Look for any podcast host, guest or anyone
Showing episodes and shows of

Kien Tuong Truong

Shows

Security Cryptography WhateverSecurity Cryptography WhateverE2EE Storage Done Right with Matilda Backendal Jonas Hofmann and Kien Tuong TruongIt seems like everyone that tries to deploy end-to-end encrypted cloudstorage seems to mess it up, often in new and creative ways. Our specialguests Matilda Backendal, Jonas Hofmann, and Kien Tuong Truong give us a tour through the breakage and discuss a new formal model of how to actually build a secure E2EE storage system.Watch on YouTube: https://youtu.be/sizLiK_byCwTranscript: https://securitycryptographywhatever.com/2025/05/19/e2ee-storage/Links:- https://brokencloudstorage.info- https://eprint.iacr.org/2024/1616.pdf2025-05-201h 02Giatqueu\'s PodcastGiatqueu's PodcastHoa Theo MuaHoa Theo Mua la thuong hieu hoa tuoi mang dam dau an cam xuc va van hoa Viet, duoc sang lap boi CEO Le Thi Hoa Dao. Lay cam hung tu bai hat “Ha Noi 12 mua hoa”, thuong hieu ra doi voi mong muon mang den su binh yen va tich cuc qua tung san pham hoa.🌸 Cau chuyen thuong hieuHoa Theo Mua khong chi don thuan la cua hang hoa, ma con la noi gui gam nhung cam xuc sau lang. Moi bo hoa la mot cau chuyen, mot ky niem, duoc cham chut ti mi de t...2025-04-2501 minCyber BriefingCyber BriefingOctober 21, 2024 - Cyber Briefing👉 What's happening in cybersecurity today? 🚨 #CyberAlerts Critical Security Flaws Found in Major End-to-End Encrypted Cloud Storage Source: Jonas Hofmann and Kien Tuong Truong Bumblebee Malware Resurfaces to Target Corporate Networks with Stealthy Tactics Source: Leandro Fróes via Netskope Bitdefender Total Security Flaws Leave Users Open to Man-in-the-Middle Attacks Source: Bitdefender Newly Disclosed Spectre Bypass Vulnerabilities Impact Intel and AMD CPUs on Linux Source: Computer Security Group CISA Adds Veeam Vulnerability to Known Exploit...2024-10-2109 minLang Thang Đà LạtLang Thang Đà LạtReview toàn cảnh trường Cao Đẳng Sư Phạm Đà Lạt – Ngôi trường với kiến trúc cổ kính ấn tượngReview toàn cảnh trường Cao Đẳng Sư Phạm Đà Lạt – Ngôi trường với kiến trúc cổ kính ấn tượng Bạn ơi, hôm nay hãy cùng Lang Thang Đà Lạt ‘phá đảo’ ngôi trường này với ‘chiếc’ Review toàn cảnh trường Cao Đẳng Sư Phạm Đà Lạt cực chi tiết này nhé. Tụi mình tin là hành trình ngày hôm nay của mình và bạn sẽ cực kỳ thú vị luôn nè. Nhanh nhanh cùng đi với tụi mình thôi nào bạn ơi! 1Review toàn cảnh trường C...2024-03-0102 minSecurity Cryptography WhateverSecurity Cryptography WhateverThreema with Kenny Paterson, Matteo Scarlata and Kien Tuong TruongAnother day, another ostensibly secure messenger that quails under the gaze of some intrepid cryptographers. This time, it's Threema, and the gaze belongs to Kenny Paterson, Matteo Scarlata, and Kien Tuong Truong from ETH Zurich. Get ready for some stunt cryptography, like 2 Fast 2 Furious stunts.Transcript: https://securitycryptographywhatever.com/2023/01/27/threema/Links:https://breakingthe3ma.app/https://threema.ch/press-files/2_documentation/cryptography_whitepaper.pdfhttps://threema.ch/en/blog/posts/ibex"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)2023-01-271h 03Cryptography FMCryptography FMEpisode 22: Three Lessons from Threema: Breaking a Secure Messenger!Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers. Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. Links and papers...2023-01-1652 min