{"guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","title":"Lockpicking and IT Security","subtitle":null,"slug":"SHA2017-25-lockpicking_and_it_security","link":"https://c3voc.de","description":"What do design flaws, implementation errors, 0days etc. look like in physical locks?\n#PhysicalSecurity #Software","original_language":"eng","persons":["Walter Belgers"],"tags":["SHA2017","25"],"view_count":1204,"promoted":false,"date":"2017-08-08T00:00:00.000+02:00","release_date":"2017-08-08T02:00:00.000+02:00","updated_at":"2026-01-04T19:45:36.032+01:00","length":3490,"duration":3490,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/25-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/25-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/22c3d7ca-e490-40d1-b0e4-d321392d53ad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/22c3d7ca-e490-40d1-b0e4-d321392d53ad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-25-lockpicking_and_it_security","url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":14},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":42},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":31},{"event_id":4293,"event_guid":"dd774554-e12d-4557-b91c-3f6039cd4aeb","weight":19},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":16},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":188},{"event_id":4344,"event_guid":"e856b1b3-ac67-42a4-ab7a-50a8d58d413e","weight":22},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":149},{"event_id":4352,"event_guid":"05007c06-fc8b-468a-b1e9-b4ff9ec8149e","weight":33},{"event_id":4353,"event_guid":"24d83f1e-e578-413a-b406-1dd2244c90fd","weight":14},{"event_id":4355,"event_guid":"0f3f0964-b30e-46a3-83e8-2f426ab59bfc","weight":17},{"event_id":4360,"event_guid":"159484b6-5989-4e61-b0bb-20f12a8b65d1","weight":15},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":48},{"event_id":4362,"event_guid":"67b3b3d4-6098-4694-896c-3e6f76b400d7","weight":41},{"event_id":4363,"event_guid":"6b3c4c2a-45ab-445d-bfc1-8989775235a4","weight":18},{"event_id":4364,"event_guid":"18911a7a-2c27-419e-86c4-4b4878991379","weight":33},{"event_id":4365,"event_guid":"7b8075fb-aafa-4037-beb9-168b5461c831","weight":19},{"event_id":4367,"event_guid":"f284b8f1-f27b-466e-9084-c3de794f8fd3","weight":38},{"event_id":4369,"event_guid":"5f25fc58-113d-4605-9fc0-9e98407cd9a3","weight":19},{"event_id":4370,"event_guid":"cf9916ac-0cb4-4a61-ae81-5fc40f36b67f","weight":15},{"event_id":4371,"event_guid":"509a87d3-75dd-4ea1-b2ca-79b03ff90749","weight":18},{"event_id":4372,"event_guid":"01d07c5c-8a4e-4dbf-acf5-126d738a1ddf","weight":23},{"event_id":4373,"event_guid":"ce865c40-0cce-4ad5-9c51-f4f1d4aea377","weight":20}],"recordings":[{"size":300,"length":3490,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-08T17:31:26.872+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-25-eng-Lockpicking_and_IT_Security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/18296","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":53,"length":3475,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-08T17:52:15.670+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-25-eng-Lockpicking_and_IT_Security.mp3","url":"https://api.media.ccc.de/public/recordings/18326","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":98,"length":3490,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-08T17:52:51.261+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-25-eng-Lockpicking_and_IT_Security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/18327","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":41,"length":3475,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-08T17:53:36.109+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-25-eng-Lockpicking_and_IT_Security.opus","url":"https://api.media.ccc.de/public/recordings/18328","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":115,"length":3490,"mime_type":"video/webm","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-08T18:19:41.370+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-25-eng-Lockpicking_and_IT_Security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/18338","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":335,"length":3490,"mime_type":"video/webm","language":"eng","filename":"SHA2017-25-eng-Lockpicking_and_IT_Security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-08T20:12:13.987+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-25-eng-Lockpicking_and_IT_Security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/18349","event_url":"https://api.media.ccc.de/public/events/22c3d7ca-e490-40d1-b0e4-d321392d53ad","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}