marketing

Marketing materials (presentations, posters, flyers)
Log | Files | Refs

commit e07e07238a14b1baa31f9aa69d0593d3e025d585
parent 962fbb368ea2d15ebc27dd69ea3084266e388174
Author: Christian Grothoff <grothoff@gnunet.org>
Date:   Tue, 14 Apr 2026 12:52:05 +0200

presi

Diffstat:
Apresentations/2026-dielinke/biblio-defqa.bib | 934+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apresentations/2026-dielinke/dielinke.tex | 236+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apresentations/2026-dielinke/extra.bib | 302++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apresentations/2026-dielinke/images/Logo-NGI_TALER_Tag_bluetext.png | 0
Apresentations/2026-dielinke/images/bandera.jpg | 0
Apresentations/2026-dielinke/images/logo-NGI_TALER_Bold.png | 0
Apresentations/2026-dielinke/images/sbfi.jpg | 0
Apresentations/2026-dielinke/logo-NGI_TALER_Bold.svg | 94+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apresentations/2026-dielinke/offline-timeline.pdf | 0
Apresentations/2026-dielinke/ref.bib | 258+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apresentations/2026-dielinke/taler-macros.tex | 108+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
11 files changed, 1932 insertions(+), 0 deletions(-)

diff --git a/presentations/2026-dielinke/biblio-defqa.bib b/presentations/2026-dielinke/biblio-defqa.bib @@ -0,0 +1,933 @@ + + +@Misc{henning2024netzpolitik, + author = {Maximilian Henning}, + title = {{EU Council} discusses Digital Euro: And how much privacy should it be?}, + howpublished = {\url{https://netzpolitik.org/2024/eu-council-discusses-digital-euro-and-how-much-privacy-should-it-be/}}, + month = {July}, + year = {2024}, + note = {Last accessed December 2024}, +} + +@misc{ecDE2023, + author = {{European Commission}}, + year = {2023}, + number = {COM/2023/369 final}, + title = {Proposal for a Regulation of the European Parliament and of the Council on the establishment of the digital euro}, + month = {June}, + url = {https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52023PC0369} +} + +@misc{ecDEservices2023, + author = {{European Commission}}, + year = {2023}, + number = {COM/2023/368 final}, + title = {Proposal for a Regulation of the European Parliament and of the Council on the provision of digital euro services by payment services providers incorporated in Member States whose currency is not the euro and amending Regulation (EU) 2021/1230 of the European Parliament and the Council}, + month = {June}, + url = {https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52023PC0368}, +} + +@misc{ecCash2023, + author = {{European Commission}}, + year = {2023}, + number = {COM/2023/364 final}, + title = {Proposal for a Regulation of the European Parliament and of the Council on the legal tender of euro banknotes and coins}, + month = {June}, + url = {https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52023PC0364}, +} + +@InProceedings{nagel2024, + author = {Joachim Nagel}, + title = {The digital euro and the protection of privacy (video address)}, + note = {\url{https://www.bundesbank.de/en/press/speeches/the-digital-euro-and-the-protection-of-privacy-935192}}, + month = {July}, + year = {2024}, + booktitle = {International Conference on Payments and Securities Settlement}, +} + +@Misc{daman2024, + author = {{Maarten G.A. Daman (ECB)}}, + title = {Making the digital euro truly private}, + howpublished = {\url{https://eaccny.com/news/chapternews/ecb-making-the-digital-euro-truly-private/}}, + month = {June}, + year = {2024}, + note = {Last accessed December 2024}, +} + +@Misc{maper2008vsuk, + key = {30562/04 and 30566/04}, + author = {{European Court of Human Rights, Grand Chamber}}, + title = {{S. and Maper vs. The United Kingdom}}, + howpublished = {\url{https://repository.library.georgetown.edu/handle/10822/513747}}, + month = {December}, + year = {2008}, +} + +@TechReport{effects2023, + author = {Helge Sigurd Næss-Schmidt and Charlotta Zienau and Rodrigo Cipriano and Jens Brink}, + title = {Effects of a digital euro on financial stability and consumer welfare}, + institution = {Copenhagen Economics}, + year = {2023}, +} + + +@article{dedollarization2024sovereignty, +author = {Theryn D. Arnold}, +title ={De-dollarization and global sovereignty: BRICS’ quest for a new financial paradigm}, +journal = {Human Geography}, +volume = {0}, +number = {0}, +pages = {19427786241266896}, +year = {0}, +doi = {10.1177/19427786241266896}, +} + + + +@Article{knowlimits2023, + author = {Barbara Meller and Oscar Soons}, + title = {Know Your (Holding) Limits: CBDC, Financial Stability and Central Bank Reliance}, + journal = {ECB Occasional Paper}, + year = {2023}, + number = {326}, + pages = {46}, + month = {August}, +} + + + +@Misc{bis2021absolute, + author = {Clint Siegner}, + title = {Bank of International Settlements Chief Talks “Absolute Control”}, + howpublished = {\url{https://www.moneymetals.com/news/2021/07/12/bank-of-international-settlements-chief-talks-absolute-control-002328}}, + month = {July}, + year = {2021}, +} + +@Misc{floss, + author = {{Free Software Foundation}}, + title = {What is Free Software?}, + howpublished = {\url{https://gnu.org/philosophy/free-sw.html}}, + year = {1996}, +} + +@TechReport{ecb2021survey, + title = {Eurosystem report on the public consultation on a digital euro}, + author = {{European Central Bank}}, + year = {2021}, + month = {April}, + note = {\url{https://www.ecb.europa.eu/pub/pdf/other/Eurosystem_report_on_the_public_consultation_on_a_digital_euro~539fa8cd8d.en.pdf}}, +} + +@TechReport{ecb2024timeline, + title = {Project timeline and planning of 2024 ERPB}, + institution = {{European Central Bank}}, + year = {2024}, + month = {April}, + note = {\url{https://www.ecb.europa.eu/euro/digital_euro/timeline/profuse/shared/pdf/ecb.degov240411_item6erpb-planning2024.en.pdf}}, +} + +@misc{cppfqa, + author = {Kreinin, Yossi}, + title = {C++ FQA Lite}, + howpublished = {\url{https://yosefk.com/c++fqa/}}, + year = {2009}, + month = {October}, +} + +@misc{bdi2022, + author = {Sch\"onborn, Sven and Rudelt, Christian}, + title = {{BDI: Digitaler Euro. Industriebedarfe bei Etablierung nicht vernachlässigen}}, + journal = {Position. Wirtschaftspolitik. Zahlungsverkehr}, + publisher = {{Bundesverband der Deutschen Industrie e.V. (BDI)}}, + address = {Berlin}, + year = {2022}, + volume = {D1620}, + pages = {1-8}, + howpublished = +{\url{https://bdi.eu/publikation/news/digitaler-euro-innovation-digitalisierung-waehrung/}}, +} + + +@TechReport{offline2023cbdc, + author = {Anonymous}, + title = {Project Polaris: A handbook for offline payments with CBDC}, + institution = {Bank of International Settlements}, + year = {2023}, + month = {May}, +} + +@journal {ss7, + author = {Roger Piqueras Jover}, + title = {Security analysis of SMS as a second factor of authentication}, + journal = {Communications of the ACM}, + volume = 63, + Number = 12, + year = {2020}, + pages = {46-52} +} + +@article{bis1993, + title = {The Nature and Management of Payment System Risks: An International Perspective}, + author = {Borio, C.F.V and {Van den Bergh}, P.}, + year = {1993}, + month = feb, + journal = {BIS Economic Papers}, + volume = {36}, + urldate = {2024-10-30} +} + +@misc{bis2020, + author = {Auer, Raphael and Böhme,Rainer}, + year = {2020}, + title = {The technology of retail central bank digital currency}, + journal = {BIS Quarterly Review}, + month = {March}, + pages = {85--96}, + howpublished = {\url{https://www.bis.org/publ/qtrpdf/r_qt2003j.pdf}}, +} + +@misc{bis2021, + author = {Auer, Raphael and Böhme,Rainer}, + year = {2021}, + title = {Central bank digital currency: the quest for minimally invasive technology}, + journal = {BIS Quarterly Review}, + month = {June}, + volume = {948}, + howpublished = {\url{https://www.bis.org/publ/work948.pdf}}, +} + +@misc{ecb2020, + author = {{European Central Bank}}, + year = {2020}, + title = {Report on a digital euro}, + month = {October}, + howpublished = +{\url{https://www.ecb.europa.eu/pub/pdf/other/Report_on_a_digital_euro~4d7268b458.en.pdf}}, +} + +@misc{ecb2021a, + author = {Bindseil, Ulrich and Panetta, Fabio and Terol, Ignacio}, + year = {2021}, + title = {Central Bank Digital Currency: functional scope, pricing and controls}, + journal = {ECB Occasional Paper Series}, + month = {December}, + volume = {286}, + howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/scpops/ecb.op286~9d472374ea.en.pdf}}, +} + +@misc{ecb2021b, + author = {{European Central Bank}}, + year = {2021}, + title = {Eurosystem report on the public consultation on a digital euro}, + month = {April}, + howpublished = +{\url{https://www.ecb.europa.eu/pub/pdf/other/ +Eurosystem_report_on_the_public_consultation_on_a_digital_euro~539fa8cd8d.en.pdf}}, +} + +@misc{mastercard, + author = {Norbert Häring}, + title = {How Mastercard invented the health hazard of cash}, + year = {2021}, + month = {March}, + howpublished = {\url{https://norberthaering.de/en/war-on-cash/mastercard-holsten/}}, +} + +@misc{ecbTender0078480, + author = {{European Central Bank}}, + title = {Tender ID: PRO-007480}, + year = {2022}, + howpublished = {per Email, \url{https://www.ecb.europa.eu/ecb/jobsproc/proc/pdf/2022-ojs040-099799-en.pdf}}, +} + +@misc{ecbTender009488, + author = {{European Central Bank}}, + title = {Tender ID: PRO-009488}, + year = {2024}, + howpublished = {not public, available upon request} +} + +@misc{paymenthabits2022, + author = {{European Central Bank}}, + year = {2022}, + title = {Study on the payment attitudes of consumers in the euro area (SPACE) -- 2022}, + month = {November}, + howpublished = +{\url{https://www.ecb.europa.eu/stats/ecb_surveys/space/shared/pdf/ecb.spacereport202212~783ffdf46e.en.pdf}}, +} +@misc{paymenthabits2024, + author = {{European Central Bank}}, + year = {2024}, + title = {Study on the payment attitudes of consumers in the euro area (SPACE) -- 2024}, + month = {December}, + howpublished = +{\url{https://www.ecb.europa.eu/stats/ecb_surveys/space/shared/pdf/ecb.space2024~19d46f0f17.en.pdf}}, +} + +@misc{masProgrammable2023, + author = {{Monetary Authority of Singapore}}, + year = {2023}, + title = {Purpose Bound Money (PBM) Technical Whitepaper}, + month = {June}, + howpublished = +{\url{https://www.mas.gov.sg/-/media/mas-media-library/development/fintech/pbm/pbm-technical-whitepaper.pdf}}, +} + +@misc{ecbHoldingLimit2023, + author = {{European Central Bank}}, + year = {2023}, + title = {Financial Stability Review}, + month = {November}, + howpublished = +{\url{https://www.ecb.europa.eu/press/financial-stability-publications/fsr/html/ecb.fsr202311~bfe9d7c565.en.html}}, +} + + + +@Article{suerf2021moser, + author = {Christian Grothoff and Thomas Moser}, + title = {How to issue a privacy-preserving central bank digital currency}, + journal = {SUERF Policy Briefs}, + year = {2021}, + number = {114}, + month = {June}, +} + +@article{suerf2022aligny, + title={Who comes after us? The correct mindset for designing a Central Bank Digital Currency}, + author={d’Aligny, Antoine and Benoist, Emmanuel and Dold, Florian and Grothoff, Christian and Kesim, {\"O}zg{\"u}r and Schanzenbach, Martin}, + journal={SUERF Policy Note}, + number={279}, + pages={1--9}, + year={2022}, + month={June}, + publisher={Soci{\'e}t{\'e} Universitaire Europ{\'e}enne de Recherches Financi{\`e}res} +} + +@article{uhlig2023privacy, + title={Privacy in Digital Payments—Escaping the Panopticon}, + author={Uhlig, Harald and Alonso, Mike and Frost, Jon}, + journal={Georgetown Journal of International Affairs}, + volume={24}, + number={2}, + pages={174--180}, + year={2023}, + publisher={Johns Hopkins University Press} +} + +@book{white1999, + author = {Lawrence H. White}, + title = {The Theory of Monetary Institutions}, + publisher = {Blackwell Publishers}, + year = {1999}, + address = {Malden, MA}, +} + +@inproceedings{platypus, +author = {W\"{u}st, Karl and Kostiainen, Kari and Delius, Noah and Capkun, Srdjan}, +title = {Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation}, +year = {2022}, +isbn = {9781450394505}, +publisher = {Association for Computing Machinery}, +address = {New York, NY, USA}, +url = {https://doi.org/10.1145/3548606.3560617}, +doi = {10.1145/3548606.3560617}, +booktitle = {Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security}, +pages = {2947–2960}, +numpages = {14}, +keywords = {zero-knowledge proof, regulation, privacy, e-cash, digital currency, compliance, cbdc, anonymity}, +location = {Los Angeles, CA, USA}, +series = {CCS '22} +} + +@article{kerckhoffs1883, + author = {Auguste Kerckhoffs}, + title = {La cryptographie militaire}, + journal = {Journal des sciences militaires}, + volume = {IX}, + pages = {5--38, 161--191}, + year = {1883}, + month = {January, February}, + language = {French} +} + +@book{schneier2015secrets, + title={Secrets and lies: digital security in a networked world}, + author={Schneier, Bruce}, + year={2015}, + publisher={John Wiley \& Sons} +} + +@article{raymond1999cathedral, + title={The cathedral and the bazaar}, + author={Raymond, Eric}, + journal={Knowledge, Technology \& Policy}, + volume={12}, + number={3}, + pages={23--49}, + year={1999}, + publisher={Springer} +} + + + +@Misc{onlinefirst2021, + author = {Christian Grothoff and Florian Dold}, + title = {Why a Digital Euro should be Online-first and Bearer-based}, + howpublished = {\url{https://taler.net/en/news/2021-03.html}}, + month = {March}, + year = {2021}, +} + +@misc{gerKWG, + author = {Deutscher Bundestag}, + title = {{Gesetz über das Kreditwesen (KWG): § 25i Allgemeine Sorgfaltspflichten in Bezug auf E-Geld}}, + year = {2023}, + month = {December}, + howpublished = {\url{https://www.gesetze-im-internet.de/kredwg/__25i.html}}, +} + +@Misc{tsys, + author = {{Taler Systems SA}}, + title = {{GNU Taler}}, + howpublished = {\url{https://taler-systems.com/}}, + year = {2024}, +} + +@misc{ecDeFunding2023, + author = {Sandali Handagama}, + title = {European Central Bank Shows It’s Serious About Enabling Digital Euro Offline Use}, + year = {2024}, + month = {January}, + howpublished = {\url{https://www.coindesk.com/policy/2024/01/11/european-central-bank-shows-its-serious-about-enabling-digital-euro-offline-use/}}, +} + +@misc{KandarStudy2023, + author = {{Kantar Public}}, + year = {2023}, + month = {March}, + title = {Study on Digital Wallet Features}, + howpublished = {\url{https://www.ecb.europa.eu/press/pr/date/2023/html/ecb.pr230424_1_annex~93abdb80da.en.pdf}}, +} + +@misc{ecbFinalInv2023, + author = {{European Central Bank}}, + title = {A stocktake on the digital euro - Summary report on the investigation phase and outlook on the next phase}, + year = {2023}, + month = {August}, + howpublished = {\url{https://www.ecb.europa.eu/euro/digital_euro/timeline/profuse/shared/pdf//ecb.dedocs231018.en.pdf}}, +} + +@misc{ecbProgInv2023, + author = {{European Central Bank}}, + title = {Progress on the investigation phase of a digital euro – fourth report}, + year = {2023}, + month = {July}, + howpublished = {\url{https://www.ecb.europa.eu/euro/digital_euro/progress/shared/pdf/ +ecb.degov230713-fourth-progress-report-digital-euro-investigation-phase.en.pdf}}, +} + +@misc{ecbBlog2024, + author = {Daman, Maarten G.A.}, + journal = {THE ECB BLOG}, + year = {2024}, + month = {June}, + title = {Making the digital euro truly private}, + howpublished = {\url{https://www.ecb.europa.eu/press/blog/date/2024/html/ecb.blog240613~47c255bdd4.en.html}}, +} + +@misc{ecbProgPrepFirst2024, + author = {{European Central Bank}}, + year = {2024}, + month = {June}, + title = {Progress on the preparation phase of a digital euro - First progress report}, + howpublished = {\url{https://www.ecb.europa.eu/euro/digital_euro/progress/html/ecb.deprp202406.en.html}}, +} + +@misc{ecbRulebookUpdate, + author = {{European Central Bank}}, + year = {2024}, + month = {January}, + title = {Update on the work of the digital euro scheme's Rulebook Development Group}, + howpublished = {\url{https://www.ecb.europa.eu/euro/digital_euro/timeline/profuse/shared/pdf/ecb.degov240103_RDG_digital_euro_schemes_update.en.pdf}}, +} + +@Misc{defaq2024, + author = {{European Central Bank}}, + title = {{FAQs on the Digital Euro}}, + howpublished = {\url{https://www.ecb.europa.eu/paym/digital_euro/faqs/html/ecb.faq_digital_euro.en.html}}, + year = {2024}, + month = {December}, + note = {Accessed: December 2, 2024}, +} + +@misc{ecbDEoffline2024, + author = {{European Central Bank}}, + year = {2024}, + month = {April}, + date = {11}, + title = {State of play on offline digital euro---11th ERPB technical session on digital euro}, + howpublished = {\url{https://www.ecb.europa.eu/euro/digital_euro/timeline/profuse/shared/pdf/ecb.degov240411_item3updateofflinedigitaleuro.en.pdf}}, +} + +@Misc{fdroid2023totp, + author = {{RedHat}}, + title = {{FreeOTP}}, + howpublished = {\url{https://freeotp.github.io/}}, + year = {2023}, +} + +@techreport{m2011totp, + title={Totp: Time-based one-time password algorithm}, + author={M'Raihi, David and Machani, Salah and Pei, Mingliang and Rydell, Johan}, + year={2011}, + institution = {{IETF}}, + howpublished = {\url{https://datatracker.ietf.org/doc/html/rfc6238}} +} +@phdthesis{dold2019gnu, + title={The {GNU} Taler system: practical and provably secure electronic payments}, + author={Dold, Florian}, + year={2019}, + school={Universit{\'e} Rennes 1} +} +@inproceedings{kesim2022zero, + title={Zero-Knowledge Age Restriction for GNU Taler}, + author={Kesim, {\"O}zg{\"u}r and Grothoff, Christian and Dold, Florian and Schanzenbach, Martin}, + booktitle={Computer Security--ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26--30, 2022, Proceedings, Part I}, + pages={110--129}, + year={2022}, + organization={Springer} +} +@inproceedings{d2022project, + title={Project Depolymerization: Tokenization of Blockchains}, + author={d’Aligny, Antoine and Benoist, Emmanuel and Grothoff, Christian}, + booktitle={2022 4th Conference on Blockchain Research \& Applications for Innovative Networks and Services (BRAINS)}, + pages={51--54}, + year={2022}, + organization={IEEE} +} +@misc{sumup2023, + title = {Business made simple}, + author = {{Sumup Inc.}}, + year = 2023, + note = {Accessed: March 3rd, 2023}, + howpublished = {\url{https://www.sumup.com/en-us/}} +} + +@article{cap, +author = {Gilbert, Seth and Lynch, Nancy}, +title = {Brewer's Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services}, +year = {2002}, +issue_date = {June 2002}, +publisher = {Association for Computing Machinery}, +address = {New York, NY, USA}, +volume = {33}, +number = {2}, +issn = {0163-5700}, +url = {https://doi.org/10.1145/564585.564601}, +doi = {10.1145/564585.564601}, +abstract = {When designing distributed web services, there are three properties that are commonly desired: consistency, availability, and partition tolerance. It is impossible to achieve all three. In this note, we prove this conjecture in the asynchronous network model, and then discuss solutions to this dilemma in the partially synchronous model.}, +journal = {SIGACT News}, +month = {jun}, +pages = {51–59}, +numpages = {9} +} + +@misc{worldlineDE2023, + title = {{Worldline helps the {ECB} to shape future digital euro by successfully delivering a front-end prototype}}, + author = {{Worldline}}, + year = 2023, + note = {Accessed: October 15th, 2024}, + howpublished = {\url{https://worldline.com/en/home/top-navigation/media-relations/press-release/worldline-helps-the-ecb-to-shape-future-digital-euro-by-successfully-delivering-a-front-end-prototype}} +} + +@misc{gdOffline2024, + title = {{New survey indicates digital euro must also work offline}}, + author = {{Giesecke+Devrient}}, + year = 2024, + note = {Accessed: October 15th, 2024}, + howpublished = {\url{https://www.gi-de.com/en/group/press/press-releases/new-survey-indicates-digital-euro-must-also-work-offline}} +} + +@misc{snbCBDC2024, + title = {{Swiss National Bank's Jordan against issuing retail cenbank digital currency}}, + author = {{Reuters}}, + year = 2024, + note = {Accessed: October 15th, 2024}, + howpublished = {\url{https://www.reuters.com/markets/currencies/swiss-national-banks-jordan-against-issuing-retail-cenbank-digital-currency-2024-04-08/}} +} + +@misc{fedCBDC2024, + title = {{Implications of a U.S. CBDC for International Payments and the Role of the Dollar}}, + author = {{Jean Flemming and Ruth Judson}}, + year = 2024, + note = {Accessed: October 15th, 2024}, + howpublished = {\url{https://www.federalreserve.gov/econres/notes/feds-notes/implications-of-a-u-s-cbdc-for-international-payments-and-the-role-of-the-dollar-20240216.html}} +} + +@misc{eurojustCrypto2024, + title = {{Successful operation against cryptocurrency scam coordinated by Eurojust }}, + author = {{Eurojust}}, + year = 2024, + note = {Accessed: October 15th, 2024}, + howpublished = {\url{https://www.eurojust.europa.eu/news/successful-operation-against-cryptocurrency-scam-coordinated-eurojust}} +} + +@misc{libra2021, + title = {White Paper}, + author = {{Diem Association}}, + year = 2020, + note = {Accessed: January 10th, 2021}, + howpublished = {\url{https://www.diem.com/en-us/white-paper/}} +} + + +@misc{twint2023, + title = {Simply {TWINT} it.}, + author = {{Twint AG}}, + year = 2023, + note = {Accessed: March 3rd, 2023}, + howpublished = {\url{https://www.twint.ch/en/}} +} + +@misc{paypal2023, + title = {Pay in a flash with {QR}}, + author = {{PayPal Inc.}}, + year = 2023, + note = {Accessed: March 13th, 2023}, + howpublished = {\url{https://www.paypal.com/us/digital-wallet/ways-to-pay/pay-with-qr-code}} +} + +@misc{twint2023-2, + title = {Collect payments simply – even without any infrastructure}, + author = {{Twint AG}}, + year = 2023, + note = {Accessed: March 3rd, 2023}, + howpublished = {\url{https://www.twint.ch/en/bausiness-customers/our-solutions/qr-code-sticker/}} +} + +@misc{safenet-otp-110, + title = {{SafeNet OTP 110}}, + author = {{Thales}}, + year = 2023, + note = {Accessed: March 3rd, 2023}, + howpublished = {\url{https://cpl.thalesgroup.com/en-gb/access-management/authenticators/safenet-otp-110}} +} +@misc{wechat, + title = {{Offline Store without {POS} Devices}}, + author = {{Tenpay}}, + year = 2023, + note = {Accessed: March 14th, 2023}, + howpublished = {\url{https://pay.weixin.qq.com/wiki/doc/api/wxpay/en/guide/OfflineStoresWithoutPOS.shtml}} +} + +@misc{wirecard, + author = {Wikipedia}, + title = {Wirecard scandal}, + howpublished = {\url{https://en.wikipedia.org/wiki/Wirecard_scandal}}, + note = {Accessed: September 15, 2024}, +} + +@misc{crowdstrike, + author = {Wikipedia}, + title = {2024 CrowdStrike incident}, + howpublished = {\url{https://en.wikipedia.org/wiki/2024_CrowdStrike_incident}}, + note = {Accessed: September 15, 2024}, +} + +@misc{ecbStatsInflation, + author = {{European Central Bank}}, + title ={Inflation and consumer prices}, + howpublished = {\url{https://www.ecb.europa.eu/stats/macroeconomic_and_sectoral/hicp/html/index.en.html}}, + note = {Accessed: September 15, 2024}, +} + +@book{ibmandholocaust, + author = {Black, Edwin}, + title = {IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation}, + year = {2001}, + isbn = {0375431241}, + publisher = {Random House Large Print}, +} + +@misc{canada2022, + author = {Tasker, John Paul}, + jounal = {CBC}, + title = {Banks have started to freeze accounts linked to the protests, Freeland says}, + year = {2022}, + month = {February}, + howpublished = {https://www.cbc.ca/news/politics/ottawa-protests-frozen-bank-accounts-1.6355396}, + note = {Accessed: September 15, 2024}, +} + +@TechReport{chavanette2024, + author = {{Chavanette Advisors}}, + title = {Galactic Grid: Your Guide to the Complex Landscape of Retail Central Bank Digital Currency Technology Providers}, + institution = {Chavanette Advisors}, + year = {2024}, +} + +@Misc{italy2022cardforce, + author = {{AFP/The Local}}, + title = {Italy abandons plan to elt shops refuse card payments in budget U-turn}, + howpublished = {\url{https://www.thelocal.it/20221219/italy-abandons-plan-to-let-shops-refuse-card-payments-in-budget-u-turn}}, + month = {December}, + year = {2022}, +} + +@TechReport{digitaleuro2020, + author = {Christine Lagarde and Fabio Panetta}, + title = {Report on a digital euro}, + institution = {European Central Bank}, + year = {2020}, + month = {October}, +} + +@Misc{markpersonal, + author = {Alessandro Giovannini and Marc Stibane}, + title = {Euro 2.0 -- Der Euro wird (auch) digital - Oesterreichische Nationalbank}, + howpublished = {Statement on stage in discussion with audience, \url{https://x.com/taler/status/1767621751825907879}}, + month = {March}, + year = {2024}, +} + +@Misc{offlinedebit2020kagan, + author = {Julia Kagan}, + title = {Offline Debit Card: What They Are and How They Work}, + howpublished = {\url{https://www.investopedia.com/terms/o/offlinedebitcard.asp}}, + month = {August}, + year = {2020}, +} + +@Misc{dea2024members, + author = {{Digital Euro Association}}, + title = {Members}, + howpublished = {https://home.digital-euro-association.de/members}, + month = {September}, + year = {2024}, +} + +@Misc{ezb2024duve, + author = {{Ledger Insights}}, + title = {ex-{BNY} Mellon tokenization lead joins European Central Bank}, + howpublished = {\url{https://www.ledgerinsights.com/ex-bny-mellon-tokenization-lead-joins-european-central-bank/}}, + month = {March}, + year = {2024}, +} + + +@inproceedings{arm2016alias, + author={R. {Guanciale} and H. {Nemati} and C. {Baumann} and M. {Dam}}, + booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, + title={Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures}, + year={2016}, + volume={}, + number={}, + pages={38-55}, + keywords={Security;Cache storage;Timing;Monitoring;Program processors;Virtual machine monitors;side channels;hypervisor;cache storage channels;verification}, + doi={10.1109/SP.2016.11}, + ISSN={2375-1207}, + month={May}, +} + +@inproceedings{arm2016cache, + author = {Lipp, Moritz and Gruss, Daniel and Spreitzer, Raphael and Maurice, Cl\'{e}mentine and Mangard, Stefan}, + title = {ARMageddon: Cache Attacks on Mobile Devices}, + year = {2016}, + isbn = {9781931971324}, + publisher = {USENIX Association}, + address = {USA}, + abstract = {In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM CPUs that have a different cache organization and instruction set than Intel x86 CPUs. So far, no cross-core cache attacks have been demonstrated on non-rooted Android smartphones. In this work, we demonstrate how to solve key challenges to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, and Flush+Flush on non-rooted ARM-based devices without any privileges. Based on our techniques, we demonstrate covert channels that outperform state-of-the-art covert channels on Android by several orders of magnitude. Moreover, we present attacks to monitor tap and swipe events as well as keystrokes, and even derive the lengths of words entered on the touchscreen. Eventually, we are the first to attack cryptographic primitives implemented in Java. Our attacks work across CPUs and can even monitor cache activity in the ARM TrustZone from the normal world. The techniques we present can be used to attack hundreds of millions of Android devices.}, + booktitle = {Proceedings of the 25th USENIX Conference on Security Symposium}, + pages = {549–564}, + numpages = {16}, + location = {Austin, TX, USA}, + series = {SEC'16} +} + +@article{zhang2016truspy, + title={TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.}, + author={Zhang, Ning and Sun, Kun and Shands, Deborah and Lou, Wenjing and Hou, Y Thomas}, + journal={IACR Cryptol. ePrint Arch.}, + volume={2016}, + pages={980}, + year={2016} +} + +@inproceedings{arm2017boomerang, + title={BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.}, + author={Machiry, Aravind and Gustafson, Eric and Spensky, Chad and Salls, Christopher and Stephens, Nick and Wang, Ruoyu and Bianchi, Antonio and Choe, Yung Ryn and Kruegel, Christopher and Vigna, Giovanni}, + booktitle={NDSS}, + year={2017} +} + +@inproceedings{arm2017clkscrew, + author = {Tang, Adrian and Sethumadhavan, Simha and Stolfo, Salvatore}, + title = {CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management}, + year = {2017}, + isbn = {9781931971409}, + publisher = {USENIX Association}, + address = {USA}, + abstract = {The need for power- and energy-efficient computing has resulted in aggressive cooperative hardware-software energy management mechanisms on modern commodity devices. Most systems today, for example, allow software to control the frequency and voltage of the underlying hardware at a very fine granularity to extend battery life. Despite their benefits, these software-exposed energy management mechanisms pose grave security implications that have not been studied before.In this work, we present the CLKSCREW attack, a new class of fault attacks that exploit the security-obliviousness of energy management mechanisms to break security. A novel benefit for the attackers is that these fault attacks become more accessible since they can now be conducted without the need for physical access to the devices or fault injection equipment. We demonstrate CLKSCREW on commodity ARM/Android devices. We show that a malicious kernel driver (1) can extract secret cryptographic keys from Trustzone, and (2) can escalate its privileges by loading self-signed code into Trustzone. As the first work to show the security ramifications of energy management mechanisms, we urge the community to re-examine these security-oblivious designs.}, + booktitle = {Proceedings of the 26th USENIX Conference on Security Symposium}, + pages = {1057–1074}, + numpages = {18}, + location = {Vancouver, BC, Canada}, + series = {SEC'17} +} + +@inproceedings{samsung2017knox, + author={M. {Dorjmyagmar} and M. {Kim} and H. {Kim}}, + booktitle={2017 19th International Conference on Advanced Communication Technology (ICACT)}, + title={Security analysis of Samsung Knox}, + year={2017}, + volume={}, + number={}, + pages={550-553}, + doi={10.23919/ICACT.2017.7890150}} + +@InProceedings{amd2019, + author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin and Yan Solihin}, + title = {Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization}, + booktitle = {USENIX Security Symposium}, + year = {2019}, +} + +@Misc{sim2019, + author = {Adaptive Mobile Security Limited}, + title = {Simjacker Technical Report}, + howpublished = {\url{https://www.enea.com/info/simjacker/}}, + year = {2019}, +} + +@inproceedings{intel2020lvi, + title = {{LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection}}, + author = {Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and Piessens, Frank}, + booktitle = {41th IEEE Symposium on Security and Privacy (S\&P'20)}, + month={March}, + year = {2020}, +} + +@misc{intel2020sgaxe, + title={{SGAxe}: How {SGX} Fails in Practice}, + author={van Schaik, Stephan and Kwong, Andrew and Genkin, Daniel and Yarom, Yuval}, + howpublished = {\url{https://sgaxeattack.com/}}, + month={June}, + year={2020}, +} + +@article{smartcard2020, + author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, + title = {Minerva: The curse of {ECDSA} nonces (Systematic analysis of lattice + attacks on noisy leakage of bit-length of {ECDSA} nonces)}, + journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems}, + volume = {2020}, + number = {4}, + pages = {281--308}, + year = {2020}, + doi = {10.13154/tches.v2020.i4.281-308} +} + +@inproceedings{atecc2022, + author={Hériveaux, Olivier}, + booktitle={2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)}, + title={Triple Exploit Chain with Laser Fault Injection on a Secure Element}, + year={2022}, + pages={9-17}, + keywords={Semiconductor lasers;Fault detection;EPROM;Memory management;Lighting;Silicon;Circuit faults;Laser Fault Injection;Secure Element;Reverse Engineering}, + doi={10.1109/FDTC57191.2022.00011} +} + +@inproceedings{amd2023, + title={faulTPM: Exposing AMD fTPMs’ Deepest Secrets}, + author={Jacob, Hans Niklas and Werling, Christian and Buhren, Robert and Seifert, Jean-Pierre}, + booktitle={2023 IEEE 8th European Symposium on Security and Privacy (EuroS\&P)}, + pages={1128--1142}, + year={2023}, + organization={IEEE} +} + +@inproceedings{arm2023, + title={Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM} {TrustZone-M}}, + author={Sa{\ss}, Xhani Marvin and Mitev, Richard and Sadeghi, Ahmad-Reza}, + booktitle={32nd USENIX Security Symposium (USENIX Security 23)}, + pages={6239--6256}, + year={2023} +} + +@Misc{tpm2023, + author = {Francisco Falcon}, + title = {Vulnerabilities in the TPM 2.0 reference implementation code}, + howpublished = {\url{https://blog.quarkslab.com/vulnerabilities-in-the-tpm-20-reference-implementation-code.html}}, + month = {March}, + year = {2023}, +} + +@Misc{intel2023sgx, + author = {Joseph Nuzman}, + title = {CVE-2022-38090: Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.}, + howpublished = {\url{https://www.cve.org/CVERecord?id=CVE-2022-38090}}, + month = {February}, + year = {2023}, +} + +@Misc{infineon2024, + author = {Thomas Roche}, + title = {EUCLEAK: Side-Channel Attack on the YubiKey 5 Series---Revealing and Breaking Infineon ECDSA Implementation on the Way}, + howpublished = {\url{https://ninjalab.io/eucleak/}}, + month = {September}, + year = {2024}, +} + +@inproceedings{intel2024, + title={TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX}, + author={Wilke, Luca and Sieck, Florian and Eisenbarth, Thomas}, + booktitle={ACM CCS 2024}, + year={2024} +} + +@inproceedings{powerled2024, + title={Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured by Standard Video Cameras}, + author={Nassi, Ben and Iluz, Etay and Cohen, Or and Vayner, Ofek and Nassi, Dudi and Zadov, Boris and Elovici, Yuval}, + booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, + pages={163--163}, + year={2024}, + organization={IEEE Computer Society} +} + +@inproceedings{amd2025, + title = {CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP}, + abstract = {Confidential virtual machines (VMs) promise higher security by running the VM inside a trusted execution environment (TEE). Recent AMD server processors support confidential VMs with the SEV-SNP processor extension. SEV-SNP provides guarantees for integrity and confidentiality for confidential VMs despite running them in a shared hosting environment.In this paper, we introduce CounterSEVeillance, a new side-channel attack leaking secret-dependent control flow and operand properties from performance counter data. Our attack is the first to exploit performance counter side-channel leakage with single-instruction resolution from SEV-SNP VMs and works on fully patched systems. We systematically analyze performance counter events in SEV-SNP VMs and find that 228 are exposed to a potentially malicious hypervisor. CounterSEVeillance builds on this analysis and records performance counter traces with an instruction-level resolution by single-stepping the victim VM using APIC interrupts in combination with page faults. We match CounterSEVeillance traces against binaries, precisely recovering the outcome of any secret-dependent conditional branch and inferring operand properties. We present four attack case studies, in which we exemplarily showcase concrete exploitable leakage with 6 of the exposed performance counters. First, we use CounterSEVeillance to extract a full RSA-4096 key from a single Mbed TLS signature process in less than 8 minutes. Second, we present the first side-channel attack on TOTP verification running in an AMD SEV-SNP VM, recovering a 6-digit TOTP with only 31.1 guesses on average. Third, we show that CounterSEVeillance can leak the secret key from which the TOTPs are derived from the underlying base32 decoder. Fourth and finally, we show that CounterSEVeillance can also be used to construct a plaintext-checking oracle in a divide-and-surrender-style attack. We conclude that moving an entire VM into a setting with a privileged adversary increases the attack surface, given the vast amounts of code not vetted for this specific security setting.}, + keywords = {Performance Counter, Confidential Virtual Machines, AMD SEV}, + author = {Stefan Gast and Hannes Weissteiner and Schr{\"o}der, {Robin Leander} and Daniel Gruss}, + year = {2025}, + month = feb, + language = {English}, + booktitle = {Network and Distributed System Security (NDSS) Symposium 2025}, + note = {Network and Distributed System Security Symposium 2025 : NDSS 2025, NDSS 2025 ; Conference date: 23-02-2025 Through 28-02-2025}, +} +@misc{letemps2020refusDeCash, + author = {{Mathilde Farine}}, + year = {2020}, + month = {April}, + date = {02}, + journal={{Le Temps}}, + title = {Les commerces peuvent refuser les achats en cash}, + howpublished = {\url{https://www.letemps.ch/economie/finance/commerces-peuvent-refuser-achats-cash}}, +} +@misc{freedom2024gnu, + author = {{GNU}}, + title = {What is Free Software?}, + howpublished = {\url{https://www.gnu.org/home.en.html}}, +} +@article{deyoung2004banks, + title={How do banks make money? The fallacies of fee income}, + author={DeYoung, Robert and Rice, Tara and others}, + journal={Economic Perspectives-Federal Reserve Bank of Chicago}, + volume={28}, + number={4}, + pages={34}, + year={2004}, + publisher={THE FEDERAL RESERVE BANK OF CHICAGO} +} +\ No newline at end of file diff --git a/presentations/2026-dielinke/dielinke.tex b/presentations/2026-dielinke/dielinke.tex @@ -0,0 +1,236 @@ +\documentclass[aspectratio=169,t]{beamer} +\input taler-macros +\usepackage{msc} + + +\newcommand{\TITLE}{Digital Euro vs. GNU Taler} +\newcommand{\SUB}{Sleeping at the helm} +\newcommand{\AUTHOR}{Christian Grothoff} +\newcommand{\SPEAKER}{Christian Grothoff} +\newcommand{\INST}{Bern University of Applied Sciences \& Taler Systems SA} +\newcommand{\DATE}{\\ \ \vspace{0.5cm} \\ April 14\textsuperscript{th} 2026} + +% Do not edit this part +\title{\TITLE} +\subtitle{\SUB} +\date{\DATE} +\author[\SPEAKER]{\AUTHOR} +\institute{\INST} + + +\begin{document} + +\begin{frame}[plain] +\maketitle +\end{frame} + +\begin{frame}{The Digital Euro proposal} +\begin{itemize} +\item Technically flawed: + \begin{itemize} + \item {\bf Impossible} to secure fully anonymous offline mode + \item Identity theft + reverse waterfall = empty bank accounts + \item Extremely wasteful or outright corrupt procurement process + \end{itemize}\pause +\item Economically dangerous: + \begin{itemize} + \item Private PSPs expected to participate $\Rightarrow$ cost \& complexity + \item Zero holding limit for companies is problematic + \item {\bf Sub-optimal for welfare} according to~\cite{doi:10.1287/mnsc.2024.06830} + \end{itemize}\pause +\item Politically fatal: + \begin{itemize} + \item {\bf Dependency} on Apple, Google, etc. cemented + \item Central bank establishes {\bf absolute control} over society~\cite{castens2021} + \item {\bf Lack of use-cases} $\Rightarrow$ legislation to force acceptance + \end{itemize} +\end{itemize} + \end{frame} + + +\begin{frame}[fragile]{G+D Hardware to fixes the CAP theorem?} + \framesubtitle{Only if history has nothing to teach us!} +\def\svgwidth{0.9\textwidth} + +\begingroup% +\makeatletter% +\providecommand\color[2][]{% + \errmessage{(Inkscape) Color is used for the text in Inkscape, but the package 'color.sty' is not loaded}% + \renewcommand\color[2][]{}% +}% +\providecommand\transparent[1]{% + \errmessage{(Inkscape) Transparency is used (non-zero) for the text in Inkscape, but the package 'transparent.sty' is not loaded}% + \renewcommand\transparent[1]{}% +}% +\providecommand\rotatebox[2]{#2}% +\newcommand*\fsize{\dimexpr\f@size pt\relax}% +\newcommand*\lineheight[1]{\fontsize{\fsize}{#1\fsize}\selectfont}% +\ifx\svgwidth\undefined% + \setlength{\unitlength}{345bp}% + \ifx\svgscale\undefined% + \relax% + \else% + \setlength{\unitlength}{\unitlength * \real{\svgscale}}% + \fi% +\else% + \setlength{\unitlength}{\svgwidth}% +\fi% +\global\let\svgwidth\undefined% +\global\let\svgscale\undefined% +\makeatother% +\begin{picture}(1,0.53623188)% + \lineheight{1}% + \setlength\tabcolsep{0pt}% + \put(0,0){\includegraphics[width=\unitlength,page=1]{offline-timeline.pdf}}% + \put(0.10624514,0.04914349){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l }\tiny Feb 2017 \cite{arm2017boomerang}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=2]{offline-timeline.pdf}}% + \put(0.28309276,0.44884928){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Mar, Jun 2020 \cite{intel2020lvi,intel2020sgaxe}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=3]{offline-timeline.pdf}}% + \put(0.18177392,0.17262607){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Aug 2017 \cite{arm2017clkscrew}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=4]{offline-timeline.pdf}}% + \put(0.08024638,0.44884927){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Dec 2017 \cite{samsung2017knox}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=5]{offline-timeline.pdf}}% + \put(0.02512174,0.36103189){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny May, Aug 2016 \cite{arm2016alias,arm2016cache,zhang2016truspy}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=6]{offline-timeline.pdf}}% + \put(0.34119422,0.08566952){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Aug 2019 \cite{amd2019}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=7]{offline-timeline.pdf}}% + \put(0.3956406,0.36131883){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Oct 2019 \cite{sim2019}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=8]{offline-timeline.pdf}}% + \put(0.38164733,0.17343635){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Jun 2020 \cite{smartcard2020}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=9]{offline-timeline.pdf}}% + \put(0.59564059,0.44827535){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Sep 2022 \cite{atecc2022}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=10]{offline-timeline.pdf}}% + \put(0.55650392,0.05335936){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Mar 2023 \cite{tpm2023}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=11]{offline-timeline.pdf}}% + \put(0.80271684,0.06728262){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Sep 2024 \cite{infineon2024}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=12]{offline-timeline.pdf}}% + \put(0.59062556,0.17319998){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Feb 2023 \cite{intel2023sgx}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=13]{offline-timeline.pdf}}% + \put(0.78984349,0.17291304){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Oct 2024 \cite{amd2025}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=14]{offline-timeline.pdf}}% + \put(0.7963995,0.44796104){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Aug 2023 \cite{arm2023}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=15]{offline-timeline.pdf}}% + \put(0.59916521,0.36103188){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Apr 2023 \cite{amd2023}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=16]{offline-timeline.pdf}}% + \put(0.79631301,0.36103188){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}\tiny Aug 2024 \cite{intel2024}\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=17]{offline-timeline.pdf}}% + \put(0.123203,0.24410952){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}2015\end{tabular}}}}% + \put(0.5000146,0.24410952){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}2020\end{tabular}}}}% + \put(0.87682623,0.24410952){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\lineheight{1.25}\smash{\begin{tabular}[t]{l}2025\end{tabular}}}}% + \put(0,0){\includegraphics[width=\unitlength,page=18]{offline-timeline.pdf}}% +\end{picture}% +\endgroup% +\end{frame} + + +\begin{frame}{Alias Lookup Service: 56M wasted} + Goal of the Alias Lookup service tender: + \begin{itemize} + \item Register dEuro account under e-mail address or phone number + \item Lookup account number under address to send payments + \item Basically, what Wero does + \end{itemize}\pause + Reality: + \begin{itemize} + \item Scalable, low-latency, multi-language implementation in FLOSS for 24 ECTS at + \url{https://lookup.t-euro.eu} + \item 2nd implementation with support for social media accounts and other + features for EUR 28,000 at \url{https://taldir.gnunet.org/} + \end{itemize}\pause + The unstoppable train: + \begin{itemize} + \item We could not apply: 10 M annual revenue were required to submit + \item I informed ECB, Olaf and EUparl about public waste of money + \item Above implementations available before awards finalized + \end{itemize} +\end{frame} + + +\begin{frame}{Design goals of the GNU Taler Payment System} + \framesubtitle{\url{https://taler.net/}} + GNU Taler must ... +\begin{enumerate} + \item {... be implemented as {\bf free software}.} + \item {... protect the {\bf privacy of buyers}.} + \item {... must enable the state to {\bf tax income} and crack down on + illegal business activities.} + \item {... prevent payment fraud.} + \item {... only {\bf disclose the minimal amount of information + necessary}.} + \item {... be usable.} + \item {... be efficient.} + \item {... avoid single points of failure.} + \item {... foster {\bf competition}.} +\end{enumerate} +\end{frame} + + +\begin{frame}{Capabilities today} +\begin{itemize} + \item Wallets for Android, iOS, WebExtensions + \item P2P payments, age-restricted payments, programmable payments + \item Rule-based KYC/AML integration, incl. E-ID support + \item 30,000 transactions/s in scalability experiments using 2 servers + \item EBICS/ISO 20022 integration, regional currency support + \item Accessible for blind people (Apps and Web pages) + \item Translated into many languages + \item External security audits, post-quantum design + \item Secure payments to offline merchants (but wallet online!) + \item Point-of-sale and casher apps (Android-only) + \item Integrations into WordPress, Drupal and other E-commerce systems + \item ... +\end{itemize} +\end{frame} + + +\begin{frame}{Further reading} + \vfill + \begin{center} + \url{https://taler.net/} + \end{center} + \vfill +\end{frame} + + + + + + +% This should be last... +\begin{frame}{Acknowledgments} + + \begin{minipage}{0.45\textwidth} \ \\ + {\tiny Funded by the European Union (Project 101135475).} + + \begin{center} + \includegraphics[width=0.5\textwidth]{images/bandera.jpg} + \end{center} + \end{minipage} + \hfill + \begin{minipage}{0.45\textwidth} + {\tiny Funded by SERI (HEU-Projekt 101135475-TALER).} + + \begin{center} + \includegraphics[width=0.65\textwidth]{images/sbfi.jpg} + \end{center} + \end{minipage} + + \vfill + + {\tiny + + Views and opinions expressed are however those of the author(s) only + and do not necessarily reflect those of the European Union. Neither the + European Union nor the granting authority can be held responsible for + them. + + } +\end{frame} + +\section*{References} +\begin{frame}[allowframebreaks]{References} +\bibliographystyle{plain} +\bibliography{ref,extra,biblio-defqa} +\end{frame} + +\end{document} diff --git a/presentations/2026-dielinke/extra.bib b/presentations/2026-dielinke/extra.bib @@ -0,0 +1,302 @@ +@article{doi:10.1287/mnsc.2024.06830, +author = {Tinn, Katrin}, +title = {A Theory Model of Digital Currency with Asymmetric Privacy}, +journal = {Management Science}, +year = {2025}, +doi = {10.1287/mnsc.2024.06830}, +} + + + +@Misc{castens2021, + author = {Catherine Austin Fitts}, + title = {The Threat of Financial Transaction Control}, + howpublished = {\url{https://solarireport.substack.com/p/the-threat-of-financial-transaction}}, + month = {February}, + year = {2024}, +} + +@techreport{project-hamilton-boston-fed, + author = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}}, + institution = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative}, + title = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies}, + month = {Feb}, + year = {2022}, + note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]} +} + +@techreport{riskbank-e-krona-phase-2, + author = {Sveriges Riskbank}, + institution = {Sveriges Riskbank}, + title = {e-krona pilot Phase 2}, + note = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]}, + year = {2022}, + month = {Apr}, +} + +@techreport{pboc-e-cny, + author = {People's Bank of China}, + institution = {People's Bank of China}, + month = {Jul}, + year = {2021}, + title = {Progress of Research \& Development of E-CNY in China}, + note = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]}, +} + +@misc{atlanticcouncil-e-cny, + author = {Kunar, Ananya}, + note = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]}, + title = {A Report Card on China's Central Bank Digital Currency: the e-CNY}, + year = {2022}, + month = {Jan}, +} + +@article{ruiz:hal-01334135, + TITLE = {{Reconstructable Software Appliances with Kameleon}}, + AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier}, + JOURNAL = {{Operating Systems Review}}, + PUBLISHER = {{Association for Computing Machinery}}, + VOLUME = {49}, + NUMBER = {1}, + PAGES = {80-89}, + YEAR = {2015}, +} + +@misc{postgres-wiki-perf, + url={https://wiki.postgresql.org/wiki/Performance_Optimization}, + title={PostgreSQL Wiki}, + publisher={PostgreSQL}, + author={Postgres}, + note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]}, + year={2020}, + month={Sep} +} + +@incollection{grid5000, + title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed}, + author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc}, + booktitle = {Cloud Computing and Services Science}, + publisher = {Springer International Publishing}, + pages = {3-20}, + volume = {367}, + year = {2013}, +} + + +@Misc{dirksen2018, + author = {Alexandra Dirksen}, + title = {A Blockchain Picture Book}, + howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}}, + month = {12}, + year = {2018}, +} + + +@incollection{crdt, + author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc}, + title = {Conflict-Free Replicated Data Types ({CRDT}s)}, + booktitle = {Encyclopedia of Big Data Technologies}, + year = {2018}, + month = may, + publisher = {Springer}, + doi = {10.1007/978-3-319-63962-8_185-1}, + eprint = {1805.06358}, + keywords = {introduction} +} + + +@conference {rogaway2016, +author = {Phillip Rogaway}, +title = {The Moral Character of Cryptographic Work}, +year = {2016}, +address = {Austin, TX}, +publisher = {USENIX Association}, +month = aug +} + +@article{stainton2023post, + title={Post Quantum Sphinx}, + author={Stainton, David Anthony}, + journal={Cryptology ePrint Archive}, + year={2023} +} + +@inproceedings{danezis2009sphinx, + title={Sphinx: A compact and provably secure mix format}, + author={Danezis, George and Goldberg, Ian}, + booktitle={2009 30th IEEE Symposium on Security and Privacy}, + pages={269--282}, + year={2009}, + organization={IEEE} +} + +@article{diaz2021nym, + title={The nym network}, + author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos}, + year={2021} +} + +@Techreport{ sdsi, + title = "SDSI - A Simple Distributed Security Infrastructure", + author = "Ronald L. Rivest,Butler Lampson", + year = "1996", + month = "April", + day = "30", + url = "http://research.microsoft.com/pubs/68726/acrobat.pdf", +} + +@Article{suerf2023huang, + author = {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano}, + title = {Practical Offline Payments Using One-Time Passcodes}, + journal = {SUERF Policy Briefs}, + year = {2023}, + number = {622}, + month = {June}, +} + +@InProceedings{depolymerization, + author = {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff}, + title = {Project Depolymerization: Tokenization of Blockchains}, + booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services}, + year = {2022}, + month = {September}, +} + +@inproceedings{evans2009practical, + title={A Practical Congestion Attack on Tor Using Long Paths.}, + author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian}, + booktitle={USENIX Security Symposium}, + pages={33--50}, + year={2009} +} +@inproceedings{jansen2014sniper, + title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.}, + author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn}, + booktitle={NDSS}, + year={2014} +} +@inproceedings{arp2015torben, + title={Torben: A practical side-channel attack for deanonymizing tor communication}, + author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad}, + booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security}, + pages={597--602}, + year={2015} +} +@inproceedings{iacovazzi2019duster, + title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding}, + author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval}, + booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)}, + pages={213--225}, + year={2019} +} + +@article{ling2012new, + title={A new cell-counting-based attack against Tor}, + author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia}, + journal={IEEE/ACM Transactions On Networking}, + volume={20}, + number={4}, + pages={1245--1261}, + year={2012}, + publisher={IEEE} +} + +@InProceedings{acquisti2003, +author="Acquisti, Alessandro +and Dingledine, Roger +and Syverson, Paul", +editor="Wright, Rebecca N.", +title="On the Economics of Anonymity", +booktitle="Financial Cryptography", +year="2003", +publisher="Springer Berlin Heidelberg", +address="Berlin, Heidelberg", +pages="84--102", +abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.", +isbn="978-3-540-45126-6" +} + + +@INPROCEEDINGS{sp2018anonymity, + author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket}, + booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, + title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two}, + year={2018}, + pages={108-126}, + doi={10.1109/SP.2018.00011}} + +@InProceedings{ pitchblack, + author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff}, + title = {Routing in the Dark: Pitch Black}, + booktitle = {23rd Annual Computer Security Applications Conference (ACSAC + 2007)}, + month = {December}, + location = {Miami Beach, Florida, USA}, + pages = {305--314}, + year = {2007}, + publisher = {IEEE Computer Society}, +} + +@article{dijkstra1974selfstabilization, +author = {Dijkstra, Edsger W.}, +title = {Self-stabilizing systems in spite of distributed control}, +year = {1974}, +issue_date = {Nov. 1974}, +publisher = {Association for Computing Machinery}, +address = {New York, NY, USA}, +volume = {17}, +number = {11}, +issn = {0001-0782}, +url = {https://doi.org/10.1145/361179.361202}, +doi = {10.1145/361179.361202}, +abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.}, +journal = {Commun. ACM}, +month = {nov}, +pages = {643–644}, +numpages = {2}, +keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control} +} + + + + + +@Misc{pipenet, + author = {Wei Dai}, + title = {PipeNet 1.1}, + howpublished = {\url{http://www.weidai.com/pipenet.txt}}, +} + +@InProceedings{gns2014wachs, + author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, + title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System}, + booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)}, + year = {2014}, + pages = {127--142}, +} +@article{eppstein, + author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George}, + title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context}, + journal = {SIGCOMM Comput. Commun. Rev.}, + issue_date = {August 2011}, + volume = {41}, + number = {4}, + month = aug, + year = {2011}, + issn = {0146-4833}, + pages = {218--229}, + numpages = {12}, + acmid = {2018462}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {difference digest, invertible bloom filter, set difference}, +} + + +@misc{setu, + author = {Elias Summermatter and Christian Grothoff}, + title = {Byzantine Fault Tolerant Set Reconciliation}, + howpublished = {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}}, + month = {1}, + year = {2021}, +} diff --git a/presentations/2026-dielinke/images/Logo-NGI_TALER_Tag_bluetext.png b/presentations/2026-dielinke/images/Logo-NGI_TALER_Tag_bluetext.png Binary files differ. diff --git a/presentations/2026-dielinke/images/bandera.jpg b/presentations/2026-dielinke/images/bandera.jpg Binary files differ. diff --git a/presentations/2026-dielinke/images/logo-NGI_TALER_Bold.png b/presentations/2026-dielinke/images/logo-NGI_TALER_Bold.png Binary files differ. diff --git a/presentations/2026-dielinke/images/sbfi.jpg b/presentations/2026-dielinke/images/sbfi.jpg Binary files differ. diff --git a/presentations/2026-dielinke/logo-NGI_TALER_Bold.svg b/presentations/2026-dielinke/logo-NGI_TALER_Bold.svg @@ -0,0 +1,94 @@ +<?xml version="1.0" encoding="UTF-8" standalone="no"?> +<!-- Created with Inkscape (http://www.inkscape.org/) --> + +<svg + version="1.1" + id="svg2" + xml:space="preserve" + width="1799.51" + height="502.77802" + viewBox="0 0 539.85301 150.8334" + xmlns:xlink="http://www.w3.org/1999/xlink" + xmlns="http://www.w3.org/2000/svg" + xmlns:svg="http://www.w3.org/2000/svg" + xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" + xmlns:cc="http://creativecommons.org/ns#" + xmlns:dc="http://purl.org/dc/elements/1.1/"><metadata + id="metadata8"><rdf:RDF><cc:Work + rdf:about=""><dc:format>image/svg+xml</dc:format><dc:type + rdf:resource="http://purl.org/dc/dcmitype/StillImage" /></cc:Work></rdf:RDF></metadata><defs + id="defs6"><linearGradient + id="linearGradient1220"><stop + id="stop1216" + offset="0" + style="stop-color:#0042b3;stop-opacity:1;" /><stop + id="stop1218" + offset="1" + style="stop-color:#000000;stop-opacity:1;" /></linearGradient><linearGradient + x1="0" + y1="0" + x2="1" + y2="0" + gradientUnits="userSpaceOnUse" + gradientTransform="matrix(-139.45511,-135.52185,-135.52185,139.45511,177.4727,131.75308)" + spreadMethod="pad" + id="linearGradient28"><stop + style="stop-opacity:1;stop-color:#00afbc" + offset="0" + id="stop24" /><stop + style="stop-opacity:1;stop-color:#205374" + offset="1" + id="stop26" /></linearGradient><clipPath + clipPathUnits="userSpaceOnUse" + id="clipPath38"><path + d="M 0,127.984 H 415.474 V 0 H 0 Z" + id="path36" /></clipPath><linearGradient + xlink:href="#linearGradient1220" + id="linearGradient947" + gradientUnits="userSpaceOnUse" + x1="14.915152" + y1="14.167241" + x2="214.11908" + y2="111.76186" + gradientTransform="matrix(1.3333322,0,0,-1.3333322,1.4909048,160.74004)" /><clipPath + clipPathUnits="userSpaceOnUse" + id="clipPath38-9"><path + d="M 0,127.984 H 415.474 V 0 H 0 Z" + id="path36-1" /></clipPath> + + + + + + + + + + +<clipPath + clipPathUnits="userSpaceOnUse" + id="clipPath38-3"><path + d="M 0,127.984 H 415.474 V 0 H 0 Z" + id="path36-5" /></clipPath></defs><g + id="g40" + transform="matrix(1.3333333,0,0,-1.3333333,224.76159,32.92067)" /><g + id="g44" + transform="matrix(1.3333333,0,0,-1.3333333,192.92306,74.082135)" /><path + id="path1" + style="fill:#ffffff;fill-opacity:1;stroke:none;stroke-width:1.32735" + d="m 35.661931,9.2984771 c -8.068918,0 -14.668375,6.6007879 -14.668375,14.6683759 V 126.86656 c 0,8.06893 6.599457,14.66837 14.668375,14.66837 H 254.71984 c 8.0676,0 14.66897,-6.60078 14.66897,-14.66837 v -24.23749 c 0,-2.683906 1.06552,-5.258903 2.96494,-7.158333 l 12.07383,-12.073246 c 3.37147,-3.370134 3.36193,-8.83624 -0.0176,-12.195752 L 272.37529,59.232903 c -1.91138,-1.89943 -2.98652,-4.484816 -2.98652,-7.179318 V 23.966853 c 0,-8.067588 -6.60137,-14.668376 -14.66897,-14.668376 z" /><path + id="path30" + style="fill:url(#linearGradient947);fill-opacity:1;stroke:none;stroke-width:1.33333" + d="m 35.128116,9.0001521 c -8.105326,0 -14.734559,6.6305699 -14.734559,14.7345599 V 127.0987 c 0,8.10533 6.629233,14.73455 14.734559,14.73455 H 255.17442 c 8.104,0 14.73515,-6.63056 14.73515,-14.73455 v -24.34685 c 0,-2.69601 1.07032,-5.282629 2.97832,-7.190628 L 285.0162,83.433498 c 3.38667,-3.385333 3.37709,-8.876108 -0.0176,-12.250774 L 272.90957,59.159882 c -1.92,-1.908 -3,-4.50505 -3,-7.21171 v -28.21346 c 0,-8.10399 -6.63115,-14.7345599 -14.73515,-14.7345599 z M 178.96686,31.463812 c 7.44667,0 14.20687,1.25606 20.27753,3.76406 2.632,1.088 5.08274,2.38884 7.34941,3.90351 4.80533,3.20933 5.06012,10.28126 0.42011,13.93593 -2.97733,2.34533 -7.22162,2.37784 -10.34295,0.22851 -4.91334,-3.384 -10.49186,-5.07597 -16.7332,-5.07597 -5.42399,0 -10.24004,1.13444 -14.44803,3.39844 -4.21066,2.26933 -7.48813,5.46421 -9.83613,9.59354 -2.348,4.128 -3.52089,8.863545 -3.52089,14.204874 0,5.262662 1.17289,9.957343 3.52089,14.08534 2.348,4.127997 5.60586,7.346649 9.77519,9.653314 4.168,2.30667 8.92374,3.45996 14.26639,3.45996 3.10534,0 6.04131,-0.3652 8.80664,-1.09453 2.94133,-0.776 5.18536,-2.993344 6.06269,-5.777342 0.30933,-0.986666 -0.44658,-1.991599 -1.48125,-1.991599 -5.64932,0 -10.1857,-4.76145 -9.81503,-10.489444 0.33867,-5.226665 4.91211,-9.179877 10.15077,-9.179877 h 9.71073 c 0.0867,0 0.17072,0.01023 0.25606,0.0129 0.0867,-0.0027 0.17072,-0.0129 0.25605,-0.0129 h 0.67442 c 4.77733,0 8.64844,3.871849 8.64844,8.647845 v 12.062685 c 0,9.915992 -6.37351,18.792892 -15.8455,21.728882 -0.06,0.0187 -0.12164,0.0376 -0.18164,0.0563 -6.072,1.86133 -12.1839,2.79317 -18.33457,2.79317 -8.82398,0 -16.75575,-1.88135 -23.79841,-5.64667 -7.04266,-3.764 -12.56657,-8.98403 -16.57322,-15.662688 -4.00667,-6.678661 -6.01055,-14.225302 -6.01055,-22.645296 0,-8.417328 2.00388,-15.966214 6.01055,-22.643534 4.00665,-6.67867 9.57035,-11.90002 16.69568,-15.66269 7.12,-3.76399 15.1345,-5.64667 24.03982,-5.64667 z m -124.941688,1.45664 h 1.957031 c 2.911996,0 5.670644,1.30506 7.51464,3.55839 l 32.18025,39.299973 c 2.40266,2.935998 7.160147,1.236302 7.160147,-2.557028 V 42.633532 c 0,-5.36534 4.34775,-9.71308 9.71308,-9.71308 5.36532,0 9.71483,4.34774 9.71483,9.71308 v 65.568108 c 0,5.364 -4.34951,9.71308 -9.71483,9.71308 h -1.84102 c -2.90799,0 -5.66286,-1.30236 -7.50819,-3.54902 L 70.896063,75.025887 c -2.40534,-2.929333 -7.15781,-1.228362 -7.15781,2.562301 v 30.613452 c 0,5.364 -4.347752,9.71308 -9.713081,9.71308 -5.363996,0 -9.713077,-4.34908 -9.713077,-9.71308 V 42.633532 c 0,-5.36534 4.349081,-9.71308 9.713077,-9.71308 z m 182.129738,6e-4 c 5.43199,0 9.83495,4.40237 9.83495,9.83437 v 65.323768 c 0,5.432 -4.40296,9.83496 -9.83495,9.83496 -5.432,0 -9.83436,-4.40296 -9.83436,-9.83496 V 42.755402 c 0,-5.432 4.40236,-9.83437 9.83436,-9.83437 z" /><text + style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:26.68px;font-family:'Montserrat SemiBold';-inkscape-font-specification:'Montserrat SemiBold, Bold';font-variant-ligatures:normal;font-variant-caps:normal;font-variant-numeric:normal;font-feature-settings:normal;text-align:start;writing-mode:lr-tb;text-anchor:start;fill:#6f9aa8;fill-opacity:1;fill-rule:nonzero;stroke:none;stroke-width:1.33333" + id="text2843" + x="310.31342" + y="112.88041"><tspan + id="tspan2841" + x="310.31342" + y="112.88041" + style="stroke-width:1.33333" /></text><path + style="font-weight:bold;font-size:31.76px;font-family:Montserrat;-inkscape-font-specification:'Montserrat, Bold';fill:#6f9aa8;stroke-width:1.34335" + d="M 324.89475,93.293065 V 69.059394 h -9.55696 v -5.631772 h 26.02559 v 5.631772 h -9.55695 v 24.233671 z m 28.32951,0 13.31145,-29.865443 h 6.82638 l 13.35412,29.865443 h -7.25304 l -10.9222,-26.366916 h 2.73053 l -10.96485,26.366916 z m 6.65574,-6.399739 1.83459,-5.247784 h 15.35936 l 1.87723,5.247784 z m 42.025,6.399739 V 63.427622 h 6.91172 v 24.233672 h 14.97537 v 5.631771 z M 446.1059,75.45913 h 14.37804 v 5.375779 H 446.1059 Z m 0.51195,12.287494 h 16.25535 v 5.546441 H 439.74882 V 63.427622 h 22.56974 v 5.546443 h -15.70071 z m 33.8333,5.546441 V 63.427622 h 12.92746 q 4.01051,0 6.91172,1.32262 2.90124,1.279944 4.47981,3.711844 1.57862,2.4319 1.57862,5.802427 0,3.327863 -1.57862,5.759763 -1.57857,2.389235 -4.47981,3.669182 -2.90121,1.279947 -6.91172,1.279947 h -9.08762 l 3.07188,-3.029208 v 11.348868 z m 18.98587,0 -7.46635,-10.83689 h 7.38106 l 7.55166,10.83689 z m -12.07415,-10.5809 -3.07188,-3.242534 h 8.70365 q 3.19987,0 4.77848,-1.365276 1.57861,-1.407942 1.57861,-3.839842 0,-2.474565 -1.57861,-3.839841 -1.57861,-1.365278 -4.77848,-1.365278 h -8.70365 l 3.07188,-3.285197 z" + id="text2191" + aria-label="T A L E R&#10;" /></svg> diff --git a/presentations/2026-dielinke/offline-timeline.pdf b/presentations/2026-dielinke/offline-timeline.pdf Binary files differ. diff --git a/presentations/2026-dielinke/ref.bib b/presentations/2026-dielinke/ref.bib @@ -0,0 +1,258 @@ + + +@misc{miller2014tls, + author = {Brad Miller and Ling Huang and A.D. Joseph and J.D. Tygar}, + title = {I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis}, + year = {2014}, + howpublished = {\url{http://arxiv.org/abs/1403.0297}} +} + +@article{crowds, + author = {Reiter, Michael K. and Rubin, Aviel D.}, + title = {Anonymous Web transactions with Crowds}, + journal = {Commun. ACM}, + issue_date = {Feb. 1999}, + volume = {42}, + number = {2}, + month = feb, + year = {1999}, + issn = {0001-0782}, + pages = {32--48}, + numpages = {17}, +} + +@inproceedings{tor2004, +author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul}, +title = {Tor: the second-generation onion router}, +year = {2004}, +publisher = {USENIX Association}, +address = {USA}, +abstract = {We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication.}, +booktitle = {Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13}, +pages = {21}, +numpages = {1}, +location = {San Diego, CA}, +series = {SSYM'04} +} + + + + + +@inproceedings{mixminion, + author = {Danezis, George and Dingledine, Roger and Mathewson, Nick}, + title = {Mixminion: Design of a Type III Anonymous Remailer Protocol}, + booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, + series = {SP '03}, + year = {2003}, + isbn = {0-7695-1940-7}, +} + +@inproceedings{ gap, + author = "Krista Bennett and Christian Grothoff", + title = "{gap - Practical Anonymous Networking}", + booktitle = "Designing Privacy Enhancing Technologies", + publisher = "Springer-Verlag", + pages = "141--160", + url = "http://grothoff.org/christian/aff.pdf", + year = "2003" +} + +@article{gilbertCAP2002, + author = {Gilbert, Seth and Lynch, Nancy}, + title = {Brewer's Conjecture and the Feasibility of Consistent, Available, Partition-tolerant Web Services}, + journal = {SIGACT News}, + issue_date = {June 2002}, + volume = {33}, + number = {2}, + month = jun, + year = {2002}, + issn = {0163-5700}, + pages = {51--59}, + numpages = {9}, + url = {http://doi.acm.org/10.1145/564585.564601}, + doi = {10.1145/564585.564601}, + acmid = {564601}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + +@INPROCEEDINGS{bls, + author = {Dan Boneh and Ben Lynn and Hovav Shacham}, + title = {Short signatures from the Weil pairing}, + booktitle = {Advances in Cryptology – ASIACRYPT ’01, LNCS}, + year = {2001}, + pages = {514--532}, + publisher = {Springer} +} + +@INPROCEEDINGS{polkadot, + author={Abbas, Hanaa and Caprolu, Maurantonio and Di Pietro, Roberto}, + booktitle={2022 IEEE International Conference on Blockchain (Blockchain)}, + title={Analysis of Polkadot: Architecture, Internals, and Contradictions}, + year={2022}, + volume={}, + number={}, + pages={61-70}, +} + + +@article{zfone, + author = {Laurianne McLaughlin}, + title = {Philip Zimmermann on What's Next after PGP}, + journal ={IEEE Security \& Privacy}, + volume = {4}, + number = {1}, + issn = {1540-7993}, + year = {2006}, + pages = {10-13}, +} + +@inproceedings{sybil, + title = {{The Sybil Attack}}, + author = {John Douceur}, + booktitle = {Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS + 2002)}, + year = {2002}, + month = {March}, +} + +@inproceedings{timing-fc2004, + title = {Timing Attacks in Low-Latency Mix-Based Systems}, + author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, + booktitle = {Proceedings of Financial Cryptography (FC '04)}, + year = {2004}, + month = {February}, + pages = {251--265}, +} + +@InCollection{ cbdc2021chaum, + author = {David Chaum and Christian Grothoff and Thomas Moser}, + title = {How to Issue a Central Bank Digital Currency}, + booktitle = {SNB Working Papers}, + publisher = {Swiss National Bank}, + year = {2021}, + number = {2021-3}, + month = {February}, +} + + +@TechReport{frost, + author = {Deirdre Connolly and Chelsea Komlo and Ian Goldberg and Christopher A. Wood}, + title = {Two-Round Threshold Schnorr Signatures with FROST }, + institution = {IRTF}, + year = {2023}, + note = {\url{https://datatracker.ietf.org/doc/draft-irtf-cfrg-frost/}}, +} + +@InProceedings{esorics2022age, + author = {Kesim, {\"O}zg{\"u}r and Grothoff, Christian and +Dold, Florian and Schanzenbach, Martin}, + editor = {Atluri, Vijayalakshmi and Di Pietro, Roberto and +Jensen, Christian D. and Meng, Weizhi}, + title = {{Zero-Knowledge Age Restriction for {GNU Taler}}}, + booktitle = {Computer Security -- ESORICS 2022}, + year = {2022}, + publisher = {Springer International Publishing}, + address = {Cham}, + pages = {110--129}, + isbn = {978-3-031-17140-6}, + howpublished = {\url{https://link.springer.com/chapter/10.1007/978-3-031-17140-6_6}}, +} + +@MastersThesis{anastasis, + author = {Dominik Samuel Meister and Dennis Neufeld}, + title = {Anastasis: Password-less key recovery via multi-factor multi-party authentication}, + school = {Bern University of Applied Sciences}, + year = {2020}, + month = {June}, +} + +@phdthesis{DBLP:phd/hal/Dold19, + author = {Florian Dold}, + title = {The {GNU} Taler system: practical and provably secure electronic payments. + (Le syst{\`{e}}me {GNU} Taler: Paiements {\'{e}}lectroniques + pratiques et s{\'{e}}curis{\'{e}}s)}, + school = {University of Rennes 1, France}, + year = {2019}, + url = {https://tel.archives-ouvertes.fr/tel-02138082}, + timestamp = {Tue, 21 Jul 2020 00:40:38 +0200}, + biburl = {https://dblp.org/rec/phd/hal/Dold19.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + + +@InProceedings{taler2016space, + author = {Jeffrey Burdges and Florian Dold and Christian Grothoff and Marcello Stanisci}, + title = {Enabling Secure Web Payments with {{GNU Taler}}}, + booktitle = {6th International Conference on Security, Privacy and Applied Cryptographic Engineering}, + year = {2016}, + editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, + number = {10076}, + series = {LNCS}, + pages = {251-270}, + month = {Dec}, + publisher = {Springer}, +} +@InProceedings{10.1007/3-540-48910-X_16, +author="Paillier, Pascal", +editor="Stern, Jacques", +title="Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", +booktitle="Advances in Cryptology --- EUROCRYPT '99", +year="1999", +publisher="Springer Berlin Heidelberg", +address="Berlin, Heidelberg", +pages="223--238", +abstract="This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes: a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model.", +isbn="978-3-540-48910-8" +} + +@TechReport{smcgeo, + author = {Mikhail J. Atallah and Wenliang Du}, + title = {Secure Multi-Party Computational Geometry}, + institution = {Purdue University}, + year = {2001}, + number = {2001-48}, + address = {West Lafayette, IN 47907}, +} + +@inproceedings{IoannidisGA02, + author = {Ioannis Ioannidis and + Ananth Grama and + Mikhail J. Atallah}, + title = {A Secure Protocol for Computing Dot-Products in Clustered and Distributed + Environments}, + booktitle = {31st International Conference on Parallel Processing {(ICPP} 2002), + 20-23 August 2002, Vancouver, BC, Canada}, + pages = {379--384}, + publisher = {{IEEE} Computer Society}, + year = {2002}, + url = {https://doi.org/10.1109/ICPP.2002.1040894}, + doi = {10.1109/ICPP.2002.1040894}, + timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, + biburl = {https://dblp.org/rec/conf/icpp/IoannidisGA02.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@INPROCEEDINGS{Amirbekyan_anew, + author = {Artak Amirbekyan and Vladimir Estivill-castro}, + title = {A new efficient privacypreserving scalar product protocol}, + booktitle = {in Proc. of AusDM ’07}, + year = {}, + pages = {209--214} +} + +@Inbook{Chaum1984, +author="Chaum, David", +title="Blind Signature System", +bookTitle="Advances in Cryptology: Proceedings of Crypto 83", +year="1984", +publisher="Springer US", +address="Boston, MA", +pages="153--153", +abstract="An untraceable payments system based on an extension of public key cryptography, called blind signatures, has been presented previously by the author. The existence of such blind signature systems was not demonstrated. An actual set of implementable functions is presented in the present work which have the blind signature property, and for which the blindness of the signature is proved without any assumptions about computational infeasibility. In terms of the simple payments system previously presented, this means that even a conspiracy between the bank and payee can learn nothing from their participation in the payments protocol about the identity of the payer.", +isbn="978-1-4684-4730-9", +doi="10.1007/978-1-4684-4730-9_14", +url="https://doi.org/10.1007/978-1-4684-4730-9_14" +} diff --git a/presentations/2026-dielinke/taler-macros.tex b/presentations/2026-dielinke/taler-macros.tex @@ -0,0 +1,108 @@ +\usepackage[utf8]{inputenc} + +% fonts and colors +\usepackage[defaultfam,tabular,lining]{montserrat} + +\setbeamercolor{normal text}{fg=black,bg=white} +\setbeamercolor{alerted text}{fg=red!50!black} +\setbeamercolor{example text}{fg=green!50!black} + +\setbeamercolor{title}{fg=white} +\setbeamerfont{title}{size=\Huge} +\setbeamerfont{title}{series=\bfseries} + +\setbeamercolor{subtitle}{fg=white} +\setbeamerfont{subtitle}{size=\Large} + +\setbeamercolor{author}{fg=white} +\setbeamerfont{author}{size=\Large} + +\setbeamercolor{institute}{fg=white} +\setbeamerfont{institute}{size=\large} + +\setbeamercolor{date}{fg=black} +\setbeamerfont{date}{size=\large} + +\setbeamercolor{frametitle}{fg=white} +\setbeamerfont{frametitle}{size=\LARGE} +\setbeamerfont{framesubtitle}{size=\large} + +\makeatletter +\setbeamertemplate{frametitle}{% + \vbox{}\vskip-0.5em% + \begin{beamercolorbox}[wd=.85\paperwidth]{frametitle} + \usebeamerfont{frametitle}% + \strut\insertframetitle\strut\par% + \end{beamercolorbox} + \ifx\insertframesubtitle\@empty% + \vskip.9em + \else% + \vskip-0.3em + \begin{beamercolorbox}[wd=.68\paperwidth]{frametitle} + \usebeamerfont{framesubtitle}% + \strut\insertframesubtitle\strut\par% + \end{beamercolorbox} + \fi +} +\makeatother + +\usepackage{tikz} +\usetikzlibrary{calc,intersections,positioning,fadings,through} + +% footline +\setbeamertemplate{navigation symbols}{} +\setbeamertemplate{footline}{% + \leavevmode% + \hskip3pt% + \insertframenumber + \hfill + \SPEAKER + \hfill + \SUB + \hfill + \raisebox{-0.8mm}{\includegraphics[height=0.7cm]{images/logo-NGI_TALER_Bold.png}} + \vskip0pt% +} + +% background + +\usepackage{xcolor} +\definecolor{left}{RGB}{0,66,179} + +\setbeamertemplate{title page} +{%\leavemode% + \begin{beamercolorbox}[wd=\the\paperwidth, ht=\the\paperheight,ignorebg,center]{} + \begin{tikzpicture}[overlay, remember picture] + \fill [left color=left, right color=left!50!black] (current page.north west) -- (current page.north east) -- ($(current page.north east)+(0,-6.5)$) -- ($(current page.north west)+(5,-6.5)$) -- ($(current page.north west)+(4.5,-6.8)$) -- ($(current page.north west)+(4,-6.5)$) -- ($(current page.north west)+(0,-6.5)$); + \end{tikzpicture} + \end{beamercolorbox}% + \vspace*{-8.5cm} + + \begin{beamercolorbox}[sep=8pt,left]{title} + {\usebeamerfont{title}\inserttitle\par}% + {\usebeamerfont{subtitle}\insertsubtitle\par}% + \end{beamercolorbox}% + \vskip1em\par + \begin{beamercolorbox}[sep=8pt,left]{author} + \usebeamerfont{author}\insertauthor + \end{beamercolorbox} + \vspace*{-0.3cm} + \begin{beamercolorbox}[sep=8pt,left]{institute} + \usebeamerfont{inst}\insertinstitute\\ + \end{beamercolorbox}% + +\vspace*{0.5cm} + + \begin{beamercolorbox}[sep=5pt,left]{date} + \usebeamerfont{date}\insertdate + \end{beamercolorbox} + \vspace*{2.5cm} +} + +\setbeamertemplate{background canvas} +{%\leavemode% + \begin{tikzpicture}[overlay, remember picture] + \fill [left color=left, right color=left!50!black] (current page.north west) -- (current page.north east) -- ($(current page.north east)+(0,-2)$) -- ($(current page.north west)+(5,-2)$) -- ($(current page.north west)+(4.5,-2.3)$) -- ($(current page.north west)+(4,-2)$) -- ($(current page.north west)+(0,-2)$); + \end{tikzpicture} +} +