{"guid":"import-4a118e414c2784362b","title":"Hacking fingerprint recognition systems","subtitle":"Kann ich dir ein Bier ausgeben?","slug":"23C3-1578-de-hacking_fingerprint_recognition_systems","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1578.en.html","description":"Der Vortrag stellt Wege und Werkzeuge vor um aus unterschiedlichen Quellen Bilder für die Herstellung von Fingerabdruckattrappen zu gewinnen.\n","original_language":"eng","persons":["starbug"],"view_count":546,"promoted":false,"date":"2006-12-27T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-04-16T22:30:05.413+02:00","tags":["23c3"," Hacking"],"length":3637,"duration":3637,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1578-de-hacking_fingerprint_recognition_systems.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1578-de-hacking_fingerprint_recognition_systems_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-4a118e414c2784362b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-4a118e414c2784362b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1578-de-hacking_fingerprint_recognition_systems","url":"https://api.media.ccc.de/public/events/import-4a118e414c2784362b","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":1191,"event_guid":"import-abd15b15cfcf4226f9","weight":14},{"event_id":1935,"event_guid":"Uo38_f5Bc4djTtf3Phgwzw","weight":11},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":14},{"event_id":2438,"event_guid":"ba45991d-6548-4a8f-90d8-da72fd417f89","weight":5},{"event_id":3852,"event_guid":"6c673b80-3f20-11e7-81b0-83993a7ef3dd","weight":5},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":9}],"recordings":[{"size":198,"length":3637,"mime_type":"audio/mpeg","language":"eng","filename":"23C3-1578-de-hacking_fingerprint_recognition_systems.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":640,"height":480,"updated_at":"2014-05-10T15:26:40.428+02:00","recording_url":"https://cdn.media.ccc.de/congress/2006/audio/23C3-1578-de-hacking_fingerprint_recognition_systems.mp3","url":"https://api.media.ccc.de/public/recordings/1923","event_url":"https://api.media.ccc.de/public/events/import-4a118e414c2784362b","conference_url":"https://api.media.ccc.de/public/conferences/23c3"},{"size":198,"length":3637,"mime_type":"video/mp4","language":"eng","filename":"23C3-1578-de-hacking_fingerprint_recognition_systems.m4v","state":"downloaded","folder":"video","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:22.584+01:00","recording_url":"https://cdn.media.ccc.de/congress/2006/video/23C3-1578-de-hacking_fingerprint_recognition_systems.m4v","url":"https://api.media.ccc.de/public/recordings/1922","event_url":"https://api.media.ccc.de/public/events/import-4a118e414c2784362b","conference_url":"https://api.media.ccc.de/public/conferences/23c3"}]}