tech-Szene","slug":"camp2023-25-was_hat_kolonialismus_mit_technikentwicklung_zu_tun_einblicke_in_kenias_tech_szene","link":"https://fahrplan.alpaka.space/camp-2023/talk/9JRGEQ/","description":"Kenias Tech-Szene boomt und die meisten Investitionen ins Silicon Savannah kommen aus dem Globalen Norden: Welche Auswirkungen hat dies auf die digitalen Innovationen aus Kenia?\r\n\r\nIn diesem Vortrag wird Alev (sie/ihr) Einblicke in kenianische Makerspaces geben: An welchen Technologien wird gearbeitet? Wie sind die Arbeitsbedingungen für Technikentwickler*innen in Nairobi? Woher kommt das Geld für Technologien 'made in Africa'? Und wie wirkt sich (Post-)Kolonialismus auf die heutige Technikentwicklung im Silicon Savannah aus?\r\nIm Anschluss an den Vortrag wird Alev Fragen beantworten und Raum für Diskussion über Rassismus und digitale Technologien geben.","original_language":"deu","persons":["Alev (sie/ihr)"],"tags":["camp2023","25","2023","JugendVillage"],"view_count":241,"promoted":false,"date":"2023-08-16T17:00:00.000+02:00","release_date":"2023-08-18T00:00:00.000+02:00","updated_at":"2026-04-02T11:00:05.005+02:00","length":1314,"duration":1314,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2023/25-95a42f01-2074-5589-863e-2b4a45978000.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2023/25-95a42f01-2074-5589-863e-2b4a45978000_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2023/25-95a42f01-2074-5589-863e-2b4a45978000.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2023/25-95a42f01-2074-5589-863e-2b4a45978000.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/camp2023-25-was_hat_kolonialismus_mit_technikentwicklung_zu_tun_einblicke_in_kenias_tech_szene","url":"https://api.media.ccc.de/public/events/95a42f01-2074-5589-863e-2b4a45978000","conference_title":"Chaos Communication Camp 2023","conference_url":"https://api.media.ccc.de/public/conferences/camp2023","related":[]},{"guid":"ecc1a4f7-7088-53e4-b15a-40e77f4ad074","title":"So haben wir einen Hackspace gestartet","subtitle":null,"slug":"metanook-2017-2-so_haben_wir_einen_hackspace_gestartet","link":"https://c3voc.de","description":"Rückblick auf etwas mehr als 1 Jahr Hacklabor in Schwerin. \n\nZwei der Gründungsmitglieder des Hacklabor Schwerin berichten von ihrer Erfahrung mit dem Aufbau eines Hackspace. ","original_language":"deu","persons":["Murdoc Bates","Michael Milz"],"tags":["metanook-2017","2"],"view_count":64,"promoted":false,"date":"2017-11-10T00:00:00.000+01:00","release_date":"2018-05-25T02:00:00.000+02:00","updated_at":"2025-10-27T01:00:03.830+01:00","length":2829,"duration":2829,"thumb_url":"https://static.media.ccc.de/media/events/metanook/metanook-2017/2-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/metanook/metanook-2017/2-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/metanook/metanook-2017/ecc1a4f7-7088-53e4-b15a-40e77f4ad074-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/metanook/metanook-2017/ecc1a4f7-7088-53e4-b15a-40e77f4ad074-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/metanook-2017-2-so_haben_wir_einen_hackspace_gestartet","url":"https://api.media.ccc.de/public/events/ecc1a4f7-7088-53e4-b15a-40e77f4ad074","conference_title":"MetaNook 2017","conference_url":"https://api.media.ccc.de/public/conferences/metanook-2017","related":[{"event_id":1168,"event_guid":"import-3f1e79fba7d576051e","weight":2},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":3552,"event_guid":"16d2170d-140d-4551-9119-328f12f60668","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":3881,"event_guid":"f42269d1-0c07-4bac-8251-de779d65cde8","weight":1},{"event_id":3954,"event_guid":"6033c592-f777-4e83-84ee-94cef2e89338","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":2},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":1},{"event_id":5444,"event_guid":"fcabf377-2082-5e37-9c17-7bc1aa5dc051","weight":2},{"event_id":5451,"event_guid":"90ed62f1-8033-56dd-9c44-da6e2ea67f07","weight":2},{"event_id":5454,"event_guid":"f1743f41-f61b-562d-bf09-8197713f62df","weight":2},{"event_id":5469,"event_guid":"c4f46227-9af7-5180-bba8-1c23e005f12e","weight":1},{"event_id":5477,"event_guid":"8654dc1d-dcde-5bd3-86e2-2cf974ed8d01","weight":5},{"event_id":5500,"event_guid":"BYAPpSpdg3PEN4qfQS7BlQ","weight":2},{"event_id":5562,"event_guid":"FCDA2jM81L7uJcD1iXje6A","weight":1},{"event_id":5568,"event_guid":"9eah1LaL9DZcns3GraeyEw","weight":2},{"event_id":6585,"event_guid":"2ef1d870-f2b1-583b-98c6-09574123a90f","weight":2}]},{"guid":"623e2e75-30eb-5102-b32e-01ccaaa8070c","title":"See Change, Change the World: Imaging Earth with CubeSats","subtitle":null,"slug":"emf2022-389-see-change-change-the-world-imaging-earth-with-cubesats","link":"https://c3voc.de","description":"Planet Labs, PBC operates the largest constellation of Earth-imaging satellites in history, collecting data of the entire landmass of our world on a near-daily basis with over 200 CubeSats. Planetary Scientist Dr. Tanya Harrison will discuss these CubeSats and how scientists are using them to better understand our ever-changing Earth.","original_language":"eng","persons":["Tanya Harrison"],"tags":["emf2022","389","2022"],"view_count":25,"promoted":false,"date":"2022-06-05T19:00:00.000+02:00","release_date":"2024-01-07T00:00:00.000+01:00","updated_at":"2025-10-12T22:30:08.366+02:00","length":1796,"duration":1796,"thumb_url":"https://static.media.ccc.de/media/events/emf/2022/389-623e2e75-30eb-5102-b32e-01ccaaa8070c.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2022/389-623e2e75-30eb-5102-b32e-01ccaaa8070c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2022/389-623e2e75-30eb-5102-b32e-01ccaaa8070c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2022/389-623e2e75-30eb-5102-b32e-01ccaaa8070c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2022-389-see-change-change-the-world-imaging-earth-with-cubesats","url":"https://api.media.ccc.de/public/events/623e2e75-30eb-5102-b32e-01ccaaa8070c","conference_title":"Electromagnetic Field 2022","conference_url":"https://api.media.ccc.de/public/conferences/emf2022","related":[]},{"guid":"8dce9793-e9a7-47cd-b3f9-31ce288b5a10","title":"Algorithm | Diversion","subtitle":null,"slug":"36c3-11310-algorithm_diversion","link":"https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/11310.html","description":"Before media art has emerged, traditional art and dance are already applying algorithms to make sophisticated patterns in their textures or movements. Hieda is researching the use of algorithm through creation of media installations and dialog with artists, dancers, choreographers and musicians. He also presents his current interest in machine learning and art which potentially exclude (or already excluding) some populations due to the dataset and modality.","original_language":"eng","persons":["Naoto Hieda"],"tags":["36c3","11310","2019","Art \u0026 Culture","Main"],"view_count":674,"promoted":false,"date":"2019-12-28T20:50:00.000+01:00","release_date":"2019-12-29T01:00:00.000+01:00","updated_at":"2025-12-06T17:15:05.281+01:00","length":3352,"duration":3352,"thumb_url":"https://static.media.ccc.de/media/congress/2019/11310-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2019/11310-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2019/11310-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2019/11310-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/36c3-11310-algorithm_diversion","url":"https://api.media.ccc.de/public/events/8dce9793-e9a7-47cd-b3f9-31ce288b5a10","conference_title":"36C3: Resource Exhaustion","conference_url":"https://api.media.ccc.de/public/conferences/36c3","related":[]}]}