{"guid":"import-ebb5f5ebcd563a0fe1","title":"TRESOR: Festplatten sicher verschlüsseln","subtitle":null,"slug":"28c3-4869-de-tresor","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4869.en.html","description":"Herkömmliche Festplattenverschlüsselungen legen notwendige Schlüssel im RAM ab. Dadurch sind sie schutzlos Angriffen wie Cold-Boot Attacken ausgeliefert, die auf den Arbeitsspeicher abzielen. TRESOR bietet Schutz gegen solche Angriffe.\n","original_language":"eng","persons":["tilo"],"tags":["28c3"," Hacking"],"view_count":537,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-25T15:00:11.073+01:00","length":2029,"duration":2029,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4869-de-tresor_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4869-de-tresor_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-ebb5f5ebcd563a0fe1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-ebb5f5ebcd563a0fe1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4869-de-tresor","url":"https://api.media.ccc.de/public/events/import-ebb5f5ebcd563a0fe1","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":559,"event_guid":"import-2c20624cc84bc563a2","weight":4},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":4},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":3},{"event_id":1561,"event_guid":"import-c6b8001e6cb02d5992","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":2},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":2},{"event_id":1602,"event_guid":"import-77160932cc8cb0a44f","weight":3},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":2},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":5},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":3},{"event_id":4976,"event_guid":"cf5cdd13-5557-4440-93cd-9645be4a362b","weight":2},{"event_id":4989,"event_guid":"d41398c2-41d5-41ef-b931-965ca95a1ada","weight":2},{"event_id":5056,"event_guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","weight":6},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":4},{"event_id":6089,"event_guid":"165016fb-55bf-4512-a240-ddee32a9436a","weight":2},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":2}],"recordings":[{"size":269,"length":2029,"mime_type":"video/webm","language":"eng","filename":"28c3-4869-de-tresor.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:49.703+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4869-de-tresor.webm","url":"https://api.media.ccc.de/public/recordings/3130","event_url":"https://api.media.ccc.de/public/events/import-ebb5f5ebcd563a0fe1","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":269,"length":2029,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4869-de-tresor.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:44.532+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4869-de-tresor.ogg","url":"https://api.media.ccc.de/public/recordings/3131","event_url":"https://api.media.ccc.de/public/events/import-ebb5f5ebcd563a0fe1","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}