{"guid":"import-d02ddb495b4b473e05","title":"Why were we so vulnerable to the DNS vulnerability?","subtitle":null,"slug":"25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability","link":"http://events.ccc.de/congress/2008/Fahrplan/events/2906.en.html","description":"SSL wasn't enough. Encryption is nonexistent. Autoupdaters are horribly broken. Why is all this the case?\n","original_language":"eng","persons":["Dan Kaminsky"],"tags":["25c3"," Hacking"],"view_count":205,"promoted":false,"date":"2008-12-27T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2025-12-14T22:15:06.324+01:00","length":4365,"duration":4365,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-d02ddb495b4b473e05-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-d02ddb495b4b473e05-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability","url":"https://api.media.ccc.de/public/events/import-d02ddb495b4b473e05","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":1},{"event_id":1180,"event_guid":"import-5fa00c37cb75885d36","weight":1},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":1},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":1},{"event_id":1301,"event_guid":"import-eac758740ecd962c0b","weight":1},{"event_id":1313,"event_guid":"import-ab7c839b128736450c","weight":1},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":1},{"event_id":1325,"event_guid":"import-57c2428d76aa862a32","weight":1},{"event_id":1347,"event_guid":"import-a7dc5a6ad09460f44a","weight":1},{"event_id":1348,"event_guid":"import-d5861b6d900f059aee","weight":1},{"event_id":1389,"event_guid":"import-5e05e9fcc28e3e5161","weight":1},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":1},{"event_id":1656,"event_guid":"import-3a9c3e4299e46ec310","weight":1},{"event_id":1823,"event_guid":"iDmPzetx6AuUFOlW1qFWig","weight":2},{"event_id":2164,"event_guid":"XGqu620EKR92-WUWMXNRvA","weight":1},{"event_id":2168,"event_guid":"AvAdq20cdc8iWoNubd6ABw","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":1},{"event_id":2945,"event_guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","weight":1},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1}],"recordings":[{"size":557,"length":4365,"mime_type":"audio/ogg","language":"eng","filename":"25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:46.963+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg","url":"https://api.media.ccc.de/public/recordings/2344","event_url":"https://api.media.ccc.de/public/events/import-d02ddb495b4b473e05","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":557,"length":4365,"mime_type":"video/mp4","language":"eng","filename":"25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.107+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4","url":"https://api.media.ccc.de/public/recordings/2343","event_url":"https://api.media.ccc.de/public/events/import-d02ddb495b4b473e05","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":557,"length":4365,"mime_type":"video/webm","language":"eng","filename":"25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.134+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.webm","url":"https://api.media.ccc.de/public/recordings/2342","event_url":"https://api.media.ccc.de/public/events/import-d02ddb495b4b473e05","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}