{"guid":"import-6809edc70e003b4ece","title":"RFID hacking","subtitle":null,"slug":"23C3-1576-en-rfid_hacking","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1576.en.html","description":"This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.\n","original_language":"eng","persons":["Karsten Nohl","Henryk Plötz","z0ccor"],"view_count":411,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-09T12:00:06.614+01:00","tags":["23c3"," Hacking"],"length":3502,"duration":3502,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1576-en-rfid_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1576-en-rfid_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-6809edc70e003b4ece-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-6809edc70e003b4ece-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1576-en-rfid_hacking","url":"https://api.media.ccc.de/public/events/import-6809edc70e003b4ece","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":118,"event_guid":"import-1f4121511842b31d10","weight":4},{"event_id":656,"event_guid":"import-be8c7f62fda931eaa6","weight":9},{"event_id":1046,"event_guid":"import-c39609eaa4f8ce253f","weight":6},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":23},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":6},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":15},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":5},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":8}],"recordings":[{"size":218,"length":3502,"mime_type":"audio/mpeg","language":"eng","filename":"23C3-1576-en-rfid_hacking.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":640,"height":480,"updated_at":"2014-05-10T15:26:39.451+02:00","recording_url":"https://cdn.media.ccc.de/congress/2006/audio/23C3-1576-en-rfid_hacking.mp3","url":"https://api.media.ccc.de/public/recordings/1851","event_url":"https://api.media.ccc.de/public/events/import-6809edc70e003b4ece","conference_url":"https://api.media.ccc.de/public/conferences/23c3"},{"size":218,"length":3502,"mime_type":"video/mp4","language":"eng","filename":"23C3-1576-en-rfid_hacking.m4v","state":"downloaded","folder":"video","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:21.293+01:00","recording_url":"https://cdn.media.ccc.de/congress/2006/video/23C3-1576-en-rfid_hacking.m4v","url":"https://api.media.ccc.de/public/recordings/1850","event_url":"https://api.media.ccc.de/public/events/import-6809edc70e003b4ece","conference_url":"https://api.media.ccc.de/public/conferences/23c3"}]}