{"guid":"import-85069872c1089c4360","title":"Security Nightmares 2009","subtitle":"Oder: worüber wir nächstes Jahr lachen werden","slug":"25c3-3021-de-security_nightmares_2009","link":"http://events.ccc.de/congress/2008/Fahrplan/events/3021.en.html","description":"Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für's nächste Jahr.\n","original_language":"eng","persons":["Ron","Frank Rieger"],"view_count":572,"promoted":false,"date":"2008-12-30T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2026-03-05T14:30:05.693+01:00","tags":["25c3"," Hacking"],"length":5665,"duration":5665,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-3021-de-security_nightmares_2009.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-3021-de-security_nightmares_2009_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-85069872c1089c4360-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-85069872c1089c4360-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-3021-de-security_nightmares_2009","url":"https://api.media.ccc.de/public/events/import-85069872c1089c4360","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":12},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":11},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":11},{"event_id":926,"event_guid":"import-cb5f27e03d80c27f3f","weight":3},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":12},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":25},{"event_id":1253,"event_guid":"import-7bc2b53aa12cb15369","weight":2},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":5},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":11},{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":4},{"event_id":1329,"event_guid":"import-5d3fe535916c811ae9","weight":3},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":21},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":7},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":3}],"recordings":[{"size":722,"length":5665,"mime_type":"audio/ogg","language":"eng","filename":"25c3-3021-de-security_nightmares_2009.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:46.462+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-3021-de-security_nightmares_2009.ogg","url":"https://api.media.ccc.de/public/recordings/2306","event_url":"https://api.media.ccc.de/public/events/import-85069872c1089c4360","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":722,"length":5665,"mime_type":"video/mp4","language":"eng","filename":"25c3-3021-de-security_nightmares_2009.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:33.350+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3021-de-security_nightmares_2009.mp4","url":"https://api.media.ccc.de/public/recordings/2305","event_url":"https://api.media.ccc.de/public/events/import-85069872c1089c4360","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":722,"length":5665,"mime_type":"video/webm","language":"eng","filename":"25c3-3021-de-security_nightmares_2009.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:33.376+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-3021-de-security_nightmares_2009.webm","url":"https://api.media.ccc.de/public/recordings/2304","event_url":"https://api.media.ccc.de/public/events/import-85069872c1089c4360","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}