{"guid":"import-11953790f175f05f25","title":"Security Nightmares","subtitle":null,"slug":"28c3-4937-en-security_nightmares","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4937.en.html","description":"\n","original_language":"eng","persons":["Frank Rieger","Ron"],"tags":["28c3"," Hacking"],"view_count":298,"promoted":false,"date":"2011-12-30T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-02-03T15:30:12.479+01:00","length":5591,"duration":5591,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4937-en-security_nightmares_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4937-en-security_nightmares_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-11953790f175f05f25-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-11953790f175f05f25-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4937-en-security_nightmares","url":"https://api.media.ccc.de/public/events/import-11953790f175f05f25","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":5},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":8},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":34},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":5},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":5},{"event_id":1708,"event_guid":"import-466b37aa8d8fc788aa","weight":11},{"event_id":1798,"event_guid":"0wIAXwCTvHhMFKucqslNxg","weight":8},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":5},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":5}],"recordings":[{"size":618,"length":5591,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4937-en-security_nightmares.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:44.263+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4937-en-security_nightmares.ogg","url":"https://api.media.ccc.de/public/recordings/3069","event_url":"https://api.media.ccc.de/public/events/import-11953790f175f05f25","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":618,"length":5591,"mime_type":"video/webm","language":"eng","filename":"28c3-4937-en-security_nightmares.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:48.609+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4937-en-security_nightmares.webm","url":"https://api.media.ccc.de/public/recordings/3068","event_url":"https://api.media.ccc.de/public/events/import-11953790f175f05f25","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}