{"guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","title":"Technologien für und wider Digitale Souveränität","subtitle":null,"slug":"33c3-8097-technologien_fur_und_wider_digitale_souveranitat","link":"https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8097.html","description":"''Technologien für und wider Digitale Souveränität''\n\nDie weltweite Vernetzung ist die tiefgreifendste Veränderung seit der\nindustriellen Revolution.  In einer Zeit der maßlose Massenüberwachung scheint die Digitale Souveränität den Einsatz privatsphärenfreundlicher Technologien als ein unverzichtbarer Bestandteil von gesellschaftlichen Lösungsversuchen zwingend zu erfordern.\n\nIn unserem Beitrag möchten wir hackerrelvante Teilaspekte und Verfahren aus einer Studie für das Bundesministerium für Justiz und Verbraucherschutz vorstellen. Unter anderem sind hier kryptographische Protokolle (z. B.  Blinde Signaturen, Zero-Knowlege Protokolle) und Methoden zur statistischen Auswertung von vertraulichen Daten  (z.B. K-Anonymität, Differentielle Vertraulichkeit) zu nennen.\n","original_language":"deu","persons":["ruedi","vgrass","Prof. Stefan Lucks"],"tags":["Ethics, Society \u0026 Politics"],"view_count":1605,"promoted":false,"date":"2016-12-29T17:15:00.000+01:00","release_date":"2016-12-29T01:00:00.000+01:00","updated_at":"2026-03-26T13:15:08.158+01:00","length":3614,"duration":3614,"thumb_url":"https://static.media.ccc.de/media/congress/2016/8097-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2016/8097-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2016/c19012c9-71de-4272-a6f4-898f5c48b8d9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2016/c19012c9-71de-4272-a6f4-898f5c48b8d9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/33c3-8097-technologien_fur_und_wider_digitale_souveranitat","url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_title":"33C3: works for me","conference_url":"https://api.media.ccc.de/public/conferences/33c3","related":[{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":32},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":36},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":24},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":25},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":38},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":26},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":28},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":57},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":85},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":62},{"event_id":3706,"event_guid":"3f76be27-6ff5-4a23-a6c6-512eaff00f28","weight":39},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":24},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":92},{"event_id":3722,"event_guid":"b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9","weight":25},{"event_id":3724,"event_guid":"7deb971d-1768-4a56-93ed-fe0192a13025","weight":33},{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":36},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":55},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":40},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":31},{"event_id":3755,"event_guid":"2bdf3de1-417b-4a5a-b31e-4701a921fb5c","weight":24},{"event_id":3756,"event_guid":"6796635e-2dd6-4f91-8f23-ba1bea7e2994","weight":28},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":32}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"deu","filename":"DRAFT_33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet.de_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T17:22:19.849+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/DRAFT_33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet.de_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50604","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":604,"length":3614,"mime_type":"video/mp4","language":"deu","filename":"33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-29T21:54:33.279+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","url":"https://api.media.ccc.de/public/recordings/14322","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":645,"length":3614,"mime_type":"video/mp4","language":"eng","filename":"33c3-8097-eng-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-29T21:55:03.759+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8097-eng-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","url":"https://api.media.ccc.de/public/recordings/14323","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":645,"length":3614,"mime_type":"video/mp4","language":"fra","filename":"33c3-8097-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-29T21:55:31.936+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8097-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp4","url":"https://api.media.ccc.de/public/recordings/14324","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":854,"length":3614,"mime_type":"video/mp4","language":"deu-eng-fra","filename":"33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-29T21:56:05.834+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_hd.mp4","url":"https://api.media.ccc.de/public/recordings/14325","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":47,"length":3601,"mime_type":"audio/opus","language":"deu","filename":"33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-29T23:56:42.624+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/opus/33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.opus","url":"https://api.media.ccc.de/public/recordings/14400","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":54,"length":3601,"mime_type":"audio/mpeg","language":"deu","filename":"33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-29T23:57:08.141+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/mp3/33c3-8097-deu-Technologien_fuer_und_wider_Digitale_Souveraenitaet.mp3","url":"https://api.media.ccc.de/public/recordings/14401","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":238,"length":3614,"mime_type":"video/mp4","language":"deu-eng-fra","filename":"33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-30T11:56:22.195+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-sd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_sd.mp4","url":"https://api.media.ccc.de/public/recordings/14535","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":686,"length":3614,"mime_type":"video/webm","language":"deu-eng-fra","filename":"33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-30T11:57:13.769+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/14536","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":234,"length":3614,"mime_type":"video/webm","language":"deu-eng-fra","filename":"33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-30T11:57:47.435+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-sd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/14537","event_url":"https://api.media.ccc.de/public/events/c19012c9-71de-4272-a6f4-898f5c48b8d9","conference_url":"https://api.media.ccc.de/public/conferences/33c3"}]}