taler-www

Main taler.net website
Log | Files | Refs | Submodules | README | LICENSE

commit ff53c175e4f09207040ac6defbe0b6c2885a4561
parent 0b206f824d378e2f38074ea8b28a1614b0b0d76f
Author: Christian Grothoff <christian@grothoff.org>
Date:   Mon, 15 Jul 2024 19:35:57 +0200

fix text

Diffstat:
Mtemplate/news/2024-14.html.j2 | 6+++---
1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/template/news/2024-14.html.j2 b/template/news/2024-14.html.j2 @@ -5,7 +5,7 @@ <p> On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project. </p> -<h2>Welcome talk by Peter Brunner Head of research at the BFH-TI</h2> +<h2>Welcome talk (Peter Brunner, Head of research at BFH-TI)</h2> <p> <video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls"> <source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" /> @@ -25,7 +25,7 @@ gives a brief overview of the technology and the direction of the project. <source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" /> </video> -<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at the BFH-TI)</h2> +<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at BFH-TI)</h2> <p> Hardware protected confirmation empowers user’s sole control over confirmation actions in digital space - even on a compromised devices. It can be applied @@ -42,7 +42,7 @@ protected confirmation was successfully piloted within the UBS e-banking in <source src="/videos/2024_07_point_zero_forum_benjamin_fehrensen.mp4" type="video/mp4" /> </video> -<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at the BFH-TI and Kevin Schrag, Master Student at the BFH-TI)</h2> +<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at BFH-TI and Kevin Schrag, Master Student at BFH-TI)</h2> <p> Advancements in hardware forensics and hacking pose significant challenges to