{"guid":"9159086f-1046-5a3f-aee0-0c4484963a39","title":"Hacking biometric security","subtitle":null,"slug":"emf2014-170-hacking-biometric-security","link":"https://c3voc.de","description":"A talk about how biometrics are not always secure, \u0026 the security systems are often poorly implemented. ","original_language":"eng","persons":["Nigel K Tolley"],"tags":["emf2014","170","2014"],"view_count":9,"promoted":false,"date":"2014-08-31T16:45:00.000+02:00","release_date":"2024-08-27T00:00:00.000+02:00","updated_at":"2025-10-23T09:15:03.183+02:00","length":1700,"duration":1700,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/170-9159086f-1046-5a3f-aee0-0c4484963a39.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/170-9159086f-1046-5a3f-aee0-0c4484963a39_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/170-9159086f-1046-5a3f-aee0-0c4484963a39.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/170-9159086f-1046-5a3f-aee0-0c4484963a39.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-170-hacking-biometric-security","url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":69,"length":1700,"mime_type":"video/webm","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T06:23:17.522+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-170-eng-Hacking_biometric_security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79364","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":107,"length":1700,"mime_type":"video/webm","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T06:16:47.453+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-170-eng-Hacking_biometric_security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79360","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":70,"length":1700,"mime_type":"video/mp4","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T06:13:38.999+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-170-eng-Hacking_biometric_security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79358","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":14,"length":1700,"mime_type":"audio/opus","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T06:08:55.498+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-170-eng-Hacking_biometric_security_opus.opus","url":"https://api.media.ccc.de/public/recordings/79356","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":25,"length":1700,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T06:08:27.179+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-170-eng-Hacking_biometric_security_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79355","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":92,"length":1700,"mime_type":"video/mp4","language":"eng","filename":"emf2014-170-eng-Hacking_biometric_security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T05:46:30.791+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-170-eng-Hacking_biometric_security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79340","event_url":"https://api.media.ccc.de/public/events/9159086f-1046-5a3f-aee0-0c4484963a39","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}