commit 35e218207d2bc2e7a4ced1066d33283253693e4c
parent 85e02e17202fc34d8a02c66a4e51310fc9e7ccfa
Author: Christian Grothoff <christian@grothoff.org>
Date: Mon, 15 Jul 2024 19:28:27 +0200
add more descriptions
Diffstat:
1 file changed, 45 insertions(+), 12 deletions(-)
diff --git a/template/news/2024-14.html.j2 b/template/news/2024-14.html.j2
@@ -3,7 +3,7 @@
<h1>2024-14: "Privacy, Identity and Payment in the Next Generation Internet at BFH: Innovation Tour Point Zero Forum "</h1>
<p>
-On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project.
+On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project.
</p>
<h2>Welcome talk by Peter Brunner Head of research at the BFH-TI</h2>
<p>
@@ -11,40 +11,73 @@ On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the
<source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" />
</video>
</p>
+
<h2>NGI TALER: Payments with Informational Self-Determination for the Next Generation Internet
-(Christian Grothoff Professor at the BFH-TI)</h2>
+(Christian Grothoff, Professor at the BFH-TI)</h2>
<p>
+NGI TALER is a consortium dedicated to launching and promoting the GNU Taler
+payment system in Europe. GNU Taler is a Free Software implementation of a
+self-custody digital cash payment system with strict privacy protections for
+payers and equally strict transparency and accountability for payees. The talk
+gives a brief overview of the technology and the direction of the project.
+</p>
<video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
<source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" />
</video>
-</p>
-<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen Professor at the BFH-TI)</h2>
+
+<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at the BFH-TI)</h2>
<p>
+Hardware protected confirmation empowers user’s sole control over confirmation
+actions in digital space - even on a compromised devices. It can be applied
+to a wide range of security critical operations such as “authentication”,
+“authentication with linking” (PSD2), “transaction confirmation” (e.g. EMV
+“3DS confirmation”), “shareholder voting”, “medical device steering”, “access
+un-locking”, “electronic signing” and many more. In addition, Protected
+Confirmation is becoming critical for multi-purpose authentication mechanisms
+such as the EUDI wallet and the Swiss EID planned for 2026. Hardware
+protected confirmation was successfully piloted within the UBS e-banking in
+2023.
+</p>
<video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
<source src="/videos/2024_07_point_zero_forum_benjamin_fehrensen.mp4" type="video/mp4" />
</video>
-</p>
-<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger Professor at the BFH-TI and Kevin Schrag Master Student at the BFH-TI)</h2>
+
+<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at the BFH-TI and Kevin Schrag, Master Student at the BFH-TI)</h2>
+
<p>
+Advancements in hardware forensics and hacking pose significant challenges to
+Hardware Security Modules (HSMs). Techniques including side-channel attacks,
+fault injection, and physical manipulation of electronic devices are
+increasingly effective in extracting or inferring secrets safeguarded by
+certified HSMs, albeit often resulting in device destruction. While these
+methods historically demanded costly and specialized tools, they are gradually
+becoming more accessible to a wider audience. This video presents the cat
+and mouse game of making and breaking hardware security.
+</p>
+
<video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
<source src="/videos/2024_07_point_zero_forum_andreas_habegger.mp4" type="video/mp4" />
</video>
</p>
-<h2>Protect our financial freedom! (Patrick Breyer, Member of the European Parliament)</h2>
+<h2>Protect our financial freedom! (Patrick Breyer, Member of the European Parliament)</h2>
+
<p>
+Crypto regulation must respect the right to anonymity. The digital euro is a
+problem and not the solution. Cash protects our financial freedom and limits
+on anonymous cash payments endanger it.
+</p>
+
<video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
<source src="/videos/2024_07_point_zero_forum_patrick_breyer.mp4" type="video/mp4" />
</video>
-</p>
-<!-- TO DO : Find the PDF's of the presentations and add the links. ------
<h2>Links</h2>
<ul>
-<li><a href="">Presentation Peter Brunner</a></li>
-<li><a href="">Presentation Chrsitian Grothoff</a></li>
+<li><a href="/presentations/pzf-2024.pdf">Slides for presentation by Christian Grothoff</a></li>
+<!-- TO DO : Find the PDF's of the presentations and add the links. ------
<li><a href="">Presentation Benjamin Fehrensen</a></li>
<li><a href="">Presentation Andreas Habegger</a></li>
-</ul>
-->
+</ul>
{% endblock body_content %}