{"guid":"cf873495-8beb-47f3-a303-4893400ecf30","title":"CR214 - Hackerethik","subtitle":"Von moralischer Flexibilität und ihren Folgen","slug":"cr-214-hackerethik","link":"https://c3voc.de","description":"\u003cp\u003eDer Skandal um das Hacking Team hat (wieder einmal) gezeigt, dass es auch Hacker ohne Moral gibt, die sich nicht scheuen auch mit Menschenrechtsverletzern Gesch\u0026auml;fte machen. Und der Skandal um den Hack von Autos hat gezeigt, dass sich in Zukunft immer mehr digitale Angriffspunkte bieten. Was genau ist da eigentlich passiert? Kann man sich vor so etwas sch\u0026uuml;tzen? Brauchen wir Hackergesetze? Und wie geht man als Hacker damit um, wenn der eigene Programmiercode von \u0026ldquo;den B\u0026ouml;sen\u0026rdquo; eingesetzt wird? Heute ab 22 Uhr werden wir diese Fragen und Probleme im Chaosradio 214 diskutieren, live im Blue Moon auf Fritz. Und wenn ihr m\u0026ouml;gt, dann k\u0026ouml;nnt ihr euch unter 0331/7097110 beteiligen.\u003c/p\u003e","original_language":"deu","persons":["Marcus Richter (Moderation)","Andreas Bogk","danimo","erdgeist"],"tags":["cr"],"view_count":701,"promoted":false,"date":"2015-07-30T00:00:00.000+02:00","release_date":"2016-04-17T02:00:00.000+02:00","updated_at":"2026-03-18T15:30:06.061+01:00","length":7048,"duration":7048,"thumb_url":"https://static.media.ccc.de/media/chaosradio/video/214-hd.jpg","poster_url":"https://static.media.ccc.de/media/chaosradio/video/214-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/chaosradio/video/cf873495-8beb-47f3-a303-4893400ecf30-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/chaosradio/video/cf873495-8beb-47f3-a303-4893400ecf30-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/cr-214-hackerethik","url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_title":"Chaosradio","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":8},{"event_id":1949,"event_guid":"0d7893ca11637d8d","weight":9},{"event_id":1952,"event_guid":"e7ca6d029c833227","weight":15},{"event_id":2311,"event_guid":"29dbd740-b1c8-476d-b8f1-ad98df418bb7","weight":26},{"event_id":2312,"event_guid":"b0fedd21-0b02-45d7-93e5-45935b24e15d","weight":8},{"event_id":2732,"event_guid":"edea100c-b9d9-4d76-bfff-224cd5f99368","weight":14},{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":23},{"event_id":2734,"event_guid":"a1533367-f889-4b07-8d2f-b2718ad6b9a6","weight":9},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":28},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":32},{"event_id":2759,"event_guid":"ff3dc349-f733-4ba6-bc83-d4373fcc981d","weight":13},{"event_id":2760,"event_guid":"2cddcb2a-8f50-41bd-9a55-9691b6abc4bc","weight":14},{"event_id":3031,"event_guid":"e1c0b8c0-f719-43dd-bec9-af3d9de6702d","weight":12},{"event_id":3032,"event_guid":"a92fdc4b-370b-4700-86ea-e5dbf22d778e","weight":12},{"event_id":3033,"event_guid":"ea530d4e-c315-4fc4-86ef-f34f3a18f663","weight":14},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":16},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":11},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":22},{"event_id":3784,"event_guid":"454751e0-fd42-11e6-b7aa-174b5fe37b07","weight":11},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":14}],"recordings":[{"size":4267,"length":7048,"mime_type":"video/mp4","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-04-17T01:42:04.653+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/h264-hd/cr-214-deu-CR214_-_Hackerethik_hd.mp4","url":"https://api.media.ccc.de/public/recordings/10330","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"},{"size":1075,"length":7048,"mime_type":"video/webm","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-04-17T11:51:50.262+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/webm-hd/cr-214-deu-CR214_-_Hackerethik_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/10332","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"},{"size":524,"length":7048,"mime_type":"video/webm","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-04-17T12:00:04.626+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/webm-sd/cr-214-deu-CR214_-_Hackerethik_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/10334","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"},{"size":489,"length":7048,"mime_type":"video/mp4","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-04-17T12:02:48.140+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/h264-sd/cr-214-deu-CR214_-_Hackerethik_sd.mp4","url":"https://api.media.ccc.de/public/recordings/10335","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"},{"size":90,"length":7040,"mime_type":"audio/opus","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik.opus","state":"downloaded","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-04-17T12:11:09.469+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/opus/cr-214-deu-CR214_-_Hackerethik.opus","url":"https://api.media.ccc.de/public/recordings/10339","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"},{"size":107,"length":7040,"mime_type":"audio/mpeg","language":"deu","filename":"cr-214-deu-CR214_-_Hackerethik.mp3","state":"downloaded","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-04-17T12:10:36.346+02:00","recording_url":"https://cdn.media.ccc.de/broadcast/chaosradio/mp3/cr-214-deu-CR214_-_Hackerethik.mp3","url":"https://api.media.ccc.de/public/recordings/10338","event_url":"https://api.media.ccc.de/public/events/cf873495-8beb-47f3-a303-4893400ecf30","conference_url":"https://api.media.ccc.de/public/conferences/chaosradio"}]}