We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Was ist Digitale Selbstverteidigung?

00:00

Formal Metadata

Title
Was ist Digitale Selbstverteidigung?
Subtitle
Begriff - Einordnung - Grenzen
Title of Series
Number of Parts
13
Author
License
CC Attribution - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Der Begriff ›Digitale Selbstverteidigung‹ wird häufig im Kontext von CryptoParties und bei der aktiven Anwendung verwendet und mit Diffensivtaktik, die gegen Massenüberwachung und Datensammlung im Rahmen von Big-Data-Anwendungen. Der Begriff der ›digitalen Selbstverteidigung‹ ist über die reine Beschreibung technischer Anwendungen und Nuztungsstrategien allerdings noch immer unterdeterminiert. Im Rahmen des Workshops soll gemeinsam mit Einsteigern und Fortgeschritten die Begrifflichkeit erörtert und diskutiert werden.
Keywords
Content (media)Computer animationLecture/Conference
GoogleFacebookOffice <Programm>GoogleDigital signalContent (media)FacebookEmailSoftware developerE-bookProduct (category theory)InformationReading (process)Point cloudE-Book-ReaderComputer animationLecture/Conference
Computer animationLecture/Conference
DigitizingWorld Wide WebKommunikationDirection (geometry)Zusammenhang <Mathematik>DigitizingVideo trackingComputer animationLecture/Conference
EncryptionApple <Marke>Project <Programm>KommunikationInternetDigitizingNIS <Programm>Hecke operatorPhysical quantityCircleBackdoor (computing)Smart cardStress (mechanics)InternetMittelungsverfahrenComplete metric spaceSoftwareEncryptionComputer animation
Office <Programm>Mobile appHacker (term)Series (mathematics)Lecture/ConferenceComputer animation
Digital signalEncryptionDigitizingSocial classSource codeNorm <Mathematik>Plane (geometry)KommunikationBoom barrierData conversionMobile appDirection (geometry)EmailPerspective (visual)Lecture/Conference
Ende <Graphentheorie>Constraint (mathematics)Hard disk drivePasswordCryptographyEncryptionDigital signalComputer animation
Computer fileStandard deviationData conversionEncryptionSystems <München>Source codeOpen sourceBackdoor (computing)ImplementationDigital signalLecture/ConferenceComputer animation
Android (robot)WINDOWS <Programm>MicrosoftKommunikationAlgorithmRandom number generationHacker (term)Firewall (computing)PasswordLecture/ConferenceComputer animation
Service (economics)Point cloudGoogleLecture/Conference
Android (robot)WINDOWS <Programm>MicrosoftOperating systemPatch (Unix)SoftwareVulnerability (computing)Android (robot)Computer animation
MicrosoftInternetHausdorff spaceWINDOWS <Programm>Server (computing)Lecture/Conference
EncryptionOffice <Programm>File formatCryptanalysisVulnerability (computing)Grand Unified TheoryLösung <Mathematik>Computer animation
MetadataInternetdienstError correction modelGrand Unified TheoryPerspective (visual)CalculationMetadataPasswordOnline chatCorrespondence (mathematics)Computer fileInternetNon-standard analysisUser profileLecture/ConferenceComputer animation
MetadataZugriffCalculationService (economics)IP addressUser profileUSB-StickLecture/Conference
Hacker (term)Scripting languageSmartphoneLaptopFacebookKommunikationZugriffLocal area networkWebsiteWireless LANSearch engine (computing)Service (economics)FacebookZugriffSequenceE-bookSoftwareMoment (mathematics)BackupComputer animation
Moment (mathematics)Content (media)WebsiteSystems <München>EncryptionCryptographyZugriffWeb pageHard disk driveUSB-StickData storage deviceDVDPhishingSupercomputerLaptopLecture/Conference
UpdateAntivirus softwareOffice <Programm>Antivirus softwareStress (mechanics)UpdateSystems <München>ZugriffSmartphoneComputer animation
InternetMoment (mathematics)ZugriffAntivirus softwareBackupSchalePoint cloudLecture/Conference
BackupDegree (graph theory)Office <Programm>Grand Unified TheoryPotential gameLINUXBackdoor (computing)CodeImplementationMoment (mathematics)Partition (number theory)Communications protocolHard disk driveSet (mathematics)Computing platformVulnerability (computing)SoftwareOperating systemBlogEncryptionWINDOWS <Programm>Source codeMetadataSystems <München>Computer fileInformationNon-standard analysisClefOpen sourceServer (computing)Computer animationLecture/Conference
KommunikationCodeCW-KomplexGooglePasswordEigenvalues and eigenvectorsPlane (geometry)MetadataEmailCryptographyMedium <Physik>AlgorithmHand fanMoment (mathematics)Musical ensembleParameter (computer programming)Decision theoryNon-standard analysisServer (computing)Lecture/Conference
Lecture/Conference
Transcript: German(auto-generated)