{"guid":"import-efd5abc0c512df9166","title":"The Hidden Nemesis","subtitle":"Backdooring Embedded Controllers","slug":"27c3-4174-en-the_hidden_nemesis","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4174.en.html","description":"Want to persistently backdoor a laptop? Backdooring the BIOS is out of the question since your target can dump and diff it? Planting hardware is out of the question as well? Shhhhhhh.. I have something for you:\n","original_language":"eng","persons":["Ralf-Philipp Weinmann"],"tags":["27c3"," Hacking"],"view_count":185,"promoted":false,"date":"2010-12-28T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2025-11-01T14:45:04.564+01:00","length":2834,"duration":2834,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4174-en-the_hidden_nemesis.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4174-en-the_hidden_nemesis_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-efd5abc0c512df9166-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-efd5abc0c512df9166-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4174-en-the_hidden_nemesis","url":"https://api.media.ccc.de/public/events/import-efd5abc0c512df9166","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":1490,"event_guid":"import-d38b66f7dfefe277e4","weight":2},{"event_id":1494,"event_guid":"import-5e7a01265ce6066f76","weight":2},{"event_id":1512,"event_guid":"import-79dd14a9f3d562f20e","weight":3},{"event_id":1548,"event_guid":"import-c55c543fed3dbc291f","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1733,"event_guid":"QszoY6oJD6rpkbsTRQinRA","weight":5},{"event_id":1981,"event_guid":"FqITQxsZ3GJ3mETYBdzW8w","weight":2}],"recordings":[{"size":625,"length":2834,"mime_type":"audio/ogg","language":"eng","filename":"27c3-4174-en-the_hidden_nemesis.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:51.385+02:00","recording_url":"https://cdn.media.ccc.de/congress/2010/ogg-audio-only/27c3-4174-en-the_hidden_nemesis.ogg","url":"https://api.media.ccc.de/public/recordings/2701","event_url":"https://api.media.ccc.de/public/events/import-efd5abc0c512df9166","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":625,"length":2834,"mime_type":"video/mp4","language":"eng","filename":"27c3-4174-en-the_hidden_nemesis.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:41.320+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/mp4-h264-HQ/27c3-4174-en-the_hidden_nemesis.mp4","url":"https://api.media.ccc.de/public/recordings/2700","event_url":"https://api.media.ccc.de/public/events/import-efd5abc0c512df9166","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":625,"length":2834,"mime_type":"video/webm","language":"eng","filename":"27c3-4174-en-the_hidden_nemesis.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:41.346+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/webm/27c3-4174-en-the_hidden_nemesis.webm","url":"https://api.media.ccc.de/public/recordings/2699","event_url":"https://api.media.ccc.de/public/events/import-efd5abc0c512df9166","conference_url":"https://api.media.ccc.de/public/conferences/27c3"}]}