{"guid":"a6b27767-e42d-4610-a8d5-5a1f20587b34","title":"Hacking collective as a laboratory","subtitle":"Hackers' knowledge studied by sociologist of science ","slug":"33c3-8263-hacking_collective_as_a_laboratory","link":"https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8263.html","description":"Talk presents findings from sociological investigation on hacking collectives. I will try to answer the question whether hacking collectives are laboratories, as seen by sociology of science. I will also show some peculiar traits of hacking collective, beneficial both for sciences and societies. Perhaps academia needs hackers more than it’s willing to admit? ","original_language":"eng","persons":["Ezi"],"tags":["Science"],"view_count":604,"promoted":false,"date":"2016-12-29T22:00:00.000+01:00","release_date":"2016-12-30T01:00:00.000+01:00","updated_at":"2026-02-08T23:15:06.909+01:00","length":1755,"duration":1755,"thumb_url":"https://static.media.ccc.de/media/congress/2016/8263-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2016/8263-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2016/a6b27767-e42d-4610-a8d5-5a1f20587b34-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2016/a6b27767-e42d-4610-a8d5-5a1f20587b34-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/33c3-8263-hacking_collective_as_a_laboratory","url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_title":"33C3: works for me","conference_url":"https://api.media.ccc.de/public/conferences/33c3","related":[{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":29},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":18},{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":18},{"event_id":3725,"event_guid":"c4211c94-7cea-457d-9214-7ccf5d7c89cc","weight":23},{"event_id":3727,"event_guid":"2aba641b-114d-4dac-866e-533314a3c108","weight":26},{"event_id":3728,"event_guid":"094b6119-b261-4750-89cf-43fed50eb679","weight":18},{"event_id":3729,"event_guid":"56ec19c0-9844-46d6-b728-7a8217b8ed38","weight":28},{"event_id":3732,"event_guid":"8270c91a-d6e2-4f1c-9ebb-cdf10708d921","weight":20},{"event_id":3733,"event_guid":"855ab830-c6c0-4be7-b84c-31ba78e90e3c","weight":21},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":51},{"event_id":3735,"event_guid":"a097896d-04fc-4f58-8d8e-a8dbef9812b4","weight":19},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":19},{"event_id":3739,"event_guid":"61677c86-8d83-4c30-9cf4-f7741e1a8798","weight":17},{"event_id":3740,"event_guid":"562ced0e-1be5-4912-b9a1-d79709ad324a","weight":17},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":19}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_33c3-8263-eng-deu-Hacking_collective_as_a_laboratory.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T17:12:34.259+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/DRAFT_33c3-8263-eng-deu-Hacking_collective_as_a_laboratory.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50349","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":272,"length":1755,"mime_type":"video/mp4","language":"eng","filename":"33c3-8263-eng-Hacking_collective_as_a_laboratory.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-30T01:32:51.362+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8263-eng-Hacking_collective_as_a_laboratory.mp4","url":"https://api.media.ccc.de/public/recordings/14430","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":292,"length":1755,"mime_type":"video/mp4","language":"deu","filename":"33c3-8263-deu-Hacking_collective_as_a_laboratory.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-30T01:33:05.834+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8263-deu-Hacking_collective_as_a_laboratory.mp4","url":"https://api.media.ccc.de/public/recordings/14431","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":333,"length":1755,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-30T01:33:19.608+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_hd.mp4","url":"https://api.media.ccc.de/public/recordings/14432","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":22,"length":1742,"mime_type":"audio/opus","language":"eng","filename":"33c3-8263-eng-Hacking_collective_as_a_laboratory.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-30T14:09:37.298+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/opus/33c3-8263-eng-Hacking_collective_as_a_laboratory.opus","url":"https://api.media.ccc.de/public/recordings/14620","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":98,"length":1755,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-30T14:10:05.062+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-sd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_sd.mp4","url":"https://api.media.ccc.de/public/recordings/14621","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":26,"length":1742,"mime_type":"audio/mpeg","language":"eng","filename":"33c3-8263-eng-Hacking_collective_as_a_laboratory.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-30T14:10:28.506+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/mp3/33c3-8263-eng-Hacking_collective_as_a_laboratory.mp3","url":"https://api.media.ccc.de/public/recordings/14622","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":105,"length":1755,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-30T14:13:18.375+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-sd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/14627","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":296,"length":1755,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-30T14:13:56.042+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/14628","event_url":"https://api.media.ccc.de/public/events/a6b27767-e42d-4610-a8d5-5a1f20587b34","conference_url":"https://api.media.ccc.de/public/conferences/33c3"}]}