{"guid":"13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","title":"Hacking-Back aus völkerrechtlicher Perspektive","subtitle":null,"slug":"dcon2020-9-hacking-back-aus-vlkerrechtlicher-perspektive","link":"https://cfp.defensivecon.org/dcon2020/talk/KEQTPT/","description":"Dieser Vortrag befasst mich mit dem Recht auf Gegenmaßen. Beleuchtet wird insbesondere die Frage, ob Hacking-Back Operationen völkerrechtlich legitim als Maßnahmen auf Angriffe unterhalb der Schwelle von bewaffneten Konflikten sind.\n\n####Aufzeichnung: [**hier**](https://youtu.be/dYMTO-Mjhzk)\n####Folien: [**hier**](https://www.defensivecon.org/slides/DefensiveCon-Hackback_aus_voelkerrechtlicher_Perspektive-Janine_Schmoldt.pdf)","original_language":"deu","persons":["Janine Schmoldt"],"tags":["dcon2020","9","2020"],"view_count":165,"promoted":false,"date":"2020-02-08T14:30:00.000+01:00","release_date":"2020-10-13T00:00:00.000+02:00","updated_at":"2026-01-07T21:30:26.591+01:00","length":3226,"duration":3226,"thumb_url":"https://static.media.ccc.de/media/conferences/dcon/2020/9-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/dcon/2020/9-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/dcon/2020/9-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/dcon/2020/9-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/dcon2020-9-hacking-back-aus-vlkerrechtlicher-perspektive","url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_title":"DefensiveCon2020","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020","related":[],"recordings":[{"size":676,"length":3226,"mime_type":"video/webm","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-10-13T13:07:29.510+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/webm-hd/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/48282","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"},{"size":258,"length":3226,"mime_type":"video/webm","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-10-13T12:45:06.598+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/webm-sd/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/48273","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"},{"size":154,"length":3226,"mime_type":"video/mp4","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-10-13T12:33:36.920+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/h264-sd/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_sd.mp4","url":"https://api.media.ccc.de/public/recordings/48262","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"},{"size":49,"length":3221,"mime_type":"audio/mpeg","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2020-10-13T12:21:03.874+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/mp3/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/48258","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"},{"size":37,"length":3221,"mime_type":"audio/opus","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2020-10-13T12:16:39.025+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/opus/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_opus.opus","url":"https://api.media.ccc.de/public/recordings/48255","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"},{"size":504,"length":3226,"mime_type":"video/mp4","language":"deu","filename":"dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-10-13T12:14:25.663+02:00","recording_url":"https://cdn.media.ccc.de/events/dcon/2020/h264-hd/dcon2020-9-deu-Hacking-Back_aus_voelkerrechtlicher_Perspektive_hd.mp4","url":"https://api.media.ccc.de/public/recordings/48249","event_url":"https://api.media.ccc.de/public/events/13b1cda1-1d0e-50c6-ab89-67cdf02d7a48","conference_url":"https://api.media.ccc.de/public/conferences/dcon2020"}]}