{"guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","title":"Hackerethik - eine Einführung","subtitle":"Verantwortung und Ethik beim schöpferisch-kritischen Umgang mit Technologie","slug":"35c3-10011-hackerethik_-_eine_einfuhrung","link":"https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10011.html","description":"Die Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen Problemen, die sich beim schöpferisch-kritischen Umgang mit Technologie (auch \"hacking\" genannt) stellen. \n\nDie Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen Problemen, die sich beim schöpferisch-kritischen Umgang mit Technologie (auch \"hacking\" genannt) stellen. Sie bietet Anhaltspunkte für die alltäglichen Fragestellungen und Probleme, die aufkommen, wenn man Technologie anders benutzt, als der Hersteller es sich gedacht hat, wenn man Lücken in Systemen findet und ausnutzt oder über Berge von persönlichen Daten stolpert. Dieser Talk gibt eine Einführung in die verschiedenen Aspekte der Hackerethik und regt zum Nachdenken über die ethischen Fragen an, die sich Menschen mit speziellen Fähigkeiten und Fertigkeiten stellen, wenn sie ihren Neigungen nachgehen. ","original_language":"deu","persons":["frank"],"tags":["35c3","10011","Ethics, Society \u0026 Politics"],"view_count":15005,"promoted":false,"date":"2018-12-27T00:00:00.000+01:00","release_date":"2018-12-27T01:00:00.000+01:00","updated_at":"2026-03-24T19:30:05.528+01:00","length":2457,"duration":2457,"thumb_url":"https://static.media.ccc.de/media/congress/2018/10011-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2018/10011-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2018/10011-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2018/10011-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/35c3-10011-hackerethik_-_eine_einfuhrung","url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_title":"35C3: Refreshing Memories","conference_url":"https://api.media.ccc.de/public/conferences/35c3","related":[{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":635},{"event_id":6379,"event_guid":"9dde571b-4d49-4b44-8329-42e354bcc24b","weight":276},{"event_id":6380,"event_guid":"e9095f5f-a38a-48da-b3d7-20da141b8b14","weight":119},{"event_id":6381,"event_guid":"c0e4f528-92c7-4170-aff3-d4dd5cd74b2c","weight":191},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":834},{"event_id":6389,"event_guid":"c8b34953-b60f-4ed0-8784-dc20153e0725","weight":204},{"event_id":6390,"event_guid":"6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c","weight":269},{"event_id":6391,"event_guid":"1601bf3b-ce4a-44c9-993f-7d28fa65168d","weight":399},{"event_id":6393,"event_guid":"4db8970f-bbfe-4541-90a8-31a05d599ffb","weight":232},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":100},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":691},{"event_id":6401,"event_guid":"f0d70663-0769-4462-ad27-bc516d9cb141","weight":248},{"event_id":6404,"event_guid":"5b947f86-8ba1-4b99-adbe-7c5030deea0c","weight":295},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":206},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":465},{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":260},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":673},{"event_id":6413,"event_guid":"a9c0c28c-4f40-4d06-99da-d73fbb2655c4","weight":378},{"event_id":6414,"event_guid":"f010dc03-13bc-413d-95ec-e8786626a2f1","weight":123},{"event_id":6415,"event_guid":"5f5d8fd7-45a7-44e4-8d82-dfb8ee692f8b","weight":113},{"event_id":6417,"event_guid":"bf5019dc-499d-4c06-9ad0-35adbe01e7f3","weight":96},{"event_id":6418,"event_guid":"dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861","weight":106},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":623},{"event_id":6422,"event_guid":"e8385c89-d33a-42d8-afb6-8ae28fe5c89d","weight":179},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":823},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":370},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":837},{"event_id":6434,"event_guid":"6beabddc-2dd6-43d2-9936-618d41d42cde","weight":103},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":700},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":522},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":533},{"event_id":6488,"event_guid":"8943659a-536d-4afb-85de-f1b8b29a7902","weight":240},{"event_id":6493,"event_guid":"2375222b-7dae-4bca-a5b0-aea227ab0d76","weight":105},{"event_id":6494,"event_guid":"9a91d92b-0691-46b2-ba73-112bc598342f","weight":110},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":114},{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":262},{"event_id":6503,"event_guid":"d0d6d058-f117-4ccb-ba6a-c41d9290a287","weight":187},{"event_id":6507,"event_guid":"787007cf-828d-4409-94b0-90a0b8d727a0","weight":369},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":255},{"event_id":6535,"event_guid":"a875f05c-5eeb-4478-9e6f-863fc52b8868","weight":139},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":1226},{"event_id":6545,"event_guid":"400622c5-3754-43fd-aaf3-0ca00e9ad551","weight":145},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":384},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":587}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"deu","filename":"35c3-9647-eng-deu-Taming_the_Chaos_Can_we_build_systems_that_actually_work.de.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:47:18.808+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/35c3-9647-eng-deu-Taming_the_Chaos_Can_we_build_systems_that_actually_work.de.srt","url":"https://api.media.ccc.de/public/recordings/44509","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":232,"length":2457,"mime_type":"video/mp4","language":"deu","filename":"35c3-10011-deu-Hackerethik_-_eine_Einfuehrung.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T22:50:20.474+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10011-deu-Hackerethik_-_eine_Einfuehrung.mp4","url":"https://api.media.ccc.de/public/recordings/30931","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":231,"length":2457,"mime_type":"video/mp4","language":"eng","filename":"35c3-10011-eng-Hackerethik_-_eine_Einfuehrung.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T22:50:30.569+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10011-eng-Hackerethik_-_eine_Einfuehrung.mp4","url":"https://api.media.ccc.de/public/recordings/30932","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":231,"length":2457,"mime_type":"video/mp4","language":"fra","filename":"35c3-10011-fra-Hackerethik_-_eine_Einfuehrung.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T22:50:39.738+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10011-fra-Hackerethik_-_eine_Einfuehrung.mp4","url":"https://api.media.ccc.de/public/recordings/30933","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":338,"length":2457,"mime_type":"video/mp4","language":"deu-eng-fra","filename":"35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T22:50:49.758+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_hd.mp4","url":"https://api.media.ccc.de/public/recordings/30934","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":165,"length":2457,"mime_type":"video/mp4","language":"deu-eng-fra","filename":"35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-12-28T00:04:11.951+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-sd/35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_sd.mp4","url":"https://api.media.ccc.de/public/recordings/30975","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":146,"length":2457,"mime_type":"video/mp4","language":"deu-eng-fra","filename":"35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-28T00:05:16.528+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/slides-h264-hd/35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/30978","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":37,"length":2457,"mime_type":"audio/mpeg","language":"deu","filename":"35c3-10011-deu-Hackerethik_-_eine_Einfuehrung_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2018-12-28T03:07:25.058+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/mp3/35c3-10011-deu-Hackerethik_-_eine_Einfuehrung_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/31124","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":390,"length":2457,"mime_type":"video/webm","language":"deu-eng-fra","filename":"35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-28T03:08:17.169+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/webm-hd/35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/31126","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":24,"length":2457,"mime_type":"audio/opus","language":"deu","filename":"35c3-10011-deu-Hackerethik_-_eine_Einfuehrung_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2018-12-28T03:08:35.529+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/opus/35c3-10011-deu-Hackerethik_-_eine_Einfuehrung_opus.opus","url":"https://api.media.ccc.de/public/recordings/31127","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":193,"length":2457,"mime_type":"video/webm","language":"deu-eng-fra","filename":"35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-12-28T03:09:09.273+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/webm-sd/35c3-10011-deu-eng-fra-Hackerethik_-_eine_Einfuehrung_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/31128","event_url":"https://api.media.ccc.de/public/events/686c1387-e761-4df6-b395-f9ddf92d46e7","conference_url":"https://api.media.ccc.de/public/conferences/35c3"}]}