{"guid":"import-8a89cf5b26fff8766e","title":"Die Politik von Deep Packet Inspection","subtitle":"Wozu es genutzt werden kann, wofür es wirklich genutzt wird, und warum.","slug":"SIGINT09_3148_de_die_politik_von_deep_packet_inspection","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3148.en.html","description":"Ein Überblick über die verschiedenen Use-Cases für DPI, die vielfältigen\nArten, es zu regulieren, und einige der damit verbundenen politischen\nKämpfe um die Zukunft des Internet.\n","original_language":"eng","persons":["Ralf Bendrath"],"tags":["sigint09"],"view_count":113,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-17T04:15:02.813+01:00","length":3538,"duration":3538,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3148_de_die_politik_von_deep_packet_inspection.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3148_de_die_politik_von_deep_packet_inspection_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8a89cf5b26fff8766e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8a89cf5b26fff8766e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3148_de_die_politik_von_deep_packet_inspection","url":"https://api.media.ccc.de/public/events/import-8a89cf5b26fff8766e","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":510,"event_guid":"import-7dd468401a516b773e","weight":1},{"event_id":514,"event_guid":"import-27d6ce9d4ab21b3e92","weight":2},{"event_id":519,"event_guid":"import-4a2eb06af5fc1e18d0","weight":1},{"event_id":600,"event_guid":"import-7a1e18a97f9b81e0d5","weight":2},{"event_id":1059,"event_guid":"import-38355af6e03d054ba5","weight":1},{"event_id":1522,"event_guid":"import-fc5a355c43b4c15caa","weight":1}],"recordings":[{"size":689,"length":3538,"mime_type":"video/mp4","language":"eng","filename":"SIGINT09_3148_de_die_politik_von_deep_packet_inspection.mp4","state":"downloaded","folder":"video","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:02:56.723+01:00","recording_url":"https://cdn.media.ccc.de/events/sigint09/video/SIGINT09_3148_de_die_politik_von_deep_packet_inspection.mp4","url":"https://api.media.ccc.de/public/recordings/755","event_url":"https://api.media.ccc.de/public/events/import-8a89cf5b26fff8766e","conference_url":"https://api.media.ccc.de/public/conferences/sigint09"},{"size":689,"length":3538,"mime_type":"video/webm","language":"eng","filename":"SIGINT09_3148_de_die_politik_von_deep_packet_inspection.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:02:56.758+01:00","recording_url":"https://cdn.media.ccc.de/events/sigint09/webm/SIGINT09_3148_de_die_politik_von_deep_packet_inspection.webm","url":"https://api.media.ccc.de/public/recordings/754","event_url":"https://api.media.ccc.de/public/events/import-8a89cf5b26fff8766e","conference_url":"https://api.media.ccc.de/public/conferences/sigint09"}]}