{"guid":"import-45de35e744bc8f1d4c","title":"Security Nightmares 2009 (English interpretation)","subtitle":"Or: about what we will laugh next year","slug":"25c3-3058-en-security_nightmares_2009_english_interpretation","link":"http://events.ccc.de/congress/2008/Fahrplan/events/3058.en.html","description":"English Interpretation and video transmission of the event in Saal 1\n\nSecurity Nightmares – the yearly review on IT-Security and a look into the crystal ball for next year.\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["25c3"," Hacking"],"view_count":35,"promoted":false,"date":"2008-12-30T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2026-03-18T12:45:09.852+01:00","length":5561,"duration":5561,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-3058-en-security_nightmares_2009_english_interpretation.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-3058-en-security_nightmares_2009_english_interpretation_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-45de35e744bc8f1d4c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-45de35e744bc8f1d4c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-3058-en-security_nightmares_2009_english_interpretation","url":"https://api.media.ccc.de/public/events/import-45de35e744bc8f1d4c","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":1276,"event_guid":"import-2d0ce4e9cfeb6f9f7d","weight":1},{"event_id":1278,"event_guid":"import-c061c38bfc1a4656a5","weight":1},{"event_id":1305,"event_guid":"import-70fdf2e68b2b8c4ea2","weight":1},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":4},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2}],"recordings":[{"size":709,"length":5561,"mime_type":"audio/ogg","language":"eng","filename":"25c3-3058-en-security_nightmares_2009_english_interpretation.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:45.532+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-3058-en-security_nightmares_2009_english_interpretation.ogg","url":"https://api.media.ccc.de/public/recordings/2226","event_url":"https://api.media.ccc.de/public/events/import-45de35e744bc8f1d4c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":709,"length":5561,"mime_type":"video/webm","language":"eng","filename":"25c3-3058-en-security_nightmares_2009_english_interpretation.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.889+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-3058-en-security_nightmares_2009_english_interpretation.webm","url":"https://api.media.ccc.de/public/recordings/2224","event_url":"https://api.media.ccc.de/public/events/import-45de35e744bc8f1d4c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":709,"length":5561,"mime_type":"video/mp4","language":"eng","filename":"25c3-3058-en-security_nightmares_2009_english_interpretation.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.859+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3058-en-security_nightmares_2009_english_interpretation.mp4","url":"https://api.media.ccc.de/public/recordings/2225","event_url":"https://api.media.ccc.de/public/events/import-45de35e744bc8f1d4c","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}