{"guid":"import-340bde5c179b953db1","title":"device hacking with jtag (653)","subtitle":null,"slug":"20C3-653-Device_hacking_with_JTAG","link":"http://www.ccc.de/congress/2003/fahrplan/event/653.en.html","description":"\n","original_language":"eng","persons":[],"tags":["20c3"],"view_count":145,"promoted":false,"date":"2003-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2026-01-16T12:15:13.442+01:00","length":3396,"duration":3396,"thumb_url":"https://static.media.ccc.de/media/congress/2003/20C3-653-Device_hacking_with_JTAG.jpg","poster_url":"https://static.media.ccc.de/media/congress/2003/20C3-653-Device_hacking_with_JTAG_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2003/import-340bde5c179b953db1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2003/import-340bde5c179b953db1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/20C3-653-Device_hacking_with_JTAG","url":"https://api.media.ccc.de/public/events/import-340bde5c179b953db1","conference_title":"20C3: Not a Number","conference_url":"https://api.media.ccc.de/public/conferences/20c3","related":[{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":2},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":2},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":2},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":4},{"event_id":728,"event_guid":"import-e7492b8aa05ee34d8c","weight":2},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":2},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":3},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":2},{"event_id":753,"event_guid":"import-677c2c0d3542346fc9","weight":2},{"event_id":765,"event_guid":"import-ec99415102c530a179","weight":3},{"event_id":767,"event_guid":"import-5ef6c0095ecebf6a2f","weight":2},{"event_id":775,"event_guid":"import-b6cd88dc4ad69cbd83","weight":2},{"event_id":785,"event_guid":"import-5a1d49359193696c0a","weight":2},{"event_id":786,"event_guid":"import-3a321d392c06b04b13","weight":2},{"event_id":792,"event_guid":"import-c9abd3b976735dc512","weight":3},{"event_id":794,"event_guid":"import-df3783d5d17fb941e9","weight":2},{"event_id":795,"event_guid":"import-4fe70f274d636f9fcb","weight":3},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":2},{"event_id":1398,"event_guid":"import-4cd820d77b40b4b492","weight":2},{"event_id":1407,"event_guid":"import-aa97ee865d5e945700","weight":8},{"event_id":1470,"event_guid":"import-384abf403ee27a0804","weight":10},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":2},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":2}],"recordings":[{"size":null,"length":5734,"mime_type":"video/mp4","language":"eng","filename":"20C3-653-Device_hacking_with_JTAG.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:11.148+01:00","recording_url":"https://cdn.media.ccc.de/congress/2003/mp4/20C3-653-Device_hacking_with_JTAG.mp4","url":"https://api.media.ccc.de/public/recordings/3987","event_url":"https://api.media.ccc.de/public/events/import-340bde5c179b953db1","conference_url":"https://api.media.ccc.de/public/conferences/20c3"},{"size":null,"length":3396,"mime_type":"audio/ogg","language":"eng","filename":"20c3_653_Device-Hackling-with-JTAG.ogg","state":"downloaded","folder":"audio","high_quality":true,"width":null,"height":null,"updated_at":"2014-06-29T00:22:38.341+02:00","recording_url":"https://cdn.media.ccc.de/congress/2003/audio/20c3_653_Device-Hackling-with-JTAG.ogg","url":"https://api.media.ccc.de/public/recordings/4107","event_url":"https://api.media.ccc.de/public/events/import-340bde5c179b953db1","conference_url":"https://api.media.ccc.de/public/conferences/20c3"}]}