{"guid":"619c0d60-3839-4082-b497-01eb3206fb2e","title":"Die Grenzen des Geheimen","subtitle":"Transparenz und Geheimhaltung im digitalen Zeitalter","slug":"DS2015-7083-die_grenzen_des_geheimen","link":"http://datenspuren.de/2015/fahrplan/events/7083.html","description":"\u003cp\u003ePodiumsdiskussion mit Gordian Meyer-Plath (Landesamt f\u0026uuml;r Verfassungsschutz Sachsen), Anna Biselli (netzpolitik.org), Constanze Kurz (Sprecherin CCC)\u003c/p\u003e","original_language":"eng","persons":["josch","Gordian Meyer-Plath","Anna Biselli","Constanze Kurz"],"view_count":782,"promoted":false,"date":"2015-10-25T10:30:00.000+01:00","release_date":"2015-10-25T02:00:00.000+02:00","updated_at":"2025-07-10T14:30:06.143+02:00","tags":[],"length":5211,"duration":5211,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2015/7083-sd.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2015/7083-sd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2015/619c0d60-3839-4082-b497-01eb3206fb2e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2015/619c0d60-3839-4082-b497-01eb3206fb2e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/DS2015-7083-die_grenzen_des_geheimen","url":"https://api.media.ccc.de/public/events/619c0d60-3839-4082-b497-01eb3206fb2e","conference_title":"Datenspuren 2015","conference_url":"https://api.media.ccc.de/public/conferences/ds2015","related":[{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":2},{"event_id":1751,"event_guid":"rP-d3RdgW3DkgejXmeWAeQ","weight":2},{"event_id":1989,"event_guid":"4NABdZ7ki6qrAcGzcGtrqQ","weight":2},{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":2},{"event_id":2108,"event_guid":"OJxFR9Y752RJi7akgV8K3w","weight":3},{"event_id":2123,"event_guid":"CiTCK-gb6Mio3mpYu4sJ2g","weight":3},{"event_id":2167,"event_guid":"1116a02b-0312-4949-9921-d605148bfccb","weight":5},{"event_id":2285,"event_guid":"9993b2e6-0732-41cf-a5fc-eb87a7d2afba","weight":3},{"event_id":2665,"event_guid":"c4306315-7b36-4115-8de5-19eac6117407","weight":2},{"event_id":2736,"event_guid":"abef1838-6353-4013-bb99-6c23630742e2","weight":3},{"event_id":2737,"event_guid":"aeb963e9-e8ae-4888-8483-2063f4adaf3a","weight":2},{"event_id":2738,"event_guid":"d4b2f5e6-417f-454c-981e-df75465d956d","weight":2},{"event_id":2755,"event_guid":"6733848c-84b1-4aa2-af57-820cbc5687e7","weight":5},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":3},{"event_id":2884,"event_guid":"fb537cde-7f1d-484b-971b-1d30a543ecfb","weight":2},{"event_id":2922,"event_guid":"47cbd880-f500-4c44-b717-c11ed1da087d","weight":2},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":2},{"event_id":3560,"event_guid":"21141199-d313-4a9f-83b0-e81089a07fee","weight":2},{"event_id":3712,"event_guid":"cb23378b-6db0-4e2f-a4c8-f5006a467ca3","weight":3},{"event_id":4567,"event_guid":"e687dabf-4edb-59f1-92d4-685b1f9ebc39","weight":3},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":2},{"event_id":4698,"event_guid":"87de639d-024d-48d7-8955-3f529befc9f5","weight":3},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2},{"event_id":5527,"event_guid":"rAlGHFVF-3UnW0IhVWOEEQ","weight":2}],"recordings":[{"size":29,"length":5197,"mime_type":"audio/opus","language":"eng","filename":"datenspuren15-7083-de-Die_Grenzen_des_Geheimen_opus.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2015-10-25T14:44:51.155+01:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2015/opus/datenspuren15-7083-de-Die_Grenzen_des_Geheimen_opus.opus","url":"https://api.media.ccc.de/public/recordings/8082","event_url":"https://api.media.ccc.de/public/events/619c0d60-3839-4082-b497-01eb3206fb2e","conference_url":"https://api.media.ccc.de/public/conferences/ds2015"},{"size":656,"length":5211,"mime_type":"video/mp4","language":"eng","filename":"datenspuren15-7083-de-Die_Grenzen_des_Geheimen_sd.mp4","state":"downloaded","folder":"h264-hq","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:10:59.734+01:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2015/h264-hq/datenspuren15-7083-de-Die_Grenzen_des_Geheimen_sd.mp4","url":"https://api.media.ccc.de/public/recordings/8063","event_url":"https://api.media.ccc.de/public/events/619c0d60-3839-4082-b497-01eb3206fb2e","conference_url":"https://api.media.ccc.de/public/conferences/ds2015"},{"size":39,"length":5197,"mime_type":"audio/mpeg","language":"eng","filename":"datenspuren15-7083-de-Die_Grenzen_des_Geheimen_mp3.mp3","state":"downloaded","folder":"mp3-audio-only","high_quality":true,"width":null,"height":null,"updated_at":"2015-10-25T14:43:50.302+01:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2015/mp3-audio-only/datenspuren15-7083-de-Die_Grenzen_des_Geheimen_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/8081","event_url":"https://api.media.ccc.de/public/events/619c0d60-3839-4082-b497-01eb3206fb2e","conference_url":"https://api.media.ccc.de/public/conferences/ds2015"},{"size":600,"length":5211,"mime_type":"video/webm","language":"eng","filename":"datenspuren15-7083-de-Die_Grenzen_des_Geheimen_webm.webm","state":"downloaded","folder":"webm","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:11:02.253+01:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2015/webm/datenspuren15-7083-de-Die_Grenzen_des_Geheimen_webm.webm","url":"https://api.media.ccc.de/public/recordings/8107","event_url":"https://api.media.ccc.de/public/events/619c0d60-3839-4082-b497-01eb3206fb2e","conference_url":"https://api.media.ccc.de/public/conferences/ds2015"}]}