Horcrux Encrypted Messaging
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore the concept of Horcrux Encrypted Messaging in this 16-minute conference talk from media.ccc.de. Delve into a novel approach to secure communication that leverages adversarial nation-states to protect against encryption breaking, device hacking, and dragnet surveillance. Learn about the design, visualization, and potential applications of this encryption method, including the intriguing Magic Wand concept. Examine the threat models and potential failure points of Horcrux Encrypted Messaging, gaining insights into cutting-edge techniques for safeguarding sensitive information in an era of pervasive digital surveillance.
Syllabus
Intro
What is Horcrux
Design
Secret
Visualization
Other Uses
Magic Wand
Magic Wand App
Threat Models
How it could fail
Taught by
media.ccc.de
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube