{"guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","title":"Hacking Reality ","subtitle":"Mixed Reality and multi-sensory communication    ","slug":"33c3-8317-hacking_reality","link":"https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8317.html","description":"Inspired by a long history of bold reality hacks this talk considers the kinds of potentials opening up through emerging Virtual Reality (VR) and Mixed Reality technologies. In this current moment of climate crisis and structural metamorphosis how can we work with powerful immersive technologies to understand our own perceptual systems, to radically communicate and to innovate new ways of being together?","original_language":"eng","persons":["Kate Genevieve "],"view_count":1525,"promoted":false,"date":"2016-12-28T16:00:00.000+01:00","release_date":"2016-12-28T01:00:00.000+01:00","updated_at":"2026-03-20T19:00:12.995+01:00","tags":["Art \u0026 Culture"],"length":3606,"duration":3606,"thumb_url":"https://static.media.ccc.de/media/congress/2016/8317-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2016/8317-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2016/2f586f3b-5399-496c-ab03-c25ad8ea8cf6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2016/2f586f3b-5399-496c-ab03-c25ad8ea8cf6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/33c3-8317-hacking_reality","url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_title":"33C3: works for me","conference_url":"https://api.media.ccc.de/public/conferences/33c3","related":[{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":22},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":27},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":22},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":23},{"event_id":3644,"event_guid":"d1681340-162c-48ce-8c0b-61c3e176696d","weight":22},{"event_id":3648,"event_guid":"8aaa55ad-b426-4d7a-8d46-f4b34a906eda","weight":21},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":47},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":28},{"event_id":3660,"event_guid":"69ce21df-4bf5-43ce-a500-ac7707ee64b7","weight":24},{"event_id":3665,"event_guid":"e204268f-0cea-4a1f-bb38-e7d50496492e","weight":38},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":37},{"event_id":3668,"event_guid":"4745fbc3-87d4-41eb-8c82-2c1bb8a51beb","weight":28},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":45},{"event_id":3674,"event_guid":"bfc2ab1f-8384-4d7d-801a-dde8c81e039c","weight":26},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":30},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":24},{"event_id":3704,"event_guid":"a1f43609-a446-41e7-9ac6-4db12bcb14c1","weight":21},{"event_id":3749,"event_guid":"e26852ae-9efe-47a0-9e65-3bbd120f7422","weight":41}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"deu","filename":"33c3-8317-eng-deu-Hacking_Reality.de.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2020-01-23T22:47:28.433+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/33c3-8317-eng-deu-Hacking_Reality.de.srt","url":"https://api.media.ccc.de/public/recordings/45361","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_33c3-8317-eng-deu-Hacking_Reality.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T16:12:28.354+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/DRAFT_33c3-8317-eng-deu-Hacking_Reality.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50344","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":609,"length":3606,"mime_type":"video/mp4","language":"eng","filename":"33c3-8317-eng-Hacking_Reality.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T19:41:17.254+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8317-eng-Hacking_Reality.mp4","url":"https://api.media.ccc.de/public/recordings/13967","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":649,"length":3606,"mime_type":"video/mp4","language":"deu","filename":"33c3-8317-deu-Hacking_Reality.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T19:41:45.590+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8317-deu-Hacking_Reality.mp4","url":"https://api.media.ccc.de/public/recordings/13968","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":733,"length":3606,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8317-eng-deu-Hacking_Reality_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T19:42:13.041+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8317-eng-deu-Hacking_Reality_hd.mp4","url":"https://api.media.ccc.de/public/recordings/13969","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":54,"length":3593,"mime_type":"audio/mpeg","language":"eng","filename":"33c3-8317-eng-Hacking_Reality.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T21:17:50.895+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/mp3/33c3-8317-eng-Hacking_Reality.mp3","url":"https://api.media.ccc.de/public/recordings/14028","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":44,"length":3593,"mime_type":"audio/opus","language":"eng","filename":"33c3-8317-eng-Hacking_Reality.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T21:19:53.156+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/opus/33c3-8317-eng-Hacking_Reality.opus","url":"https://api.media.ccc.de/public/recordings/14033","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":213,"length":3606,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8317-eng-deu-Hacking_Reality_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-29T11:33:12.267+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-sd/33c3-8317-eng-deu-Hacking_Reality_sd.mp4","url":"https://api.media.ccc.de/public/recordings/14188","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":238,"length":3606,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8317-eng-deu-Hacking_Reality_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-29T11:33:45.386+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-sd/33c3-8317-eng-deu-Hacking_Reality_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/14189","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":681,"length":3606,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8317-eng-deu-Hacking_Reality_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-29T11:34:38.385+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8317-eng-deu-Hacking_Reality_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/14190","event_url":"https://api.media.ccc.de/public/events/2f586f3b-5399-496c-ab03-c25ad8ea8cf6","conference_url":"https://api.media.ccc.de/public/conferences/33c3"}]}