10
0
Fork 0
mirror of https://github.com/ChaosChemnitz/interfug15 synced 2024-12-22 10:02:23 +01:00
interfug15_github/fahrplan/2015/events.json

1 line
No EOL
4.7 KiB
JSON

{"conference_events":{"version":"0.0.6 fug fug fug","events":[{"id":7075,"guid":"f1082904-966e-4b60-aafd-3e6ac1aab082","title":"Abendprogramm","logo":null,"type":"other","do_not_record":true,"start_time":"2015-08-29T17:30:00+02:00","end_time":"2015-08-29T20:30:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"","speakers":[]},{"id":7073,"guid":"88af6df5-8abe-4d9f-9915-d5689780e5f9","title":"Die \u00dcberwachung","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-30T12:15:00+02:00","end_time":"2015-08-30T13:45:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Der Vortrag gibt einen \u00dcberblick \u00fcber die NSA-Aff\u00e4re, auch gerade diejenigen Punkte, die die Bundesrepublik Deutschland betreffen. Im letzten Kapitel werden einige Fragen behandelt, die sich daraus f\u00fcr die gesellschaftliche Diskussion ergeben.","speakers":[{"id":4130,"image":"/system/avatars/4130/medium/mark-1.jpg?1440026984","full_public_name":"Mark Neis","abstract":"Born 1972, living in Chemnitz/Saxony. CCC-Member since 2001, Pirate since 2009. Speeches on topics like searching the net, privacy and surveillance issues at different CCC and non-CCC events since 2004, e. g. regularly at Datenspuren (c3d2 Dresden). ","description":"","links":[]}]},{"id":7074,"guid":"cbdd4902-b98a-4a23-85bf-08446d97a5be","title":"Sichere Kontaktdatenverteilung mit Sm@rtRNS","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-29T11:45:00+02:00","end_time":"2015-08-29T12:15:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Ende-zu-Ende-verschl\u00fcsselter Kontaktdatenaustausch \u00fcber DNS und HTTP","speakers":[{"id":4652,"image":"/system/avatars/4652/medium/passfotorescale.jpg?1404775139","full_public_name":"Tesla42","abstract":"","description":"","links":[{"url":"https://chaoschemnitz.de","title":"ChCh"}]}]},{"id":6985,"guid":"494b8e9b-5b02-4a70-a3a7-c24702e2f3b2","title":"social pre-event","logo":null,"type":"meeting","do_not_record":true,"start_time":"2015-08-28T18:00:00+02:00","end_time":"2015-08-28T21:00:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Es gibt ein social pre event.","speakers":[]},{"id":7007,"guid":"05b9ab23-dd06-4af9-b14c-813d2d62124b","title":"Suckless.org","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-29T14:00:00+02:00","end_time":"2015-08-29T15:00:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Suckless.org ist das \u00dcberprojekt von einfacher Softwarew wie dwm, st, tabbed, surf, sbase, sinit und mehr. Der Vortrag stellt das Projekt und seine Ziele vor.","speakers":[{"id":5719,"image":null,"full_public_name":"Zwansch","abstract":"","description":"","links":[{"url":"https://www.r-36.net","title":"R-36.net"},{"url":"gopher://r-36.net","title":"R-36.net"},{"url":"https://www.r-36.net","title":"R-36.net"},{"url":"gopher://r-36.net","title":"R-36.net"}]}]},{"id":7005,"guid":"026183c8-20c3-444f-a26a-343bd6d74ee3","title":"Torrenting on the Interwebs","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-29T15:15:00+02:00","end_time":"2015-08-29T16:00:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Es geht um die Adaption von BitTorrent-Filesharing auf Web-Technologien.","speakers":[{"id":1648,"image":"/system/avatars/1648/medium/26.gif?1360200574","full_public_name":"Astro","abstract":"","description":"","links":[{"url":"http://spaceboyz.net/~astro/","title":"Homepage"}]}]},{"id":7009,"guid":"47c2ca1d-b45b-47d1-a3a5-912be6e8c1fc","title":"WebRTC Security","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-30T11:00:00+02:00","end_time":"2015-08-30T11:45:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Dank WebRTC k\u00f6nnen Webapplikationen verschl\u00fcsselte Videokonferenzen und Datei\u00fcbertragung direkt zwischen den Browsern anbieten. Aber wie Funktioniert diese Technologie eigentlich, wie sicher ist sie wirklich, welche H\u00fcrden gibt es und wo liegen ihre Grenzen?","speakers":[{"id":5698,"image":null,"full_public_name":"Stephan Thamm","abstract":"","description":"","links":[]}]},{"id":7002,"guid":"dc30bafd-f194-4236-86be-43428376432f","title":"Wir kochen Hagebuttenmarmelade","logo":null,"type":"lecture","do_not_record":false,"start_time":"2015-08-29T16:15:00+02:00","end_time":"2015-08-29T17:15:00+02:00","room":{"name":"Lokomov","id":344},"abstract":"Nach Auskunft von Datensch\u00fctzern sind alle Bem\u00fchungen um den Datenschutz der letzten 20 Jahre gescheitert. Ineinem Vortrag m\u00f6chte ich erkl\u00e4ren woran das liegt.","speakers":[{"id":3806,"image":"/system/avatars/3806/medium/zyx013.jpg?1395752105","full_public_name":"kusanowsky","abstract":"Soziologe","description":"soziologische Beobachtungen des Internets","links":[{"url":"http://www.differentia.wordpress.com","title":"Differentia"}]}]}]}}