{"guid":"import-497322ce1a89f08a20","title":"Vertex Hacking","subtitle":"Reverse Engineering von 3D-Dateiformaten","slug":"25c3-2942-de-vertex_hacking","link":"http://events.ccc.de/congress/2008/Fahrplan/events/2942.en.html","description":"Es geht um die Methoden beim Umgang mit unbekannten Dateiformaten, speziell im Bereich der 3D-Modelle. Vorgestellt werden sollen die Werkzeuge, die Vorgehensweise, ein paar mögliche Fallstricke, interessante Implementierungsdetails und schlussendlich auch das Ergebnis in Form der Bibliothek libg3d.\n","original_language":"eng","persons":["Markus Dahms"],"tags":["25c3"," Hacking"],"view_count":28,"promoted":false,"date":"2008-12-30T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2026-02-03T05:30:03.678+01:00","length":2936,"duration":2936,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-2942-de-vertex_hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-2942-de-vertex_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-497322ce1a89f08a20-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-497322ce1a89f08a20-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-2942-de-vertex_hacking","url":"https://api.media.ccc.de/public/events/import-497322ce1a89f08a20","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":1},{"event_id":1343,"event_guid":"import-dec7979f6876685173","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1}],"recordings":[{"size":376,"length":2936,"mime_type":"audio/ogg","language":"eng","filename":"25c3-2942-de-vertex_hacking.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:45.117+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-2942-de-vertex_hacking.ogg","url":"https://api.media.ccc.de/public/recordings/2196","event_url":"https://api.media.ccc.de/public/events/import-497322ce1a89f08a20","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":376,"length":2936,"mime_type":"video/mp4","language":"eng","filename":"25c3-2942-de-vertex_hacking.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.255+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2942-de-vertex_hacking.mp4","url":"https://api.media.ccc.de/public/recordings/2195","event_url":"https://api.media.ccc.de/public/events/import-497322ce1a89f08a20","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":376,"length":2936,"mime_type":"video/webm","language":"eng","filename":"25c3-2942-de-vertex_hacking.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.286+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-2942-de-vertex_hacking.webm","url":"https://api.media.ccc.de/public/recordings/2194","event_url":"https://api.media.ccc.de/public/events/import-497322ce1a89f08a20","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}