{"guid":"c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","title":"Crypto-Workshop","subtitle":"Die Wiener Cryptoparty zu Gast bei der PrivacyWeek","slug":"pw17-188-crypto-workshop","link":"https://c3voc.de","description":"Bisherige Themen bei der Cryptoparty Wien: \nThema: IoT Fails - Ein Einblick in die skurrilen Fails der IoT Industrie \nThema: Bitcoin - Funktionsweise der Blockchain \nThema: Workshop → Bitmessage, A Peer‐to‐Peer Message Authentication and Delivery System \nThema: Workshop → Anonym im Internet? Wirklich anonym mit Tor? \nThema: Workshop → Email Verschlüsselung mit GPG \nThema: Handy Messenger - Die guten, die schlechten und die weit verbreiteten \nThema: Ein #33c3 - Rückblick \nThema: Vorbereitungsworkshop #33c3 - Laptop absichern \u0026 Co \nThema: E-Voting \nThema: Handy Messenger - Die guten, die schlechten und die weit verbreiteten \nThema: Das Tor Ökosystem, mehr als nur den Tor-Browser benutzen. \nThema: OpSec - wie verhält man sich, um Metadaten zu minimieren \nThema: Zu viele Passwörter? Passwortmanagement Software, 2-Faktor Authentifizierung \nThema: Backup, jetzt aber richtig! \nThema: Ransomware: „DatenVERschlüsselung leicht gemacht“ \nThema: Browsererweiterungen für Firefox \u0026 Chrome - Hands on Workshop \nThema: #32c3 - Eine Rückschau \nThema: Vorbereitungsworkshop #32c3 - Laptop absichern \nThema: Email… the good, the bad and the mostly ugly \nThema: Adblocking und Anti-Tracking/-Profiling \nThema: Rückschau auf den Sommer 2015 und das Chaos Communication Camp sowie Vortragsempfehlungen \nThema: Ab 19:30: Computer sicher nutzen: Über Malware, Phishing und Co. - Sichere Nutzung vom Computer um sich vor Malware, Phishing und Co zu schützen \nThema: Wie sicher kann Email sein? GPG und S/MIME. \nThema: Handy Security, sichere Sprach- und Videotelefonie, sichere Text-Messenger \nThema: TLS Zertifikate, Überprüfung, Zertifizierungssstellen und Superfish \nThema: Rückschau auf den 31. Chaos Communication Congress (31C3), aktuelle Entwicklungen, Fragen und Antworten \nThema: Einführung in das Thema Kryptografie mit anschließendem praktischen Workshop zu Browsersicherheit \nThema: Den eigenen Laptop absichern. Speziell für Besuchende des 31C3 \nThema: IT-Sicherheit und online Privatsphäre im Studium \nThema: Wie sicher ist https wirklich? \nThema: Verschlüsselte Datenträger austauschen \nThema: Alternativen zu Googles Diensten \nThema: Netzsperren und Zensur \nThema: Browser Fingerprinting, Tor, Tails \nThema: Filter Bubble \nThema: Browser \nThema: Heartbleed \u0026 Passwortsicherheit \nThema: Esoterische Kryptografie Tools - eine muntere Rundschau über die unsinnigen Dinge die da draussen sind von denen Du besser die Finger lässt. \nThema: Email Verschlüsselung mit GPG \nThema: Instant Messaging - Sicherer und privater Chatten mit Jabber und OTR \nThema: Anonymiät online, Tor, I2P \nThema: Absichern mobiler Geräte im Internet. Laptops, Tablets, Mobiltelefone. Speziell auch für Besuchende des 30C3 \nThema: Metadaten: Was das ist, wo sie entstehen, warum sie gefährlich sind und wie sich manche davon Vermeiden lassen. \nThema: Email-Verschlüsselung \nThema: Die CryptoCalypse - NSA und die Kryptographie: Wie sicher ist sicher? \nThema: Grundlagen der Verschlüsselung, Sicheres speichern von Daten \nThema: Operational Security (Feind hört mit) \nThema: OPSEC, Tor Hidden Services im Internet \u0026 alles was euch interessiert (bringt Fragen mit!)","original_language":"deu","persons":["Petar Kosic"],"tags":["pw17","188"],"view_count":528,"promoted":false,"date":"2017-10-28T00:00:00.000+02:00","release_date":"2018-02-01T01:00:00.000+01:00","updated_at":"2026-04-06T15:30:05.199+02:00","length":2186,"duration":2186,"thumb_url":"https://static.media.ccc.de/media/conferences/pw17/188-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/pw17/188-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/pw17/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/pw17/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw17-188-crypto-workshop","url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_title":"Privacy Week 2017","conference_url":"https://api.media.ccc.de/public/conferences/pw17","related":[{"event_id":1616,"event_guid":"import-ebb5f5ebcd563a0fe1","weight":6},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":2},{"event_id":2451,"event_guid":"746c83c2-b29b-41e7-be5b-fafdfe923a5a","weight":4},{"event_id":2958,"event_guid":"2714ce2a-4930-436e-b1e4-b461a6a79a15","weight":5},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":5},{"event_id":4471,"event_guid":"8590e34b-db76-42ed-a741-016951a2e626","weight":4},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":2},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":1},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":2},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4977,"event_guid":"14610aca-cb4d-4d79-915d-07ad36b32e47","weight":8},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":19},{"event_id":4996,"event_guid":"1fd3475c-f696-415b-971d-786e173e212c","weight":10},{"event_id":5008,"event_guid":"e5a54f6e-71cc-461e-91d5-5a1c0e3f316f","weight":6},{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":17},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":4},{"event_id":5021,"event_guid":"7c1ede90-60d4-4dda-8475-fb9ed6097e4f","weight":5},{"event_id":5033,"event_guid":"a33e07e8-36eb-4228-876f-f71944700aa6","weight":5},{"event_id":5039,"event_guid":"a25cfa4b-0e87-4306-951f-bc10f4c65f61","weight":4},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":9},{"event_id":5046,"event_guid":"f843c36d-ed74-4234-8116-dbb786022c7f","weight":21},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":6},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":15},{"event_id":5057,"event_guid":"0d450673-ab40-45f9-b949-6d7055ad8c28","weight":7},{"event_id":5060,"event_guid":"5cc72efe-e510-4c67-b49c-cbf12b4899cf","weight":17},{"event_id":5061,"event_guid":"f2fad80c-2d2f-4717-9a82-2406e7b23c77","weight":6},{"event_id":5062,"event_guid":"a15280a6-4f11-4c81-9e9c-7bd9cb6ed343","weight":7},{"event_id":5666,"event_guid":"05001d71-e22f-4bf5-9f0c-7105e719581a","weight":4},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":5},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":6}],"recordings":[{"size":246,"length":2186,"mime_type":"video/mp4","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-02-01T12:44:25.051+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/h264-hd/pw17-188-deu-Crypto-Workshop_hd.mp4","url":"https://api.media.ccc.de/public/recordings/23164","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"},{"size":33,"length":2180,"mime_type":"audio/mpeg","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2018-02-01T13:01:38.910+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/mp3/pw17-188-deu-Crypto-Workshop_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/23189","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"},{"size":78,"length":2186,"mime_type":"video/mp4","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-02-01T13:02:12.578+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/h264-sd/pw17-188-deu-Crypto-Workshop_sd.mp4","url":"https://api.media.ccc.de/public/recordings/23190","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"},{"size":22,"length":2180,"mime_type":"audio/opus","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2018-02-01T13:02:41.030+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/opus/pw17-188-deu-Crypto-Workshop_opus.opus","url":"https://api.media.ccc.de/public/recordings/23191","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"},{"size":92,"length":2186,"mime_type":"video/webm","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-02-01T13:17:38.366+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/webm-sd/pw17-188-deu-Crypto-Workshop_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/23212","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"},{"size":247,"length":2186,"mime_type":"video/webm","language":"deu","filename":"pw17-188-deu-Crypto-Workshop_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-02-01T14:58:41.408+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2017/webm-hd/pw17-188-deu-Crypto-Workshop_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/23230","event_url":"https://api.media.ccc.de/public/events/c0b4ff7f-7746-4d69-8d0f-b46a4be6a501","conference_url":"https://api.media.ccc.de/public/conferences/pw17"}]}