YoVDO

Horcrux Encrypted Messaging

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Encryption Courses Surveillance Courses Threat Models Courses Secure Messaging Courses

Course Description

Overview

Explore the concept of Horcrux Encrypted Messaging in this 16-minute conference talk from media.ccc.de. Delve into a novel approach to secure communication that leverages adversarial nation-states to protect against encryption breaking, device hacking, and dragnet surveillance. Learn about the design, visualization, and potential applications of this encryption method, including the intriguing Magic Wand concept. Examine the threat models and potential failure points of Horcrux Encrypted Messaging, gaining insights into cutting-edge techniques for safeguarding sensitive information in an era of pervasive digital surveillance.

Syllabus

Intro
What is Horcrux
Design
Secret
Visualization
Other Uses
Magic Wand
Magic Wand App
Threat Models
How it could fail


Taught by

media.ccc.de

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera