{"guid":"import-5386a3e6361b34fd2c","title":"Der Hackerparagraph 202c StGB","subtitle":"Bestandsaufnahme und Auswirkungen","slug":"25c3-3028-de-der_hackerparagraph_202c_stgb","link":"http://events.ccc.de/congress/2008/Fahrplan/events/3028.en.html","description":"Es wird Zeit, dass wir mal über die Dinge sprechen, die wir seit dem Inkrafttreten des Hackerparagraphen nicht mehr machen können.\nUnd die Dinge, bei denen wir uns nicht sicher sind, ob wir sie machen können, und daher lieber sein lassen.\n","original_language":"eng","persons":["Felix von Leitner","Jürgen Schmidt","Jan Münther","lexi"],"tags":["25c3"," Hacking"],"view_count":681,"promoted":false,"date":"2008-12-27T01:00:00.000+01:00","release_date":"2008-12-30T01:00:00.000+01:00","updated_at":"2026-03-31T02:15:04.848+02:00","length":3678,"duration":3678,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-3028-de-der_hackerparagraph_202c_stgb.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-3028-de-der_hackerparagraph_202c_stgb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-5386a3e6361b34fd2c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-5386a3e6361b34fd2c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-3028-de-der_hackerparagraph_202c_stgb","url":"https://api.media.ccc.de/public/events/import-5386a3e6361b34fd2c","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":106,"event_guid":"import-c6b33fcb2523d7b8e4","weight":2},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":4},{"event_id":1110,"event_guid":"import-b59b49e433ecf74450","weight":2},{"event_id":1120,"event_guid":"import-6208bdaf46f4c64c2b","weight":2},{"event_id":1290,"event_guid":"import-7fdd19a6d7f3fa79ff","weight":2},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":2},{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":2},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":3},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":2},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":3},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":3},{"event_id":2281,"event_guid":"7f270061-0231-41d4-b50c-f1017231c534","weight":2},{"event_id":2406,"event_guid":"680d0aea18aa6ba03f104efcd2bac2f3","weight":2},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":3}],"recordings":[{"size":470,"length":3678,"mime_type":"audio/ogg","language":"eng","filename":"25c3-3028-de-der_hackerparagraph_202c_stgb.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:46.191+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-3028-de-der_hackerparagraph_202c_stgb.ogg","url":"https://api.media.ccc.de/public/recordings/2280","event_url":"https://api.media.ccc.de/public/events/import-5386a3e6361b34fd2c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":470,"length":3678,"mime_type":"video/mp4","language":"eng","filename":"25c3-3028-de-der_hackerparagraph_202c_stgb.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:32.861+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3028-de-der_hackerparagraph_202c_stgb.mp4","url":"https://api.media.ccc.de/public/recordings/2279","event_url":"https://api.media.ccc.de/public/events/import-5386a3e6361b34fd2c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":470,"length":3678,"mime_type":"video/webm","language":"eng","filename":"25c3-3028-de-der_hackerparagraph_202c_stgb.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:32.888+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-3028-de-der_hackerparagraph_202c_stgb.webm","url":"https://api.media.ccc.de/public/recordings/2278","event_url":"https://api.media.ccc.de/public/events/import-5386a3e6361b34fd2c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}