{"guid":"42cd6de5-6cd7-5987-a7f7-aa4957c10958","title":"Elektrische Sicherheit für Hacker","subtitle":null,"slug":"gpn20-37-elektrische-sicherheit-fr-hacker","link":"https://cfp.gulas.ch/gpn20/talk/3XH7UG/","description":"Sicherheit von elektrischen Installationen und Anlagen\n\nElektrotechnik ist Sicherheitstechnik.\nOb am Arbeitsplatz, im Hackerspace, zu Hause oder auf Reisen - oft sind wir mit teils „kreativen“ elektrischen Installationen konfrontiert.\nIn diesem Talk geht es hauptsächlich um die elektrische Sicherheit von Anlagen und Installationen:\n- was müssen wir beim Installieren/ Erweitern beachten\n- physiologische Auswirkungen von Strom\n- rechtliche Grundlagen und Normen\n- Beispiele aus der Praxis eines Prüfers","original_language":"deu","persons":["Kevin Heneka"],"tags":["gpn20","37","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":906,"promoted":false,"date":"2022-05-20T17:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-01-23T11:00:11.814+01:00","length":3559,"duration":3559,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-37-elektrische-sicherheit-fr-hacker","url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[],"recordings":[{"size":493,"length":3559,"mime_type":"video/webm","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-05-21T21:28:46.170+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/webm-hd/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/59275","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":189,"length":3559,"mime_type":"video/webm","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-05-21T10:20:54.618+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/webm-sd/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/59180","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":54,"length":3551,"mime_type":"audio/mpeg","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2022-05-21T09:12:04.468+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/mp3/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/59161","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":34,"length":3551,"mime_type":"audio/opus","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2022-05-21T09:11:17.339+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/opus/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_opus.opus","url":"https://api.media.ccc.de/public/recordings/59160","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":145,"length":3559,"mime_type":"video/mp4","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-05-20T23:05:10.690+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/h264-sd/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_sd.mp4","url":"https://api.media.ccc.de/public/recordings/59097","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":537,"length":3559,"mime_type":"video/mp4","language":"deu","filename":"gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-05-20T20:44:59.674+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/h264-hd/gpn20-37-deu-Elektrische_Sicherheit_fuer_Hacker_hd.mp4","url":"https://api.media.ccc.de/public/recordings/59075","event_url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"}]}