{"guid":"import-b00e23ddd70d2f59fb","title":"Defending mobile phones","subtitle":null,"slug":"28c3-4736-en-defending_mobile_phones","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4736.en.html","description":"Cell phone users face an increasing frequency and depth of privacy intruding attacks. Defense knowledge has not scaled at the same speed as attack capabilities. This talk intends to revert this imbalance.\n","original_language":"eng","persons":["Karsten Nohl","Luca Melette"],"tags":["28c3"," Hacking"],"view_count":443,"promoted":false,"date":"2011-12-27T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2025-11-19T10:15:04.398+01:00","length":3460,"duration":3460,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4736-en-defending_mobile_phones_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4736-en-defending_mobile_phones_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-b00e23ddd70d2f59fb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-b00e23ddd70d2f59fb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4736-en-defending_mobile_phones","url":"https://api.media.ccc.de/public/events/import-b00e23ddd70d2f59fb","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":3},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":2},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":2},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":3},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1718,"event_guid":"import-290f7b71026756648d","weight":2},{"event_id":1835,"event_guid":"xdX27wLbHpeOU_dSgBO4Hg","weight":5},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":9},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":4},{"event_id":2835,"event_guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","weight":2},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":4},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":2},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":2},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":2}],"recordings":[{"size":355,"length":3460,"mime_type":"video/webm","language":"eng","filename":"28c3-4736-en-defending_mobile_phones.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:48.974+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4736-en-defending_mobile_phones.webm","url":"https://api.media.ccc.de/public/recordings/3088","event_url":"https://api.media.ccc.de/public/events/import-b00e23ddd70d2f59fb","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":355,"length":3460,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4736-en-defending_mobile_phones.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:44.351+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4736-en-defending_mobile_phones.ogg","url":"https://api.media.ccc.de/public/recordings/3089","event_url":"https://api.media.ccc.de/public/events/import-b00e23ddd70d2f59fb","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}