{"guid":"93a28ecf-424d-57d1-85ce-c40621145f32","title":"Nutzung von Daten aus Sozialen Netzwerken im Umfeld der zivilen Sicherheit","subtitle":null,"slug":"fiffkon17-11-nutzung_von_daten_aus_sozialen_netzwerken_im_umfeld_der_zivilen_sicherheit","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Frank Geyer"],"tags":["fiffkon17","11"],"view_count":61,"promoted":false,"date":"2017-10-21T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2023-11-03T16:15:04.254+01:00","length":2130,"duration":2130,"thumb_url":"https://static.media.ccc.de/media/conferences/fiffkon/2017/11-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/fiffkon/2017/11-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/fiffkon/2017/93a28ecf-424d-57d1-85ce-c40621145f32-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/fiffkon/2017/93a28ecf-424d-57d1-85ce-c40621145f32-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fiffkon17-11-nutzung_von_daten_aus_sozialen_netzwerken_im_umfeld_der_zivilen_sicherheit","url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_title":"FIfFKon 2017","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17","related":[{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":1},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":2},{"event_id":5363,"event_guid":"cf6aff6c-bd9c-541b-baa8-abebd20130a1","weight":7},{"event_id":5371,"event_guid":"b7f0363f-3cb4-5a68-af1a-e19d2f097ebd","weight":2},{"event_id":5373,"event_guid":"872f06cb-b7e9-5c83-b981-884eb50de891","weight":5},{"event_id":5374,"event_guid":"f2eb3618-59ff-53f1-b2d5-a441669adadd","weight":5},{"event_id":5409,"event_guid":"a891ac61-3d85-56c1-976c-79fb77172b79","weight":5},{"event_id":5411,"event_guid":"15dde167-7d6b-5c0b-9a50-584478acc824","weight":9},{"event_id":5412,"event_guid":"71c76e55-6b33-52fd-af57-26ad9ef8c787","weight":9}],"recordings":[{"size":375,"length":2130,"mime_type":"video/mp4","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-05-16T03:43:15.995+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/h264-hd/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_hd.mp4","url":"https://api.media.ccc.de/public/recordings/25304","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"},{"size":32,"length":2124,"mime_type":"audio/mpeg","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2018-05-16T04:58:36.856+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/mp3/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/25305","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"},{"size":22,"length":2124,"mime_type":"audio/opus","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2018-05-16T04:59:05.228+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/opus/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_opus.opus","url":"https://api.media.ccc.de/public/recordings/25306","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"},{"size":94,"length":2130,"mime_type":"video/mp4","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-05-16T04:59:38.433+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/h264-sd/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_sd.mp4","url":"https://api.media.ccc.de/public/recordings/25307","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"},{"size":92,"length":2130,"mime_type":"video/webm","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-05-16T05:00:37.555+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/webm-sd/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/25308","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"},{"size":315,"length":2130,"mime_type":"video/webm","language":"deu","filename":"fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-05-16T05:01:13.969+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2017/webm-hd/fiffkon17-11-deu-Nutzung_von_Daten_aus_Sozialen_Netzwerken_im_Umfeld_der_zivilen_Sicherheit_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/25309","event_url":"https://api.media.ccc.de/public/events/93a28ecf-424d-57d1-85ce-c40621145f32","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon17"}]}