{"guid":"import-b766adc19ddd01d9b4","title":"Secure Code","subtitle":"Why developing Secure Software is like playing Marble Madness","slug":"22C3-530-en-seccode","link":"http://events.ccc.de/congress/2005/fahrplan/events/530.en.html","description":"This talk will introduce new strategies for dealing with entire bug classes, and removing bug attractors from development environments.\n","original_language":"eng","persons":["Paul Böhm"],"tags":["22c3"," Hacking"],"view_count":38,"promoted":false,"date":"2005-12-30T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2024-02-08T11:15:05.510+01:00","length":3460,"duration":3460,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-530-en-seccode.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-530-en-seccode_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-b766adc19ddd01d9b4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-b766adc19ddd01d9b4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-530-en-seccode","url":"https://api.media.ccc.de/public/events/import-b766adc19ddd01d9b4","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":918,"event_guid":"import-d64bd455642b344372","weight":1},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":1},{"event_id":929,"event_guid":"import-184dd05c328f44989b","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":932,"event_guid":"import-ac419b4bf7a1293785","weight":1},{"event_id":947,"event_guid":"import-57a636234323b47cae","weight":1},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":1},{"event_id":968,"event_guid":"import-2c717701c0484bd4cd","weight":1},{"event_id":983,"event_guid":"import-bf4c76c8a7eb2cf7b1","weight":1},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":991,"event_guid":"import-714a2f9e3b449a1b2d","weight":1},{"event_id":996,"event_guid":"import-38c2dd9d642c6ca79a","weight":1},{"event_id":1016,"event_guid":"import-d4541c93c84d480010","weight":1},{"event_id":1028,"event_guid":"import-f46b9a6a2d546305c8","weight":2},{"event_id":1034,"event_guid":"import-475cf38d0e695ee755","weight":1},{"event_id":1038,"event_guid":"import-5c42eac0076c9f5ef9","weight":1},{"event_id":1273,"event_guid":"import-185c5941b7063fd2b7","weight":1},{"event_id":1814,"event_guid":"3HEv_YYlkY2P_y1pKfU7fA","weight":1}],"recordings":[{"size":121,"length":3460,"mime_type":"audio/ogg","language":"eng","filename":"22C3-530-en-seccode.ogg","state":"downloaded","folder":"lectures/audio/ogg","high_quality":true,"width":320,"height":240,"updated_at":"2014-05-10T15:26:39.078+02:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/audio/ogg/22C3-530-en-seccode.ogg","url":"https://api.media.ccc.de/public/recordings/1829","event_url":"https://api.media.ccc.de/public/events/import-b766adc19ddd01d9b4","conference_url":"https://api.media.ccc.de/public/conferences/22c3"},{"size":121,"length":3460,"mime_type":"video/mp4","language":"eng","filename":"22C3-530-en-seccode.m4v","state":"downloaded","folder":"lectures/video/mp4-avc/320x240","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:20.835+01:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-530-en-seccode.m4v","url":"https://api.media.ccc.de/public/recordings/1828","event_url":"https://api.media.ccc.de/public/events/import-b766adc19ddd01d9b4","conference_url":"https://api.media.ccc.de/public/conferences/22c3"}]}