{"guid":"import-54bf3922b45e891012","title":"DC+, The Protocol","subtitle":"Technical defense against data retention law","slug":"28c3-4723-en-dc_plus_the_protocol","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4723.en.html","description":"The idea of Dining Cryptographers-Networks (DC) offers a much better anonymity compared to MIX-Networks: Defined anonymity sets, no need to trust in a central service, no possible attack for data retention.\n","original_language":"eng","persons":["klobs"],"tags":["28c3"," Hacking"],"view_count":105,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-06-18T16:15:05.942+02:00","length":2512,"duration":2512,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4723-en-dc_plus_the_protocol_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4723-en-dc_plus_the_protocol_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-54bf3922b45e891012-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-54bf3922b45e891012-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4723-en-dc_plus_the_protocol","url":"https://api.media.ccc.de/public/events/import-54bf3922b45e891012","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":201,"event_guid":"import-5b4b173ddd025d8b13","weight":2},{"event_id":1216,"event_guid":"import-4b94dd0c19479fda5f","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1560,"event_guid":"import-c61c6c2185e39fe0a2","weight":2},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2}],"recordings":[{"size":263,"length":2512,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4723-en-dc_plus_the_protocol.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:43.920+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4723-en-dc_plus_the_protocol.ogg","url":"https://api.media.ccc.de/public/recordings/3007","event_url":"https://api.media.ccc.de/public/events/import-54bf3922b45e891012","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":263,"length":2512,"mime_type":"video/webm","language":"eng","filename":"28c3-4723-en-dc_plus_the_protocol.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:47.505+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4723-en-dc_plus_the_protocol.webm","url":"https://api.media.ccc.de/public/recordings/3006","event_url":"https://api.media.ccc.de/public/events/import-54bf3922b45e891012","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}