{"guid":"9c6d3dca-ef43-548a-97e8-b574b8e08891","title":"We hate to say we told you so - IT Sicherheit als Kriegshandwerk","subtitle":"","slug":"fiffkon16-4018-we_hate_to_say_we_told_you_so_it_sicherheit_als_kriegshandwerk","link":"https://c3voc.de","description":"IT-Sicherheit und Cyperwar stehen im Widerspruch zu einander, obwohl sich Militär und Geheimdienste Methoden und Wissen der IT-Sicherheit zu nutze macht. Baut man Cyperwaffen und setzt sie ein, so schwächt man die Sicherheit der IT Infrastruktur und daran angeschlossene Systeme. Für Cyberwaffen benötigt man geheimgehaltene Schwachstellen. Doch das Wissen um diese Schwachstellen bleibt nicht geheim, sondern gelangt irgendwann auch zu anderen nicht staatlichen Kriminellen und gefährdet die IT-Sicherheit.","original_language":"deu","persons":["Sylvia Johnigk und Kai Nothdurft"],"tags":["fiffkon16"],"view_count":501,"promoted":false,"date":"2016-11-27T00:00:00.000+01:00","release_date":"2016-11-27T01:00:00.000+01:00","updated_at":"2026-02-28T11:30:05.857+01:00","length":2925,"duration":2925,"thumb_url":"https://static.media.ccc.de/media/conferences/fiffkon/2016/4018-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/fiffkon/2016/4018-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/fiffkon/2016/9c6d3dca-ef43-548a-97e8-b574b8e08891-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/fiffkon/2016/9c6d3dca-ef43-548a-97e8-b574b8e08891-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fiffkon16-4018-we_hate_to_say_we_told_you_so_it_sicherheit_als_kriegshandwerk","url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_title":"FIfFKon 2016","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16","related":[{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":3},{"event_id":3566,"event_guid":"40332b3d-c3b6-5c10-be52-1014af10f5ad","weight":14},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":18},{"event_id":3569,"event_guid":"9c00b430-17a7-58af-9daa-0bea4c0d5a4e","weight":4},{"event_id":3570,"event_guid":"adc46ce2-f407-51b3-8fe9-7cd63d3a290b","weight":14},{"event_id":3572,"event_guid":"97eb193e-25c8-5ae8-b83c-a0de3daa31fc","weight":4},{"event_id":3574,"event_guid":"391366a5-a55c-52b1-b027-ae0ea3f8b1f2","weight":3},{"event_id":3576,"event_guid":"cb7eb08d-2169-55bf-b66f-c715abb32857","weight":8},{"event_id":3577,"event_guid":"bcec5baa-fd40-5313-b54a-890557c21d8b","weight":7},{"event_id":3578,"event_guid":"5c131502-5ff3-5bd6-80f7-231a44575164","weight":6},{"event_id":3579,"event_guid":"37781754-b1cd-5304-9b68-4a7507e32608","weight":13},{"event_id":3580,"event_guid":"cdd8cb41-3d60-5a65-b725-bb1897015710","weight":8},{"event_id":3582,"event_guid":"9e10862d-aca8-5e32-ab05-7affc9afbc4c","weight":5},{"event_id":3583,"event_guid":"644ddfa9-2ae4-5d6f-aea8-ef23138d3f0f","weight":3}],"recordings":[{"size":265,"length":2925,"mime_type":"video/mp4","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-11-27T14:01:26.167+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/h264-hd/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_hd.mp4","url":"https://api.media.ccc.de/public/recordings/13415","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"},{"size":39,"length":2919,"mime_type":"audio/opus","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-11-27T14:07:38.806+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/opus/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk.opus","url":"https://api.media.ccc.de/public/recordings/13416","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"},{"size":44,"length":2919,"mime_type":"audio/mpeg","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-11-27T14:08:05.405+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/mp3/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk.mp3","url":"https://api.media.ccc.de/public/recordings/13417","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"},{"size":76,"length":2925,"mime_type":"video/mp4","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-11-27T14:17:55.497+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/h264-sd/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_sd.mp4","url":"https://api.media.ccc.de/public/recordings/13418","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"},{"size":98,"length":2925,"mime_type":"video/webm","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-11-27T14:32:56.165+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/webm-sd/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/13420","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"},{"size":319,"length":2925,"mime_type":"video/webm","language":"deu","filename":"fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-11-27T15:42:44.745+01:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2016/webm-hd/fiffkon16-4018-deu-We_hate_to_say_we_told_you_so_-_IT_Sicherheit_als_Kriegshandwerk_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/13426","event_url":"https://api.media.ccc.de/public/events/9c6d3dca-ef43-548a-97e8-b574b8e08891","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon16"}]}