{"guid":"8939b20e-42df-5917-8bf1-f1ee8c401780","title":"Q\u0026A on Physical Security with the worlds greatest lock hackers","subtitle":null,"slug":"emf2014-275-q-a-on-physical-security-with-the-worlds-greatest-lock-hackers","link":"https://c3voc.de","description":"Join Jos Weyers, Warren Rockley, Nigel Tolley and John Naughton as they answer your questions on anything lock and physical security related.","original_language":"eng","persons":["Jos Weyers \u0026 Nigel K Tolley"],"tags":["emf2014","275","2014"],"view_count":8,"promoted":false,"date":"2014-08-31T18:30:00.000+02:00","release_date":"2024-08-27T00:00:00.000+02:00","updated_at":"2025-08-20T07:00:03.833+02:00","length":2061,"duration":2061,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/275-8939b20e-42df-5917-8bf1-f1ee8c401780.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/275-8939b20e-42df-5917-8bf1-f1ee8c401780_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/275-8939b20e-42df-5917-8bf1-f1ee8c401780.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/275-8939b20e-42df-5917-8bf1-f1ee8c401780.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-275-q-a-on-physical-security-with-the-worlds-greatest-lock-hackers","url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":81,"length":2061,"mime_type":"video/webm","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T07:00:39.813+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79393","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":118,"length":2061,"mime_type":"video/webm","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T06:47:05.206+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79383","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":18,"length":2061,"mime_type":"audio/opus","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T06:42:55.471+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_opus.opus","url":"https://api.media.ccc.de/public/recordings/79379","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":31,"length":2061,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T06:41:55.688+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79378","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":74,"length":2061,"mime_type":"video/mp4","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T06:39:56.700+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79375","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":92,"length":2061,"mime_type":"video/mp4","language":"eng","filename":"emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T06:28:36.740+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-275-eng-Q_A_on_Physical_Security_with_the_worlds_greatest_lock_hackers_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79367","event_url":"https://api.media.ccc.de/public/events/8939b20e-42df-5917-8bf1-f1ee8c401780","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}