{"guid":"0275b08c-16b7-57ca-abbf-39dbe6326257","title":"Irgendwas mit Hardware Security Modules","subtitle":"","slug":"ds25-513-irgendwas-mit-hardware-security-modules-vortrag","link":"https://talks.datenspuren.de/ds25/talk/J9CQP8/","description":"\r\nDer Vortrag betrachtet die Vorteile, und eigentlich die Notwendigkeit, der Nutzung von Hardware Security Modules (HSM) hinsichtlich technischer als auch organisatorischer Aspekte.\r\n\r\nFolien zur Vorbereitung sind unter https://senf.space/ds25-hsm-prep.pdf zu finden.\r\n\r\nAufgrund der kurzen Vortragszeit ist es nützlich, diese kurz überflogen zu haben und schon mal etwas über gängige Implementierungen (GnuPG, S/MIME) gelesen zu haben.\r\n\r\nEs werden mir bekannte HSM inklusive meiner jeweiligen Meinung vorgestellt. Im Anschluss wird anhand eines Nitrokey 3 die Nutzung gängiger Verfahren erläutert.\r\n\r\nEin weiterer Vortrag zum Thema Nitrokey ist: https://talks.datenspuren.de/ds25/talk/79MCPJ/\r\n\r\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/de/","original_language":"deu","persons":["Senf"],"tags":["513","2025","ds25","Sicherheit","Kleiner Saal","ds25-deu","Day 2"],"view_count":506,"promoted":false,"date":"2025-09-20T14:15:00.000+02:00","release_date":"2025-09-20T00:00:00.000+02:00","updated_at":"2026-04-02T11:30:07.040+02:00","length":2569,"duration":2569,"thumb_url":"https://static.media.ccc.de/media/events/datenspuren/2025/513-0275b08c-16b7-57ca-abbf-39dbe6326257.jpg","poster_url":"https://static.media.ccc.de/media/events/datenspuren/2025/513-0275b08c-16b7-57ca-abbf-39dbe6326257_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/datenspuren/2025/513-0275b08c-16b7-57ca-abbf-39dbe6326257.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/datenspuren/2025/513-0275b08c-16b7-57ca-abbf-39dbe6326257.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/ds25-513-irgendwas-mit-hardware-security-modules-vortrag","url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_title":"Datenspuren 2025","conference_url":"https://api.media.ccc.de/public/conferences/DS2025","related":[],"recordings":[{"size":156,"length":2569,"mime_type":"video/webm;codecs=av01","language":"deu","filename":"ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-09-21T02:10:10.774+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2025/av1-hd/ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/91480","event_url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_url":"https://api.media.ccc.de/public/conferences/DS2025"},{"size":23,"length":2569,"mime_type":"audio/opus","language":"deu","filename":"ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-09-21T02:10:56.489+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2025/opus/ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_opus.opus","url":"https://api.media.ccc.de/public/recordings/91482","event_url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_url":"https://api.media.ccc.de/public/conferences/DS2025"},{"size":71,"length":2569,"mime_type":"video/mp4","language":"deu","filename":"ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-09-21T02:12:44.712+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2025/h264-sd/ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_sd.mp4","url":"https://api.media.ccc.de/public/recordings/91485","event_url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_url":"https://api.media.ccc.de/public/conferences/DS2025"},{"size":39,"length":2569,"mime_type":"audio/mpeg","language":"deu","filename":"ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-09-21T02:10:52.762+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2025/mp3/ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/91481","event_url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_url":"https://api.media.ccc.de/public/conferences/DS2025"},{"size":159,"length":2569,"mime_type":"video/mp4","language":"deu","filename":"ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-09-20T20:09:41.089+02:00","recording_url":"https://cdn.media.ccc.de/events/datenspuren/2025/h264-hd/ds25-513-deu-Irgendwas_mit_Hardware_Security_Modules_-_Vortrag_hd.mp4","url":"https://api.media.ccc.de/public/recordings/91429","event_url":"https://api.media.ccc.de/public/events/0275b08c-16b7-57ca-abbf-39dbe6326257","conference_url":"https://api.media.ccc.de/public/conferences/DS2025"}]}