{"guid":"import-7cf3890d64fd07e22e","title":"Security Nightmares","subtitle":null,"slug":"26c3-3687-de-security_nightmares","link":"http://events.ccc.de/congress/2009/Fahrplan/events/3687.en.html","description":"Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["26c3"," Community"],"view_count":860,"promoted":false,"date":"2009-12-30T01:00:00.000+01:00","release_date":"2010-01-02T01:00:00.000+01:00","updated_at":"2026-03-22T10:45:07.832+01:00","length":5145,"duration":5145,"thumb_url":"https://static.media.ccc.de/media/congress/2009/26c3-3687-de-security_nightmares.jpg","poster_url":"https://static.media.ccc.de/media/congress/2009/26c3-3687-de-security_nightmares_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2009/import-7cf3890d64fd07e22e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2009/import-7cf3890d64fd07e22e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/26c3-3687-de-security_nightmares","url":"https://api.media.ccc.de/public/events/import-7cf3890d64fd07e22e","conference_title":"26C3: Here be Dragons","conference_url":"https://api.media.ccc.de/public/conferences/26c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":7},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":6},{"event_id":919,"event_guid":"import-43cdf8a139f4c9aa7d","weight":6},{"event_id":1099,"event_guid":"import-a4d9fc832b17c561de","weight":3},{"event_id":1183,"event_guid":"import-64027c5bdfa497cfab","weight":5},{"event_id":1294,"event_guid":"import-e1bb0bdd72e1b3b9c2","weight":3},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":21},{"event_id":1356,"event_guid":"import-79abc6678b832816fd","weight":3},{"event_id":1362,"event_guid":"import-5f693514aee8848fb2","weight":2},{"event_id":1367,"event_guid":"import-71e21240c5411bc6a6","weight":3},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":5},{"event_id":1387,"event_guid":"import-5c5387aa75445aa216","weight":5},{"event_id":1407,"event_guid":"import-aa97ee865d5e945700","weight":3},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":10},{"event_id":1432,"event_guid":"import-471cc3975501e96422","weight":2},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":17},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":3},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":9},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":5},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":3},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":8},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":5},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":4},{"event_id":2766,"event_guid":"3d7c49e7-7e31-11e5-b91e-b21625562c7b","weight":3},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":3},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":5}],"recordings":[{"size":961,"length":5145,"mime_type":"audio/ogg","language":"eng","filename":"26c3-3687-de-security_nightmares.ogg","state":"downloaded","folder":"ogg","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:48.915+02:00","recording_url":"https://cdn.media.ccc.de/congress/2009/ogg/26c3-3687-de-security_nightmares.ogg","url":"https://api.media.ccc.de/public/recordings/2502","event_url":"https://api.media.ccc.de/public/events/import-7cf3890d64fd07e22e","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":961,"length":5145,"mime_type":"video/mp4","language":"eng","filename":"26c3-3687-de-security_nightmares.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:37.318+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/mp4/26c3-3687-de-security_nightmares.mp4","url":"https://api.media.ccc.de/public/recordings/2501","event_url":"https://api.media.ccc.de/public/events/import-7cf3890d64fd07e22e","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":961,"length":5145,"mime_type":"video/webm","language":"eng","filename":"26c3-3687-de-security_nightmares.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:37.349+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/webm/26c3-3687-de-security_nightmares.webm","url":"https://api.media.ccc.de/public/recordings/2500","event_url":"https://api.media.ccc.de/public/events/import-7cf3890d64fd07e22e","conference_url":"https://api.media.ccc.de/public/conferences/26c3"}]}