{"version":"1.2.0","chapters":[{"startTime":0,"title":"Intro"},{"startTime":41.691000000000003,"title":"Prixit"},{"startTime":691.04600000000005,"title":"Podcastgeschichte wird gemacht"},{"startTime":1091.3430000000001,"title":"Feedback: Jiff und Kicks"},{"startTime":1254.9559999999999,"title":"Wahlen in Bayern"},{"startTime":1948.539,"title":"Cyberwar: Motivation zum Thema"},{"startTime":2326.904,"title":"Cyberwar: Begriffsdefinition"},{"startTime":3195.3690000000001,"title":"Cyberwar: Security Nightmares"},{"startTime":3822.7150000000001,"title":"Cyberwar: Urknall Stuxnet"},{"startTime":4875.7920000000004,"title":"Cyberwar: Defensivstrategien: Nicht-Angriffspakte"},{"startTime":5894.4690000000001,"title":"Cyberwar: Defensivstrategien: Softwarequalit\u00e4t und Bildung"},{"startTime":6644.3360000000002,"title":"Cyberwar: Angriff auf Gef\u00fchl und Gedanken"},{"startTime":7203.5870000000004,"title":"Epilog"}]}