{"guid":"import-46ee25357ca568906f","title":"Chip Reverse Engineering","subtitle":null,"slug":"25c3-2896-en-chip_reverse_engineering","link":"http://events.ccc.de/congress/2008/Fahrplan/events/2896.en.html","description":"Cryptographic algorithms are often kept secret in the false belief that this provides security. To find and analyze these algorithms, we reverse-engineering the silicon chips that implement them.\n","original_language":"eng","persons":["Karsten Nohl","starbug"],"tags":["25c3"," Hacking"],"view_count":361,"promoted":false,"date":"2008-12-27T01:00:00.000+01:00","release_date":"2008-12-30T01:00:00.000+01:00","updated_at":"2026-02-26T12:45:08.121+01:00","length":2696,"duration":2696,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-2896-en-chip_reverse_engineering.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-2896-en-chip_reverse_engineering_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-46ee25357ca568906f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-46ee25357ca568906f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-2896-en-chip_reverse_engineering","url":"https://api.media.ccc.de/public/events/import-46ee25357ca568906f","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":198,"event_guid":"import-b962abe26523d75e2c","weight":3},{"event_id":232,"event_guid":"import-2d5bd827dc1780ab66","weight":2},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":2},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":3},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":2},{"event_id":1313,"event_guid":"import-ab7c839b128736450c","weight":2},{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":3},{"event_id":1331,"event_guid":"import-b6d9b9d565c00a5acb","weight":4},{"event_id":1350,"event_guid":"import-bbaef39cd440f712fd","weight":2},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":2},{"event_id":1503,"event_guid":"import-019cfe6488a1c1abe9","weight":2},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":2},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":3},{"event_id":2216,"event_guid":"A8xVpIjX1oKQOQcWMt_49Q","weight":3},{"event_id":3482,"event_guid":"420d4364-a10e-49ec-aa95-387bd5334aa4","weight":3},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":5},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":2},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":3},{"event_id":5027,"event_guid":"e213beae-6b9a-48fd-b3c5-7036a4e530ac","weight":3},{"event_id":5709,"event_guid":"cbe1f8bd-13bb-5ff3-965f-c1e5e2c2abd8","weight":4},{"event_id":6724,"event_guid":"3424364c-cbd5-58da-ad91-5bef295f6146","weight":3}],"recordings":[{"size":345,"length":2696,"mime_type":"audio/ogg","language":"eng","filename":"25c3-2896-en-chip_reverse_engineering.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:45.381+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-2896-en-chip_reverse_engineering.ogg","url":"https://api.media.ccc.de/public/recordings/2211","event_url":"https://api.media.ccc.de/public/events/import-46ee25357ca568906f","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":345,"length":2696,"mime_type":"video/mp4","language":"eng","filename":"25c3-2896-en-chip_reverse_engineering.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.551+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2896-en-chip_reverse_engineering.mp4","url":"https://api.media.ccc.de/public/recordings/2210","event_url":"https://api.media.ccc.de/public/events/import-46ee25357ca568906f","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":345,"length":2696,"mime_type":"video/webm","language":"eng","filename":"25c3-2896-en-chip_reverse_engineering.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.579+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-2896-en-chip_reverse_engineering.webm","url":"https://api.media.ccc.de/public/recordings/2209","event_url":"https://api.media.ccc.de/public/events/import-46ee25357ca568906f","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}