{"guid":"import-f7fb9bcdd441658463","title":"Machine-to-machine (M2M) security","subtitle":"When physical security depends on IT security","slug":"cccamp11-4439-maching_to_machine_security-en","link":"http://events.ccc.de/camp/2011/Fahrplan/events/4439.en.html","description":"Today, more and more real-world things and machines are equipped with some kind of connection back home to the vendor. Such machine-to-machine (M2M) communication is often poorly secured and some day, the shit will hit the fan!\n","original_language":"eng","persons":["hunz"],"view_count":38,"promoted":false,"date":"2011-08-13T02:00:00.000+02:00","release_date":"2011-08-21T02:00:00.000+02:00","updated_at":"2024-09-06T09:45:04.159+02:00","tags":["camp2011"," Hacking"],"length":2702,"duration":2702,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2011/cccamp11-4439-maching_to_machine_security-en.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2011/cccamp11-4439-maching_to_machine_security-en_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2011/import-f7fb9bcdd441658463-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2011/import-f7fb9bcdd441658463-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/cccamp11-4439-maching_to_machine_security-en","url":"https://api.media.ccc.de/public/events/import-f7fb9bcdd441658463","conference_title":"Chaos Communication Camp 2011","conference_url":"https://api.media.ccc.de/public/conferences/camp2011","related":[{"event_id":1136,"event_guid":"import-0b0bb700744d6dcda6","weight":3},{"event_id":2496,"event_guid":"54159b05-db61-4055-b2ae-f4a16559ccfe","weight":3},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":3}],"recordings":[{"size":423,"length":2702,"mime_type":"video/ogg","language":"eng","filename":"cccamp11-4439-maching_to_machine_security-en.ogv","state":"downloaded","folder":"video","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:12.899+02:00","recording_url":"https://cdn.media.ccc.de/events/camp2011/video/cccamp11-4439-maching_to_machine_security-en.ogv","url":"https://api.media.ccc.de/public/recordings/97","event_url":"https://api.media.ccc.de/public/events/import-f7fb9bcdd441658463","conference_url":"https://api.media.ccc.de/public/conferences/camp2011"},{"size":423,"length":2702,"mime_type":"video/mp4","language":"eng","filename":"cccamp11-4439-maching_to_machine_security-en.mp4","state":"downloaded","folder":"video","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:02:40.554+01:00","recording_url":"https://cdn.media.ccc.de/events/camp2011/video/cccamp11-4439-maching_to_machine_security-en.mp4","url":"https://api.media.ccc.de/public/recordings/96","event_url":"https://api.media.ccc.de/public/events/import-f7fb9bcdd441658463","conference_url":"https://api.media.ccc.de/public/conferences/camp2011"},{"size":423,"length":2702,"mime_type":"video/webm","language":"eng","filename":"cccamp11-4439-maching_to_machine_security-en.webm","state":"downloaded","folder":"video","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:02:40.579+01:00","recording_url":"https://cdn.media.ccc.de/events/camp2011/video/cccamp11-4439-maching_to_machine_security-en.webm","url":"https://api.media.ccc.de/public/recordings/95","event_url":"https://api.media.ccc.de/public/events/import-f7fb9bcdd441658463","conference_url":"https://api.media.ccc.de/public/conferences/camp2011"}]}