{"guid":"import-7d27a5ec4fcd8ee9be","title":"Bluetooth Hacking","subtitle":null,"slug":"066_Bluetooth_Hacking","link":"http://www.ccc.de/congress/2004/fahrplan/event/66.en.html","description":"Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure...\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":147,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:43.848+02:00","length":5875,"duration":5875,"thumb_url":"https://static.media.ccc.de/media/congress/2004/066 Bluetooth Hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/066 Bluetooth Hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-7d27a5ec4fcd8ee9be-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-7d27a5ec4fcd8ee9be-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/066_Bluetooth_Hacking","url":"https://api.media.ccc.de/public/events/import-7d27a5ec4fcd8ee9be","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":6},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":4},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":5},{"event_id":817,"event_guid":"import-c865fbf5a8d13de458","weight":4},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":6},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":5},{"event_id":847,"event_guid":"import-3aae12cacdafcdcae7","weight":5}],"recordings":[{"size":111,"length":5875,"mime_type":"audio/mpeg","language":"eng","filename":"066 Bluetooth Hacking.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:34.113+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/066 Bluetooth Hacking.mp3","url":"https://api.media.ccc.de/public/recordings/1508","event_url":"https://api.media.ccc.de/public/events/import-7d27a5ec4fcd8ee9be","conference_url":"https://api.media.ccc.de/public/conferences/21c3"},{"size":111,"length":5875,"mime_type":"video/mp4","language":"eng","filename":"066 Bluetooth Hacking.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:14.830+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/066 Bluetooth Hacking.mp4","url":"https://api.media.ccc.de/public/recordings/1507","event_url":"https://api.media.ccc.de/public/events/import-7d27a5ec4fcd8ee9be","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}