doi
stringlengths 19
19
| title
stringlengths 4
117
| url
stringlengths 29
29
| video_url
stringlengths 118
217
| license
stringclasses 18
values | subject
stringclasses 17
values | genre
stringclasses 5
values | release_year
stringclasses 17
values | author
stringlengths 3
194
⌀ | contributors
stringclasses 58
values | abstract
stringlengths 32
4.28k
| transcript
stringlengths 997
68.2k
| transcript_segments
dict | keyframes
dict | language
stringclasses 1
value | slides
listlengths 2
79
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
10.5446/50750 (DOI) | IoT Village - Exploring vulnerabilities in Smart Sex Toys | https://av.tib.eu/media/50750 | https://tib.flowcenter.de/mfc/medialink/3/de82789838e6f2fba8d3b47029b0b2ce0e908d9333288e4ec8e8a60791e9601081/DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys.mp4 | CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | Computer Science | Conference/Talk | 2020 | Bilic, Denise
Pastorino, Cecilia | null | Smart sex toys are a huge topic – and we’re not talking about their size! The Internet of Things (IoT) has triggered many personal items to become connected and smart, watches, toothbrushes, glasses and even toilets, to name just a few. The adult toy market has not been left behind with new models of toys that include the opportunity to connect them to the Internet and allow them to be remotely controlled. IoT devices and their vulnerabilities are frequently discussed in the media, and sex toys are not the exception. Many of them have holes in them. Keep focused, we mean holes and bugs in the software. This is despite the sensitivity of the extremely personal information they handle. We analyzed the security of the Android applications that control the most frequently purchased models of connected sexual pleasure devices, to determine the extent to which the confidentiality of user data could be vulnerable. Our research revealed interesting security flaws derived from both the implementation of the application and the design of the device, affecting the storage and processing of information. If you’re one of the many users who have a smart sex toy connected to the internet, or plan to buy one, you cannot miss this talk, it may have you shaking in your seat. Our presentation may make you reconsider connecting it ever again or not purchasing one at all. | Hi, I'm Cecilia. And I'm Denise. And today we are going to talk about sex toys. Smart sex toys. Well, insecure smart sex toys. Yeah. There have been previous researches on this subject and you can find them online, but many devices that are still on the market have a lot of vulnerability and privacy issues. So in our research we try to find these problems and today we are going to share with you our results. Exactly. But first let's do a quick recap on the history of these devices. They have actually been with us for a very long time. Actually, more than a century. The first sex toys were used as medical appliances back in the 1900s. They were used to cure different types of pathologies, including some psychological ones. Then throughout the 1920s, 30s, 40s, 50s, even to the late 60s, new devices, new models, new shapes started to appear in the market and they were this time advertised towards the home users that could buy these products, take them home and use them whenever they wanted. Imagine powering one of these via the electric power grid, right? Well, let's talk about physical security back in the 20s with one of those. Then by the 70s the emergence of new feminist movements alongside the boom of the porn industry propelled those devices and new form shapes and materials started to be used. But by the 2000 this thing starts to get interesting for us because new devices that could be controlled remotely via infrared connectivity started to appear and by the 2010 there were several devices that could be controlled locally via Bluetooth with an application on your own smartphone. Yeah, when the arrival of IoT and new technologies many manufacturers decided to integrate these toys with mobile apps and internet connections. So nowadays in 2020 we have toys that have a lot of characteristics and that can be used remotely, like control the toy remotely through the mobile app or even a web browser and changed by rating patterns or even synchronize the device with a video call, an audiobook, a playlist or even have Alexa support or other assistance support to control them on voice commands. So all of these functionalities are very interesting and also open the door to many vulnerabilities. Exactly and they open the door to new models that can connect between each other and also we are not now starting to see a trend towards smart six robots that have a lot of different capabilities that can be connected to the internet. They have certain artificial intelligence apps that can be installed on the device and these apps of course have a lot of vulnerabilities that we can somehow assess to try to bypass. So we actually contacted a few of these vendors to ask them about the characteristics of these smart six robots and we found out that they are following several bad practices when it comes to security. So this the way this smart six robots work is that they actually have a smartphone that functions on their head basically like a brain and that connects to the rest of the sensors of the body. So that phone can be actually very vulnerable and the updates are actually delivered through emails so the user have to install the APK themselves. Talk about security when it comes to this type of devices. Well apart from the devices if we think about the sex industry and the adult entertainment industry these industries have already been charged of several cyber attacks and the first attack that comes to my mind is the Ashley Madison social network which a couple of years before was a target of an attack and the details and information of more than 30 million users was exposed online. So a lot of cheaters were revealed and many people had a lot of problems in their relationships and we can also think about Tinder this dating app that has already been found in many vulnerabilities and also we have to think about the many scams that are based on fake apps or fake lab promises or even sextorsion based on stolen information. So if to these attacks to the sex industry we add the fact that IoT devices are being compromised by attackers to perform different types of attacks well that's a problem. We can think for example about the mirai network or about a case where attackers got control of a thermometer in a casino's fish tank and then from there could jump to the casino's network. So if we sum up the the industry of sex that has been target of cyber attacks with the many IoT devices that we have today in the market and are already being used by attackers well the combination it's a little bit scary. So what can go wrong with these toys? Well first of all an attacker can put a Valkdoror malware inside of one of these toys but also these devices are permanently advertising themselves so they are permanently sending information of their presence there. So it's pretty easy to find if a toy is present on a hotel room or if someone is carrying one with him. So this can lead to several issues like information disclosure, information very sensitive for example as sexual orientation, sexual partners or sexual practices and this can be some problem in many countries that have lost against some sexual practices but also we don't think about an attacker that gets control of one of these devices while a user is playing with it. So imagine a person has a toy it's playing at home but then an attacker gets control of that toy and is the one that is really sending the commands to the toy. Would that be sexual assault? What happens there? These are things that we have to start considering with smart sex toys. So at the start of our research we had to choose the devices that we were going to use for our research basically the models that we were going to buy and voila there were so many different vendors so many different models and it was really hard to choose with so many different characteristics each and every one of them. So we did what anybody would do in this situation right? We went to the museum of sex. Yes, in New York. We were in New York and we visited the museum. Exactly and we started actually testing different devices that you could test in the site and we didn't bring our laptops with us. We should have. Yeah but we ended up choosing two vendors that we think were one of the biggest or two of the biggest. So are you referring to the size or actually the vendors? Oh come on. Don't do this to me. Just thinking. Okay the first one is Love Ence. I'm sure many of you know this brand if you're interested in sex toys and security of sex toys because there have been researched on this particular vendor. This brand has a lot of smart sex toys. You can connect them over a Bluetooth network or even over the internet and there are so many different shapes and sizes and we have also we vibe that we choose because they also have a lot of smart sex toys and they are very important in the market and I'm sure you're aware that there were several researchers regarding this vendor in the past. So we wanted to know how much they have changed. So the first with the was we visited the websites of these two vendors and tried to look at the characteristics of their different models. So the first thing that you can see is that there is a lot of information about colors, materials, how much the battery lasts, how much does it take to charge them, but there were no mentions of these on the websites about protocols, encryption and the security that was being applied to this apps and this firmware to make it secure. So this is something that happens a lot with this type of IoT devices in particular, say sex toys. So the first step was to understand the architecture, how are these toys connected. So the toy connects to the user smartphone using a personal area network like Bluetooth or in most cases Bluetooth low energy. Then from the smartphone the user connects to an appy from the vendor usually on a vendor server and then the remote partner that can be anywhere in the world connects to that appy and from there gets control of the remote toy. So in this architecture in this model there are a lot of attack vectors that an attacker could use like go through for the personal area network connection for the Bluetooth connection, maybe something on the on the smartphone on the app or even the remote connection through the internet appy. So that's what we analyzed. Exactly, but first a quick disclaimer because all of the vulnerabilities that we are going to see throughout the talk that we're going to discuss have been already fixed and we have mission and to perform and distribute the content that you are going to see. So just to be clear on where we are standing. So the first toy we are going to show you is this naughty one right here. He can't stand still. So this is the the jive from WeVive. This toy is pretty interesting because it's awareable. It means that the person wears this toy and can go around playing with this toy. So usually a couple use these toys in bars, restaurants or even discos not only in hotel rooms or inside the house. So that was pretty interesting for our analysis because it's a toy that you can find anywhere and it's as we said before it's permanently advertising its presence and an attacker can easily find one of these like 30 feet around. Yeah it is designed to be used in insecure networks or it should be designed for that. We might had some trouble when it comes to information security in the past. It was at DuftCon a few years ago that research was presented where it was proven that they had collected too much information from their users without their consent and so they were sued and they had to pay 3.7 million dollars which is a lot. So we wanted to see if they had learned from this experience and they had changed their applications to make them more secure. The first thing that we checked was the remote control via the URL. This application has the possibility to create a 12 characters string that it's been used as a token and you can share with your partner and so they can connect via a de-application to control your own sex toy. So this token used to have some problems in the past. It didn't expire as it should but now they actually fix it. At least we couldn't find any problem with this right now. The first things that we checked were some privacy issues that could have critical consequences for the users leading to information disclosure. There are so many good things that we buy past change. For example now they block all screenshots of the tents which is great and it's quite common in these applications that tend to handle such sensitive data. They applied end to end decryption to encrypt all the pictures that you are sending and their files actually are deleted from the chat once the chat ends which is great so you know that your pictures do not linger on the phone of your partners. But still there were some issues that we found with this transferring of images. Yes well the pictures sent on the chat are saved to the storage inside the app sorry to the app storage inside the phone so that no other app can access that picture or you cannot access that picture from outside the application. But if the attacker has a rooted phone well they can access the app storage. In that case that's what we did we found out that the picture that is stored inside the application still has all the metadata in it. So when you send the picture the metadata is not deleted before it's sent. So that picture can be uploaded to a site like for example Metapix and an attacker can find out where the person is that sent the picture is actually located the exact location by the GPS details information. The attacker can also know the model of the phone that's been used, the camera, the time and date the photo was actually taken and if it has been edited or not. This information at first could sound like something that no one could use but the thing is that many people usually use these applications to talk to strangers and also many people share online their tokens or their remote controls. So if that person is trying to hide his or her true personality or is trying to hide where he or he is well the metadata and the pictures does not help. Exactly and sometimes this is not a personal choice but this is also can be part of the service as a cam girl or a cam boy service. So we need to protect these people that are using these devices basically to work. What else? Well this application actually includes a four-digit pin that they can use in order to lock the application so no one else can access the application unless it has the four-digit pin. This functionality might be in place to protect the app from your kids or something like that your nieces or maybe also a jealous lover. So the consequences can also be kind of critical if you're talking about a toxic relationship because this application only allows one partner at the time so polyamory has not arrived. So this pin can actually since it's just a four-digit pin can be brute-forced by using a bad USB with a very simple script because it takes the keyboard input and not like a grid of buttons or other type of component. So it's quite trivial to access this token and therefore access the control panel of the application and the usage of the application itself. And like we see in the video just unblock the app. Exactly. So what else regarding these toys? Well as we spoke before and these toys use Bluetooth low energy and this protocol has a particular characteristic that is that there are two type of devices peripheral and central devices. Peripheral devices that are usually the toys have to be constantly advertising their presence to wait for a connection from the central device. That means that while a toy is not connected to a smartphone it's permanently advertising announcing their presence there waiting for the connection. This means that like that. You're doing that. I'm not doing that. It's crazy we are already being hot. Who is doing that? I'm not sure. It's nobody here. It's just us. Okay so is somebody here? So the attacker can download an application like this Bluetooth scanner and just try to find out if there are any devices around. In the example that you can see on the screen we are finding the chive that's here and the Macs that we are going to talk later about this one. So it's pretty easy for the attacker to just find these devices find a lot of information from these devices and start using this scanner as a compass. A compass to get closer to the device just using the signal strength of each device. So the attacker can easily move around looking for the best signal strength and that would give the attacker an idea of where is the toy present who is wearing or using that toy. That's pretty much a lot of information. Yes and then they can connect to the toy and they don't even need the app to do that because there are several websites that you can use by using the web Bluetooth APA to connect to the to the sex toy and send comments to the sex toys and they are still functioning because there is no authentication when it comes to this Bluetooth connection and so it's quite vulnerable to these type of hijackings. So not only an attacker can get control of this toy whenever the toy is available but also could an attacker get into the middle of a conversation of the middle of a connection? Well that's actually what we tried a Bluetooth mind in the middle attack where the attacker tries to get in the middle of a communication and control the toy. So in a common scenario a toy would be connected to the user's phone but in this case what the attacker will try to do is get in the middle of that connection create a fake toy in his or her computer and then make the user connect to the fake toy instead of the real toy and the attacker will be the one who will forward the commands to the toy or maybe change them in the middle. So in the next video we are going to see a proof of concept of this. So what we did is use the tool BDL choose to create a man in the middle attack. This tool uses two Bluetooth dongles and the attacker will need two computers or in this case two virtual machines. In the first one what the attacker would do is create a Bluetooth proxy. This Bluetooth proxy will be in charge of getting all the Bluetooth communications, capturing all the Bluetooth traffic. Then once the proxy is up the attacker can go to the other computer or the other virtual machine and we connect to the Bluetooth proxy to the BDL choose proxy and then once connected you will see that this tool has a web interface that's very useful and easy to use. So in that interface the attacker can see all the Bluetooth devices on range and there you will find the Jive, our toy. So then once the attacker finds the toy can connect to that toy and as you see in the console the tool BDL choose will create what it's called a dummy. It's like a fake toy, a fake device where the user, the victim will connect but we'll still think that it's the real toy because this dummy will copy all the characteristics of the real device. So then the victim connects to that dummy to the fake toy and when sends a command the toy actually moves but as you see on the screen the attacker is capturing all these packages, all these commands. So the attacker can start knowing some commands and getting some traffic. So there can you see the user is changing some aberration patterns and the attacker is there capturing all of these packages. So then the attacker can get some commands but what the attacker can do next is take any of these packages and just reply it that means send it back to the toy. So now the attacker is sending a command and while the victim is not doing anything the toy is moving. So the toy is vibrating so the attacker is the one that is actually controlling the toy at this point. You can see it's sending different type of commands and the toy is responding. Also what the attacker can do there, the device is stopping, is change these packages. Just add new commands. These commands can either be taken from the source code of the application or by capturing a lot of traffic. So there for example you have the max intensity. So the attacker can send a command to the toy to rebrate at its maximum intensity. And there you will see how the toy is now vibrating. So the attacker can not only intercept the actual commands but also change them or send new commands to the toy. So in this case I know maybe it could be a sexual assault, something to talk about or to think about. So we have proved that these devices are still vulnerable to this type of attack and no authentication has been included in this toys in the past years. Which was the goal of this research. So now we're going to analyze our Loven's device which is the max device that you are watching right now on screen. This device can be synchronized with its counterpart. It can be another max device or a normal device. These models are interesting from a hacking perspective because if a hacker has control over one of these devices then immediately compromises the other one that replicates the movements of the first. So you can have two devices under your control by the price of one. So we started analyzing the application that is used to control this device that is the Loven's remote application and we started analyzing the privacy features related to this application. Well we could see that it uses a 4-digit pin to lock the application as same as the other one but there were some concerns right? Yes well some questionable design choices from Loven's. To start the screenshots are allowed so for a sexy application that's pretty much something to think about. But also well the metadata was deleted from the pictures before they are sent that's great but the pictures that were person sent on a chat well are very difficult to delete from the remote smartphone. They practically stay there. What do we mean by this? Well let's imagine you're using the application and you send your partner your own picture. Let's say that you now open the options menu on this picture. Well you see different options. First of all you can see that you can delete the picture but this deletion only works locally. It doesn't remove the picture from the server nor the phone of your lover so basically once you send the picture you lose control. Also the remote partner can also forward or download your picture whenever they want and this since this application this picture stays on the server then they can also query the server to get the image if they know the URL of this particular resource. The Loven's privacy policy says that this picture is stay in their servers unencrypted by the way for seven days but we've actually found that they can stay longer. There's actually a hidden option that's called recall and that's the one you want to use when you want to delete a picture from the two devices but this option it's only available for two minutes after sending the picture and then completely disappears. So if you never tried to delete the pictures right after you send it then you don't even know that this function even exists. So that's something to have in mind if you or one of your relatives or someone of your friends it's actually using this application. Also when we start analyzing the traffic you can see that there are several queries HTTP get queries that are broadcasting information such as the user ID in this case is the same one as the email addresses. When you register into the application you can set a fantasy username and you need to provide your email. Well guess what that email is actually shared with whomever you're chatting with. Let's say you open up chat with one of your friends well the application uses your email as your user ID to identify your phone so they are sharing your email with the person that you're chatting and they can look up your email in the internal files of the phone because they are not encrypted and even if they were you can still somehow manage to get through this information by injecting the application at runtime and there are other ways other issues related to the way this application manipulates the email addresses. For example you can query the server to see if a given email address is registered on the system so you can know based on the response if the email exists you could use a leak database of emails from previous attacks let's say the Ashley Madison social network attack and then query these emails against the server because there are no protections against brute forcing so you could query all that you want and it works the other way around you can also query for user names and get their emails so let's say you start browsing the application and you find the patterns library where users can share their patterns of use publicly with other users so you could find user names listed in this library and then query the server to get their emails and start different attacks as social engineering or sex torsion attacks or even use this emails to launch other type of attacks since these are also the user IDs so these emails could be used to identify a person right well apart from the library we need to think that many people just share their username their nicknames online for remote session with someone around the world but most of the time these are fantasy names like sexist got 26 well in this case an attacker could find out what's there in the email for sexist got 26 and find the real person behind that nickname be sure not to register with a corporate account right yeah for sure well apart from this the levels remote control also works with an URL so the person that has this toy can create remote control URL for his or her partner to control the toy remotely so this URL works directly through the internet it does not need for the remote partner to have the app in style as in the case of we buy so in this case this URL is made by at first an alphanumeric token with only four characters so we started analyzing a little bit about this token so apparently as a lovin says it's a one-time use token and it lasts only 30 minutes but we were going to test this and see if this is true spoiler alert it's not so this is the remote panel where the remote lover can connect to control this toy in this case what you're seeing is the panel for our own toy in the case of max you have two controls for vibration vibration and for air control so anyone that connects to this URL without authentication just gets control of this toy so the idea here was to find if it was able to just guess different tokens and get access to panels that are online and maybe get a panel for another person's toy yeah so we created different tokens some of them expired some of them active and we used our own lovin's app installed on our own smartphone and then we tried to analyze how this access to this token worked so basically if the token never actually existed then it's the server reddit X to a JSON with page not found but in the case the token existed at some point in time then it's reddit active to another research with a path that you can see now on screen you can see there's an sID or session ID that links the token the the user ID and also the ID of the particular device since a user can have multiple device connected to this application and then there was a second redirection within this process where you can see that the only thing that changes is the two in the middle of the path at the end the session only expires or the token expires if the user reaches the final URL but in the meantime you can interrupt the process and try to somehow see if their response from the server tells you if a token is valid meaning it has existed at some point in time if it's active meaning there's someone actually waiting for you to connect to this token or if it has expired so is there a way to weaponize this? could an attacker just try to write a script to find random active tokens and try to join this remote sessions? well we created different tokens some of them expired some of them active and we actually tested some non-existent tokens and we created a script to see if we could do this programatically and in fact this worked it's a success you can actually tell with a script if a token is active or not so we tested this set of tokens and then we wondered could an attacker wait for how long to find an active token I mean is it really worth it I mean or would he have to wait so long that it's not even worth the effort? well let's do some math let's check this so it's a four digits token with letter and numbers and that would be around 36 characters different characters and that would be like 1.6 million possibilities of tokens to try so if we think about one second per token to find them maybe 20 days for an attacker to find a token valid and also the attacker needs to access this URL this token before the remote partner does so it doesn't expire so it's pretty much complicated it's a lot of time so maybe if we speed up a little bit if we make some automation here automations in the rescue right so here's a proof of concept that we ran on top of our own tokens and you can see on the bottom right screen there's a console that's running our script that's checking for different tokens and some of them are non-existent some others are valid if the token is valid then it opens up a new tab on the web browser to your left and if the session it's actually active then it sends a message via a telegram bot to the attacker so that way the attacker can know that a new active token has been found and this is done by adding a malicious extension to this web browser that allows or adds more processing capabilities to the Python script that it's running on the bottom right so this is a simulation of 10 minutes of running the script and you can see that in the end it doesn't take long to find new tokens this is the average that took us to find active tokens and in this case you can see the attacker has access to the control panel of this device the max device and he receives a new message via telegram in his phone let him know that there's a new section session active and the web browser so how can we protect ourselves given that these devices still have vulnerabilities well first of all keep in mind that this is a sexting phenomena so if you're talking about sexting don't don't share any pictures or videos where other people can see your face or some particular markings that you have try to avoid being recognizable through these pictures and videos also make sure that you're not sharing this remote tokens online or publicly in that you're always sharing them via some secure mechanism with the intended person make sure also that you're registering to these applications with a fantasy email don't use your personal email create a new one specifically for these applications and also make sure to install the latest updates to install the patches to all of these vulnerabilities well and of course make sure you're using a secure network while you play with these toys and even if it's possible make sure nobody is around and also you can always Google some reviews about the toy and see if there are already some security issues published or there is any security review published and once you decide to to buy a toy or once you have chosen a toy please read terms and conditions before using it and it's also a good practice to download the application before buying the toy so you can check the application see which functionalities it has and how it works and maybe guess or research a little bit about which information is asking you and how it will and create or protect that information so well that's all but what happens if you already have a toy what about all these people that already bought a toy and now are too scared to use it well remember it's also a great toy for your dog thank you very much for listening to our talk | {
"avg_logprob": [
-0.20492032170295715,
-0.20492032170295715,
-0.20492032170295715,
-0.20492032170295715,
-0.20492032170295715,
-0.20492032170295715,
-0.12460683286190033,
-0.12460683286190033,
-0.12460683286190033,
-0.12460683286190033,
-0.1325518786907196,
-0.1325518786907196,
-0.1325518786907196,
-0.1325518786907196,
-0.17389144003391266,
-0.17389144003391266,
-0.17389144003391266,
-0.17389144003391266,
-0.18100528419017792,
-0.18100528419017792,
-0.18100528419017792,
-0.18100528419017792,
-0.18100528419017792,
-0.18304665386676788,
-0.18304665386676788,
-0.18304665386676788,
-0.18304665386676788,
-0.14798587560653687,
-0.14798587560653687,
-0.14798587560653687,
-0.14798587560653687,
-0.14798587560653687,
-0.14729805290699005,
-0.14729805290699005,
-0.14729805290699005,
-0.14729805290699005,
-0.14729805290699005,
-0.14419890940189362,
-0.14419890940189362,
-0.14419890940189362,
-0.14419890940189362,
-0.15916630625724792,
-0.15916630625724792,
-0.15916630625724792,
-0.15916630625724792,
-0.15916630625724792,
-0.1779639571905136,
-0.1779639571905136,
-0.1779639571905136,
-0.1779639571905136,
-0.1779639571905136,
-0.151582732796669,
-0.151582732796669,
-0.151582732796669,
-0.151582732796669,
-0.16219644248485565,
-0.16219644248485565,
-0.16219644248485565,
-0.16219644248485565,
-0.16219644248485565,
-0.20064425468444824,
-0.20064425468444824,
-0.20064425468444824,
-0.20064425468444824,
-0.20064425468444824,
-0.15009190142154694,
-0.15009190142154694,
-0.15009190142154694,
-0.15009190142154694,
-0.15009190142154694,
-0.14894403517246246,
-0.14894403517246246,
-0.14894403517246246,
-0.14894403517246246,
-0.14894403517246246,
-0.1934128999710083,
-0.1934128999710083,
-0.1934128999710083,
-0.1934128999710083,
-0.1934128999710083,
-0.27522194385528564,
-0.27522194385528564,
-0.27522194385528564,
-0.27522194385528564,
-0.19084738194942474,
-0.19084738194942474,
-0.19084738194942474,
-0.19084738194942474,
-0.1350793093442917,
-0.1350793093442917,
-0.1350793093442917,
-0.1350793093442917,
-0.1350793093442917,
-0.20897503197193146,
-0.20897503197193146,
-0.20897503197193146,
-0.20897503197193146,
-0.1741459220647812,
-0.1741459220647812,
-0.1741459220647812,
-0.1741459220647812,
-0.1957097202539444,
-0.1957097202539444,
-0.1957097202539444,
-0.1957097202539444,
-0.1957097202539444,
-0.19401027262210846,
-0.19401027262210846,
-0.19401027262210846,
-0.19401027262210846,
-0.19401027262210846,
-0.19147051870822906,
-0.19147051870822906,
-0.19147051870822906,
-0.19147051870822906,
-0.19147051870822906,
-0.2073114812374115,
-0.2073114812374115,
-0.2073114812374115,
-0.2073114812374115,
-0.2073114812374115,
-0.190919890999794,
-0.190919890999794,
-0.190919890999794,
-0.190919890999794,
-0.190919890999794,
-0.14529936015605927,
-0.14529936015605927,
-0.14529936015605927,
-0.14529936015605927,
-0.14529936015605927,
-0.1396416872739792,
-0.1396416872739792,
-0.1396416872739792,
-0.1396416872739792,
-0.1396416872739792,
-0.21306423842906952,
-0.21306423842906952,
-0.21306423842906952,
-0.21306423842906952,
-0.21306423842906952,
-0.13780687749385834,
-0.13780687749385834,
-0.13780687749385834,
-0.13780687749385834,
-0.13780687749385834,
-0.16157884895801544,
-0.16157884895801544,
-0.16157884895801544,
-0.16157884895801544,
-0.16157884895801544,
-0.14175961911678314,
-0.14175961911678314,
-0.14175961911678314,
-0.14175961911678314,
-0.14175961911678314,
-0.1525363028049469,
-0.1525363028049469,
-0.1525363028049469,
-0.1525363028049469,
-0.1536615639925003,
-0.1536615639925003,
-0.1536615639925003,
-0.1536615639925003,
-0.15090367197990417,
-0.15090367197990417,
-0.15090367197990417,
-0.15090367197990417,
-0.15090367197990417,
-0.1856745034456253,
-0.1856745034456253,
-0.1856745034456253,
-0.1856745034456253,
-0.22134028375148773,
-0.22134028375148773,
-0.22134028375148773,
-0.22134028375148773,
-0.22134028375148773,
-0.1957029551267624,
-0.1957029551267624,
-0.1957029551267624,
-0.1957029551267624,
-0.1957029551267624,
-0.18028827011585236,
-0.18028827011585236,
-0.18028827011585236,
-0.18028827011585236,
-0.18028827011585236,
-0.13096065819263458,
-0.13096065819263458,
-0.13096065819263458,
-0.13096065819263458,
-0.13096065819263458,
-0.14711152017116547,
-0.14711152017116547,
-0.14711152017116547,
-0.14711152017116547,
-0.16538536548614502,
-0.16538536548614502,
-0.16538536548614502,
-0.16538536548614502,
-0.16538536548614502,
-0.16538536548614502,
-0.09913543611764908,
-0.09913543611764908,
-0.09913543611764908,
-0.09913543611764908,
-0.09913543611764908,
-0.17126932740211487,
-0.17126932740211487,
-0.17126932740211487,
-0.17126932740211487,
-0.17126932740211487,
-0.16389043629169464,
-0.16389043629169464,
-0.16389043629169464,
-0.16389043629169464,
-0.16389043629169464,
-0.14834919571876526,
-0.14834919571876526,
-0.14834919571876526,
-0.14834919571876526,
-0.14834919571876526,
-0.17562028765678406,
-0.17562028765678406,
-0.17562028765678406,
-0.17562028765678406,
-0.17562028765678406,
-0.1281125694513321,
-0.1281125694513321,
-0.1281125694513321,
-0.1281125694513321,
-0.1281125694513321,
-0.11203372478485107,
-0.11203372478485107,
-0.11203372478485107,
-0.11203372478485107,
-0.11203372478485107,
-0.15940533578395844,
-0.15940533578395844,
-0.15940533578395844,
-0.15940533578395844,
-0.17284056544303894,
-0.17284056544303894,
-0.17284056544303894,
-0.17284056544303894,
-0.17284056544303894,
-0.12850089371204376,
-0.12850089371204376,
-0.12850089371204376,
-0.12850089371204376,
-0.19400812685489655,
-0.19400812685489655,
-0.19400812685489655,
-0.19400812685489655,
-0.22285063564777374,
-0.22285063564777374,
-0.22285063564777374,
-0.22285063564777374,
-0.22285063564777374,
-0.12766125798225403,
-0.12766125798225403,
-0.12766125798225403,
-0.12766125798225403,
-0.15633563697338104,
-0.15633563697338104,
-0.15633563697338104,
-0.15633563697338104,
-0.15633563697338104,
-0.14725163578987122,
-0.14725163578987122,
-0.14725163578987122,
-0.14725163578987122,
-0.11994302272796631,
-0.11994302272796631,
-0.11994302272796631,
-0.11994302272796631,
-0.11994302272796631,
-0.13717657327651978,
-0.13717657327651978,
-0.13717657327651978,
-0.13717657327651978,
-0.1152086928486824,
-0.1152086928486824,
-0.1152086928486824,
-0.1152086928486824,
-0.14667752385139465,
-0.14667752385139465,
-0.14667752385139465,
-0.14667752385139465,
-0.16007715463638306,
-0.16007715463638306,
-0.16007715463638306,
-0.16007715463638306,
-0.1527474969625473,
-0.1527474969625473,
-0.1527474969625473,
-0.1527474969625473,
-0.18190898001194,
-0.18190898001194,
-0.18190898001194,
-0.18190898001194,
-0.14943251013755798,
-0.14943251013755798,
-0.14943251013755798,
-0.14943251013755798,
-0.14943251013755798,
-0.17176546156406403,
-0.17176546156406403,
-0.17176546156406403,
-0.17176546156406403,
-0.16510218381881714,
-0.16510218381881714,
-0.16510218381881714,
-0.16510218381881714,
-0.1821892112493515,
-0.1821892112493515,
-0.1821892112493515,
-0.1821892112493515,
-0.08579456806182861,
-0.08579456806182861,
-0.08579456806182861,
-0.08579456806182861,
-0.20189447700977325,
-0.20189447700977325,
-0.20189447700977325,
-0.20189447700977325,
-0.18870899081230164,
-0.18870899081230164,
-0.18870899081230164,
-0.18870899081230164,
-0.18870899081230164,
-0.12198597937822342,
-0.12198597937822342,
-0.12198597937822342,
-0.12198597937822342,
-0.15530425310134888,
-0.15530425310134888,
-0.15530425310134888,
-0.15530425310134888,
-0.15530425310134888,
-0.1317884922027588,
-0.1317884922027588,
-0.1317884922027588,
-0.1317884922027588,
-0.10419551283121109,
-0.10419551283121109,
-0.10419551283121109,
-0.10419551283121109,
-0.11402604728937149,
-0.11402604728937149,
-0.11402604728937149,
-0.11402604728937149,
-0.1278373897075653,
-0.1278373897075653,
-0.1278373897075653,
-0.1278373897075653,
-0.09740152955055237,
-0.09740152955055237,
-0.09740152955055237,
-0.09740152955055237,
-0.10635799914598465,
-0.10635799914598465,
-0.10635799914598465,
-0.10635799914598465,
-0.10909610986709595,
-0.10909610986709595,
-0.10909610986709595,
-0.10909610986709595,
-0.10909610986709595,
-0.1264667958021164,
-0.1264667958021164,
-0.1264667958021164,
-0.1264667958021164,
-0.09698041528463364,
-0.09698041528463364,
-0.09698041528463364,
-0.09698041528463364,
-0.09698041528463364,
-0.1265791356563568,
-0.1265791356563568,
-0.1265791356563568,
-0.1265791356563568,
-0.12365192919969559,
-0.12365192919969559,
-0.12365192919969559,
-0.12365192919969559,
-0.12365192919969559,
-0.16780602931976318,
-0.16780602931976318,
-0.7711649537086487
],
"compression_ratio": [
1.6881721019744873,
1.6881721019744873,
1.6881721019744873,
1.6881721019744873,
1.6881721019744873,
1.6881721019744873,
1.5288461446762085,
1.5288461446762085,
1.5288461446762085,
1.5288461446762085,
1.5679612159729004,
1.5679612159729004,
1.5679612159729004,
1.5679612159729004,
1.5958548784255981,
1.5958548784255981,
1.5958548784255981,
1.5958548784255981,
1.5666667222976685,
1.5666667222976685,
1.5666667222976685,
1.5666667222976685,
1.5666667222976685,
1.6310160160064697,
1.6310160160064697,
1.6310160160064697,
1.6310160160064697,
1.7169811725616455,
1.7169811725616455,
1.7169811725616455,
1.7169811725616455,
1.7169811725616455,
1.6828193664550781,
1.6828193664550781,
1.6828193664550781,
1.6828193664550781,
1.6828193664550781,
1.6983239650726318,
1.6983239650726318,
1.6983239650726318,
1.6983239650726318,
1.642241358757019,
1.642241358757019,
1.642241358757019,
1.642241358757019,
1.642241358757019,
1.6727272272109985,
1.6727272272109985,
1.6727272272109985,
1.6727272272109985,
1.6727272272109985,
1.5567010641098022,
1.5567010641098022,
1.5567010641098022,
1.5567010641098022,
1.638655424118042,
1.638655424118042,
1.638655424118042,
1.638655424118042,
1.638655424118042,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.7183098793029785,
1.7183098793029785,
1.7183098793029785,
1.7183098793029785,
1.7183098793029785,
1.8136364221572876,
1.8136364221572876,
1.8136364221572876,
1.8136364221572876,
1.8136364221572876,
1.6909871101379395,
1.6909871101379395,
1.6909871101379395,
1.6909871101379395,
1.6909871101379395,
1.525821566581726,
1.525821566581726,
1.525821566581726,
1.525821566581726,
1.6117020845413208,
1.6117020845413208,
1.6117020845413208,
1.6117020845413208,
1.6995304822921753,
1.6995304822921753,
1.6995304822921753,
1.6995304822921753,
1.6995304822921753,
1.6275510787963867,
1.6275510787963867,
1.6275510787963867,
1.6275510787963867,
1.5685279369354248,
1.5685279369354248,
1.5685279369354248,
1.5685279369354248,
1.7731481790542603,
1.7731481790542603,
1.7731481790542603,
1.7731481790542603,
1.7731481790542603,
1.6851063966751099,
1.6851063966751099,
1.6851063966751099,
1.6851063966751099,
1.6851063966751099,
1.6561086177825928,
1.6561086177825928,
1.6561086177825928,
1.6561086177825928,
1.6561086177825928,
1.6150442361831665,
1.6150442361831665,
1.6150442361831665,
1.6150442361831665,
1.6150442361831665,
1.6521738767623901,
1.6521738767623901,
1.6521738767623901,
1.6521738767623901,
1.6521738767623901,
1.6610169410705566,
1.6610169410705566,
1.6610169410705566,
1.6610169410705566,
1.6610169410705566,
1.637130856513977,
1.637130856513977,
1.637130856513977,
1.637130856513977,
1.637130856513977,
1.7207207679748535,
1.7207207679748535,
1.7207207679748535,
1.7207207679748535,
1.7207207679748535,
1.871921181678772,
1.871921181678772,
1.871921181678772,
1.871921181678772,
1.871921181678772,
1.7407407760620117,
1.7407407760620117,
1.7407407760620117,
1.7407407760620117,
1.7407407760620117,
1.7333333492279053,
1.7333333492279053,
1.7333333492279053,
1.7333333492279053,
1.7333333492279053,
1.6703910827636719,
1.6703910827636719,
1.6703910827636719,
1.6703910827636719,
1.6455026865005493,
1.6455026865005493,
1.6455026865005493,
1.6455026865005493,
1.5707964897155762,
1.5707964897155762,
1.5707964897155762,
1.5707964897155762,
1.5707964897155762,
1.5288461446762085,
1.5288461446762085,
1.5288461446762085,
1.5288461446762085,
1.6535087823867798,
1.6535087823867798,
1.6535087823867798,
1.6535087823867798,
1.6535087823867798,
1.8295964002609253,
1.8295964002609253,
1.8295964002609253,
1.8295964002609253,
1.8295964002609253,
1.6607929468154907,
1.6607929468154907,
1.6607929468154907,
1.6607929468154907,
1.6607929468154907,
1.736842155456543,
1.736842155456543,
1.736842155456543,
1.736842155456543,
1.736842155456543,
1.8095238208770752,
1.8095238208770752,
1.8095238208770752,
1.8095238208770752,
1.9139344692230225,
1.9139344692230225,
1.9139344692230225,
1.9139344692230225,
1.9139344692230225,
1.9139344692230225,
1.827102780342102,
1.827102780342102,
1.827102780342102,
1.827102780342102,
1.827102780342102,
1.7488372325897217,
1.7488372325897217,
1.7488372325897217,
1.7488372325897217,
1.7488372325897217,
1.8146342039108276,
1.8146342039108276,
1.8146342039108276,
1.8146342039108276,
1.8146342039108276,
1.7397260665893555,
1.7397260665893555,
1.7397260665893555,
1.7397260665893555,
1.7397260665893555,
1.924242377281189,
1.924242377281189,
1.924242377281189,
1.924242377281189,
1.924242377281189,
1.902438998222351,
1.902438998222351,
1.902438998222351,
1.902438998222351,
1.902438998222351,
1.6814159154891968,
1.6814159154891968,
1.6814159154891968,
1.6814159154891968,
1.6814159154891968,
1.5858585834503174,
1.5858585834503174,
1.5858585834503174,
1.5858585834503174,
1.6416666507720947,
1.6416666507720947,
1.6416666507720947,
1.6416666507720947,
1.6416666507720947,
1.6432431936264038,
1.6432431936264038,
1.6432431936264038,
1.6432431936264038,
1.612021803855896,
1.612021803855896,
1.612021803855896,
1.612021803855896,
1.6317992210388184,
1.6317992210388184,
1.6317992210388184,
1.6317992210388184,
1.6317992210388184,
1.6470588445663452,
1.6470588445663452,
1.6470588445663452,
1.6470588445663452,
1.7788461446762085,
1.7788461446762085,
1.7788461446762085,
1.7788461446762085,
1.7788461446762085,
1.6577540636062622,
1.6577540636062622,
1.6577540636062622,
1.6577540636062622,
1.7285714149475098,
1.7285714149475098,
1.7285714149475098,
1.7285714149475098,
1.7285714149475098,
1.578125,
1.578125,
1.578125,
1.578125,
1.697802186012268,
1.697802186012268,
1.697802186012268,
1.697802186012268,
1.66847825050354,
1.66847825050354,
1.66847825050354,
1.66847825050354,
1.661375641822815,
1.661375641822815,
1.661375641822815,
1.661375641822815,
1.6298342943191528,
1.6298342943191528,
1.6298342943191528,
1.6298342943191528,
1.6455026865005493,
1.6455026865005493,
1.6455026865005493,
1.6455026865005493,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.7533632516860962,
1.699453592300415,
1.699453592300415,
1.699453592300415,
1.699453592300415,
1.5714285373687744,
1.5714285373687744,
1.5714285373687744,
1.5714285373687744,
1.7758620977401733,
1.7758620977401733,
1.7758620977401733,
1.7758620977401733,
1.6830600500106812,
1.6830600500106812,
1.6830600500106812,
1.6830600500106812,
1.6340205669403076,
1.6340205669403076,
1.6340205669403076,
1.6340205669403076,
1.7638888359069824,
1.7638888359069824,
1.7638888359069824,
1.7638888359069824,
1.7638888359069824,
1.6927083730697632,
1.6927083730697632,
1.6927083730697632,
1.6927083730697632,
1.8009259700775146,
1.8009259700775146,
1.8009259700775146,
1.8009259700775146,
1.8009259700775146,
1.7010869979858398,
1.7010869979858398,
1.7010869979858398,
1.7010869979858398,
1.6182795763015747,
1.6182795763015747,
1.6182795763015747,
1.6182795763015747,
1.627659559249878,
1.627659559249878,
1.627659559249878,
1.627659559249878,
1.7237569093704224,
1.7237569093704224,
1.7237569093704224,
1.7237569093704224,
1.699453592300415,
1.699453592300415,
1.699453592300415,
1.699453592300415,
1.7247190475463867,
1.7247190475463867,
1.7247190475463867,
1.7247190475463867,
1.7180616855621338,
1.7180616855621338,
1.7180616855621338,
1.7180616855621338,
1.7180616855621338,
1.6684210300445557,
1.6684210300445557,
1.6684210300445557,
1.6684210300445557,
1.8502415418624878,
1.8502415418624878,
1.8502415418624878,
1.8502415418624878,
1.8502415418624878,
1.6810810565948486,
1.6810810565948486,
1.6810810565948486,
1.6810810565948486,
1.7926267385482788,
1.7926267385482788,
1.7926267385482788,
1.7926267385482788,
1.7926267385482788,
1.4067796468734741,
1.4067796468734741,
0.5789473652839661
],
"end": [
4.900000095367432,
10.15999984741211,
15.119999885559082,
19.799999237060547,
23.15999984741211,
28.8799991607666,
34.52000045776367,
39.7599983215332,
45.68000030517578,
53.939998626708984,
60.68000030517578,
66.5999984741211,
71.63999938964844,
76.72000122070312,
83.76000213623047,
91.5199966430664,
98.16000366210938,
103.4800033569336,
111,
115.87999725341797,
120.87999725341797,
126.44000244140625,
133.32000732421875,
139.47999572753906,
144.63999938964844,
151.67999267578125,
158,
163.27999877929688,
168.39999389648438,
175.47999572753906,
181.75999450683594,
187.16000366210938,
192.83999633789062,
197.9600067138672,
205.0800018310547,
210.8800048828125,
217.1199951171875,
222.60000610351562,
228.75999450683594,
235.32000732421875,
242.47999572753906,
247.67999267578125,
254.67999267578125,
258.9200134277344,
264.44000244140625,
269.32000732421875,
274.0799865722656,
279.3999938964844,
283.9200134277344,
289.44000244140625,
297.1199951171875,
304.6400146484375,
310.2799987792969,
315.79998779296875,
321.3599853515625,
327.0799865722656,
333.239990234375,
339.67999267578125,
343.79998779296875,
349.20001220703125,
354.32000732421875,
359.6000061035156,
364.0400085449219,
370.2799987792969,
375.7200012207031,
380.6400146484375,
389.0400085449219,
394.760009765625,
399.239990234375,
403.3599853515625,
407.239990234375,
411.760009765625,
417.8399963378906,
424.239990234375,
430.3599853515625,
434.9200134277344,
439.8399963378906,
445.20001220703125,
449.9200134277344,
457.1600036621094,
465.0799865722656,
470.5199890136719,
477.5199890136719,
483.67999267578125,
487.3999938964844,
496.9200134277344,
506.1199951171875,
511.3599853515625,
516.1199951171875,
520.719970703125,
526.719970703125,
533.1199951171875,
538.9600219726562,
544.8800048828125,
551.760009765625,
557.5599975585938,
564,
571.280029296875,
577.52001953125,
583.9600219726562,
590,
595.47998046875,
599.9600219726562,
604.7999877929688,
610.1599731445312,
615.719970703125,
621.5599975585938,
625.8800048828125,
631.7999877929688,
637.2000122070312,
643.1199951171875,
647.9600219726562,
653.2000122070312,
659.7999877929688,
663,
668.6799926757812,
674.239990234375,
678.5999755859375,
683.239990234375,
688.8400268554688,
696.760009765625,
702.1599731445312,
706.5599975585938,
713.4400024414062,
718.760009765625,
724.4400024414062,
730.47998046875,
736.8400268554688,
742,
748.52001953125,
754.2000122070312,
762.4400024414062,
767.52001953125,
772.2000122070312,
777.47998046875,
783.8400268554688,
788.1199951171875,
792.6400146484375,
797.6799926757812,
804.4400024414062,
809.239990234375,
814.8400268554688,
821.8400268554688,
827.1199951171875,
831.4400024414062,
836.6400146484375,
841.760009765625,
846.8400268554688,
851.280029296875,
856.47998046875,
861.47998046875,
869.0399780273438,
874.3200073242188,
879.6799926757812,
885.52001953125,
890.7999877929688,
897.1599731445312,
903.8800048828125,
908.4400024414062,
915.280029296875,
923.1599731445312,
928.239990234375,
933.6400146484375,
939.0800170898438,
945.6400146484375,
951,
957.5599975585938,
962.5999755859375,
968.9600219726562,
977.6400146484375,
984.8400268554688,
991.280029296875,
998.5999755859375,
1004.239990234375,
1012.3599853515625,
1019.0800170898438,
1023.7999877929688,
1028.56005859375,
1033.1199951171875,
1039.719970703125,
1043.6800537109375,
1050.8399658203125,
1055.4000244140625,
1064.280029296875,
1070.199951171875,
1075.800048828125,
1081.0799560546875,
1084.9200439453125,
1090,
1096.3199462890625,
1101.3199462890625,
1106.8399658203125,
1112.199951171875,
1117.0400390625,
1125.8800048828125,
1131.5999755859375,
1136.43994140625,
1142.4000244140625,
1147.9599609375,
1152.0400390625,
1155.8800048828125,
1160.1600341796875,
1165.3199462890625,
1171.760009765625,
1177.56005859375,
1182.719970703125,
1187.719970703125,
1193.760009765625,
1201.8399658203125,
1207.239990234375,
1211.5999755859375,
1216.6800537109375,
1221.9200439453125,
1226.760009765625,
1231.9200439453125,
1237.6400146484375,
1244.760009765625,
1251.0799560546875,
1256.3199462890625,
1262.800048828125,
1269.1600341796875,
1274,
1279.6400146484375,
1284.9599609375,
1289.9599609375,
1295.43994140625,
1302.239990234375,
1307.199951171875,
1312.47998046875,
1317,
1322.52001953125,
1327.1199951171875,
1332.0400390625,
1340.43994140625,
1345.0799560546875,
1350.9200439453125,
1355.800048828125,
1360.8399658203125,
1367.4000244140625,
1373.5999755859375,
1379.56005859375,
1386.719970703125,
1392.1600341796875,
1399.4000244140625,
1404.719970703125,
1410.719970703125,
1416.6800537109375,
1423.199951171875,
1429.8800048828125,
1435.5999755859375,
1443.0799560546875,
1448.1199951171875,
1455.3199462890625,
1460.8399658203125,
1468.239990234375,
1474.4000244140625,
1480.4000244140625,
1486.3199462890625,
1492.199951171875,
1496.9200439453125,
1502.0400390625,
1508.1199951171875,
1513.47998046875,
1519.6800537109375,
1527.43994140625,
1533.1199951171875,
1539.3199462890625,
1543.760009765625,
1548.199951171875,
1555.8399658203125,
1561.239990234375,
1567.8800048828125,
1573.52001953125,
1578.8800048828125,
1583.9200439453125,
1588.8399658203125,
1594.3199462890625,
1599.280029296875,
1605.5999755859375,
1613.199951171875,
1621.3199462890625,
1626.6400146484375,
1631.719970703125,
1637.3199462890625,
1644.6800537109375,
1651,
1657.6800537109375,
1664.5999755859375,
1671.719970703125,
1677.1600341796875,
1684.56005859375,
1691.280029296875,
1700.280029296875,
1705.800048828125,
1710.8399658203125,
1717.280029296875,
1723.9200439453125,
1729.47998046875,
1736.5999755859375,
1742,
1748.4000244140625,
1755.52001953125,
1760.8399658203125,
1765.3599853515625,
1771.199951171875,
1776.9599609375,
1782.0400390625,
1786.8800048828125,
1795.47998046875,
1804.280029296875,
1810.3199462890625,
1815.719970703125,
1822.6800537109375,
1828.56005859375,
1834.8800048828125,
1842.719970703125,
1850.239990234375,
1855.239990234375,
1861.0400390625,
1867.760009765625,
1874.239990234375,
1880.56005859375,
1886.56005859375,
1893.760009765625,
1902.239990234375,
1909.280029296875,
1916.1600341796875,
1922.0799560546875,
1929.56005859375,
1934.43994140625,
1940,
1945.4000244140625,
1951.43994140625,
1958.3199462890625,
1965.9200439453125,
1971.9200439453125,
1976.0400390625,
1982.760009765625,
1988.239990234375,
1994.47998046875,
2001.239990234375,
2007.9200439453125,
2015.1199951171875,
2023.199951171875,
2030.3599853515625,
2036.47998046875,
2042.3199462890625,
2048.800048828125,
2056.0400390625,
2062,
2068.840087890625,
2074.919921875,
2079.760009765625,
2086.679931640625,
2092.080078125,
2098.52001953125,
2104.639892578125,
2110.639892578125,
2119.199951171875,
2125.080078125,
2132.47998046875,
2138.360107421875,
2147.1201171875,
2151.9599609375,
2157.39990234375,
2163.719970703125,
2169.52001953125,
2175,
2180.0400390625,
2185.360107421875,
2191,
2197,
2203.52001953125,
2209.8798828125,
2215.639892578125,
2221.719970703125,
2227.1201171875,
2234.1201171875,
2238.800048828125,
2246.9599609375,
2252.47998046875,
2258.280029296875,
2264.199951171875,
2268.919921875,
2273.52001953125,
2279.1201171875,
2284.60009765625,
2290.840087890625,
2295.9599609375,
2304,
2323.9599609375
],
"id": [
0,
1,
2,
3,
4,
5,
6,
7,
8,
9,
10,
11,
12,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52,
53,
54,
55,
56,
57,
58,
59,
60,
61,
62,
63,
64,
65,
66,
67,
68,
69,
70,
71,
72,
73,
74,
75,
76,
77,
78,
79,
80,
81,
82,
83,
84,
85,
86,
87,
88,
89,
90,
91,
92,
93,
94,
95,
96,
97,
98,
99,
100,
101,
102,
103,
104,
105,
106,
107,
108,
109,
110,
111,
112,
113,
114,
115,
116,
117,
118,
119,
120,
121,
122,
123,
124,
125,
126,
127,
128,
129,
130,
131,
132,
133,
134,
135,
136,
137,
138,
139,
140,
141,
142,
143,
144,
145,
146,
147,
148,
149,
150,
151,
152,
153,
154,
155,
156,
157,
158,
159,
160,
161,
162,
163,
164,
165,
166,
167,
168,
169,
170,
171,
172,
173,
174,
175,
176,
177,
178,
179,
180,
181,
182,
183,
184,
185,
186,
187,
188,
189,
190,
191,
192,
193,
194,
195,
196,
197,
198,
199,
200,
201,
202,
203,
204,
205,
206,
207,
208,
209,
210,
211,
212,
213,
214,
215,
216,
217,
218,
219,
220,
221,
222,
223,
224,
225,
226,
227,
228,
229,
230,
231,
232,
233,
234,
235,
236,
237,
238,
239,
240,
241,
242,
243,
244,
245,
246,
247,
248,
249,
250,
251,
252,
253,
254,
255,
256,
257,
258,
259,
260,
261,
262,
263,
264,
265,
266,
267,
268,
269,
270,
271,
272,
273,
274,
275,
276,
277,
278,
279,
280,
281,
282,
283,
284,
285,
286,
287,
288,
289,
290,
291,
292,
293,
294,
295,
296,
297,
298,
299,
300,
301,
302,
303,
304,
305,
306,
307,
308,
309,
310,
311,
312,
313,
314,
315,
316,
317,
318,
319,
320,
321,
322,
323,
324,
325,
326,
327,
328,
329,
330,
331,
332,
333,
334,
335,
336,
337,
338,
339,
340,
341,
342,
343,
344,
345,
346,
347,
348,
349,
350,
351,
352,
353,
354,
355,
356,
357,
358,
359,
360,
361,
362,
363,
364,
365,
366,
367,
368,
369,
370,
371,
372,
373,
374,
375,
376,
377,
378,
379,
380,
381,
382,
383,
384,
385,
386,
387,
388,
389,
390
],
"no_speech_prob": [
0.05017048120498657,
0.05017048120498657,
0.05017048120498657,
0.05017048120498657,
0.05017048120498657,
0.05017048120498657,
0.000048095018428284675,
0.000048095018428284675,
0.000048095018428284675,
0.000048095018428284675,
0.000032296466088155285,
0.000032296466088155285,
0.000032296466088155285,
0.000032296466088155285,
0.00006292735633905977,
0.00006292735633905977,
0.00006292735633905977,
0.00006292735633905977,
0.000016841560864122584,
0.000016841560864122584,
0.000016841560864122584,
0.000016841560864122584,
0.000016841560864122584,
0.00004413559872773476,
0.00004413559872773476,
0.00004413559872773476,
0.00004413559872773476,
0.00005133336526341736,
0.00005133336526341736,
0.00005133336526341736,
0.00005133336526341736,
0.00005133336526341736,
0.00003972701233578846,
0.00003972701233578846,
0.00003972701233578846,
0.00003972701233578846,
0.00003972701233578846,
0.000016490610505570658,
0.000016490610505570658,
0.000016490610505570658,
0.000016490610505570658,
0.000022228474335861392,
0.000022228474335861392,
0.000022228474335861392,
0.000022228474335861392,
0.000022228474335861392,
0.00004456289389054291,
0.00004456289389054291,
0.00004456289389054291,
0.00004456289389054291,
0.00004456289389054291,
0.00004114323019166477,
0.00004114323019166477,
0.00004114323019166477,
0.00004114323019166477,
0.00005077988680568524,
0.00005077988680568524,
0.00005077988680568524,
0.00005077988680568524,
0.00005077988680568524,
0.00001963428258022759,
0.00001963428258022759,
0.00001963428258022759,
0.00001963428258022759,
0.00001963428258022759,
0.000012281751878617797,
0.000012281751878617797,
0.000012281751878617797,
0.000012281751878617797,
0.000012281751878617797,
0.00003294238558737561,
0.00003294238558737561,
0.00003294238558737561,
0.00003294238558737561,
0.00003294238558737561,
0.00014130125055089593,
0.00014130125055089593,
0.00014130125055089593,
0.00014130125055089593,
0.00014130125055089593,
0.00018546494538895786,
0.00018546494538895786,
0.00018546494538895786,
0.00018546494538895786,
0.00002639281956362538,
0.00002639281956362538,
0.00002639281956362538,
0.00002639281956362538,
0.000019909504771931097,
0.000019909504771931097,
0.000019909504771931097,
0.000019909504771931097,
0.000019909504771931097,
0.000022199399609235115,
0.000022199399609235115,
0.000022199399609235115,
0.000022199399609235115,
0.000019570714357541874,
0.000019570714357541874,
0.000019570714357541874,
0.000019570714357541874,
0.000021634183212881908,
0.000021634183212881908,
0.000021634183212881908,
0.000021634183212881908,
0.000021634183212881908,
0.00006558131281053647,
0.00006558131281053647,
0.00006558131281053647,
0.00006558131281053647,
0.00006558131281053647,
0.00007350621308432892,
0.00007350621308432892,
0.00007350621308432892,
0.00007350621308432892,
0.00007350621308432892,
0.00003261772508267313,
0.00003261772508267313,
0.00003261772508267313,
0.00003261772508267313,
0.00003261772508267313,
0.000031328745535574853,
0.000031328745535574853,
0.000031328745535574853,
0.000031328745535574853,
0.000031328745535574853,
0.0000762903509894386,
0.0000762903509894386,
0.0000762903509894386,
0.0000762903509894386,
0.0000762903509894386,
0.00007218878454295918,
0.00007218878454295918,
0.00007218878454295918,
0.00007218878454295918,
0.00007218878454295918,
0.00006631918222410604,
0.00006631918222410604,
0.00006631918222410604,
0.00006631918222410604,
0.00006631918222410604,
0.00005090502236271277,
0.00005090502236271277,
0.00005090502236271277,
0.00005090502236271277,
0.00005090502236271277,
0.000033921562135219574,
0.000033921562135219574,
0.000033921562135219574,
0.000033921562135219574,
0.000033921562135219574,
0.00001905517819977831,
0.00001905517819977831,
0.00001905517819977831,
0.00001905517819977831,
0.00001905517819977831,
0.00006222637603059411,
0.00006222637603059411,
0.00006222637603059411,
0.00006222637603059411,
0.00002078931538562756,
0.00002078931538562756,
0.00002078931538562756,
0.00002078931538562756,
0.00002443622361170128,
0.00002443622361170128,
0.00002443622361170128,
0.00002443622361170128,
0.00002443622361170128,
0.0001379038003506139,
0.0001379038003506139,
0.0001379038003506139,
0.0001379038003506139,
0.000011721122973540332,
0.000011721122973540332,
0.000011721122973540332,
0.000011721122973540332,
0.000011721122973540332,
0.00005015626811655238,
0.00005015626811655238,
0.00005015626811655238,
0.00005015626811655238,
0.00005015626811655238,
0.00003915749766747467,
0.00003915749766747467,
0.00003915749766747467,
0.00003915749766747467,
0.00003915749766747467,
0.00011615837865974754,
0.00011615837865974754,
0.00011615837865974754,
0.00011615837865974754,
0.00011615837865974754,
0.000010325609764549881,
0.000010325609764549881,
0.000010325609764549881,
0.000010325609764549881,
0.0000501204704050906,
0.0000501204704050906,
0.0000501204704050906,
0.0000501204704050906,
0.0000501204704050906,
0.0000501204704050906,
0.00003908551298081875,
0.00003908551298081875,
0.00003908551298081875,
0.00003908551298081875,
0.00003908551298081875,
0.000026840461941901594,
0.000026840461941901594,
0.000026840461941901594,
0.000026840461941901594,
0.000026840461941901594,
0.000024773296900093555,
0.000024773296900093555,
0.000024773296900093555,
0.000024773296900093555,
0.000024773296900093555,
0.000020664039766415954,
0.000020664039766415954,
0.000020664039766415954,
0.000020664039766415954,
0.000020664039766415954,
0.00001551641798869241,
0.00001551641798869241,
0.00001551641798869241,
0.00001551641798869241,
0.00001551641798869241,
0.00003383366492926143,
0.00003383366492926143,
0.00003383366492926143,
0.00003383366492926143,
0.00003383366492926143,
0.000012237591363373213,
0.000012237591363373213,
0.000012237591363373213,
0.000012237591363373213,
0.000012237591363373213,
0.000036135879781795666,
0.000036135879781795666,
0.000036135879781795666,
0.000036135879781795666,
0.000004496489964367356,
0.000004496489964367356,
0.000004496489964367356,
0.000004496489964367356,
0.000004496489964367356,
0.000023223185053211637,
0.000023223185053211637,
0.000023223185053211637,
0.000023223185053211637,
0.000035415872844168916,
0.000035415872844168916,
0.000035415872844168916,
0.000035415872844168916,
0.00009767313167685643,
0.00009767313167685643,
0.00009767313167685643,
0.00009767313167685643,
0.00009767313167685643,
0.00010257846588501707,
0.00010257846588501707,
0.00010257846588501707,
0.00010257846588501707,
0.000005812122708448442,
0.000005812122708448442,
0.000005812122708448442,
0.000005812122708448442,
0.000005812122708448442,
0.000022296702809398994,
0.000022296702809398994,
0.000022296702809398994,
0.000022296702809398994,
0.000015068901120685041,
0.000015068901120685041,
0.000015068901120685041,
0.000015068901120685041,
0.000015068901120685041,
0.00005647822035825811,
0.00005647822035825811,
0.00005647822035825811,
0.00005647822035825811,
0.00002830944868037477,
0.00002830944868037477,
0.00002830944868037477,
0.00002830944868037477,
0.000008057568265940063,
0.000008057568265940063,
0.000008057568265940063,
0.000008057568265940063,
0.00003336445297463797,
0.00003336445297463797,
0.00003336445297463797,
0.00003336445297463797,
0.000022470885596703738,
0.000022470885596703738,
0.000022470885596703738,
0.000022470885596703738,
0.000016879484974197112,
0.000016879484974197112,
0.000016879484974197112,
0.000016879484974197112,
0.00006166350067360327,
0.00006166350067360327,
0.00006166350067360327,
0.00006166350067360327,
0.00006166350067360327,
0.00003689874574774876,
0.00003689874574774876,
0.00003689874574774876,
0.00003689874574774876,
0.00007405586802633479,
0.00007405586802633479,
0.00007405586802633479,
0.00007405586802633479,
0.000029039338187430985,
0.000029039338187430985,
0.000029039338187430985,
0.000029039338187430985,
0.00003255967021686956,
0.00003255967021686956,
0.00003255967021686956,
0.00003255967021686956,
0.000035816261515719816,
0.000035816261515719816,
0.000035816261515719816,
0.000035816261515719816,
0.00002050086004601326,
0.00002050086004601326,
0.00002050086004601326,
0.00002050086004601326,
0.00002050086004601326,
0.000016707803297322243,
0.000016707803297322243,
0.000016707803297322243,
0.000016707803297322243,
0.00008835968765197322,
0.00008835968765197322,
0.00008835968765197322,
0.00008835968765197322,
0.00008835968765197322,
0.00006001696965540759,
0.00006001696965540759,
0.00006001696965540759,
0.00006001696965540759,
0.00012759353558067232,
0.00012759353558067232,
0.00012759353558067232,
0.00012759353558067232,
0.0000702675970387645,
0.0000702675970387645,
0.0000702675970387645,
0.0000702675970387645,
0.00004211205305182375,
0.00004211205305182375,
0.00004211205305182375,
0.00004211205305182375,
0.00006778167153242975,
0.00006778167153242975,
0.00006778167153242975,
0.00006778167153242975,
0.00003704653863678686,
0.00003704653863678686,
0.00003704653863678686,
0.00003704653863678686,
0.000028363918318063952,
0.000028363918318063952,
0.000028363918318063952,
0.000028363918318063952,
0.000028363918318063952,
0.0001912546722451225,
0.0001912546722451225,
0.0001912546722451225,
0.0001912546722451225,
0.00007897559407865629,
0.00007897559407865629,
0.00007897559407865629,
0.00007897559407865629,
0.00007897559407865629,
0.00008034669008338824,
0.00008034669008338824,
0.00008034669008338824,
0.00008034669008338824,
0.00003427086630836129,
0.00003427086630836129,
0.00003427086630836129,
0.00003427086630836129,
0.00003427086630836129,
0.0001421327469870448,
0.0001421327469870448,
0.0002748681290540844
],
"seek": [
0,
0,
0,
0,
0,
0,
2888,
2888,
2888,
2888,
5394,
5394,
5394,
5394,
7672,
7672,
7672,
7672,
10348,
10348,
10348,
10348,
10348,
13332,
13332,
13332,
13332,
15800,
15800,
15800,
15800,
15800,
18716,
18716,
18716,
18716,
18716,
21712,
21712,
21712,
21712,
24248,
24248,
24248,
24248,
24248,
26932,
26932,
26932,
26932,
26932,
29712,
29712,
29712,
29712,
32136,
32136,
32136,
32136,
32136,
34920,
34920,
34920,
34920,
34920,
37572,
37572,
37572,
37572,
37572,
40336,
40336,
40336,
40336,
40336,
43036,
43036,
43036,
43036,
43036,
45716,
45716,
45716,
45716,
48368,
48368,
48368,
48368,
51136,
51136,
51136,
51136,
51136,
53896,
53896,
53896,
53896,
56400,
56400,
56400,
56400,
59000,
59000,
59000,
59000,
59000,
61572,
61572,
61572,
61572,
61572,
64312,
64312,
64312,
64312,
64312,
66868,
66868,
66868,
66868,
66868,
69676,
69676,
69676,
69676,
69676,
72444,
72444,
72444,
72444,
72444,
75420,
75420,
75420,
75420,
75420,
78384,
78384,
78384,
78384,
78384,
80924,
80924,
80924,
80924,
80924,
83664,
83664,
83664,
83664,
83664,
86148,
86148,
86148,
86148,
86148,
89080,
89080,
89080,
89080,
91528,
91528,
91528,
91528,
93908,
93908,
93908,
93908,
93908,
96896,
96896,
96896,
96896,
99860,
99860,
99860,
99860,
99860,
102856,
102856,
102856,
102856,
102856,
105540,
105540,
105540,
105540,
105540,
108492,
108492,
108492,
108492,
108492,
111220,
111220,
111220,
111220,
113644,
113644,
113644,
113644,
113644,
113644,
116532,
116532,
116532,
116532,
116532,
119376,
119376,
119376,
119376,
119376,
122192,
122192,
122192,
122192,
122192,
125108,
125108,
125108,
125108,
125108,
127964,
127964,
127964,
127964,
127964,
130720,
130720,
130720,
130720,
130720,
133204,
133204,
133204,
133204,
133204,
136084,
136084,
136084,
136084,
138672,
138672,
138672,
138672,
138672,
141668,
141668,
141668,
141668,
144308,
144308,
144308,
144308,
146824,
146824,
146824,
146824,
146824,
149692,
149692,
149692,
149692,
151968,
151968,
151968,
151968,
151968,
154820,
154820,
154820,
154820,
157352,
157352,
157352,
157352,
157352,
159928,
159928,
159928,
159928,
162664,
162664,
162664,
162664,
165100,
165100,
165100,
165100,
167716,
167716,
167716,
167716,
170580,
170580,
170580,
170580,
172948,
172948,
172948,
172948,
175552,
175552,
175552,
175552,
175552,
178204,
178204,
178204,
178204,
181032,
181032,
181032,
181032,
183488,
183488,
183488,
183488,
186104,
186104,
186104,
186104,
188656,
188656,
188656,
188656,
191616,
191616,
191616,
191616,
191616,
194540,
194540,
194540,
194540,
197192,
197192,
197192,
197192,
197192,
200124,
200124,
200124,
200124,
203036,
203036,
203036,
203036,
205604,
205604,
205604,
205604,
207976,
207976,
207976,
207976,
210464,
210464,
210464,
210464,
213248,
213248,
213248,
213248,
215740,
215740,
215740,
215740,
215740,
218536,
218536,
218536,
218536,
220988,
220988,
220988,
220988,
220988,
223880,
223880,
223880,
223880,
226420,
226420,
226420,
226420,
226420,
229084,
229084,
230400
],
"start": [
0,
4.900000095367432,
10.15999984741211,
15.119999885559082,
19.799999237060547,
23.15999984741211,
28.8799991607666,
34.52000045776367,
39.7599983215332,
45.68000030517578,
53.939998626708984,
60.68000030517578,
66.5999984741211,
71.63999938964844,
76.72000122070312,
83.76000213623047,
91.5199966430664,
98.16000366210938,
103.4800033569336,
111,
115.87999725341797,
120.87999725341797,
126.44000244140625,
133.32000732421875,
139.47999572753906,
144.63999938964844,
151.67999267578125,
158,
163.27999877929688,
168.39999389648438,
175.47999572753906,
181.75999450683594,
187.16000366210938,
192.83999633789062,
197.9600067138672,
205.0800018310547,
210.8800048828125,
217.1199951171875,
222.60000610351562,
228.75999450683594,
235.32000732421875,
242.47999572753906,
247.67999267578125,
254.67999267578125,
258.9200134277344,
264.44000244140625,
269.32000732421875,
274.0799865722656,
279.3999938964844,
283.9200134277344,
289.44000244140625,
297.1199951171875,
304.6400146484375,
310.2799987792969,
315.79998779296875,
321.3599853515625,
327.0799865722656,
333.239990234375,
339.67999267578125,
343.79998779296875,
349.20001220703125,
354.32000732421875,
359.6000061035156,
364.0400085449219,
370.2799987792969,
375.7200012207031,
380.6400146484375,
389.0400085449219,
394.760009765625,
399.239990234375,
403.3599853515625,
407.239990234375,
411.760009765625,
417.8399963378906,
424.239990234375,
430.3599853515625,
434.9200134277344,
439.8399963378906,
445.20001220703125,
449.9200134277344,
457.1600036621094,
465.0799865722656,
470.5199890136719,
477.5199890136719,
483.67999267578125,
487.3999938964844,
496.9200134277344,
506.1199951171875,
511.3599853515625,
516.1199951171875,
520.719970703125,
526.719970703125,
533.1199951171875,
538.9600219726562,
544.8800048828125,
551.760009765625,
557.5599975585938,
564,
571.280029296875,
577.52001953125,
583.9600219726562,
590,
595.47998046875,
599.9600219726562,
604.7999877929688,
610.1599731445312,
615.719970703125,
621.5599975585938,
625.8800048828125,
631.7999877929688,
637.2000122070312,
643.1199951171875,
647.9600219726562,
653.2000122070312,
659.7999877929688,
663,
668.6799926757812,
674.239990234375,
678.5999755859375,
683.239990234375,
688.8400268554688,
696.760009765625,
702.1599731445312,
706.5599975585938,
713.4400024414062,
718.760009765625,
724.4400024414062,
730.47998046875,
736.8400268554688,
742,
748.52001953125,
754.2000122070312,
762.4400024414062,
767.52001953125,
772.2000122070312,
777.47998046875,
783.8400268554688,
788.1199951171875,
792.6400146484375,
797.6799926757812,
804.4400024414062,
809.239990234375,
814.8400268554688,
821.8400268554688,
827.1199951171875,
831.4400024414062,
836.6400146484375,
841.760009765625,
846.8400268554688,
851.280029296875,
856.47998046875,
861.47998046875,
869.0399780273438,
874.3200073242188,
879.6799926757812,
885.52001953125,
890.7999877929688,
897.1599731445312,
903.8800048828125,
908.4400024414062,
915.280029296875,
923.1599731445312,
928.239990234375,
933.6400146484375,
939.0800170898438,
945.6400146484375,
951,
957.5599975585938,
962.5999755859375,
968.9600219726562,
977.6400146484375,
984.8400268554688,
991.280029296875,
998.5999755859375,
1004.239990234375,
1012.3599853515625,
1019.0800170898438,
1023.7999877929688,
1028.56005859375,
1033.1199951171875,
1039.719970703125,
1043.6800537109375,
1050.8399658203125,
1055.4000244140625,
1064.280029296875,
1070.199951171875,
1075.800048828125,
1081.0799560546875,
1084.9200439453125,
1090,
1096.3199462890625,
1101.3199462890625,
1106.8399658203125,
1112.199951171875,
1117.0400390625,
1125.8800048828125,
1131.5999755859375,
1136.43994140625,
1142.4000244140625,
1147.9599609375,
1152.0400390625,
1155.8800048828125,
1160.1600341796875,
1165.3199462890625,
1171.760009765625,
1177.56005859375,
1182.719970703125,
1187.719970703125,
1193.760009765625,
1201.8399658203125,
1207.239990234375,
1211.5999755859375,
1216.6800537109375,
1221.9200439453125,
1226.760009765625,
1231.9200439453125,
1237.6400146484375,
1244.760009765625,
1251.0799560546875,
1256.3199462890625,
1262.800048828125,
1269.1600341796875,
1274,
1279.6400146484375,
1284.9599609375,
1289.9599609375,
1295.43994140625,
1302.239990234375,
1307.199951171875,
1312.47998046875,
1317,
1322.52001953125,
1327.1199951171875,
1332.0400390625,
1340.43994140625,
1345.0799560546875,
1350.9200439453125,
1355.800048828125,
1360.8399658203125,
1367.4000244140625,
1373.5999755859375,
1379.56005859375,
1386.719970703125,
1392.1600341796875,
1399.4000244140625,
1404.719970703125,
1410.719970703125,
1416.6800537109375,
1423.199951171875,
1429.8800048828125,
1435.5999755859375,
1443.0799560546875,
1448.1199951171875,
1455.3199462890625,
1460.8399658203125,
1468.239990234375,
1474.4000244140625,
1480.4000244140625,
1486.3199462890625,
1492.199951171875,
1496.9200439453125,
1502.0400390625,
1508.1199951171875,
1513.47998046875,
1519.6800537109375,
1527.43994140625,
1533.1199951171875,
1539.3199462890625,
1543.760009765625,
1548.199951171875,
1555.8399658203125,
1561.239990234375,
1567.8800048828125,
1573.52001953125,
1578.8800048828125,
1583.9200439453125,
1588.8399658203125,
1594.3199462890625,
1599.280029296875,
1605.5999755859375,
1613.199951171875,
1621.3199462890625,
1626.6400146484375,
1631.719970703125,
1637.3199462890625,
1644.6800537109375,
1651,
1657.6800537109375,
1664.5999755859375,
1671.719970703125,
1677.1600341796875,
1684.56005859375,
1691.280029296875,
1700.280029296875,
1705.800048828125,
1710.8399658203125,
1717.280029296875,
1723.9200439453125,
1729.47998046875,
1736.5999755859375,
1742,
1748.4000244140625,
1755.52001953125,
1760.8399658203125,
1765.3599853515625,
1771.199951171875,
1776.9599609375,
1782.0400390625,
1786.8800048828125,
1795.47998046875,
1804.280029296875,
1810.3199462890625,
1815.719970703125,
1822.6800537109375,
1828.56005859375,
1834.8800048828125,
1842.719970703125,
1850.239990234375,
1855.239990234375,
1861.0400390625,
1867.760009765625,
1874.239990234375,
1880.56005859375,
1886.56005859375,
1893.760009765625,
1902.239990234375,
1909.280029296875,
1916.1600341796875,
1922.0799560546875,
1929.56005859375,
1934.43994140625,
1940,
1945.4000244140625,
1951.43994140625,
1958.3199462890625,
1965.9200439453125,
1971.9200439453125,
1976.0400390625,
1982.760009765625,
1988.239990234375,
1994.47998046875,
2001.239990234375,
2007.9200439453125,
2015.1199951171875,
2023.199951171875,
2030.3599853515625,
2036.47998046875,
2042.3199462890625,
2048.800048828125,
2056.0400390625,
2062,
2068.840087890625,
2074.919921875,
2079.760009765625,
2086.679931640625,
2092.080078125,
2098.52001953125,
2104.639892578125,
2110.639892578125,
2119.199951171875,
2125.080078125,
2132.47998046875,
2138.360107421875,
2147.1201171875,
2151.9599609375,
2157.39990234375,
2163.719970703125,
2169.52001953125,
2175,
2180.0400390625,
2185.360107421875,
2191,
2197,
2203.52001953125,
2209.8798828125,
2215.639892578125,
2221.719970703125,
2227.1201171875,
2234.1201171875,
2238.800048828125,
2246.9599609375,
2252.47998046875,
2258.280029296875,
2264.199951171875,
2268.919921875,
2273.52001953125,
2279.1201171875,
2284.60009765625,
2290.840087890625,
2295.9599609375,
2304
],
"temperature": [
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
],
"text": [
" Hi, I'm Cecilia. And I'm Denise. And today we are going to talk about sex toys.",
" Smart sex toys. Well, insecure smart sex toys. Yeah. There have been previous",
" researches on this subject and you can find them online, but many devices that",
" are still on the market have a lot of vulnerability and privacy issues. So in",
" our research we try to find these problems and today we are going to share",
" with you our results. Exactly. But first let's do a quick recap on the history of",
" these devices. They have actually been with us for a very long time. Actually,",
" more than a century. The first sex toys were used as medical appliances back in",
" the 1900s. They were used to cure different types of pathologies, including",
" some psychological ones. Then throughout the 1920s, 30s, 40s, 50s, even to the late",
" 60s, new devices, new models, new shapes started to appear in the market and they",
" were this time advertised towards the home users that could buy these products,",
" take them home and use them whenever they wanted. Imagine powering one of these",
" via the electric power grid, right? Well, let's talk about physical security back",
" in the 20s with one of those. Then by the 70s the emergence of new feminist",
" movements alongside the boom of the porn industry propelled those devices and new",
" form shapes and materials started to be used. But by the 2000 this thing starts",
" to get interesting for us because new devices that could be controlled",
" remotely via infrared connectivity started to appear and by the 2010 there",
" were several devices that could be controlled locally via Bluetooth with",
" an application on your own smartphone. Yeah, when the arrival of IoT and new",
" technologies many manufacturers decided to integrate these toys with mobile apps",
" and internet connections. So nowadays in 2020 we have toys that have a",
" lot of characteristics and that can be used remotely, like control the toy",
" remotely through the mobile app or even a web browser and changed by rating",
" patterns or even synchronize the device with a video call, an audiobook, a",
" playlist or even have Alexa support or other assistance support to control them",
" on voice commands. So all of these functionalities are very interesting and",
" also open the door to many vulnerabilities. Exactly and they open",
" the door to new models that can connect between each other and also we are not",
" now starting to see a trend towards smart six robots that have a lot of",
" different capabilities that can be connected to the internet. They have",
" certain artificial intelligence apps that can be installed on the device and",
" these apps of course have a lot of vulnerabilities that we can somehow",
" assess to try to bypass. So we actually contacted a few of these vendors to ask",
" them about the characteristics of these smart six robots and we found out that",
" they are following several bad practices when it comes to security. So this",
" the way this smart six robots work is that they actually have a smartphone",
" that functions on their head basically like a brain and that connects to the",
" rest of the sensors of the body. So that phone can be actually very vulnerable",
" and the updates are actually delivered through emails so the user have to",
" install the APK themselves. Talk about security when it comes to this type of",
" devices. Well apart from the devices if we think about the sex industry and the",
" adult entertainment industry these industries have already been charged of",
" several cyber attacks and the first attack that comes to my mind is the",
" Ashley Madison social network which a couple of years before was a target of",
" an attack and the details and information of more than 30 million",
" users was exposed online. So a lot of cheaters were revealed and many people",
" had a lot of problems in their relationships and we can also think",
" about Tinder this dating app that has already been found in many vulnerabilities",
" and also we have to think about the many scams that are based on fake apps or",
" fake lab promises or even sextorsion based on stolen information. So if to",
" these attacks to the sex industry we add the fact that IoT devices are being",
" compromised by attackers to perform different types of attacks well that's",
" a problem. We can think for example about the mirai network or about a case",
" where attackers got control of a thermometer in a casino's fish tank and",
" then from there could jump to the casino's network. So if we sum up the",
" the industry of sex that has been target of cyber attacks with the many IoT devices",
" that we have today in the market and are already being used by attackers well the",
" combination it's a little bit scary. So what can go wrong with these toys? Well",
" first of all an attacker can put a Valkdoror malware inside of one of these toys",
" but also these devices are permanently advertising themselves so they are",
" permanently sending information of their presence there. So it's pretty easy to",
" find if a toy is present on a hotel room or if someone is carrying one with him.",
" So this can lead to several issues like information disclosure, information",
" very sensitive for example as sexual orientation, sexual partners or sexual",
" practices and this can be some problem in many countries that have",
" lost against some sexual practices but also we don't think about an attacker",
" that gets control of one of these devices while a user is playing with it.",
" So imagine a person has a toy it's playing at home but then an attacker",
" gets control of that toy and is the one that is really sending the commands to",
" the toy. Would that be sexual assault? What happens there? These are things that we",
" have to start considering with smart sex toys. So at the start of our research we",
" had to choose the devices that we were going to use for our research basically",
" the models that we were going to buy and voila there were so many different",
" vendors so many different models and it was really hard to choose with so many",
" different characteristics each and every one of them. So we did what anybody",
" would do in this situation right? We went to the museum of sex. Yes, in New York.",
" We were in New York and we visited the museum. Exactly and we started actually",
" testing different devices that you could test in the site and we didn't bring",
" our laptops with us. We should have. Yeah but we ended up choosing two vendors that",
" we think were one of the biggest or two of the biggest. So are you referring to",
" the size or actually the vendors? Oh come on. Don't do this to me. Just thinking.",
" Okay the first one is Love Ence. I'm sure many of you know this brand if you're",
" interested in sex toys and security of sex toys because there have been",
" researched on this particular vendor. This brand has a lot of smart sex toys.",
" You can connect them over a Bluetooth network or even over the internet and",
" there are so many different shapes and sizes and we have also we vibe that we",
" choose because they also have a lot of smart sex toys and they are very",
" important in the market and I'm sure you're aware that there were several",
" researchers regarding this vendor in the past. So we wanted to know how much they",
" have changed. So the first with the was we visited the websites of these two",
" vendors and tried to look at the characteristics of their",
" different models. So the first thing that you can see is that there is a lot of",
" information about colors, materials, how much the battery lasts, how much does it",
" take to charge them, but there were no mentions of these on the websites about",
" protocols, encryption and the security that was being applied to this apps and",
" this firmware to make it secure. So this is something that happens a lot with",
" this type of IoT devices in particular, say sex toys. So the first step was to",
" understand the architecture, how are these toys connected. So the toy connects",
" to the user smartphone using a personal area network like Bluetooth or in",
" most cases Bluetooth low energy. Then from the smartphone the user connects to an",
" appy from the vendor usually on a vendor server and then the remote partner",
" that can be anywhere in the world connects to that appy and from there gets",
" control of the remote toy. So in this architecture in this model there are a",
" lot of attack vectors that an attacker could use like go through for the",
" personal area network connection for the Bluetooth connection, maybe something on",
" the on the smartphone on the app or even the remote connection through the",
" internet appy. So that's what we analyzed. Exactly, but first a quick disclaimer",
" because all of the vulnerabilities that we are going to see throughout the talk",
" that we're going to discuss have been already fixed and we have mission and to",
" perform and distribute the content that you are going to see. So just to be",
" clear on where we are standing. So the first toy we are going to show you is",
" this naughty one right here. He can't stand still. So this is the the jive from",
" WeVive. This toy is pretty interesting because it's",
" awareable. It means that the person wears this toy and can go around playing with",
" this toy. So usually a couple use these toys in bars, restaurants or even",
" discos not only in hotel rooms or inside the house. So that was pretty",
" interesting for our analysis because it's a toy that you can find anywhere and",
" it's as we said before it's permanently advertising its presence and an attacker",
" can easily find one of these like 30 feet around. Yeah it is",
" designed to be used in insecure networks or it should be designed for that. We",
" might had some trouble when it comes to information security in the past. It was",
" at DuftCon a few years ago that research was presented where it was proven",
" that they had collected too much information from their users without",
" their consent and so they were sued and they had to pay 3.7 million dollars",
" which is a lot. So we wanted to see if they had learned from this experience",
" and they had changed their applications to make them more secure. The first thing",
" that we checked was the remote control via the URL. This application has the",
" possibility to create a 12 characters string that it's been used as a token",
" and you can share with your partner and so they can connect via a de-application",
" to control your own sex toy. So this token used to have some problems in the",
" past. It didn't expire as it should but now they actually fix it. At least we",
" couldn't find any problem with this right now. The first things that we checked",
" were some privacy issues that could have critical consequences for the users",
" leading to information disclosure. There are so many good things that we buy",
" past change. For example now they block all screenshots of the tents which is",
" great and it's quite common in these applications that tend to handle such",
" sensitive data. They applied end to end decryption to encrypt all the pictures",
" that you are sending and their files actually are deleted from the chat",
" once the chat ends which is great so you know that your pictures do not linger",
" on the phone of your partners. But still there were some issues that we found",
" with this transferring of images. Yes well the pictures sent on the chat are",
" saved to the storage inside the app sorry to the app storage inside the",
" phone so that no other app can access that picture or you cannot access that",
" picture from outside the application. But if the attacker has a rooted phone",
" well they can access the app storage. In that case that's what we did we found out",
" that the picture that is stored inside the application still has all the",
" metadata in it. So when you send the picture the metadata is not deleted",
" before it's sent. So that picture can be uploaded to a site like for example",
" Metapix and an attacker can find out where the person is that sent the",
" picture is actually located the exact location by the GPS details information.",
" The attacker can also know the model of the phone that's been used, the camera,",
" the time and date the photo was actually taken and if it has been edited or not.",
" This information at first could sound like something that no one could use but",
" the thing is that many people usually use these applications to talk to",
" strangers and also many people share online their tokens or their remote",
" controls. So if that person is trying to hide his or her true personality or is",
" trying to hide where he or he is well the metadata and the pictures",
" does not help. Exactly and sometimes this is not a personal choice but this is",
" also can be part of the service as a cam girl or a cam boy service. So we need",
" to protect these people that are using these devices basically to work. What",
" else? Well this application actually includes a four-digit pin that they can",
" use in order to lock the application so no one else can access the application",
" unless it has the four-digit pin. This functionality might be in place to",
" protect the app from your kids or something like that your nieces or",
" maybe also a jealous lover. So the consequences can also be kind of",
" critical if you're talking about a toxic relationship because this",
" application only allows one partner at the time so polyamory has not arrived.",
" So this pin can actually since it's just a four-digit pin can be brute-forced by",
" using a bad USB with a very simple script because it takes the keyboard input",
" and not like a grid of buttons or other type of component. So it's quite trivial",
" to access this token and therefore access the control panel of the application",
" and the usage of the application itself. And like we see in the video just unblock",
" the app. Exactly. So what else regarding these toys? Well as we spoke before and",
" these toys use Bluetooth low energy and this protocol has a particular",
" characteristic that is that there are two type of devices peripheral and",
" central devices. Peripheral devices that are usually the toys have to",
" be constantly advertising their presence to wait for a connection from the",
" central device. That means that while a toy is not connected to a smartphone it's",
" permanently advertising announcing their presence there waiting for the",
" connection. This means that like that. You're doing that. I'm not doing that. It's",
" crazy we are already being hot. Who is doing that? I'm not sure. It's nobody here. It's just us.",
" Okay so is somebody here? So the attacker can download an application",
" like this Bluetooth scanner and just try to find out if there are any",
" devices around. In the example that you can see on the screen we are finding the",
" chive that's here and the Macs that we are going to talk later about this one. So",
" it's pretty easy for the attacker to just find these devices find a lot of",
" information from these devices and start using this scanner as a compass. A",
" compass to get closer to the device just using the signal strength of each device.",
" So the attacker can easily move around looking for the best signal strength and",
" that would give the attacker an idea of where is the toy present who is wearing",
" or using that toy. That's pretty much a lot of information. Yes and then they",
" can connect to the toy and they don't even need the app to do that because",
" there are several websites that you can use by using the web Bluetooth APA to",
" connect to the to the sex toy and send comments to the sex toys and they are",
" still functioning because there is no authentication when it comes to this",
" Bluetooth connection and so it's quite vulnerable to these type of hijackings. So",
" not only an attacker can get control of this toy whenever the toy is available",
" but also could an attacker get into the middle of a conversation of the middle",
" of a connection? Well that's actually what we tried a Bluetooth mind in the",
" middle attack where the attacker tries to get in the middle of a communication",
" and control the toy. So in a common scenario a toy would be connected to",
" the user's phone but in this case what the attacker will try to do is get in the",
" middle of that connection create a fake toy in his or her computer and then make",
" the user connect to the fake toy instead of the real toy and the attacker",
" will be the one who will forward the commands to the toy or maybe change them",
" in the middle. So in the next video we are going to see a proof of concept of",
" this. So what we did is use the tool BDL choose to create a man in the middle",
" attack. This tool uses two Bluetooth dongles and the attacker will need two",
" computers or in this case two virtual machines. In the first one what the",
" attacker would do is create a Bluetooth proxy. This Bluetooth proxy will be in",
" charge of getting all the Bluetooth communications, capturing all the",
" Bluetooth traffic. Then once the proxy is up the attacker can go to the other",
" computer or the other virtual machine and we connect to the",
" Bluetooth proxy to the BDL choose proxy and then once connected you will see",
" that this tool has a web interface that's very useful and easy to use. So in",
" that interface the attacker can see all the Bluetooth devices on range and there",
" you will find the Jive, our toy. So then once the attacker finds the toy can",
" connect to that toy and as you see in the console the tool BDL choose will",
" create what it's called a dummy. It's like a fake toy, a fake device where the",
" user, the victim will connect but we'll still think that it's the real toy",
" because this dummy will copy all the characteristics of the real device. So",
" then the victim connects to that dummy to the fake toy and when sends a command",
" the toy actually moves but as you see on the screen the attacker is capturing all",
" these packages, all these commands. So the attacker can start knowing some",
" commands and getting some traffic. So there can you see the user is",
" changing some aberration patterns and the attacker is there capturing all of",
" these packages. So then the attacker can get some commands but what the attacker",
" can do next is take any of these packages and just reply it that means",
" send it back to the toy. So now the attacker is sending a command and while",
" the victim is not doing anything the toy is moving. So the toy is vibrating so the",
" attacker is the one that is actually controlling the toy at this point. You can",
" see it's sending different type of commands and the toy is responding. Also",
" what the attacker can do there, the device is stopping, is change these",
" packages. Just add new commands. These commands can either be taken from the",
" source code of the application or by capturing a lot of traffic. So there",
" for example you have the max intensity. So the attacker can send a command to the",
" toy to rebrate at its maximum intensity. And there you will see how the toy is",
" now vibrating. So the attacker can not only intercept the actual commands but",
" also change them or send new commands to the toy. So in this case I know maybe",
" it could be a sexual assault, something to talk about or to think about. So we",
" have proved that these devices are still vulnerable to this type of attack and no",
" authentication has been included in this toys in the past years. Which was the",
" goal of this research. So now we're going to analyze our Loven's device which is",
" the max device that you are watching right now on screen. This device can be",
" synchronized with its counterpart. It can be another max device or a normal",
" device. These models are interesting from a hacking perspective because if a",
" hacker has control over one of these devices then immediately compromises",
" the other one that replicates the movements of the first. So you can have",
" two devices under your control by the price of one. So we started analyzing the",
" application that is used to control this device that is the Loven's remote",
" application and we started analyzing the privacy features related to this",
" application. Well we could see that it uses a 4-digit pin to lock the",
" application as same as the other one but there were some concerns right? Yes",
" well some questionable design choices from Loven's. To start the screenshots are",
" allowed so for a sexy application that's pretty much something to think about.",
" But also well the metadata was deleted from the pictures before they are sent",
" that's great but the pictures that were person sent on a chat well are very",
" difficult to delete from the remote smartphone. They practically stay there.",
" What do we mean by this? Well let's imagine you're using the application",
" and you send your partner your own picture. Let's say that you now open the",
" options menu on this picture. Well you see different options. First of all you",
" can see that you can delete the picture but this deletion only works locally. It",
" doesn't remove the picture from the server nor the phone of your lover so",
" basically once you send the picture you lose control. Also the remote",
" partner can also forward or download your picture whenever they want and this",
" since this application this picture stays on the server then they can also",
" query the server to get the image if they know the URL of this particular",
" resource. The Loven's privacy policy says that this picture is stay in their",
" servers unencrypted by the way for seven days but we've actually found that they",
" can stay longer. There's actually a hidden option that's called recall and",
" that's the one you want to use when you want to delete a picture from the two",
" devices but this option it's only available for two minutes after sending",
" the picture and then completely disappears. So if you never tried to",
" delete the pictures right after you send it then you don't even know that",
" this function even exists. So that's something to have in mind if you or one",
" of your relatives or someone of your friends it's actually using this",
" application. Also when we start analyzing the traffic you can see that",
" there are several queries HTTP get queries that are broadcasting information",
" such as the user ID in this case is the same one as the email addresses. When",
" you register into the application you can set a fantasy username and you need",
" to provide your email. Well guess what that email is actually shared with",
" whomever you're chatting with. Let's say you open up chat with one of your friends",
" well the application uses your email as your user ID to identify your phone so",
" they are sharing your email with the person that you're chatting and they",
" can look up your email in the internal files of the phone because they are not",
" encrypted and even if they were you can still somehow manage to get through this",
" information by injecting the application at runtime and there are other ways other",
" issues related to the way this application manipulates the email",
" addresses. For example you can query the server to see if a given email address",
" is registered on the system so you can know based on the response if the email",
" exists you could use a leak database of emails from previous attacks let's say",
" the Ashley Madison social network attack and then query these emails against",
" the server because there are no protections against brute forcing so you",
" could query all that you want and it works the other way around you can",
" also query for user names and get their emails so let's say you start browsing",
" the application and you find the patterns library where users can share",
" their patterns of use publicly with other users so you could find user names",
" listed in this library and then query the server to get their emails and start",
" different attacks as social engineering or sex torsion attacks or even use this",
" emails to launch other type of attacks since these are also the user IDs so",
" these emails could be used to identify a person right well apart from the library",
" we need to think that many people just share their username their nicknames",
" online for remote session with someone around the world but most of the time",
" these are fantasy names like sexist got 26 well in this case an attacker could",
" find out what's there in the email for sexist got 26 and find the real person",
" behind that nickname be sure not to register with a corporate account right",
" yeah for sure well apart from this the levels remote control also works with an",
" URL so the person that has this toy can create remote control URL for his or",
" her partner to control the toy remotely so this URL works directly through the",
" internet it does not need for the remote partner to have the app in style as in",
" the case of we buy so in this case this URL is made by at first an alphanumeric",
" token with only four characters so we started analyzing a little bit about this",
" token so apparently as a lovin says it's a one-time use token and it lasts only",
" 30 minutes but we were going to test this and see if this is true spoiler alert",
" it's not so this is the remote panel where the remote lover can connect to",
" control this toy in this case what you're seeing is the panel for our own toy in",
" the case of max you have two controls for vibration vibration and for air",
" control so anyone that connects to this URL without authentication just gets",
" control of this toy so the idea here was to find if it was able to just guess",
" different tokens and get access to panels that are online and maybe get a",
" panel for another person's toy yeah so we created different tokens some of them",
" expired some of them active and we used our own lovin's app installed on our own",
" smartphone and then we tried to analyze how this access to this token worked so",
" basically if the token never actually existed then it's the server reddit X",
" to a JSON with page not found but in the case the token existed at some point in",
" time then it's reddit active to another research with a path that you can see now",
" on screen you can see there's an sID or session ID that links the token the the",
" user ID and also the ID of the particular device since a user can have",
" multiple device connected to this application and then there was a second",
" redirection within this process where you can see that the only thing that",
" changes is the two in the middle of the path at the end the session only expires",
" or the token expires if the user reaches the final URL but in the meantime you can",
" interrupt the process and try to somehow see if their response from the server",
" tells you if a token is valid meaning it has existed at some point in time if it's",
" active meaning there's someone actually waiting for you to connect to this token",
" or if it has expired so is there a way to weaponize this? could an attacker just",
" try to write a script to find random active tokens and try to join this",
" remote sessions? well we created different tokens some of them expired some of",
" them active and we actually tested some non-existent tokens and we created a",
" script to see if we could do this programatically and in fact this worked",
" it's a success you can actually tell with a script if a token is active or not",
" so we tested this set of tokens and then we wondered could an attacker wait for",
" how long to find an active token I mean is it really worth it I mean or would he",
" have to wait so long that it's not even worth the effort? well let's do some",
" math let's check this so it's a four digits token with letter and numbers and",
" that would be around 36 characters different characters and that would be",
" like 1.6 million possibilities of tokens to try so if we think about one",
" second per token to find them maybe 20 days for an attacker to find a token",
" valid and also the attacker needs to access this URL this token before the",
" remote partner does so it doesn't expire so it's pretty much complicated it's a",
" lot of time so maybe if we speed up a little bit if we make some automation",
" here automations in the rescue right so here's a proof of concept that we ran",
" on top of our own tokens and you can see on the bottom right screen there's a",
" console that's running our script that's checking for different tokens and some",
" of them are non-existent some others are valid if the token is valid then it",
" opens up a new tab on the web browser to your left and if the session it's",
" actually active then it sends a message via a telegram bot to the attacker so",
" that way the attacker can know that a new active token has been found and this",
" is done by adding a malicious extension to this web browser that allows or adds",
" more processing capabilities to the Python script that it's running on the",
" bottom right so this is a simulation of 10 minutes of running the script and you",
" can see that in the end it doesn't take long to find new tokens this is the",
" average that took us to find active tokens and in this case you can see the",
" attacker has access to the control panel of this device the max device and he",
" receives a new message via telegram in his phone let him know that there's a",
" new section session active and the web browser so how can we protect ourselves",
" given that these devices still have vulnerabilities well first of all keep in",
" mind that this is a sexting phenomena so if you're talking about sexting don't",
" don't share any pictures or videos where other people can see your face or some",
" particular markings that you have try to avoid being recognizable through these",
" pictures and videos also make sure that you're not sharing this remote tokens",
" online or publicly in that you're always sharing them via some secure mechanism",
" with the intended person make sure also that you're registering to these",
" applications with a fantasy email don't use your personal email create a new one",
" specifically for these applications and also make sure to install the latest",
" updates to install the patches to all of these vulnerabilities well and of",
" course make sure you're using a secure network while you play with these toys",
" and even if it's possible make sure nobody is around and also you can always",
" Google some reviews about the toy and see if there are already some security",
" issues published or there is any security review published and once you decide to",
" to buy a toy or once you have chosen a toy please read terms and conditions",
" before using it and it's also a good practice to download the application",
" before buying the toy so you can check the application see which functionalities",
" it has and how it works and maybe guess or research a little bit about which",
" information is asking you and how it will and create or protect that information",
" so well that's all but what happens if you already have a toy what about all",
" these people that already bought a toy and now are too scared to use it well",
" remember it's also a great toy for your dog thank you very much for listening",
" to our talk"
],
"tokens": [
[
2421,
11,
286,
478,
38807,
24169,
13,
400,
286,
478,
38133,
13,
400,
965,
321,
366,
516,
281,
751,
466,
3260,
13753,
13
],
[
12923,
3260,
13753,
13,
1042,
11,
32215,
4069,
3260,
13753,
13,
865,
13,
821,
362,
668,
3894
],
[
2132,
279,
322,
341,
3983,
293,
291,
393,
915,
552,
2950,
11,
457,
867,
5759,
300
],
[
366,
920,
322,
264,
2142,
362,
257,
688,
295,
24210,
293,
11427,
2663,
13,
407,
294
],
[
527,
2132,
321,
853,
281,
915,
613,
2740,
293,
965,
321,
366,
516,
281,
2073
],
[
365,
291,
527,
3542,
13,
7587,
13,
583,
700,
718,
311,
360,
257,
1702,
20928,
322,
264,
2503,
295
],
[
613,
5759,
13,
814,
362,
767,
668,
365,
505,
337,
257,
588,
938,
565,
13,
5135,
11
],
[
544,
813,
257,
4901,
13,
440,
700,
3260,
13753,
645,
1143,
382,
4625,
35480,
646,
294
],
[
264,
28898,
82,
13,
814,
645,
1143,
281,
13698,
819,
3467,
295,
3100,
6204,
11,
3009
],
[
512,
14346,
2306,
13,
1396,
3710,
264,
22003,
82,
11,
2217,
82,
11,
3356,
82,
11,
2625,
82,
11,
754,
281,
264,
3469
],
[
4060,
82,
11,
777,
5759,
11,
777,
5245,
11,
777,
10854,
1409,
281,
4204,
294,
264,
2142,
293,
436
],
[
645,
341,
565,
42310,
3030,
264,
1280,
5022,
300,
727,
2256,
613,
3383,
11
],
[
747,
552,
1280,
293,
764,
552,
5699,
436,
1415,
13,
11739,
1347,
278,
472,
295,
613
],
[
5766,
264,
5210,
1347,
10748,
11,
558,
30,
1042,
11,
718,
311,
751,
466,
4001,
3825,
646
],
[
294,
264,
945,
82,
365,
472,
295,
729,
13,
1396,
538,
264,
5285,
82,
264,
36211,
295,
777,
26229
],
[
9981,
12385,
264,
9351,
295,
264,
19444,
3518,
25577,
5929,
729,
5759,
293,
777
],
[
1254,
10854,
293,
5319,
1409,
281,
312,
1143,
13,
583,
538,
264,
8132,
341,
551,
3719
],
[
281,
483,
1880,
337,
505,
570,
777,
5759,
300,
727,
312,
10164
],
[
20824,
5766,
30361,
21095,
1409,
281,
4204,
293,
538,
264,
9657,
456
],
[
645,
2940,
5759,
300,
727,
312,
10164,
16143,
5766,
20286,
365
],
[
364,
3861,
322,
428,
1065,
13307,
13,
865,
11,
562,
264,
18365,
295,
30112,
293,
777
],
[
7943,
867,
18455,
3047,
281,
13365,
613,
13753,
365,
6013,
7733
],
[
293,
4705,
9271,
13,
407,
13434,
294,
4808,
321,
362,
13753,
300,
362,
257
],
[
688,
295,
10891,
293,
300,
393,
312,
1143,
20824,
11,
411,
1969,
264,
12058
],
[
20824,
807,
264,
6013,
724,
420,
754,
257,
3670,
11185,
293,
3105,
538,
10990
],
[
8294,
420,
754,
19331,
1125,
264,
4302,
365,
257,
960,
818,
11,
364,
40031,
11,
257
],
[
16788,
420,
754,
362,
22595,
1406,
420,
661,
9683,
1406,
281,
1969,
552
],
[
322,
3177,
16901,
13,
407,
439,
295,
613,
11745,
1088,
366,
588,
1880,
293
],
[
611,
1269,
264,
2853,
281,
867,
37633,
13,
7587,
293,
436,
1269
],
[
264,
2853,
281,
777,
5245,
300,
393,
1745,
1296,
1184,
661,
293,
611,
321,
366,
406
],
[
586,
2891,
281,
536,
257,
6028,
3030,
4069,
2309,
14733,
300,
362,
257,
688,
295
],
[
819,
10862,
300,
393,
312,
4582,
281,
264,
4705,
13,
814,
362
],
[
1629,
11677,
7599,
7733,
300,
393,
312,
8899,
322,
264,
4302,
293
],
[
613,
7733,
295,
1164,
362,
257,
688,
295,
37633,
300,
321,
393,
6063
],
[
5877,
281,
853,
281,
24996,
13,
407,
321,
767,
21546,
257,
1326,
295,
613,
22056,
281,
1029
],
[
552,
466,
264,
10891,
295,
613,
4069,
2309,
14733,
293,
321,
1352,
484,
300
],
[
436,
366,
3480,
2940,
1578,
7525,
562,
309,
1487,
281,
3825,
13,
407,
341
],
[
264,
636,
341,
4069,
2309,
14733,
589,
307,
300,
436,
767,
362,
257,
13307
],
[
300,
6828,
322,
641,
1378,
1936,
411,
257,
3567,
293,
300,
16967,
281,
264
],
[
1472,
295,
264,
14840,
295,
264,
1772,
13,
407,
300,
2593,
393,
312,
767,
588,
10955
],
[
293,
264,
9205,
366,
767,
10144,
807,
12524,
370,
264,
4195,
362,
281
],
[
3625,
264,
5372,
42,
2969,
13,
8780,
466,
3825,
562,
309,
1487,
281,
341,
2010,
295
],
[
5759,
13,
1042,
4936,
490,
264,
5759,
498,
321,
519,
466,
264,
3260,
3518,
293,
264
],
[
5075,
12393,
3518,
613,
13284,
362,
1217,
668,
11109,
295
],
[
2940,
13411,
8122,
293,
264,
700,
2690,
300,
1487,
281,
452,
1575,
307,
264
],
[
19571,
22874,
2093,
3209,
597,
257,
1916,
295,
924,
949,
390,
257,
3779,
295
],
[
364,
2690,
293,
264,
4365,
293,
1589,
295,
544,
813,
2217,
2459
],
[
5022,
390,
9495,
2950,
13,
407,
257,
688,
295,
947,
16749,
645,
9599,
293,
867,
561
],
[
632,
257,
688,
295,
2740,
294,
641,
6159,
293,
321,
393,
611,
519
],
[
466,
49341,
341,
10689,
724,
300,
575,
1217,
668,
1352,
294,
867,
37633
],
[
293,
611,
321,
362,
281,
519,
466,
264,
867,
795,
4070,
300,
366,
2361,
322,
7592,
7733,
420
],
[
7592,
2715,
16403,
420,
754,
42826,
830,
313,
2361,
322,
15900,
1589,
13,
407,
498,
281
],
[
613,
8122,
281,
264,
3260,
3518,
321,
909,
264,
1186,
300,
30112,
5759,
366,
885
],
[
32463,
538,
45129,
281,
2042,
819,
3467,
295,
8122,
731,
300,
311
],
[
257,
1154,
13,
492,
393,
519,
337,
1365,
466,
264,
3149,
1301,
3209,
420,
466,
257,
1389
],
[
689,
45129,
658,
1969,
295,
257,
42539,
294,
257,
36278,
311,
3506,
5466,
293
],
[
550,
490,
456,
727,
3012,
281,
264,
36278,
311,
3209,
13,
407,
498,
321,
2408,
493,
264
],
[
264,
3518,
295,
3260,
300,
575,
668,
3779,
295,
13411,
8122,
365,
264,
867,
30112,
5759
],
[
300,
321,
362,
965,
294,
264,
2142,
293,
366,
1217,
885,
1143,
538,
45129,
731,
264
],
[
6562,
309,
311,
257,
707,
857,
6958,
13,
407,
437,
393,
352,
2085,
365,
613,
13753,
30,
1042
],
[
700,
295,
439,
364,
35871,
393,
829,
257,
691,
667,
67,
284,
284,
40747,
1854,
295,
472,
295,
613,
13753
],
[
457,
611,
613,
5759,
366,
24042,
13097,
2969,
370,
436,
366
],
[
24042,
7750,
1589,
295,
641,
6814,
456,
13,
407,
309,
311,
1238,
1858,
281
],
[
915,
498,
257,
12058,
307,
1974,
322,
257,
7622,
1808,
420,
498,
1580,
307,
9792,
472,
365,
796,
13
],
[
407,
341,
393,
1477,
281,
2940,
2663,
411,
1589,
30392,
11,
1589
],
[
588,
9477,
337,
1365,
382,
6701,
14764,
11,
6701,
4462,
420,
6701
],
[
7525,
293,
341,
393,
312,
512,
1154,
294,
867,
3517,
300,
362
],
[
2731,
1970,
512,
6701,
7525,
457,
611,
321,
500,
380,
519,
466,
364,
35871
],
[
300,
2170,
1969,
295,
472,
295,
613,
5759,
1339,
257,
4195,
307,
2433,
365,
309,
13
],
[
407,
3811,
257,
954,
575,
257,
12058,
309,
311,
2433,
412,
1280,
457,
550,
364,
35871
],
[
2170,
1969,
295,
300,
12058,
293,
307,
264,
472,
300,
307,
534,
7750,
264,
16901,
281
],
[
264,
12058,
13,
6068,
300,
312,
6701,
12458,
30,
708,
2314,
456,
30,
1981,
366,
721,
300,
321
],
[
362,
281,
722,
8079,
365,
4069,
3260,
13753,
13,
407,
412,
264,
722,
295,
527,
2132,
321
],
[
632,
281,
2826,
264,
5759,
300,
321,
645,
516,
281,
764,
337,
527,
2132,
1936
],
[
264,
5245,
300,
321,
645,
516,
281,
2256,
293,
45565,
456,
645,
370,
867,
819
],
[
22056,
370,
867,
819,
5245,
293,
309,
390,
534,
1152,
281,
2826,
365,
370,
867
],
[
819,
10891,
1184,
293,
633,
472,
295,
552,
13,
407,
321,
630,
437,
4472
],
[
576,
360,
294,
341,
2590,
558,
30,
492,
1437,
281,
264,
8441,
295,
3260,
13,
1079,
11,
294,
1873,
3609,
13
],
[
492,
645,
294,
1873,
3609,
293,
321,
11220,
264,
8441,
13,
7587,
293,
321,
1409,
767
],
[
4997,
819,
5759,
300,
291,
727,
1500,
294,
264,
3621,
293,
321,
994,
380,
1565
],
[
527,
27642,
365,
505,
13,
492,
820,
362,
13,
865,
457,
321,
4590,
493,
10875,
732,
22056,
300
],
[
321,
519,
645,
472,
295,
264,
3880,
420,
732,
295,
264,
3880,
13,
407,
366,
291,
13761,
281
],
[
264,
2744,
420,
767,
264,
22056,
30,
876,
808,
322,
13,
1468,
380,
360,
341,
281,
385,
13,
1449,
1953,
13
],
[
1033,
264,
700,
472,
307,
5956,
2193,
384,
13,
286,
478,
988,
867,
295,
291,
458,
341,
3360,
498,
291,
434
],
[
3102,
294,
3260,
13753,
293,
3825,
295,
3260,
13753,
570,
456,
362,
668
],
[
37098,
322,
341,
1729,
24321,
13,
639,
3360,
575,
257,
688,
295,
4069,
3260,
13753,
13
],
[
509,
393,
1745,
552,
670,
257,
20286,
3209,
420,
754,
670,
264,
4705,
293
],
[
456,
366,
370,
867,
819,
10854,
293,
11602,
293,
321,
362,
611,
321,
14606,
300,
321
],
[
2826,
570,
436,
611,
362,
257,
688,
295,
4069,
3260,
13753,
293,
436,
366,
588
],
[
1021,
294,
264,
2142,
293,
286,
478,
988,
291,
434,
3650,
300,
456,
645,
2940
],
[
10309,
8595,
341,
24321,
294,
264,
1791,
13,
407,
321,
1415,
281,
458,
577,
709,
436
],
[
362,
3105,
13,
407,
264,
700,
365,
264,
390,
321,
11220,
264,
12891,
295,
613,
732
],
[
22056,
293,
3031,
281,
574,
412,
264,
10891,
295,
641
],
[
819,
5245,
13,
407,
264,
700,
551,
300,
291,
393,
536,
307,
300,
456,
307,
257,
688,
295
],
[
1589,
466,
4577,
11,
5319,
11,
577,
709,
264,
5809,
20669,
11,
577,
709,
775,
309
],
[
747,
281,
4602,
552,
11,
457,
456,
645,
572,
23844,
295,
613,
322,
264,
12891,
466
],
[
20618,
11,
29575,
293,
264,
3825,
300,
390,
885,
6456,
281,
341,
7733,
293
],
[
341,
30289,
281,
652,
309,
7144,
13,
407,
341,
307,
746,
300,
2314,
257,
688,
365
],
[
341,
2010,
295,
30112,
5759,
294,
1729,
11,
584,
3260,
13753,
13,
407,
264,
700,
1823,
390,
281
],
[
1223,
264,
9482,
11,
577,
366,
613,
13753,
4582,
13,
407,
264,
12058,
16967
],
[
281,
264,
4195,
13307,
1228,
257,
2973,
1859,
3209,
411,
20286,
420,
294
],
[
881,
3331,
20286,
2295,
2281,
13,
1396,
490,
264,
13307,
264,
4195,
16967,
281,
364
],
[
724,
88,
490,
264,
24321,
2673,
322,
257,
24321,
7154,
293,
550,
264,
8607,
4975
],
[
300,
393,
312,
4992,
294,
264,
1002,
16967,
281,
300,
724,
88,
293,
490,
456,
2170
],
[
1969,
295,
264,
8607,
12058,
13,
407,
294,
341,
9482,
294,
341,
2316,
456,
366,
257
],
[
688,
295,
2690,
18875,
300,
364,
35871,
727,
764,
411,
352,
807,
337,
264
],
[
2973,
1859,
3209,
4984,
337,
264,
20286,
4984,
11,
1310,
746,
322
],
[
264,
322,
264,
13307,
322,
264,
724,
420,
754,
264,
8607,
4984,
807,
264
],
[
4705,
724,
88,
13,
407,
300,
311,
437,
321,
28181,
13,
7587,
11,
457,
700,
257,
1702,
40896
],
[
570,
439,
295,
264,
37633,
300,
321,
366,
516,
281,
536,
3710,
264,
751
],
[
300,
321,
434,
516,
281,
2248,
362,
668,
1217,
6806,
293,
321,
362,
4447,
293,
281
],
[
2042,
293,
20594,
264,
2701,
300,
291,
366,
516,
281,
536,
13,
407,
445,
281,
312
],
[
1850,
322,
689,
321,
366,
4877,
13,
407,
264,
700,
12058,
321,
366,
516,
281,
855,
291,
307
],
[
341,
32154,
472,
558,
510,
13,
634,
393,
380,
1463,
920,
13,
407,
341,
307,
264,
264,
361,
488,
490
],
[
492,
53,
488,
13,
639,
12058,
307,
1238,
1880,
570,
309,
311
],
[
3650,
712,
13,
467,
1355,
300,
264,
954,
20877,
341,
12058,
293,
393,
352,
926,
2433,
365
],
[
341,
12058,
13,
407,
2673,
257,
1916,
764,
613,
13753,
294,
10228,
11,
11486,
420,
754
],
[
2983,
329,
406,
787,
294,
7622,
9396,
420,
1854,
264,
1782,
13,
407,
300,
390,
1238
],
[
1880,
337,
527,
5215,
570,
309,
311,
257,
12058,
300,
291,
393,
915,
4992,
293
],
[
309,
311,
382,
321,
848,
949,
309,
311,
24042,
13097,
1080,
6814,
293,
364,
35871
],
[
393,
3612,
915,
472,
295,
613,
411,
2217,
3521,
926,
13,
865,
309,
307
],
[
4761,
281,
312,
1143,
294,
32215,
9590,
420,
309,
820,
312,
4761,
337,
300,
13,
492
],
[
1062,
632,
512,
5253,
562,
309,
1487,
281,
1589,
3825,
294,
264,
1791,
13,
467,
390
],
[
412,
5153,
844,
9838,
257,
1326,
924,
2057,
300,
2132,
390,
8212,
689,
309,
390,
12785
],
[
300,
436,
632,
11087,
886,
709,
1589,
490,
641,
5022,
1553
],
[
641,
14546,
293,
370,
436,
645,
33864,
293,
436,
632,
281,
1689,
805,
13,
22,
2459,
3808
],
[
597,
307,
257,
688,
13,
407,
321,
1415,
281,
536,
498,
436,
632,
3264,
490,
341,
1752
],
[
293,
436,
632,
3105,
641,
5821,
281,
652,
552,
544,
7144,
13,
440,
700,
551
],
[
300,
321,
10033,
390,
264,
8607,
1969,
5766,
264,
12905,
13,
639,
3861,
575,
264
],
[
7959,
281,
1884,
257,
2272,
4342,
6798,
300,
309,
311,
668,
1143,
382,
257,
14862
],
[
293,
291,
393,
2073,
365,
428,
4975,
293,
370,
436,
393,
1745,
5766,
257,
368,
12,
1746,
1050,
399
],
[
281,
1969,
428,
1065,
3260,
12058,
13,
407,
341,
14862,
1143,
281,
362,
512,
2740,
294,
264
],
[
1791,
13,
467,
994,
380,
45447,
382,
309,
820,
457,
586,
436,
767,
3191,
309,
13,
1711,
1935,
321
],
[
2809,
380,
915,
604,
1154,
365,
341,
558,
586,
13,
440,
700,
721,
300,
321,
10033
],
[
645,
512,
11427,
2663,
300,
727,
362,
4924,
10098,
337,
264,
5022
],
[
5775,
281,
1589,
30392,
13,
821,
366,
370,
867,
665,
721,
300,
321,
2256
],
[
1791,
1319,
13,
1171,
1365,
586,
436,
3461,
439,
40661,
295,
264,
39283,
597,
307
],
[
869,
293,
309,
311,
1596,
2689,
294,
613,
5821,
300,
3928,
281,
4813,
1270
],
[
9477,
1412,
13,
814,
6456,
917,
281,
917,
979,
627,
1695,
281,
17972,
662,
439,
264,
5242
],
[
300,
291,
366,
7750,
293,
641,
7098,
767,
366,
22981,
490,
264,
5081
],
[
1564,
264,
5081,
5314,
597,
307,
869,
370,
291,
458,
300,
428,
5242,
360,
406,
45657
],
[
322,
264,
2593,
295,
428,
4462,
13,
583,
920,
456,
645,
512,
2663,
300,
321,
1352
],
[
365,
341,
31437,
295,
5267,
13,
1079,
731,
264,
5242,
2279,
322,
264,
5081,
366
],
[
6624,
281,
264,
6725,
1854,
264,
724,
2597,
281,
264,
724,
6725,
1854,
264
],
[
2593,
370,
300,
572,
661,
724,
393,
2105,
300,
3036,
420,
291,
2644,
2105,
300
],
[
3036,
490,
2380,
264,
3861,
13,
583,
498,
264,
35871,
575,
257,
25277,
2593
],
[
731,
436,
393,
2105,
264,
724,
6725,
13,
682,
300,
1389,
300,
311,
437,
321,
630,
321,
1352,
484
],
[
300,
264,
3036,
300,
307,
12187,
1854,
264,
3861,
920,
575,
439,
264
],
[
26603,
294,
309,
13,
407,
562,
291,
2845,
264,
3036,
264,
26603,
307,
406,
22981
],
[
949,
309,
311,
2279,
13,
407,
300,
3036,
393,
312,
17135,
281,
257,
3621,
411,
337,
1365
],
[
6377,
569,
970,
293,
364,
35871,
393,
915,
484,
689,
264,
954,
307,
300,
2279,
264
],
[
3036,
307,
767,
6870,
264,
1900,
4914,
538,
264,
19462,
4365,
1589,
13
],
[
440,
35871,
393,
611,
458,
264,
2316,
295,
264,
2593,
300,
311,
668,
1143,
11,
264,
2799,
11
],
[
264,
565,
293,
4002,
264,
5052,
390,
767,
2726,
293,
498,
309,
575,
668,
23016,
420,
406,
13
],
[
639,
1589,
412,
700,
727,
1626,
411,
746,
300,
572,
472,
727,
764,
457
],
[
264,
551,
307,
300,
867,
561,
2673,
764,
613,
5821,
281,
751,
281
],
[
22724,
293,
611,
867,
561,
2073,
2950,
641,
22667,
420,
641,
8607
],
[
9003,
13,
407,
498,
300,
954,
307,
1382,
281,
6479,
702,
420,
720,
2074,
9033,
420,
307
],
[
1382,
281,
6479,
689,
415,
420,
415,
307,
731,
264,
26603,
293,
264,
5242
],
[
775,
406,
854,
13,
7587,
293,
2171,
341,
307,
406,
257,
2973,
3922,
457,
341,
307
],
[
611,
393,
312,
644,
295,
264,
2643,
382,
257,
1945,
2013,
420,
257,
1945,
3237,
2643,
13,
407,
321,
643
],
[
281,
2371,
613,
561,
300,
366,
1228,
613,
5759,
1936,
281,
589,
13,
708
],
[
1646,
30,
1042,
341,
3861,
767,
5974,
257,
1451,
12,
25259,
270,
5447,
300,
436,
393
],
[
764,
294,
1668,
281,
4017,
264,
3861,
370,
572,
472,
1646,
393,
2105,
264,
3861
],
[
5969,
309,
575,
264,
1451,
12,
25259,
270,
5447,
13,
639,
14980,
1062,
312,
294,
1081,
281
],
[
2371,
264,
724,
490,
428,
2301,
420,
746,
411,
300,
428,
2838,
887,
420
],
[
1310,
611,
257,
13805,
18009,
13,
407,
264,
10098,
393,
611,
312,
733,
295
],
[
4924,
498,
291,
434,
1417,
466,
257,
12786,
2480,
570,
341
],
[
3861,
787,
4045,
472,
4975,
412,
264,
565,
370,
6754,
335,
827,
575,
406,
6678,
13
],
[
407,
341,
5447,
393,
767,
1670,
309,
311,
445,
257,
1451,
12,
25259,
270,
5447,
393,
312,
47909,
12,
2994,
1232,
538
],
[
1228,
257,
1578,
10109,
365,
257,
588,
2199,
5755,
570,
309,
2516,
264,
10186,
4846
],
[
293,
406,
411,
257,
10748,
295,
9905,
420,
661,
2010,
295,
6542,
13,
407,
309,
311,
1596,
26703
],
[
281,
2105,
341,
14862,
293,
4412,
2105,
264,
1969,
4831,
295,
264,
3861
],
[
293,
264,
14924,
295,
264,
3861,
2564,
13,
400,
411,
321,
536,
294,
264,
960,
445,
517,
28830
],
[
264,
724,
13,
7587,
13,
407,
437,
1646,
8595,
613,
13753,
30,
1042,
382,
321,
7179,
949,
293
],
[
613,
13753,
764,
20286,
2295,
2281,
293,
341,
10336,
575,
257,
1729
],
[
16282,
300,
307,
300,
456,
366,
732,
2010,
295,
5759,
40235,
293
],
[
5777,
5759,
13,
3026,
21240,
304,
5759,
300,
366,
2673,
264,
13753,
362,
281
],
[
312,
6460,
13097,
641,
6814,
281,
1699,
337,
257,
4984,
490,
264
],
[
5777,
4302,
13,
663,
1355,
300,
1339,
257,
12058,
307,
406,
4582,
281,
257,
13307,
309,
311
],
[
24042,
13097,
28706,
641,
6814,
456,
3806,
337,
264
],
[
4984,
13,
639,
1355,
300,
411,
300,
13,
509,
434,
884,
300,
13,
286,
478,
406,
884,
300,
13,
467,
311
],
[
3219,
321,
366,
1217,
885,
2368,
13,
2102,
307,
884,
300,
30,
286,
478,
406,
988,
13,
467,
311,
5079,
510,
13,
467,
311,
445,
505,
13
],
[
1033,
370,
307,
2618,
510,
30,
407,
264,
35871,
393,
5484,
364,
3861
],
[
411,
341,
20286,
30211,
293,
445,
853,
281,
915,
484,
498,
456,
366,
604
],
[
5759,
926,
13,
682,
264,
1365,
300,
291,
393,
536,
322,
264,
2568,
321,
366,
5006,
264
],
[
417,
488,
300,
311,
510,
293,
264,
5707,
82,
300,
321,
366,
516,
281,
751,
1780,
466,
341,
472,
13,
407
],
[
309,
311,
1238,
1858,
337,
264,
35871,
281,
445,
915,
613,
5759,
915,
257,
688,
295
],
[
1589,
490,
613,
5759,
293,
722,
1228,
341,
30211,
382,
257,
10707,
13,
316
],
[
10707,
281,
483,
4966,
281,
264,
4302,
445,
1228,
264,
6358,
3800,
295,
1184,
4302,
13
],
[
407,
264,
35871,
393,
3612,
1286,
926,
1237,
337,
264,
1151,
6358,
3800,
293
],
[
300,
576,
976,
264,
35871,
364,
1558,
295,
689,
307,
264,
12058,
1974,
567,
307,
4769
],
[
420,
1228,
300,
12058,
13,
663,
311,
1238,
709,
257,
688,
295,
1589,
13,
1079,
293,
550,
436
],
[
393,
1745,
281,
264,
12058,
293,
436,
500,
380,
754,
643,
264,
724,
281,
360,
300,
570
],
[
456,
366,
2940,
12891,
300,
291,
393,
764,
538,
1228,
264,
3670,
20286,
5372,
32,
281
],
[
1745,
281,
264,
281,
264,
3260,
12058,
293,
2845,
3053,
281,
264,
3260,
13753,
293,
436,
366
],
[
920,
18483,
570,
456,
307,
572,
26643,
562,
309,
1487,
281,
341
],
[
20286,
4984,
293,
370,
309,
311,
1596,
10955,
281,
613,
2010,
295,
10625,
501,
1109,
13,
407
],
[
406,
787,
364,
35871,
393,
483,
1969,
295,
341,
12058,
5699,
264,
12058,
307,
2435
],
[
457,
611,
727,
364,
35871,
483,
666,
264,
2808,
295,
257,
3761,
295,
264,
2808
],
[
295,
257,
4984,
30,
1042,
300,
311,
767,
437,
321,
3031,
257,
20286,
1575,
294,
264
],
[
2808,
2690,
689,
264,
35871,
9898,
281,
483,
294,
264,
2808,
295,
257,
6101
],
[
293,
1969,
264,
12058,
13,
407,
294,
257,
2689,
9005,
257,
12058,
576,
312,
4582,
281
],
[
264,
4195,
311,
2593,
457,
294,
341,
1389,
437,
264,
35871,
486,
853,
281,
360,
307,
483,
294,
264
],
[
2808,
295,
300,
4984,
1884,
257,
7592,
12058,
294,
702,
420,
720,
3820,
293,
550,
652
],
[
264,
4195,
1745,
281,
264,
7592,
12058,
2602,
295,
264,
957,
12058,
293,
264,
35871
],
[
486,
312,
264,
472,
567,
486,
2128,
264,
16901,
281,
264,
12058,
420,
1310,
1319,
552
],
[
294,
264,
2808,
13,
407,
294,
264,
958,
960,
321,
366,
516,
281,
536,
257,
8177,
295,
3410,
295
],
[
341,
13,
407,
437,
321,
630,
307,
764,
264,
2290,
363,
35,
43,
2826,
281,
1884,
257,
587,
294,
264,
2808
],
[
2690,
13,
639,
2290,
4960,
732,
20286,
33079,
904,
293,
264,
35871,
486,
643,
732
],
[
10807,
420,
294,
341,
1389,
732,
6374,
8379,
13,
682,
264,
700,
472,
437,
264
],
[
35871,
576,
360,
307,
1884,
257,
20286,
29690,
13,
639,
20286,
29690,
486,
312,
294
],
[
4602,
295,
1242,
439,
264,
20286,
15163,
11,
23384,
439,
264
],
[
20286,
6419,
13,
1396,
1564,
264,
29690,
307,
493,
264,
35871,
393,
352,
281,
264,
661
],
[
3820,
420,
264,
661,
6374,
3479,
293,
321,
1745,
281,
264
],
[
20286,
29690,
281,
264,
363,
35,
43,
2826,
29690,
293,
550,
1564,
4582,
291,
486,
536
],
[
300,
341,
2290,
575,
257,
3670,
9226,
300,
311,
588,
4420,
293,
1858,
281,
764,
13,
407,
294
],
[
300,
9226,
264,
35871,
393,
536,
439,
264,
20286,
5759,
322,
3613,
293,
456
],
[
291,
486,
915,
264,
508,
488,
11,
527,
12058,
13,
407,
550,
1564,
264,
35871,
10704,
264,
12058,
393
],
[
1745,
281,
300,
12058,
293,
382,
291,
536,
294,
264,
11076,
264,
2290,
363,
35,
43,
2826,
486
],
[
1884,
437,
309,
311,
1219,
257,
35064,
13,
467,
311,
411,
257,
7592,
12058,
11,
257,
7592,
4302,
689,
264
],
[
4195,
11,
264,
6760,
486,
1745,
457,
321,
603,
920,
519,
300,
309,
311,
264,
957,
12058
],
[
570,
341,
35064,
486,
5055,
439,
264,
10891,
295,
264,
957,
4302,
13,
407
],
[
550,
264,
6760,
16967,
281,
300,
35064,
281,
264,
7592,
12058,
293,
562,
14790,
257,
5622
],
[
264,
12058,
767,
6067,
457,
382,
291,
536,
322,
264,
2568,
264,
35871,
307,
23384,
439
],
[
613,
17401,
11,
439,
613,
16901,
13,
407,
264,
35871,
393,
722,
5276,
512
],
[
16901,
293,
1242,
512,
6419,
13,
407,
456,
393,
291,
536,
264,
4195,
307
],
[
4473,
512,
4340,
2405,
8294,
293,
264,
35871,
307,
456,
23384,
439,
295
],
[
613,
17401,
13,
407,
550,
264,
35871,
393,
483,
512,
16901,
457,
437,
264,
35871
],
[
393,
360,
958,
307,
747,
604,
295,
613,
17401,
293,
445,
16972,
309,
300,
1355
],
[
2845,
309,
646,
281,
264,
12058,
13,
407,
586,
264,
35871,
307,
7750,
257,
5622,
293,
1339
],
[
264,
6760,
307,
406,
884,
1340,
264,
12058,
307,
2684,
13,
407,
264,
12058,
307,
47748,
370,
264
],
[
35871,
307,
264,
472,
300,
307,
767,
14905,
264,
12058,
412,
341,
935,
13,
509,
393
],
[
536,
309,
311,
7750,
819,
2010,
295,
16901,
293,
264,
12058,
307,
16670,
13,
2743
],
[
437,
264,
35871,
393,
360,
456,
11,
264,
4302,
307,
12767,
11,
307,
1319,
613
],
[
17401,
13,
1449,
909,
777,
16901,
13,
1981,
16901,
393,
2139,
312,
2726,
490,
264
],
[
4009,
3089,
295,
264,
3861,
420,
538,
23384,
257,
688,
295,
6419,
13,
407,
456
],
[
337,
1365,
291,
362,
264,
11469,
13749,
13,
407,
264,
35871,
393,
2845,
257,
5622,
281,
264
],
[
12058,
281,
12970,
4404,
412,
1080,
6674,
13749,
13,
400,
456,
291,
486,
536,
577,
264,
12058,
307
],
[
586,
47748,
13,
407,
264,
35871,
393,
406,
787,
24700,
264,
3539,
16901,
457
],
[
611,
1319,
552,
420,
2845,
777,
16901,
281,
264,
12058,
13,
407,
294,
341,
1389,
286,
458,
1310
],
[
309,
727,
312,
257,
6701,
12458,
11,
746,
281,
751,
466,
420,
281,
519,
466,
13,
407,
321
],
[
362,
14617,
300,
613,
5759,
366,
920,
10955,
281,
341,
2010,
295,
2690,
293,
572
],
[
26643,
575,
668,
5556,
294,
341,
13753,
294,
264,
1791,
924,
13,
3013,
390,
264
],
[
3387,
295,
341,
2132,
13,
407,
586,
321,
434,
516,
281,
12477,
527,
6130,
553,
311,
4302,
597,
307
],
[
264,
11469,
4302,
300,
291,
366,
1976,
558,
586,
322,
2568,
13,
639,
4302,
393,
312
],
[
19331,
1602,
365,
1080,
22335,
13,
467,
393,
312,
1071,
11469,
4302,
420,
257,
2710
],
[
4302,
13,
1981,
5245,
366,
1880,
490,
257,
31422,
4585,
570,
498,
257
],
[
38155,
575,
1969,
670,
472,
295,
613,
5759,
550,
4258,
11482,
3598
],
[
264,
661,
472,
300,
3248,
299,
1024,
264,
9981,
295,
264,
700,
13,
407,
291,
393,
362
],
[
732,
5759,
833,
428,
1969,
538,
264,
3218,
295,
472,
13,
407,
321,
1409,
23663,
264
],
[
3861,
300,
307,
1143,
281,
1969,
341,
4302,
300,
307,
264,
6130,
553,
311,
8607
],
[
3861,
293,
321,
1409,
23663,
264,
11427,
4122,
4077,
281,
341
],
[
3861,
13,
1042,
321,
727,
536,
300,
309,
4960,
257,
1017,
12,
25259,
270,
5447,
281,
4017,
264
],
[
3861,
382,
912,
382,
264,
661,
472,
457,
456,
645,
512,
7389,
558,
30,
1079
],
[
731,
512,
37158,
1715,
7994,
490,
6130,
553,
311,
13,
1407,
722,
264,
40661,
366
],
[
4350,
370,
337,
257,
13701,
3861,
300,
311,
1238,
709,
746,
281,
519,
466,
13
],
[
583,
611,
731,
264,
26603,
390,
22981,
490,
264,
5242,
949,
436,
366,
2279
],
[
300,
311,
869,
457,
264,
5242,
300,
645,
954,
2279,
322,
257,
5081,
731,
366,
588
],
[
2252,
281,
12097,
490,
264,
8607,
13307,
13,
814,
15667,
1754,
456,
13
],
[
708,
360,
321,
914,
538,
341,
30,
1042,
718,
311,
3811,
291,
434,
1228,
264,
3861
],
[
293,
291,
2845,
428,
4975,
428,
1065,
3036,
13,
961,
311,
584,
300,
291,
586,
1269,
264
],
[
3956,
6510,
322,
341,
3036,
13,
1042,
291,
536,
819,
3956,
13,
2386,
295,
439,
291
],
[
393,
536,
300,
291,
393,
12097,
264,
3036,
457,
341,
1103,
302,
313,
787,
1985,
16143,
13,
467
],
[
1177,
380,
4159,
264,
3036,
490,
264,
7154,
6051,
264,
2593,
295,
428,
18009,
370
],
[
1936,
1564,
291,
2845,
264,
3036,
291,
3624,
1969,
13,
2743,
264,
8607
],
[
4975,
393,
611,
2128,
420,
5484,
428,
3036,
5699,
436,
528,
293,
341
],
[
1670,
341,
3861,
341,
3036,
10834,
322,
264,
7154,
550,
436,
393,
611
],
[
14581,
264,
7154,
281,
483,
264,
3256,
498,
436,
458,
264,
12905,
295,
341,
1729
],
[
7684,
13,
440,
6130,
553,
311,
11427,
3897,
1619,
300,
341,
3036,
307,
1754,
294,
641
],
[
15909,
517,
22660,
627,
25383,
538,
264,
636,
337,
3407,
1708,
457,
321,
600,
767,
1352,
300,
436
],
[
393,
1754,
2854,
13,
821,
311,
767,
257,
7633,
3614,
300,
311,
1219,
9901,
293
],
[
300,
311,
264,
472,
291,
528,
281,
764,
562,
291,
528,
281,
12097,
257,
3036,
490,
264,
732
],
[
5759,
457,
341,
3614,
309,
311,
787,
2435,
337,
732,
2077,
934,
7750
],
[
264,
3036,
293,
550,
2584,
25527,
13,
407,
498,
291,
1128,
3031,
281
],
[
12097,
264,
5242,
558,
934,
291,
2845,
309,
550,
291,
500,
380,
754,
458,
300
],
[
341,
2445,
754,
8198,
13,
407,
300,
311,
746,
281,
362,
294,
1575,
498,
291,
420,
472
],
[
295,
428,
18201,
420,
1580,
295,
428,
1855,
309,
311,
767,
1228,
341
],
[
3861,
13,
2743,
562,
321,
722,
23663,
264,
6419,
291,
393,
536,
300
],
[
456,
366,
2940,
24109,
33283,
483,
24109,
300,
366,
30024,
1589
],
[
1270,
382,
264,
4195,
7348,
294,
341,
1389,
307,
264,
912,
472,
382,
264,
3796,
16862,
13,
1133
],
[
291,
7280,
666,
264,
3861,
291,
393,
992,
257,
13861,
30351,
293,
291,
643
],
[
281,
2893,
428,
3796,
13,
1042,
2041,
437,
300,
3796,
307,
767,
5507,
365
],
[
315,
423,
331,
291,
434,
24654,
365,
13,
961,
311,
584,
291,
1269,
493,
5081,
365,
472,
295,
428,
1855
],
[
731,
264,
3861,
4960,
428,
3796,
382,
428,
4195,
7348,
281,
5876,
428,
2593,
370
],
[
436,
366,
5414,
428,
3796,
365,
264,
954,
300,
291,
434,
24654,
293,
436
],
[
393,
574,
493,
428,
3796,
294,
264,
6920,
7098,
295,
264,
2593,
570,
436,
366,
406
],
[
36663,
293,
754,
498,
436,
645,
291,
393,
920,
6063,
3067,
281,
483,
807,
341
],
[
1589,
538,
10711,
278,
264,
3861,
412,
34474,
293,
456,
366,
661,
2098,
661
],
[
2663,
4077,
281,
264,
636,
341,
3861,
9258,
26192,
264,
3796
],
[
16862,
13,
1171,
1365,
291,
393,
14581,
264,
7154,
281,
536,
498,
257,
2212,
3796,
2985
],
[
307,
13968,
322,
264,
1185,
370,
291,
393,
458,
2361,
322,
264,
4134,
498,
264,
3796
],
[
8198,
291,
727,
764,
257,
17143,
8149,
295,
12524,
490,
3894,
8122,
718,
311,
584
],
[
264,
19571,
22874,
2093,
3209,
2690,
293,
550,
14581,
613,
12524,
1970
],
[
264,
7154,
570,
456,
366,
572,
29031,
1970,
47909,
19030,
370,
291
],
[
727,
14581,
439,
300,
291,
528,
293,
309,
1985,
264,
661,
636,
926,
291,
393
],
[
611,
14581,
337,
4195,
5288,
293,
483,
641,
12524,
370,
718,
311,
584,
291,
722,
38602
],
[
264,
3861,
293,
291,
915,
264,
8294,
6405,
689,
5022,
393,
2073
],
[
641,
8294,
295,
764,
14843,
365,
661,
5022,
370,
291,
727,
915,
4195,
5288
],
[
10052,
294,
341,
6405,
293,
550,
14581,
264,
7154,
281,
483,
641,
12524,
293,
722
],
[
819,
8122,
382,
2093,
7043,
420,
3260,
3930,
82,
313,
8122,
420,
754,
764,
341
],
[
12524,
281,
4025,
661,
2010,
295,
8122,
1670,
613,
366,
611,
264,
4195,
48212,
370
],
[
613,
12524,
727,
312,
1143,
281,
5876,
257,
954,
558,
731,
4936,
490,
264,
6405
],
[
321,
643,
281,
519,
300,
867,
561,
445,
2073,
641,
30351,
641,
15416,
77,
1632
],
[
2950,
337,
8607,
5481,
365,
1580,
926,
264,
1002,
457,
881,
295,
264,
565
],
[
613,
366,
13861,
5288,
411,
3260,
468,
658,
7551,
731,
294,
341,
1389,
364,
35871,
727
],
[
915,
484,
437,
311,
456,
294,
264,
3796,
337,
3260,
468,
658,
7551,
293,
915,
264,
957,
954
],
[
2261,
300,
21641,
312,
988,
406,
281,
7280,
365,
257,
10896,
2696,
558
],
[
1338,
337,
988,
731,
4936,
490,
341,
264,
4358,
8607,
1969,
611,
1985,
365,
364
],
[
12905,
370,
264,
954,
300,
575,
341,
12058,
393,
1884,
8607,
1969,
12905,
337,
702,
420
],
[
720,
4975,
281,
1969,
264,
12058,
20824,
370,
341,
12905,
1985,
3838,
807,
264
],
[
4705,
309,
775,
406,
643,
337,
264,
8607,
4975,
281,
362,
264,
724,
294,
3758,
382,
294
],
[
264,
1389,
295,
321,
2256,
370,
294,
341,
1389,
341,
12905,
307,
1027,
538,
412,
700,
364,
419,
950,
282,
15583,
299
],
[
14862,
365,
787,
1451,
4342,
370,
321,
1409,
23663,
257,
707,
857,
466,
341
],
[
14862,
370,
7970,
382,
257,
450,
4796,
1619,
309,
311,
257,
472,
12,
3766,
764,
14862,
293,
309,
20669,
787
],
[
2217,
2077,
457,
321,
645,
516,
281,
1500,
341,
293,
536,
498,
341,
307,
2074,
26927,
9615
],
[
309,
311,
406,
370,
341,
307,
264,
8607,
4831,
689,
264,
8607,
18009,
393,
1745,
281
],
[
1969,
341,
12058,
294,
341,
1389,
437,
291,
434,
2577,
307,
264,
4831,
337,
527,
1065,
12058,
294
],
[
264,
1389,
295,
11469,
291,
362,
732,
9003,
337,
20006,
20006,
293,
337,
1988
],
[
1969,
370,
2878,
300,
16967,
281,
341,
12905,
1553,
26643,
445,
2170
],
[
1969,
295,
341,
12058,
370,
264,
1558,
510,
390,
281,
915,
498,
309,
390,
1075,
281,
445,
2041
],
[
819,
22667,
293,
483,
2105,
281,
13419,
300,
366,
2950,
293,
1310,
483,
257
],
[
4831,
337,
1071,
954,
311,
12058,
1338,
370,
321,
2942,
819,
22667,
512,
295,
552
],
[
36587,
512,
295,
552,
4967,
293,
321,
1143,
527,
1065,
450,
4796,
311,
724,
8899,
322,
527,
1065
],
[
13307,
293,
550,
321,
3031,
281,
12477,
577,
341,
2105,
281,
341,
14862,
2732,
370
],
[
1936,
498,
264,
14862,
1128,
767,
13135,
550,
309,
311,
264,
7154,
2182,
17975,
1783
],
[
281,
257,
31828,
365,
3028,
406,
1352,
457,
294,
264,
1389,
264,
14862,
13135,
412,
512,
935,
294
],
[
565,
550,
309,
311,
2182,
17975,
4967,
281,
1071,
2132,
365,
257,
3100,
300,
291,
393,
536,
586
],
[
322,
2568,
291,
393,
536,
456,
311,
364,
262,
2777,
420,
5481,
7348,
300,
6123,
264,
14862,
264,
264
],
[
4195,
7348,
293,
611,
264,
7348,
295,
264,
1729,
4302,
1670,
257,
4195,
393,
362
],
[
3866,
4302,
4582,
281,
341,
3861,
293,
550,
456,
390,
257,
1150
],
[
2182,
621,
882,
1951,
341,
1399,
689,
291,
393,
536,
300,
264,
787,
551,
300
],
[
2962,
307,
264,
732,
294,
264,
2808,
295,
264,
3100,
412,
264,
917,
264,
5481,
787,
1278,
3145
],
[
420,
264,
14862,
1278,
3145,
498,
264,
4195,
14235,
264,
2572,
12905,
457,
294,
264,
14991,
291,
393
],
[
12729,
264,
1399,
293,
853,
281,
6063,
536,
498,
641,
4134,
490,
264,
7154
],
[
5112,
291,
498,
257,
14862,
307,
7363,
3620,
309,
575,
13135,
412,
512,
935,
294,
565,
498,
309,
311
],
[
4967,
3620,
456,
311,
1580,
767,
3806,
337,
291,
281,
1745,
281,
341,
14862
],
[
420,
498,
309,
575,
36587,
370,
307,
456,
257,
636,
281,
7463,
1125,
341,
30,
727,
364,
35871,
445
],
[
853,
281,
2464,
257,
5755,
281,
915,
4974,
4967,
22667,
293,
853,
281,
3917,
341
],
[
8607,
11081,
30,
731,
321,
2942,
819,
22667,
512,
295,
552,
36587,
512,
295
],
[
552,
4967,
293,
321,
767,
8246,
512,
2107,
12,
18217,
317,
22667,
293,
321,
2942,
257
],
[
5755,
281,
536,
498,
321,
727,
360,
341,
1461,
5030,
293,
294,
1186,
341,
2732
],
[
309,
311,
257,
2245,
291,
393,
767,
980,
365,
257,
5755,
498,
257,
14862,
307,
4967,
420,
406
],
[
370,
321,
8246,
341,
992,
295,
22667,
293,
550,
321,
17055,
727,
364,
35871,
1699,
337
],
[
577,
938,
281,
915,
364,
4967,
14862,
286,
914,
307,
309,
534,
3163,
309,
286,
914,
420,
576,
415
],
[
362,
281,
1699,
370,
938,
300,
309,
311,
406,
754,
3163,
264,
4630,
30,
731,
718,
311,
360,
512
],
[
5221,
718,
311,
1520,
341,
370,
309,
311,
257,
1451,
27011,
14862,
365,
5063,
293,
3547,
293
],
[
300,
576,
312,
926,
8652,
4342,
819,
4342,
293,
300,
576,
312
],
[
411,
502,
13,
21,
2459,
12178,
295,
22667,
281,
853,
370,
498,
321,
519,
466,
472
],
[
1150,
680,
14862,
281,
915,
552,
1310,
945,
1708,
337,
364,
35871,
281,
915,
257,
14862
],
[
7363,
293,
611,
264,
35871,
2203,
281,
2105,
341,
12905,
341,
14862,
949,
264
],
[
8607,
4975,
775,
370,
309,
1177,
380,
45447,
370,
309,
311,
1238,
709,
6179,
309,
311,
257
],
[
688,
295,
565,
370,
1310,
498,
321,
3073,
493,
257,
707,
857,
498,
321,
652,
512,
17769
],
[
510,
3553,
763,
294,
264,
13283,
558,
370,
510,
311,
257,
8177,
295,
3410,
300,
321,
5872
],
[
322,
1192,
295,
527,
1065,
22667,
293,
291,
393,
536,
322,
264,
2767,
558,
2568,
456,
311,
257
],
[
11076,
300,
311,
2614,
527,
5755,
300,
311,
8568,
337,
819,
22667,
293,
512
],
[
295,
552,
366,
2107,
12,
18217,
317,
512,
2357,
366,
7363,
498,
264,
14862,
307,
7363,
550,
309
],
[
9870,
493,
257,
777,
4421,
322,
264,
3670,
11185,
281,
428,
1411,
293,
498,
264,
5481,
309,
311
],
[
767,
4967,
550,
309,
14790,
257,
3636,
5766,
257,
4304,
1342,
10592,
281,
264,
35871,
370
],
[
300,
636,
264,
35871,
393,
458,
300,
257,
777,
4967,
14862,
575,
668,
1352,
293,
341
],
[
307,
1096,
538,
5127,
257,
33496,
10320,
281,
341,
3670,
11185,
300,
4045,
420,
10860
],
[
544,
9007,
10862,
281,
264,
15329,
5755,
300,
309,
311,
2614,
322,
264
],
[
2767,
558,
370,
341,
307,
257,
16575,
295,
1266,
2077,
295,
2614,
264,
5755,
293,
291
],
[
393,
536,
300,
294,
264,
917,
309,
1177,
380,
747,
938,
281,
915,
777,
22667,
341,
307,
264
],
[
4274,
300,
1890,
505,
281,
915,
4967,
22667,
293,
294,
341,
1389,
291,
393,
536,
264
],
[
35871,
575,
2105,
281,
264,
1969,
4831,
295,
341,
4302,
264,
11469,
4302,
293,
415
],
[
20717,
257,
777,
3636,
5766,
4304,
1342,
294,
702,
2593,
718,
796,
458,
300,
456,
311,
257
],
[
777,
3541,
5481,
4967,
293,
264,
3670,
11185,
370,
577,
393,
321,
2371,
4175
],
[
2212,
300,
613,
5759,
920,
362,
37633,
731,
700,
295,
439,
1066,
294
],
[
1575,
300,
341,
307,
257,
42826,
278,
22004,
370,
498,
291,
434,
1417,
466,
42826,
278,
500,
380
],
[
500,
380,
2073,
604,
5242,
420,
2145,
689,
661,
561,
393,
536,
428,
1851,
420,
512
],
[
1729,
39087,
300,
291,
362,
853,
281,
5042,
885,
40757,
807,
613
],
[
5242,
293,
2145,
611,
652,
988,
300,
291,
434,
406,
5414,
341,
8607,
22667
],
[
2950,
420,
14843,
294,
300,
291,
434,
1009,
5414,
552,
5766,
512,
7144,
7513
],
[
365,
264,
10226,
954,
652,
988,
611,
300,
291,
434,
47329,
281,
613
],
[
5821,
365,
257,
13861,
3796,
500,
380,
764,
428,
2973,
3796,
1884,
257,
777,
472
],
[
4682,
337,
613,
5821,
293,
611,
652,
988,
281,
3625,
264,
6792
],
[
9205,
281,
3625,
264,
26531,
281,
439,
295,
613,
37633,
731,
293,
295
],
[
1164,
652,
988,
291,
434,
1228,
257,
7144,
3209,
1339,
291,
862,
365,
613,
13753
],
[
293,
754,
498,
309,
311,
1944,
652,
988,
5079,
307,
926,
293,
611,
291,
393,
1009
],
[
3329,
512,
10229,
466,
264,
12058,
293,
536,
498,
456,
366,
1217,
512,
3825
],
[
2663,
6572,
420,
456,
307,
604,
3825,
3131,
6572,
293,
1564,
291,
4536,
281
],
[
281,
2256,
257,
12058,
420,
1564,
291,
362,
8614,
257,
12058,
1767,
1401,
2115,
293,
4487
],
[
949,
1228,
309,
293,
309,
311,
611,
257,
665,
3124,
281,
5484,
264,
3861
],
[
949,
6382,
264,
12058,
370,
291,
393,
1520,
264,
3861,
536,
597,
11745,
1088
],
[
309,
575,
293,
577,
309,
1985,
293,
1310,
2041,
420,
2132,
257,
707,
857,
466,
597
],
[
1589,
307,
3365,
291,
293,
577,
309,
486,
293,
1884,
420,
2371,
300,
1589
],
[
370,
731,
300,
311,
439,
457,
437,
2314,
498,
291,
1217,
362,
257,
12058,
437,
466,
439
],
[
613,
561,
300,
1217,
4243,
257,
12058,
293,
586,
366,
886,
5338,
281,
764,
309,
731
],
[
1604,
309,
311,
611,
257,
869,
12058,
337,
428,
3000,
1309,
291,
588,
709,
337,
4764
],
[
50364,
281,
527,
751,
51362
]
]
} | {
"frames": [
[
0,
863
],
[
864,
3383
],
[
3384,
4391
],
[
4392,
5531
],
[
5532,
6251
],
[
6252,
8651
],
[
8652,
10679
],
[
10680,
11147
],
[
11148,
11735
],
[
11736,
14387
],
[
14388,
15803
],
[
15804,
16247
],
[
16248,
17735
],
[
17736,
18431
],
[
18432,
19271
],
[
19272,
20567
],
[
20568,
21119
],
[
21120,
21167
],
[
21168,
21635
],
[
21636,
22211
],
[
22212,
22979
],
[
22980,
23315
],
[
23316,
24371
],
[
24372,
24455
],
[
24456,
25175
],
[
25176,
26111
],
[
26112,
27047
],
[
27048,
27203
],
[
27204,
27923
],
[
27924,
28739
],
[
28740,
29291
],
[
29292,
29723
],
[
29724,
30683
],
[
30684,
31127
],
[
31128,
33503
],
[
33504,
33899
],
[
33900,
35027
],
[
35028,
35255
],
[
35256,
35327
],
[
35328,
35387
],
[
35388,
35471
],
[
35472,
35627
],
[
35628,
35711
],
[
35712,
36311
],
[
36312,
37067
],
[
37068,
37307
],
[
37308,
37655
],
[
37656,
40019
],
[
40020,
40739
],
[
40740,
41987
],
[
41988,
43115
],
[
43116,
44099
],
[
44100,
44891
],
[
44892,
46151
],
[
46152,
47579
],
[
47580,
47627
],
[
47628,
47939
],
[
47940,
50171
],
[
50172,
50891
],
[
50892,
52223
],
[
52224,
52355
],
[
52356,
52595
],
[
52596,
52871
],
[
52872,
53135
],
[
53136,
53195
],
[
53196,
53291
],
[
53292,
53447
],
[
53448,
53567
],
[
53568,
54335
],
[
54336,
57479
],
[
57480,
57587
],
[
57588,
57657
]
],
"slide": [
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_0_863.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_864_3383.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_3384_4391.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_4392_5531.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_5532_6251.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_6252_8651.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_8652_10679.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_10680_11147.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_11148_11735.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_11736_14387.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_14388_15803.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_15804_16247.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_16248_17735.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_17736_18431.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_18432_19271.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_19272_20567.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_20568_21119.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_21120_21167.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_21168_21635.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_21636_22211.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_22212_22979.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_22980_23315.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_23316_24371.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_24372_24455.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_24456_25175.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_25176_26111.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_26112_27047.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_27048_27203.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_27204_27923.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_27924_28739.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_28740_29291.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_29292_29723.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_29724_30683.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_30684_31127.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_31128_33503.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_33504_33899.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_33900_35027.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35028_35255.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35256_35327.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35328_35387.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35388_35471.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35472_35627.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35628_35711.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_35712_36311.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_36312_37067.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_37068_37307.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_37308_37655.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_37656_40019.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_40020_40739.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_40740_41987.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_41988_43115.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_43116_44099.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_44100_44891.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_44892_46151.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_46152_47579.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_47580_47627.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_47628_47939.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_47940_50171.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_50172_50891.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_50892_52223.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_52224_52355.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_52356_52595.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_52596_52871.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_52872_53135.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_53136_53195.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_53196_53291.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_53292_53447.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_53448_53567.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_53568_54335.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_54336_57479.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_57480_57587.png",
"DEF_CON_Safe_Mode_IoT_Village_-_Denise_Bilic__Cecilia_Pastorino_-_VulnerabilitiesinSmart_SexToys_57588_57657.png"
],
"timestamp": [
[
0,
34.560001373291016
],
[
34.560001373291016,
135.36000061035156
],
[
135.36000061035156,
175.67999267578125
],
[
175.67999267578125,
221.27999877929688
],
[
221.27999877929688,
250.0800018310547
],
[
250.0800018310547,
346.0799865722656
],
[
346.0799865722656,
427.20001220703125
],
[
427.20001220703125,
445.9200134277344
],
[
445.9200134277344,
469.44000244140625
],
[
469.44000244140625,
575.52001953125
],
[
575.52001953125,
632.1599731445312
],
[
632.1599731445312,
649.9199829101562
],
[
649.9199829101562,
709.4400024414062
],
[
709.4400024414062,
737.280029296875
],
[
737.280029296875,
770.8800048828125
],
[
770.8800048828125,
822.719970703125
],
[
822.719970703125,
844.7999877929688
],
[
844.7999877929688,
846.719970703125
],
[
846.719970703125,
865.4400024414062
],
[
865.4400024414062,
888.47998046875
],
[
888.47998046875,
919.2000122070312
],
[
919.2000122070312,
932.6400146484375
],
[
932.6400146484375,
974.8800048828125
],
[
974.8800048828125,
978.239990234375
],
[
978.239990234375,
1007.0399780273438
],
[
1007.0399780273438,
1044.47998046875
],
[
1044.47998046875,
1081.9200439453125
],
[
1081.9200439453125,
1088.1600341796875
],
[
1088.1600341796875,
1116.9599609375
],
[
1116.9599609375,
1149.5999755859375
],
[
1149.5999755859375,
1171.6800537109375
],
[
1171.6800537109375,
1188.9599609375
],
[
1188.9599609375,
1227.3599853515625
],
[
1227.3599853515625,
1245.1199951171875
],
[
1245.1199951171875,
1340.1600341796875
],
[
1340.1600341796875,
1356
],
[
1356,
1401.1199951171875
],
[
1401.1199951171875,
1410.239990234375
],
[
1410.239990234375,
1413.1199951171875
],
[
1413.1199951171875,
1415.52001953125
],
[
1415.52001953125,
1418.8800048828125
],
[
1418.8800048828125,
1425.1199951171875
],
[
1425.1199951171875,
1428.47998046875
],
[
1428.47998046875,
1452.47998046875
],
[
1452.47998046875,
1482.719970703125
],
[
1482.719970703125,
1492.3199462890625
],
[
1492.3199462890625,
1506.239990234375
],
[
1506.239990234375,
1600.800048828125
],
[
1600.800048828125,
1629.5999755859375
],
[
1629.5999755859375,
1679.52001953125
],
[
1679.52001953125,
1724.6400146484375
],
[
1724.6400146484375,
1764
],
[
1764,
1795.6800537109375
],
[
1795.6800537109375,
1846.0799560546875
],
[
1846.0799560546875,
1903.199951171875
],
[
1903.199951171875,
1905.1199951171875
],
[
1905.1199951171875,
1917.5999755859375
],
[
1917.5999755859375,
2006.8800048828125
],
[
2006.8800048828125,
2035.6800537109375
],
[
2035.6800537109375,
2088.9599609375
],
[
2088.9599609375,
2094.239990234375
],
[
2094.239990234375,
2103.840087890625
],
[
2103.840087890625,
2114.8798828125
],
[
2114.8798828125,
2125.43994140625
],
[
2125.43994140625,
2127.840087890625
],
[
2127.840087890625,
2131.679931640625
],
[
2131.679931640625,
2137.919921875
],
[
2137.919921875,
2142.719970703125
],
[
2142.719970703125,
2173.43994140625
],
[
2173.43994140625,
2299.199951171875
],
[
2299.199951171875,
2303.52001953125
],
[
2303.52001953125,
2306.320068359375
]
]
} | en | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] |
10.5446/33775 (DOI) | Python and Angular, a perfect match? | https://av.tib.eu/media/33775 | https://tib.flowcenter.de/mfc/medialink/3/dec75062bea25724d9e4f8ca11ef305ece477246c05b2f3c3c802f188ad9bc018a/Oliver_Braun_-_Python_and_Angular__a_perfect_match__dVmFKXm3b0c.mp4 | "CC Attribution - NonCommercial - ShareAlike 3.0 Unported:\nYou are free to use, adapt and copy, dis(...TRUNCATED) | Computer Science | Conference/Talk | 2017 | Braun, Oliver | null | "Python and Angular, a perfect match? Python on mobile devices is still negligible mostly because of(...TRUNCATED) | " Good afternoon, ladies and gentlemen. Hello everybody, thanks for attending this talk. I am going (...TRUNCATED) | {"avg_logprob":[-0.2382936030626297,-0.2382936030626297,-0.2382936030626297,-0.2382936030626297,-0.2(...TRUNCATED) | {"frames":[[0,5963],[5964,6503],[6504,17531],[17532,33395],[33396,33803],[33804,33899],[33900,33947](...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAGACAIAAABUQk3oAACMLUlEQVR4nO29B5gcx3XgX1WdpidvxCLnHAiQYM5RD(...TRUNCATED) |
10.5446/20239 (DOI) | Function field analogues of compactifications of period domains | https://av.tib.eu/media/20239 | https://tib.flowcenter.de/mfc/medialink/3/de89eb5de4151bedab2c328f96de82670580861f3fc1aa46793673331b55aee870/Kazuya_Kato_-_Function_field_analogues_of_compactifications_of_period_domains.mp4 | "CC Attribution 3.0 Unported:\nYou are free to use, adapt and copy, distribute and transmit the work(...TRUNCATED) | Mathematics | Conference/Talk | 2015 | Kato, Kazuya | Abbes, A. (Organizer)
Illusie, L. (Organizer) | "For a function field in one variable over a finite field, we will consider analogues of compactific(...TRUNCATED) | " Thank you very much. I am thankful to the organizers for the invitation. And I am very happy to ta(...TRUNCATED) | {"avg_logprob":[-0.39384111762046814,-0.39384111762046814,-0.39384111762046814,-0.34555336833000183,(...TRUNCATED) | {"frames":[[0,851],[852,6599],[6600,12287],[12288,12959],[12960,16091],[16092,16331],[16332,21155],[(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAEAAElEQVR4nOz9+bMsW3YehuUeMrOqznTHN/d73a9fv(...TRUNCATED) |
10.5446/40322 (DOI) | Spoilers and Counter-Spoilers | https://av.tib.eu/media/40322 | https://tib.flowcenter.de/mfc/medialink/3/de2406583bb2e2909607f7d7a99d41b7fcba7a0aa989efa971c070b945feecfa92/Spoiling_and_Counter-spoiling_x-aLE5kz0PU_2.mp4 | "CC Attribution 2.0 Belgium:\nYou are free to use, adapt and copy, distribute and transmit the work (...TRUNCATED) | Computer Science | Conference/Talk | 2014 | Bernardini, Riccardo | null | "Organizing quality software competitions In this talk we describe an approach for organizing progra(...TRUNCATED) | " Thank you. Good afternoon to everyone. I am Ricardo Bernardini. I work at the University of Udine (...TRUNCATED) | {"avg_logprob":[-0.2662702798843384,-0.2662702798843384,-0.2662702798843384,-0.2662702798843384,-0.2(...TRUNCATED) | {"frames":[[0,59],[60,4523],[4524,5063],[5064,5843],[5844,7247],[7248,7955],[7956,8723],[8724,9707],(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAGACAIAAABUQk3oAAEAAElEQVR4nOz9CZMcx5EuiuZWSy/YSIojzVyzY3b//(...TRUNCATED) |
10.5446/36328 (DOI) | Working together to keep the Internet safe and secure | https://av.tib.eu/media/36328 | https://tib.flowcenter.de/mfc/medialink/3/de05e2223a94e7fa1c276da9a1beb88e2f72a0030c2278b2dd17b8f6fea81e2053/DEF_CON_23_-_Alejandro_Mayorkas_-_Working_together_to_keep_the_Internet_safe_and_secure_u6dHxhPXcNM.mp4 | "CC Attribution 3.0 Unported:\nYou are free to use, adapt and copy, distribute and transmit the work(...TRUNCATED) | Computer Science | Conference/Talk | 2015 | Mayorkas, Alejandro | null | "Working together to keep the Internet safe and secure Alejandro Mayorkas Deputy Secretary of Homela(...TRUNCATED) | " Welcome to DEF CON 23. I'm Russ. I am the chief of operations for the conference. I've been here f(...TRUNCATED) | {"avg_logprob":[-0.22960923612117767,-0.22960923612117767,-0.22960923612117767,-0.22960923612117767,(...TRUNCATED) | {"frames":[[0,2987],[2988,5819],[5820,5963],[5964,6323],[6324,6623],[6624,6803],[6804,7355],[7356,74(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAEAAElEQVR4nOz9aZMkyZElCMqlqmbm7uEe95UZGXkig(...TRUNCATED) |
10.5446/47589 (DOI) | De l'Une à l'Autre: Towards Linked Data in Special Collections Cataloging | https://av.tib.eu/media/47589 | https://tib.flowcenter.de/mfc/medialink/3/de72571efe517df02f9ba01a5701c17bee92e183cb26277789cf5526a0a179498e/De_l_Une_a_l_Autre__Towards_Linked_Data_in_Special_izrmju4kHBo.mp4 | "CC Attribution - ShareAlike 3.0 Unported:\nYou are free to use, adapt and copy, distribute and tran(...TRUNCATED) | Information Science | Conference/Talk | 2017 | Heberlein, Regine
Bell, Joyce
Santarelli, Lidia
Baxmeyer, Jennifer
Green, Peter | null | "A member of the Mellon-funded Linked Data for Production (LD4P) initiative, LD4P at Princeton is pa(...TRUNCATED) | " Good morning. My name is Regina Heberlein. I'm a metadata specialist in the Department of Special (...TRUNCATED) | {"avg_logprob":[-0.17591293156147003,-0.17591293156147003,-0.17591293156147003,-0.17591293156147003,(...TRUNCATED) | {"frames":[[0,287],[288,347],[348,683],[684,9083],[9084,9371],[9372,18239],[18240,20867],[20868,2093(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAEAAElEQVR4nOz96ZIl2ZEeCNpudhdfw2NJZCKBAqqAW(...TRUNCATED) |
10.5446/15510 (DOI) | An Open Source Analysis Toolbox For Street Network Comparison | https://av.tib.eu/media/15510 | https://tib.flowcenter.de/mfc/medialink/3/de4b56fbebf8ecd5aac10fdf7d4fdec434dfff7f921973df515c30599ff9f098b545/Analysis_Toolbox_For_Street_Network_Comparison__OSM_vs_the_Official_Austrian_Reference_Graph__720p__2..mp4 | "CC Attribution - NonCommercial - ShareAlike 3.0 Unported:\nYou are free to use, adapt and copy, dis(...TRUNCATED) | Computer Science | Conference/Talk | 2013 | "Graser, Anita (QGIS team, AIT Austrian Institute of Technology)\nStraub, Markus (Austrian Institute(...TRUNCATED) | null | "This paper presents a novel open source toolbox for street network comparison based on the Sextante(...TRUNCATED) | " Well, thanks a lot. Hi, so my name is Anita Grasser. It's a pleasure being able to present here in(...TRUNCATED) | {"avg_logprob":[-0.2278939187526703,-0.2278939187526703,-0.2278939187526703,-0.2278939187526703,-0.2(...TRUNCATED) | {"frames":[[0,1475],[1476,3335],[3336,5339],[5340,6431],[6432,7271],[7272,8819],[8820,10163],[10164,(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAD8hklEQVR4nOz9B5gcx5UmioZLU66rvfcOQMN7DxIk6(...TRUNCATED) |
10.5446/15503 (DOI) | A New Dimension To PostGIS : 3D | https://av.tib.eu/media/15503 | https://tib.flowcenter.de/mfc/medialink/3/dee254c0a36c692f0b5995c5b0537ac58c88fbd483954a6c10fbd11b0e62f0bd97/A_New_Dimension_To_PostGIS___3D__480p_.mp4 | "CC Attribution - ShareAlike 3.0 Unported:\nYou are free to use, adapt and copy, distribute and tran(...TRUNCATED) | Computer Science | Conference/Talk | 2013 | Olivier, Courtin (Oslandia)
Hugo, Mercier (Oslandia) | null | "Talking about 3D used to sound cool. Used to. But for real GIS use, we really need more than just p(...TRUNCATED) | " Thanks. So this presentation is about post-JIS 3D and also quantum JIS 3D display solution. So the(...TRUNCATED) | {"avg_logprob":[-0.30448174476623535,-0.30448174476623535,-0.3817412257194519,-0.3817412257194519,-0(...TRUNCATED) | {"frames":[[0,3215],[3216,3335],[3336,8891],[8892,10823],[10824,12203],[12204,12455],[12456,13427],[(...TRUNCATED) | en | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] |
10.5446/39847 (DOI) | CAR HACKING VILLAGE - CAN Signal Extraction from OpenXC with Radare2 | https://av.tib.eu/media/39847 | https://tib.flowcenter.de/mfc/medialink/3/de64792d0f3698ea2289abd98a7af75fbc48ef6d0d09a0752205fe50c24a43d3ae/DEF_CON_26_CAR_HACKING_VILLAGE_-_Ben_Gardiner_-_CAN_Signal_Extraction_from_OpenXC_with_Radare2_Uoevu.mp4 | "CC Attribution 3.0 Unported:\nYou are free to use, adapt and copy, distribute and transmit the work(...TRUNCATED) | Computer Science | Conference/Talk | 2018 | Gardiner, Ben | null | "OpenXC builds its firmware - for both the open and proprietary builds - using JSON data structures (...TRUNCATED) | " So I'm going to be talking to you about uh, Radare 2. It has a lot of pronunciations. Uh, people t(...TRUNCATED) | {"avg_logprob":[-0.2115614116191864,-0.2115614116191864,-0.2115614116191864,-0.2115614116191864,-0.2(...TRUNCATED) | {"frames":[[0,3275],[3276,4739],[4740,5147],[5148,7259],[7260,7991],[7992,8711],[8712,9263],[9264,98(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAEAAElEQVR4nNT96a8tW5InCPm495nu9IaIjKisysrsQ(...TRUNCATED) |
10.5446/51484 (DOI) | The Cultural Anthropology of Stack Exchange | https://av.tib.eu/media/51484 | https://tib.flowcenter.de/mfc/medialink/3/de2d5af1f1cbe3edeeb26606d134346f50942623a777bbba71fbb2b1724445863c/Opening_and_Keynote_-_Joel_Spolsky_-_The_Science_of_Communities_Behind_Software-68200924.mp4 | "CC Attribution - NonCommercial - ShareAlike 3.0 Unported:\nYou are free to use, adapt and copy, dis(...TRUNCATED) | Computer Science | Conference/Talk | 2013 | Spolsky, Joel | null | "Joel Spolsky is an expert on software development, co–founder of Fog Creek Software, and the co(...TRUNCATED) | " Thanks. Thank you. Let's see if, oh look, it came up. Good. I'm going to talk a little bit about S(...TRUNCATED) | {"avg_logprob":[-0.22099441289901733,-0.22099441289901733,-0.22099441289901733,-0.14770853519439697,(...TRUNCATED) | {"frames":[[0,59],[60,107],[108,155],[156,203],[204,2051],[2052,2951],[2952,3323],[3324,3539],[3540,(...TRUNCATED) | en | [{"bytes":"iVBORw0KGgoAAAANSUhEUgAAAgAAAAEgCAIAAABNXlwGAAEAAElEQVR4nOz9B5wcV5U2jN9YVR2mJ49yluWcZdlyw(...TRUNCATED) |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
- Downloads last month
- 14