{"guid":"import-9d9c56ae1d5816730b","title":"Datamining for Hackers","subtitle":"Encrypted Traffic Mining","slug":"28c3-4732-en-datamining_for_hackers","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4732.en.html","description":"This talk presents Traffic Mining (TM) particularly in regard to VoiP applications such as Skype. TM is a method to digest and understand large quantities of data.\n","original_language":"eng","persons":["Stefan Burschka"],"tags":["28c3"," Hacking"],"view_count":178,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-10-19T07:45:03.831+02:00","length":3286,"duration":3286,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4732-en-datamining_for_hackers_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4732-en-datamining_for_hackers_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-9d9c56ae1d5816730b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-9d9c56ae1d5816730b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4732-en-datamining_for_hackers","url":"https://api.media.ccc.de/public/events/import-9d9c56ae1d5816730b","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":2},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":2},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":3},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1772,"event_guid":"seTBwtIxwEedOMpITZG7EQ","weight":3},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":3}],"recordings":[{"size":446,"length":3286,"mime_type":"video/webm","language":"eng","filename":"28c3-4732-en-datamining_for_hackers.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:47.171+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4732-en-datamining_for_hackers.webm","url":"https://api.media.ccc.de/public/recordings/2986","event_url":"https://api.media.ccc.de/public/events/import-9d9c56ae1d5816730b","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":446,"length":3286,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4732-en-datamining_for_hackers.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:43.820+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4732-en-datamining_for_hackers.ogg","url":"https://api.media.ccc.de/public/recordings/2987","event_url":"https://api.media.ccc.de/public/events/import-9d9c56ae1d5816730b","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}