{"guid":"import-712831a77a45a2e53f","title":"“Yes We Can’t!” - on kleptography and cryptovirology","subtitle":null,"slug":"26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology","link":"http://events.ccc.de/congress/2009/Fahrplan/events/3702.en.html","description":"In this talk I will survey some of the results (with Adam Young) on Cryptovirology (the art of employing public key cryptography maliciously as part of a malware attack, such as in ransomware) and the related Kleptography (the art of embedding cryptographic Trojans inside tamper-proof cryptosystems).\n","original_language":"eng","persons":["Moti Yung"],"tags":["26c3"," Hacking"],"view_count":87,"promoted":false,"date":"2009-12-29T01:00:00.000+01:00","release_date":"2009-12-29T01:00:00.000+01:00","updated_at":"2026-01-04T10:45:10.319+01:00","length":3340,"duration":3340,"thumb_url":"https://static.media.ccc.de/media/congress/2009/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.jpg","poster_url":"https://static.media.ccc.de/media/congress/2009/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2009/import-712831a77a45a2e53f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2009/import-712831a77a45a2e53f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology","url":"https://api.media.ccc.de/public/events/import-712831a77a45a2e53f","conference_title":"26C3: Here be Dragons","conference_url":"https://api.media.ccc.de/public/conferences/26c3","related":[{"event_id":1271,"event_guid":"import-f8b849a9e3b83d4724","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1309,"event_guid":"import-85069872c1089c4360","weight":1},{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":1},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":1},{"event_id":1354,"event_guid":"import-9ccb7a83f51f1522a1","weight":1},{"event_id":1356,"event_guid":"import-79abc6678b832816fd","weight":1},{"event_id":1362,"event_guid":"import-5f693514aee8848fb2","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1367,"event_guid":"import-71e21240c5411bc6a6","weight":1},{"event_id":1370,"event_guid":"import-e395c5dd45fe2eb4d1","weight":1},{"event_id":1375,"event_guid":"import-7cf3890d64fd07e22e","weight":1},{"event_id":1383,"event_guid":"import-c5cfcdb5af5a7ff87e","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1392,"event_guid":"import-4e9c0ca8ed477893c1","weight":1},{"event_id":1395,"event_guid":"import-4137bcc9f19cd11ed9","weight":1},{"event_id":1401,"event_guid":"import-ca7f98bebd89e24485","weight":1},{"event_id":1412,"event_guid":"import-e3fcaa02eb8239d225","weight":1},{"event_id":1417,"event_guid":"import-5c9815bf98ccc8a92a","weight":1},{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":1},{"event_id":1432,"event_guid":"import-471cc3975501e96422","weight":1}],"recordings":[{"size":624,"length":3340,"mime_type":"audio/ogg","language":"eng","filename":"26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg","state":"downloaded","folder":"ogg","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:50.289+02:00","recording_url":"https://cdn.media.ccc.de/congress/2009/ogg/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg","url":"https://api.media.ccc.de/public/recordings/2615","event_url":"https://api.media.ccc.de/public/events/import-712831a77a45a2e53f","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":624,"length":3340,"mime_type":"video/mp4","language":"eng","filename":"26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:39.586+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/mp4/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4","url":"https://api.media.ccc.de/public/recordings/2614","event_url":"https://api.media.ccc.de/public/events/import-712831a77a45a2e53f","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":624,"length":3340,"mime_type":"video/webm","language":"eng","filename":"26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:39.618+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/webm/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.webm","url":"https://api.media.ccc.de/public/recordings/2613","event_url":"https://api.media.ccc.de/public/events/import-712831a77a45a2e53f","conference_url":"https://api.media.ccc.de/public/conferences/26c3"}]}