{"guid":"60ba43d2-a9c8-42ab-a434-8772cb182675","title":"Building and Breaking Wireless Security","subtitle":"Wireless Physical Layer Security \u0026 More...","slug":"32c3-7119-building_and_breaking_wireless_security","link":"https://events.ccc.de/congress/2015/Fahrplan/events/7119.html","description":"This talk gives an overview on state-of-the-art wireless security concepts: How can we analyze wireless protocols? How can we build mechanisms that are secure even when the attacker has unlimited computational power? Can we exploit wireless transmission for more?","original_language":"eng","persons":["jiska"],"tags":["Security"],"view_count":76939,"promoted":false,"date":"2015-12-29T22:45:00.000+01:00","release_date":"2015-12-30T01:00:00.000+01:00","updated_at":"2026-03-21T06:15:03.276+01:00","length":1745,"duration":1745,"thumb_url":"https://static.media.ccc.de/media/congress/2015/7119-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2015/7119-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2015/60ba43d2-a9c8-42ab-a434-8772cb182675-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2015/60ba43d2-a9c8-42ab-a434-8772cb182675-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/32c3-7119-building_and_breaking_wireless_security","url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_title":"32C3: gated communities","conference_url":"https://api.media.ccc.de/public/conferences/32c3","related":[{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":9},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":8},{"event_id":2867,"event_guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","weight":6},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":6},{"event_id":2879,"event_guid":"3f61827f-8b17-47b4-a43c-e0dce6532cbe","weight":6},{"event_id":2883,"event_guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","weight":5},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":7},{"event_id":2902,"event_guid":"930673b3-4f75-40eb-8be5-574469c3920f","weight":7},{"event_id":2904,"event_guid":"8b01d636-d39b-44b8-8d6f-fc03e47eae1b","weight":5},{"event_id":2909,"event_guid":"8becd5e2-45df-4723-9d6a-2e9f334875d2","weight":6},{"event_id":2919,"event_guid":"4d473646-e765-441b-98eb-653dfe6bdeb1","weight":6},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":5},{"event_id":2939,"event_guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","weight":7},{"event_id":2941,"event_guid":"56126bd1-f1b3-4bc7-81be-304b6b681cde","weight":4},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":6},{"event_id":2945,"event_guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","weight":8},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":10},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":7},{"event_id":3494,"event_guid":"6fa5bff9-dea2-4736-9a96-5ca45f089ed8","weight":7},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":5},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":10}],"recordings":[{"size":20,"length":1736,"mime_type":"audio/opus","language":"deu","filename":"32c3-7119-de-Building_and_Breaking_Wireless_Security.opus","state":"downloaded","folder":"opus-translation","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-03T20:12:20.871+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus-translation/32c3-7119-de-Building_and_Breaking_Wireless_Security.opus","url":"https://api.media.ccc.de/public/recordings/9640","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":26,"length":1736,"mime_type":"audio/mpeg","language":"deu","filename":"32c3-7119-de-Building_and_Breaking_Wireless_Security.mp3","state":"downloaded","folder":"mp3-translated","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-03T20:09:37.814+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3-translated/32c3-7119-de-Building_and_Breaking_Wireless_Security.mp3","url":"https://api.media.ccc.de/public/recordings/9638","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_32c3-7119-en-de-Building_and_Breaking_Wireless_Security.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T14:51:32.005+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/DRAFT_32c3-7119-en-de-Building_and_Breaking_Wireless_Security.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/51132","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":268,"length":1745,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:46.595+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/9167","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":114,"length":1745,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7119-en-de-Building_and_Breaking_Wireless_Security_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:13:07.705+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/9321","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":101,"length":1745,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7119-en-de-Building_and_Breaking_Wireless_Security_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:13:38.073+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-sd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/9641","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":22,"length":1736,"mime_type":"audio/opus","language":"eng","filename":"32c3-7119-en-Building_and_Breaking_Wireless_Security.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-03T20:11:13.240+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus/32c3-7119-en-Building_and_Breaking_Wireless_Security.opus","url":"https://api.media.ccc.de/public/recordings/9639","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":250,"length":1745,"mime_type":"video/mp4","language":"eng","filename":"32c3-7119-en-Building_and_Breaking_Wireless_Security.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:46.168+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7119-en-Building_and_Breaking_Wireless_Security.mp4","url":"https://api.media.ccc.de/public/recordings/9165","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":273,"length":1745,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7119-en-de-Building_and_Breaking_Wireless_Security_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T21:01:48.358+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-hd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/9632","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":250,"length":1745,"mime_type":"video/mp4","language":"deu","filename":"32c3-7119-de-Building_and_Breaking_Wireless_Security.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:46.344+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7119-de-Building_and_Breaking_Wireless_Security.mp4","url":"https://api.media.ccc.de/public/recordings/9166","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":26,"length":1736,"mime_type":"audio/mpeg","language":"eng","filename":"32c3-7119-en-Building_and_Breaking_Wireless_Security.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-03T20:08:04.798+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3/32c3-7119-en-Building_and_Breaking_Wireless_Security.mp3","url":"https://api.media.ccc.de/public/recordings/9636","event_url":"https://api.media.ccc.de/public/events/60ba43d2-a9c8-42ab-a434-8772cb182675","conference_url":"https://api.media.ccc.de/public/conferences/32c3"}]}