commit ff53c175e4f09207040ac6defbe0b6c2885a4561
parent 0b206f824d378e2f38074ea8b28a1614b0b0d76f
Author: Christian Grothoff <christian@grothoff.org>
Date: Mon, 15 Jul 2024 19:35:57 +0200
fix text
Diffstat:
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/template/news/2024-14.html.j2 b/template/news/2024-14.html.j2
@@ -5,7 +5,7 @@
<p>
On the occasion of the Point Zero Forum's Innovation Tour, we have showcased the privacy-preserving GNU Taler payment system along with its various applications and extensions – as well as other payment- and digital identity related projects – that are currently being developed at the Bern University of Applied Sciences and its international partners as part of the NGI TALER EU project.
</p>
-<h2>Welcome talk by Peter Brunner Head of research at the BFH-TI</h2>
+<h2>Welcome talk (Peter Brunner, Head of research at BFH-TI)</h2>
<p>
<video id="video" poster="/images/logo-2021.svg" autobuffer="" height="360" width="640" controls="controls">
<source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" />
@@ -25,7 +25,7 @@ gives a brief overview of the technology and the direction of the project.
<source src="/videos/2024_07_point_zero_forum_welcome_peter_brunner.mp4" type="video/mp4" />
</video>
-<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at the BFH-TI)</h2>
+<h2>The Vital Role of Protected Confirmation (Benjamin Fehrensen, Professor at BFH-TI)</h2>
<p>
Hardware protected confirmation empowers user’s sole control over confirmation
actions in digital space - even on a compromised devices. It can be applied
@@ -42,7 +42,7 @@ protected confirmation was successfully piloted within the UBS e-banking in
<source src="/videos/2024_07_point_zero_forum_benjamin_fehrensen.mp4" type="video/mp4" />
</video>
-<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at the BFH-TI and Kevin Schrag, Master Student at the BFH-TI)</h2>
+<h2>Demonstration: Limits of Hardware Key Protection (Andreas Habegger, Professor at BFH-TI and Kevin Schrag, Master Student at BFH-TI)</h2>
<p>
Advancements in hardware forensics and hacking pose significant challenges to