{"guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","title":"Practical Cryptography Patterns","subtitle":null,"slug":"gpn18-129-practical-cryptography-patterns","link":"https://c3voc.de","description":"Unprotected data will put not only your customers at risk. Jens' talk will give you actionable advice on how - and why - cryptography can help you and your managers to get better sleep. His talk will illustrate legal and regulatory requirements, and will then dive into a set of cryptographic patterns to get you started on your way to better and more secure software.\n\nBetting all your data on your cloud providers security might not be the best way to exercise your accountability. Protecting data with cryptography can ensure that your last line of defense actually holds.","original_language":"deu","persons":["Jens Neuhalfen"],"tags":["gpn18","129"],"view_count":264,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-05-02T00:00:03.304+02:00","length":3973,"duration":3973,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/129-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/129-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-129-practical-cryptography-patterns","url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":13},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":14},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":13},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":11},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":11},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":4},{"event_id":5353,"event_guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","weight":2},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":2},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":12},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":7},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":13},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":13},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":24},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":17}],"recordings":[{"size":227,"length":3973,"mime_type":"video/mp4","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-05-11T17:54:15.022+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/h264-hd/gpn18-129-deu-Practical_Cryptography_Patterns_hd.mp4","url":"https://api.media.ccc.de/public/recordings/24916","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"},{"size":60,"length":3963,"mime_type":"audio/mpeg","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-01-01T21:12:35.508+01:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/mp3/gpn18-129-deu-Practical_Cryptography_Patterns_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/32701","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"},{"size":36,"length":3963,"mime_type":"audio/opus","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-01-01T21:13:04.032+01:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/opus/gpn18-129-deu-Practical_Cryptography_Patterns_opus.opus","url":"https://api.media.ccc.de/public/recordings/32702","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"},{"size":102,"length":3973,"mime_type":"video/mp4","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-01-01T21:28:36.422+01:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/h264-sd/gpn18-129-deu-Practical_Cryptography_Patterns_sd.mp4","url":"https://api.media.ccc.de/public/recordings/32703","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"},{"size":137,"length":3973,"mime_type":"video/webm","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-01-01T21:29:07.503+01:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/webm-sd/gpn18-129-deu-Practical_Cryptography_Patterns_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/32704","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"},{"size":336,"length":3973,"mime_type":"video/webm","language":"deu","filename":"gpn18-129-deu-Practical_Cryptography_Patterns_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-01-01T21:54:43.340+01:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn18/webm-hd/gpn18-129-deu-Practical_Cryptography_Patterns_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/32706","event_url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_url":"https://api.media.ccc.de/public/conferences/gpn18"}]}