{"guid":"import-324570bd16ebe02b27","title":"Security Nightmares","subtitle":null,"slug":"28c3-4898-de-security_nightmares","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4898.en.html","description":"\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["28c3"," Hacking"],"view_count":662,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-27T00:15:06.330+01:00","length":5593,"duration":5593,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4898-de-security_nightmares_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4898-de-security_nightmares_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-324570bd16ebe02b27-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-324570bd16ebe02b27-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4898-de-security_nightmares","url":"https://api.media.ccc.de/public/events/import-324570bd16ebe02b27","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":6},{"event_id":769,"event_guid":"import-b2af0e61f8de12a218","weight":3},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":4},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":9},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":3},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":15},{"event_id":1534,"event_guid":"import-5fe6dab8530ac65492","weight":3},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":10},{"event_id":1555,"event_guid":"import-1343b743a0a62d96cf","weight":3},{"event_id":1568,"event_guid":"import-0f193d0a307fc9b016","weight":3},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":3},{"event_id":1585,"event_guid":"import-11953790f175f05f25","weight":34},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":3},{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":4},{"event_id":1619,"event_guid":"import-b0554205945a09137e","weight":3},{"event_id":1622,"event_guid":"import-a5bb0702e23237f62d","weight":6},{"event_id":1666,"event_guid":"import-9ea9ae180acd0e8e38","weight":3},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":26},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":13},{"event_id":2273,"event_guid":"38ea922b-5b2d-4290-8c79-da0c891edd7a","weight":5},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":6},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":8}],"recordings":[{"size":601,"length":5593,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4898-de-security_nightmares.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:43.641+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4898-de-security_nightmares.ogg","url":"https://api.media.ccc.de/public/recordings/2961","event_url":"https://api.media.ccc.de/public/events/import-324570bd16ebe02b27","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":601,"length":5593,"mime_type":"video/webm","language":"eng","filename":"28c3-4898-de-security_nightmares.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:46.684+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4898-de-security_nightmares.webm","url":"https://api.media.ccc.de/public/recordings/2960","event_url":"https://api.media.ccc.de/public/events/import-324570bd16ebe02b27","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}