{"guid":"0cb5695f-e895-5352-8848-f924c682ab36","title":"The Security of the Internet of Things","subtitle":"","slug":"emf2014-191-the-security-of-the-internet-of-things","link":"https://c3voc.de","description":"A talk about the current state of security in internet-enabled embedded devices with a variety of sensors and actuators, from curtains through home automation systems to full-scale power plants. With plenty of actual examples.","original_language":"eng","persons":["José Díez"],"tags":["emf2014","191","2014"],"view_count":6,"promoted":false,"date":"2014-08-29T15:45:00.000+02:00","release_date":"2024-08-26T00:00:00.000+02:00","updated_at":"2025-02-03T08:30:07.868+01:00","length":1103,"duration":1103,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/191-0cb5695f-e895-5352-8848-f924c682ab36.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/191-0cb5695f-e895-5352-8848-f924c682ab36_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/191-0cb5695f-e895-5352-8848-f924c682ab36.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/191-0cb5695f-e895-5352-8848-f924c682ab36.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-191-the-security-of-the-internet-of-things","url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":40,"length":1103,"mime_type":"video/webm","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-26T23:17:56.050+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-191-eng-The_Security_of_the_Internet_of_Things_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79048","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":16,"length":1103,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-26T23:08:55.811+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-191-eng-The_Security_of_the_Internet_of_Things_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79040","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":60,"length":1103,"mime_type":"video/webm","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-26T23:08:03.991+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-191-eng-The_Security_of_the_Internet_of_Things_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79039","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":40,"length":1103,"mime_type":"video/mp4","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-26T23:06:56.085+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-191-eng-The_Security_of_the_Internet_of_Things_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79037","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":9,"length":1103,"mime_type":"audio/opus","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-26T23:04:55.365+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-191-eng-The_Security_of_the_Internet_of_Things_opus.opus","url":"https://api.media.ccc.de/public/recordings/79036","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":50,"length":1103,"mime_type":"video/mp4","language":"eng","filename":"emf2014-191-eng-The_Security_of_the_Internet_of_Things_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-26T23:04:18.790+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-191-eng-The_Security_of_the_Internet_of_Things_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79034","event_url":"https://api.media.ccc.de/public/events/0cb5695f-e895-5352-8848-f924c682ab36","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}