taler-www

Main taler.net website
Log | Files | Refs | Submodules | README | LICENSE

commit 35e218207d2bc2e7a4ced1066d33283253693e4c
parent 85e02e17202fc34d8a02c66a4e51310fc9e7ccfa
Author: Christian Grothoff <christian@grothoff.org>
Date:   Mon, 15 Jul 2024 19:28:27 +0200

add more descriptions

Diffstat:
Mtemplate/news/2024-14.html.j2 | 57+++++++++++++++++++++++++++++++++++++++++++++------------
1 file changed, 45 insertions(+), 12 deletions(-)

diff --git a/template/news/2024-14.html.j2 b/template/news/2024-14.html.j2 @@ -3,7 +3,7 @@ <h1>2024-14: &quot;Privacy, Identity and Payment in the Next Generation Internet at BFH: Innovation Tour Point Zero Forum &quot;</h1> <p> -On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project. +On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project. </p> <h2>Welcome talk by Peter Brunner Head of research at the BFH-TI</h2> <p> @@ -11,40 +11,73 @@ On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the <source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" /> </video> </p> + <h2>NGI TALER: Payments with Informational Self-Determination for the Next Generation Internet -(Christian Grothoff Professor at the BFH-TI)</h2> +(Christian Grothoff, Professor at the BFH-TI)</h2> <p> +NGI TALER is a consortium dedicated to launching and promoting the GNU Taler +payment system in Europe. GNU Taler is a Free Software implementation of a +self-custody digital cash payment system with strict privacy protections for +payers and equally strict transparency and accountability for payees. The talk +gives a brief overview of the technology and the direction of the project. +</p> <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls"> <source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" /> </video> -</p> -<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen Professor at the BFH-TI)</h2> + +<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at the BFH-TI)</h2> <p> +Hardware protected confirmation empowers user’s sole control over confirmation +actions in digital space - even on a compromised devices. It can be applied +to a wide range of security critical operations such as “authentication”, +“authentication with linking” (PSD2), “transaction confirmation” (e.g. EMV +“3DS confirmation”), “shareholder voting”, “medical device steering”, “access +un-locking”, “electronic signing” and many more. In addition, Protected +Confirmation is becoming critical for multi-purpose authentication mechanisms +such as the EUDI wallet and the Swiss EID planned for 2026. Hardware +protected confirmation was successfully piloted within the UBS e-banking in +2023. +</p> <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls"> <source src="/videos/2024_07_point_zero_forum_benjamin_fehrensen.mp4" type="video/mp4" /> </video> -</p> -<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger Professor at the BFH-TI and Kevin Schrag Master Student at the BFH-TI)</h2> + +<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at the BFH-TI and Kevin Schrag, Master Student at the BFH-TI)</h2> + <p> +Advancements in hardware forensics and hacking pose significant challenges to +Hardware Security Modules (HSMs). Techniques including side-channel attacks, +fault injection, and physical manipulation of electronic devices are +increasingly effective in extracting or inferring secrets safeguarded by +certified HSMs, albeit often resulting in device destruction. While these +methods historically demanded costly and specialized tools, they are gradually +becoming more accessible to a wider audience. This video presents the cat +and mouse game of making and breaking hardware security. +</p> + <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls"> <source src="/videos/2024_07_point_zero_forum_andreas_habegger.mp4" type="video/mp4" /> </video> </p> -<h2>Protect our financial freedom! (Patrick Breyer, Member of the European Parliament)</h2> +<h2>Protect our financial freedom! (Patrick Breyer, Member of the European Parliament)</h2> + <p> +Crypto regulation must respect the right to anonymity. The digital euro is a +problem and not the solution. Cash protects our financial freedom and limits +on anonymous cash payments endanger it. +</p> + <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls"> <source src="/videos/2024_07_point_zero_forum_patrick_breyer.mp4" type="video/mp4" /> </video> -</p> -<!-- TO DO : Find the PDF's of the presentations and add the links. ------ <h2>Links</h2> <ul> -<li><a href="">Presentation Peter Brunner</a></li> -<li><a href="">Presentation Chrsitian Grothoff</a></li> +<li><a href="/presentations/pzf-2024.pdf">Slides for presentation by Christian Grothoff</a></li> +<!-- TO DO : Find the PDF's of the presentations and add the links. ------ <li><a href="">Presentation Benjamin Fehrensen</a></li> <li><a href="">Presentation Andreas Habegger</a></li> -</ul> --> +</ul> {% endblock body_content %}