{"id":1030,"date":"2010-01-03T13:53:59","date_gmt":"2010-01-03T13:53:59","guid":{"rendered":"http:\/\/nethemba.com\/cs\/26c3\/"},"modified":"2010-01-03T13:53:59","modified_gmt":"2010-01-03T13:53:59","slug":"26c3","status":"publish","type":"post","link":"https:\/\/nethemba.com\/cs\/26c3\/","title":{"rendered":"26c3"},"content":{"rendered":"<p>Koncom minul\u00e9ho roka sa konal v Berl\u00edne 26. ro\u010dn\u00edk konferencie CCC (Chaos Communication Congress) s n\u00e1zvom &#8222;Here be Dragons&#8220;.<\/p>\n<p>Predn\u00e1\u0161ky sa op\u00e4\u0165 t\u00fdkali prim\u00e1rne po\u010d\u00edta\u010dovej bezpe\u010dnosti, technol\u00f3gi\u00ed GSM, VoIP, RFID, reverzn\u00e9ho in\u017einerstva r\u00f4znych kryptografick\u00fdch funkci\u00ed a \u010dipov. Niektor\u00e9 z nich v\u0161ak mali aj ve\u013emi odli\u0161n\u00fa tematiku ako z\u00e1hady straten\u00fdch kozmonautov alebo predn\u00e1\u0161ka s n\u00e1zvom &#8222;Hacking the Universe&#8220; o te\u00f3rii str\u00fan.<\/p>\n<p>HaeB je jedn\u00fdm z troch \u013eud\u00ed, ktor\u00fd m\u00e1 na starosti udr\u017eiavanie kontroly a poriadku nemeckej wikip\u00e9die od roku 2006. Ke\u010f\u017ee wikip\u00e9dia je otvoren\u00fd syst\u00e9m a umo\u017e\u0148uje prispieva\u0165 dokonca aj bez registr\u00e1cie, vy\u017eaduje si vymyslie\u0165 \u00fa\u010dinn\u00fd sp\u00f4sob ochrany napr\u00edklad pred internetov\u00fdm vandalizmom alebo dodr\u017eiavan\u00edm copyrightu. HaeB vo svojej predn\u00e1\u0161ke uviedol, ako podobn\u00e9 incidenty detekova\u0165 a mo\u017enosti ich predch\u00e1dzania (viazanie identity pou\u017e\u00edvate\u013ea pomocou pr\u00edspevkov a jeho hodnotenie). Predn\u00e1\u0161ka bola zameran\u00e1 na &#8222;sockpuppets&#8220;, \u013eud\u00ed s viacer\u00fdmi pou\u017e\u00edvate\u013esk\u00fdmi kontami a sp\u00f4sobom ich odhalenia.<\/p>\n<p>Fyzik Lorenz z Hels\u00ednk uviedol filozoficky laden\u00fa predn\u00e1\u0161ku o auton\u00f3mnych inteligentn\u00fdch robotoch a smere ich v\u00fdvoja, mo\u017enosti ich kontroly a zam\u00fd\u0161\u013eal sa, ak\u00fd by bol svet bez toho, aby sme museli fyzicky pracova\u0165.<\/p>\n<p>Philippe Oechslin predn\u00e1\u0161al o h\u013eadan\u00ed kritick\u00fdch zranite\u013enost\u00ed pomocou reverzn\u00e9ho in\u017einierstva niektor\u00fdch komer\u010dn\u00fdch produktov, ktor\u00e9 pou\u017e\u00edvali potenci\u00e1lne bezpe\u010dn\u00e9 \u0161ifrovacie funkcie. Poukazoval na implementa\u010dn\u00e9 chyby, ktor\u00e9 sa dali v niektor\u00fdch pr\u00edpadoch ve\u013emi jednoduch\u00fdm sp\u00f4sobom zneu\u017ei\u0165. Jednalo sa napr\u00edklad o funkciu zapam\u00e4tania si posledn\u00fdch predo\u0161l\u00fdch hesiel, ktor\u00e1 zabezpe\u010dovala, \u017ee sa nebude nov\u00e9 zvolen\u00e9 heslo opakova\u0165, pr\u00edpadne v\u00fdmenu \u010d\u00edsiel blokov, ktor\u00e9 sa mali de\u0161ifrova\u0165 a s t\u00fdm spojen\u00e9 mo\u017enosti pou\u017e\u00edva\u0165 in\u00fd k\u013e\u00fa\u010d.<\/p>\n<p>Op\u00e4\u0165 nech\u00fdbala predn\u00e1\u0161ka o anonymiz\u00e9ri Tor. L\u00edder projektu Roger Dingledine uviedol nieko\u013eko nov\u00fdch zauj\u00edmavost\u00ed, okrem popisu a n\u00e1vrhu samotnej infra\u0161trukt\u00fary sa zmienil o korel\u00e1cii udalost\u00ed s po\u010dtom pripojen\u00fdch pou\u017e\u00edvate\u013eov tor-u, potenci\u00e1lne \u00fatoky a ich blokovanie, pr\u00edpadne situ\u00e1ciu v \u010c\u00edne.<\/p>\n<p>Dvojica Qin Liu a Sebastien Sauge predstavili prv\u00fa experimentalnu implement\u00e1ciu kvantov\u00e9ho \u0161ifrovania spolu s praktickou uk\u00e1\u017ekou.<\/p>\n<p>Za najlep\u0161iu predn\u00e1\u0161ku minim\u00e1lne v prv\u00fd de\u0148 pova\u017eujem &#8222;cat \/proc\/sys\/net\/ipv4\/fuckups&#8220; od Fabian Yamaguchi, rozdelen\u00fa na tri s\u00favisl\u00e9 \u010dasti. Najprv predviedol, ako sa jednoducho dok\u00e1\u017ee \u00fato\u010dn\u00edk infiltrova\u0165 do siete napr\u00edklad cez instant messengere a bezpe\u010dnostn\u00e9 chyby v r\u00f4znych klientoch (Adium, Pidgin, Microsoft Messenger). Pokra\u010doval chybami v implement\u00e1cii sie\u0165ov\u00fdch ovlada\u010dov v linuxe, ktor\u00e9 umo\u017enili ob\u00eds\u0165 firewall a ukon\u010dil technikou \u00fatoku &#8222;cache poisoning&#8220; squid-u.<\/p>\n<p>Zauj\u00edmav\u00e1 bola predn\u00e1\u0161ka \u0161tudenta Mike Brennan z Filadelfie o stylometrii &#8211; rozpozn\u00e1vanie autorstva na z\u00e1klade lingvistiky. Dobr\u00e9 v\u00fdsledky v tejto oblasti by dok\u00e1zali usved\u010di\u0165 \u013eud\u00ed, ktor\u00ed publikuj\u00fa anonymne na z\u00e1klade porovnan\u00ed s ich predo\u0161l\u00fdmi textmi. Na klasifik\u00e1ciu sa pou\u017e\u00edvaj\u00fa neur\u00f3nov\u00e9 siete, niektor\u00e9 signifikantn\u00e9 znaky, napr\u00edklad bodky za medzerou, alebo anal\u00fdza pomocou slovn\u00edka synon\u00fdm. Ka\u017edop\u00e1dne t\u00e1to technika rozpozn\u00e1vania sa nakoniec uk\u00e1zala by\u0165 ve\u013emi ne\u00fa\u010dinn\u00e1 v pr\u00edpade \u00fatoku &#8222;imit\u00e1ciou&#8220;, pri ktorom sa \u00fato\u010dn\u00edk sna\u017e\u00ed p\u00edsa\u0165 ako nejak\u00e1 in\u00e1 konkr\u00e9tna osoba.<\/p>\n<p>Sai Emrys mal ve\u013emi \u017eiv\u00fa predn\u00e1\u0161ku o tvorbe jazykov. Bola spojen\u00e1 s workshopom, \u013eudia mali mo\u017enos\u0165 hlasova\u0165 za jednotliv\u00e9 fon\u00e9my a p\u00edsmen\u00e1, tvorbu fonologick\u00fdch pravidiel a na ich z\u00e1klade definova\u0165 jazyk, v ktorom Sai s pomocou posluch\u00e1\u010dov vytvoril nieko\u013eko z\u00e1kladnych slov alebo viet.<\/p>\n<p>Felix &#8222;FX&#8220; Lindner mal rozsiahlu predn\u00e1\u0161ku o RICH (Rich internet applications) so zameran\u00edm na technol\u00f3giu FLASH (AVM1, AVM2) o hist\u00f3rii, \u00fatokoch, malware a mo\u017enosti zabezpe\u010denia. Okrem toho prezentoval svoj open source projekt s n\u00e1zvom Blitzableiter na anal\u00fdzu a prevenciu bezpe\u010dnostn\u00fdch dier v Adobe Flash. Linder spravil ve\u013ek\u00fd po\u010det testov s Blitzableiter, vysk\u00fa\u0161al najzn\u00e1mej\u0161ie exploity a \u017eiaden z nich nepre\u0161iel aplik\u00e1ciou, ktor\u00fa tool pokladal za bezpe\u010dn\u00fa. Zatia\u013e v\u0161ak m\u00f4ze nasta\u0165 probl\u00e9m s funkcionalitou FLASH aplik\u00e1ci\u00ed, mal\u00e9 percento testovan\u00fdch str\u00e1nok nepre\u0161lo ladiacimi proced\u00farami. Projekt Blitzableiter vyzer\u00e1 ve\u013emi s\u013eubne na to, aby mal za n\u00e1sledok vznik bezpe\u010dnej\u0161ieho k\u00f3du.<\/p>\n<p>Philippe Langloias, zakladate\u013e spolo\u010dnosti P1 security predstavil mo\u017enos\u0165 \u00fatoku na sadu signaliza\u010dn\u00fdch protokolov SS7 a SIGTRAN (SS7 cez IP). Obdobne ako v osemdesiatych rokoch sada protokolov TCP\/IP, SS7 obsahuje mno\u017estvo zranite\u013enost\u00ed na r\u00f4znych vrstv\u00e1ch, ktor\u00e9 sa daj\u00fa jednoducho zneu\u017ei\u0165 a \u00fatoky zautomatizova\u0165.<\/p>\n<p>\u010eal\u0161ia netechnick\u00e1 predn\u00e1\u0161ka s n\u00e1zvom &#8222;The Lost Cosmonauts&#8220; od Brian Dunninga predniesla probl\u00e9m straten\u00fdch Sovietskych kozmonautov, ktor\u00ed sa pod\u013ea v\u0161etk\u00e9ho stratili vo vesm\u00edre a boli vymazan\u00ed z hist\u00f3rie. Brian sa sna\u017eil analyzova\u0165 nahr\u00e1vku m\u0155tvej kozmonautky a aplikova\u0165 &#8222;kritick\u00e9 myslenie&#8220; na zistenie jej skuto\u010dn\u00e9ho zdroja.<\/p>\n<p>S dostupnos\u0165ou open-source implement\u00e1ci\u00ed GSM protokolov ako OpenBSC sa cel\u00e1 GSM technol\u00f3gia st\u00e1va pre hackerov \u010doraz dostupnej\u0161ia. Harald Welte spomenul mo\u017enosti, ako operova\u0165 vlastn\u00fa GSM sie\u0165 pomocou open source rie\u0161en\u00ed.<\/p>\n<p>Adam Young n\u00e1s obozn\u00e1mil s v\u00fdsledkami v\u00fdskumu kryptovirol\u00f3gie a kleptografie &#8211; \u0161t\u00fadiu pou\u017eitia \u0161ifrovania v malware.<\/p>\n<p>L. Aaron Kaplan v \u010fal\u0161ej predn\u00e1\u0161ke op\u00edsal slabosti a trendy pre aktu\u00e1lne trackovacie met\u00f3dy a sp\u00f4soby triangul\u00e1cie. D\u00f4le\u017eit\u00fd bod predstavuje firma Skyhook Wireless, ktor\u00e1 na lokaliz\u00e1ciu pre r\u00f4zne produkty (iPhone, Mac OS X, G1Android) pou\u017e\u00edva nieko\u013eko nez\u00e1visl\u00fdch technol\u00f3gi\u00ed (SSID datab\u00e1zy, GPS sign\u00e1ly, celul\u00e1rne siete). Kaplan rozviedol potenci\u00e1lne \u00fatoky a sp\u00f4soby ochrany pred hroziacou stratou n\u00e1\u0161ho s\u00fakromia.<\/p>\n<p>Predn\u00e1\u0161ka od teoretick\u00e9ho fyzika Robert Hellinga s n\u00e1zvom &#8222;Hacking the universe&#8220; o te\u00f3rii str\u00fan pre m\u0148a patrila k najo\u010dak\u00e1vanej\u0161\u00edm v posledn\u00fd de\u0148 konferencie, no pri\u0161la mi pr\u00edli\u0161 element\u00e1rna. Te\u00f3ria str\u00fan predstavuje fyzik\u00e1lny smer pre vytvorenie takzvanej &#8222;te\u00f3rie v\u0161etk\u00e9ho&#8220;, Helling okrem toho uviedol p\u00e1r slov o \u010diernych dierach, LHC, kozmol\u00f3gii a sna\u017eil sa osvetli\u0165, \u010do sa stalo pri Ve\u013ekom tresku.<\/p>\n<p>Okrem predn\u00e1\u0161ok sa konali na konferencii aj workshopy (jeden z naj\u017eiadanej\u0161\u00edch mal by\u0165 o crackovan\u00ed A5\/1 pre GSM, no bol zru\u0161en\u00fd &#8211; bli\u017e\u0161ie inform\u00e1cie na <a href=\"http:\/\/tinyurl.com\/yl4b6fx\">http:\/\/tinyurl.com\/yl4b6fx<\/a> a <a href=\"http:\/\/tinyurl.com\/ykdfcn6\">http:\/\/tinyurl.com\/ykdfcn6<\/a>) a s\u00fa\u0165a\u017ee. Nech\u00fdbal ani LEGO SUMO Contest, kde si \u013eudia postavili vlastn\u00fdch robotov z lega a t\u00ed sa sna\u017eili toho druh\u00e9ho vytla\u010di\u0165 zo stola.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Koncom minul\u00e9ho roka sa konal v Berl\u00edne 26. ro\u010dn\u00edk konferencie CCC (Chaos Communication Congress) s n\u00e1zvom &#8222;Here be Dragons&#8220;. Predn\u00e1\u0161ky sa op\u00e4\u0165 t\u00fdkali prim\u00e1rne po\u010d\u00edta\u010dovej bezpe\u010dnosti, technol\u00f3gi\u00ed GSM, VoIP, RFID, reverzn\u00e9ho in\u017einerstva r\u00f4znych kryptografick\u00fdch funkci\u00ed a \u010dipov. Niektor\u00e9 z nich v\u0161ak mali aj ve\u013emi odli\u0161n\u00fa tematiku ako z\u00e1hady straten\u00fdch kozmonautov alebo predn\u00e1\u0161ka s n\u00e1zvom &#8222;Hacking [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[12],"tags":[102,136,105],"class_list":["post-1030","post","type-post","status-publish","format-standard","hentry","category-uncategorized-cs","tag-26c3-cs","tag-conference-cs","tag-hacking-cs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>26c3 - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/26c3\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"26c3 - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Koncom minul\u00e9ho roka sa konal v Berl\u00edne 26. ro\u010dn\u00edk konferencie CCC (Chaos Communication Congress) s n\u00e1zvom &#8222;Here be Dragons&#8220;. Predn\u00e1\u0161ky sa op\u00e4\u0165 t\u00fdkali prim\u00e1rne po\u010d\u00edta\u010dovej bezpe\u010dnosti, technol\u00f3gi\u00ed GSM, VoIP, RFID, reverzn\u00e9ho in\u017einerstva r\u00f4znych kryptografick\u00fdch funkci\u00ed a \u010dipov. Niektor\u00e9 z nich v\u0161ak mali aj ve\u013emi odli\u0161n\u00fa tematiku ako z\u00e1hady straten\u00fdch kozmonautov alebo predn\u00e1\u0161ka s n\u00e1zvom &#8222;Hacking [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/26c3\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-03T13:53:59+00:00\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"26c3\",\"datePublished\":\"2010-01-03T13:53:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/\"},\"wordCount\":1181,\"commentCount\":0,\"keywords\":[\"26c3\",\"conference\",\"hacking\"],\"articleSection\":[\"Uncategorized @cs\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/\",\"name\":\"26c3 - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2010-01-03T13:53:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/26c3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/home-new-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"26c3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\\\/\\\/www.nethemba.com\\\/\"],\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/author\\\/nethemba-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"26c3 - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/26c3\/","og_locale":"cs_CZ","og_type":"article","og_title":"26c3 - Nethemba","og_description":"Koncom minul\u00e9ho roka sa konal v Berl\u00edne 26. ro\u010dn\u00edk konferencie CCC (Chaos Communication Congress) s n\u00e1zvom &#8222;Here be Dragons&#8220;. Predn\u00e1\u0161ky sa op\u00e4\u0165 t\u00fdkali prim\u00e1rne po\u010d\u00edta\u010dovej bezpe\u010dnosti, technol\u00f3gi\u00ed GSM, VoIP, RFID, reverzn\u00e9ho in\u017einerstva r\u00f4znych kryptografick\u00fdch funkci\u00ed a \u010dipov. Niektor\u00e9 z nich v\u0161ak mali aj ve\u013emi odli\u0161n\u00fa tematiku ako z\u00e1hady straten\u00fdch kozmonautov alebo predn\u00e1\u0161ka s n\u00e1zvom &#8222;Hacking [&hellip;]","og_url":"https:\/\/nethemba.com\/cs\/26c3\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2010-01-03T13:53:59+00:00","author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Napsal(a)":"Pavol Lupt\u00e1k","Odhadovan\u00e1 doba \u010dten\u00ed":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/cs\/26c3\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/cs\/26c3\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"26c3","datePublished":"2010-01-03T13:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/cs\/26c3\/"},"wordCount":1181,"commentCount":0,"keywords":["26c3","conference","hacking"],"articleSection":["Uncategorized @cs"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/cs\/26c3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/26c3\/","url":"https:\/\/nethemba.com\/cs\/26c3\/","name":"26c3 - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2010-01-03T13:53:59+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/26c3\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/26c3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/26c3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"26c3"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/cs\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=1030"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1030\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=1030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/categories?post=1030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/tags?post=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}