{"guid":"c630108b-616a-5885-be89-e49e3aa11d21","title":"Embedded Linux Security: The Good, the Bad and the Ugly","subtitle":null,"slug":"glt24-476-embedded-linux-security-the-good-the-bad-and-the-ugly","link":"https://pretalx.linuxtage.at/glt24/talk/N8FX7N/","description":"Linux-based embedded systems are not uncommon these days, but they still have some rough edges, especially in terms of security.\nIn this talk, Richard will outline common problems he encounters when working with customers on embedded systems.\nThe goal is to make you aware of these critical pitfalls you should definitely avoid in your next project.","original_language":"eng","persons":["Richard Weinberger","David Gstir"],"tags":["glt24","476","2024","Sicherheit"],"view_count":327,"promoted":false,"date":"2024-04-06T11:35:00.000+02:00","release_date":"2024-04-06T00:00:00.000+02:00","updated_at":"2026-02-14T22:45:08.544+01:00","length":1765,"duration":1765,"thumb_url":"https://static.media.ccc.de/media/events/glt/2024/476-c630108b-616a-5885-be89-e49e3aa11d21.jpg","poster_url":"https://static.media.ccc.de/media/events/glt/2024/476-c630108b-616a-5885-be89-e49e3aa11d21_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/glt/2024/476-c630108b-616a-5885-be89-e49e3aa11d21.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/glt/2024/476-c630108b-616a-5885-be89-e49e3aa11d21.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/glt24-476-embedded-linux-security-the-good-the-bad-and-the-ugly","url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_title":"Grazer Linuxtage 2024","conference_url":"https://api.media.ccc.de/public/conferences/glt24","related":[],"recordings":[{"size":419,"length":1765,"mime_type":"video/webm","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2024-04-07T04:46:50.192+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/webm-hd/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/77038","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"},{"size":110,"length":1765,"mime_type":"video/webm","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-04-06T20:21:45.158+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/webm-sd/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/77009","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"},{"size":79,"length":1765,"mime_type":"video/mp4","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-04-06T15:29:53.861+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/h264-sd/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_sd.mp4","url":"https://api.media.ccc.de/public/recordings/76924","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"},{"size":16,"length":1765,"mime_type":"audio/opus","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-04-06T15:24:43.064+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/opus/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_opus.opus","url":"https://api.media.ccc.de/public/recordings/76920","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"},{"size":26,"length":1765,"mime_type":"audio/mpeg","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-04-06T15:24:27.239+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/mp3/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/76919","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"},{"size":553,"length":1765,"mime_type":"video/mp4","language":"eng","filename":"glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2024-04-06T15:24:03.072+02:00","recording_url":"https://cdn.media.ccc.de/events/glt24/h264-hd/glt24-476-eng-Embedded_Linux_Security_The_Good_the_Bad_and_the_Ugly_hd.mp4","url":"https://api.media.ccc.de/public/recordings/76917","event_url":"https://api.media.ccc.de/public/events/c630108b-616a-5885-be89-e49e3aa11d21","conference_url":"https://api.media.ccc.de/public/conferences/glt24"}]}