taler-www

Main taler.net website
Log | Files | Refs | Submodules | README | LICENSE

2024-14.html.j2 (4641B)


      1 {% extends "common/news.j2" %}
      2 {% block body_content %}
      3 
      4 <h1>2024-08: &quot;Privacy, Identity and Payment in the Next Generation Internet at BFH: Innovation Tour Point Zero Forum&quot;</h1>
      5 <p>
      6 On the occasion of the Point Zero Forum's Innovation Tour, we have showcased
      7 the privacy-preserving GNU Taler payment system along with its various
      8 applications and extensions – as well as other payment- and digital identity
      9 related projects – that are currently being developed at the Bern University
     10 of Applied Sciences and its international partners as part of the NGI TALER EU
     11 project.  This page includes recordings of the main talks. In the near future,
     12 we will also post interviews made with some of the poster presenters (sadly,
     13 only about half of the people could be interviewed due to time constraints).
     14 </p>
     15 <h2>Welcome talk (Peter Brunner, Head of research at BFH-TI)</h2>
     16 <p>
     17 <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
     18     <source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" />
     19 </video>
     20 </p>
     21 
     22 <h2>NGI TALER: Payments with Informational Self-Determination for the Next Generation Internet
     23 (Christian Grothoff, Professor at the BFH-TI)</h2>
     24 <p>
     25 NGI TALER is a consortium dedicated to launching and promoting the GNU Taler
     26 payment system in Europe. GNU Taler is a Free Software implementation of a
     27 self-custody digital cash payment system with strict privacy protections for
     28 payers and equally strict transparency and accountability for payees. The talk
     29 gives a brief overview of the technology and the direction of the project.
     30 </p>
     31 <p>
     32 <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
     33     <source src="/videos/2024_07_point_zero_forum_christian_grothoff.mp4" type="video/mp4" />
     34 </video>
     35 </p>
     36 <p>
     37 <a href="/presentations/pzf-2024.pdf">⭳Slides (PDF)⭳</a></li>
     38 </p>
     39 
     40 <h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at BFH-TI)</h2>
     41 <p>
     42 Hardware protected confirmation empowers user’s sole control over confirmation
     43 actions in digital space - even on a compromised devices.  It can be applied
     44 to a wide range of security critical operations such as “authentication”,
     45 “authentication with linking” (PSD2), “transaction confirmation” (e.g. EMV
     46 “3DS confirmation”), “shareholder voting”, “medical device steering”, “access
     47 un-locking”, “electronic signing” and many more. In addition, Protected
     48 Confirmation is becoming critical for multi-purpose authentication mechanisms
     49 such as the EUDI wallet and the Swiss EID planned for 2026.  Hardware
     50 protected confirmation was successfully piloted within the UBS e-banking in
     51 2023.
     52 </p>
     53 <p>
     54 <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
     55     <source src="/videos/2024_07_point_zero_forum_benjamin_fehrensen.mp4" type="video/mp4" />
     56 </video>
     57 </p>
     58 <p>
     59 <a href="/presentations/pzf-ben-2024.pdf">⭳Slides (PDF)⭳</a></li>
     60 </p>
     61 
     62 <h2>Demonstration: Limits of Hardware Key Protection  (Andreas Habegger, Professor at BFH-TI and Kevin Schrag, Master Student at BFH-TI)</h2>
     63 
     64 <p>
     65 Advancements in hardware forensics and hacking pose significant challenges to
     66 Hardware Security Modules (HSMs). Techniques including side-channel attacks,
     67 fault injection, and physical manipulation of electronic devices are
     68 increasingly effective in extracting or inferring secrets safeguarded by
     69 certified HSMs, albeit often resulting in device destruction. While these
     70 methods historically demanded costly and specialized tools, they are gradually
     71 becoming more accessible to a wider audience. This video presents the cat
     72 and mouse game of making and breaking hardware security.
     73 </p>
     74 <p>
     75 <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
     76     <source src="/videos/2024_07_point_zero_forum_andreas_habegger.mp4" type="video/mp4" />
     77 </video>
     78 </p>
     79 <p>
     80 <a href="/presentations/pzf-andreas-2024.pdf">⭳Slides (PDF)⭳</a></li>
     81 </p>
     82 
     83 <h2>Protect our financial freedom! (Patrick Breyer, Member of the European Parliament)</h2>
     84 
     85 <p>
     86 Crypto regulation must respect the right to anonymity. The digital euro is a
     87 problem and not the solution. Cash protects our financial freedom and limits
     88 on anonymous cash payments endanger it.
     89 </p>
     90 <p>
     91 <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
     92     <source src="/videos/2024_07_point_zero_forum_patrick_breyer.mp4" type="video/mp4" />
     93 </video>
     94 </p>
     95 {% endblock body_content %}