{"version":"1.2.0","chapters":[{"startTime":0,"title":"Intro"},{"startTime":29.827999999999999,"title":"Prolog"},{"startTime":563.26599999999996,"title":"Edathy"},{"startTime":1860.4690000000001,"title":"Netzneutralit\u00e4t"},{"startTime":2329.6039999999998,"title":"Vorratsdatenspeicherung"},{"startTime":3075.1350000000002,"title":"Internetzensur in der T\u00fcrkei"},{"startTime":3423.6199999999999,"title":"Schengen-Security"},{"startTime":3731.078,"title":"Ernst machen mit dem Leistungsschutzrecht"},{"startTime":3944.1559999999999,"title":"Epilog"}]}