{"guid":"import-76eda6a4d2ee2ee3de","title":"The Convergence of Anti-Counterfeiting and Computer Security","subtitle":"Reverse-engineering currency detection systems","slug":"108_The_Convergence_of_Anti-Counterfeiting_and_Computer_Security","link":"http://www.ccc.de/congress/2004/fahrplan/event/108.en.html","description":"This talk examines the similarities between computer security and\noptical document security. Also we describe our work on reverse\nengineering anti-counterfeiting measures, included in much modern\ngraphics software, and discuss its impact on Open Source.\n","original_language":"eng","persons":["Steven J. Murdoch"],"tags":["21c3"," Hacking"],"view_count":2,"promoted":false,"date":"2004-12-27T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:34.103+02:00","length":2710,"duration":2710,"thumb_url":"https://static.media.ccc.de/media/congress/2004/108 The Convergence of Anti-Counterfeiting and Computer Security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/108 The Convergence of Anti-Counterfeiting and Computer Security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-76eda6a4d2ee2ee3de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-76eda6a4d2ee2ee3de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/108_The_Convergence_of_Anti-Counterfeiting_and_Computer_Security","url":"https://api.media.ccc.de/public/events/import-76eda6a4d2ee2ee3de","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[],"recordings":[{"size":42,"length":2710,"mime_type":"video/mp4","language":"eng","filename":"108 The Convergence of Anti-Counterfeiting and Computer Security.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:13.019+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/108 The Convergence of Anti-Counterfeiting and Computer Security.mp4","url":"https://api.media.ccc.de/public/recordings/1405","event_url":"https://api.media.ccc.de/public/events/import-76eda6a4d2ee2ee3de","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}