SecAppDev 2026 lecture details
The ongoing crypto wars
This talk traces crypto wars from limits on research and key escrow to Apple vs. FBI. It covers debates on scanning communications and EU plans for access to encrypted data, ending with privacy risks of the EU Digital Identity Wallet.
Tuesday June 2nd, 14:00 - 15:30
Room Lemaire
Add to calendar (ICS) Add to Google calendarAbstract
This talk explores the history of the crypto wars, highlighting tensions between privacy and government surveillance. It covers early attempts to restrict cryptographic research and mandate key escrow, followed by landmark cases like Apple vs. FBI on device access. Today’s debate centers on scanning communications for child abuse material and age verification. Future EU plans suggest broader access to encrypted data. The talk concludes with a critical look at privacy risks in the European Digital Identity Wallet.
Key takeaway
Crypto wars show ongoing tension between privacy & surveillance, with growing risks to online privacy
Content level
Introductory
Target audience
Software developers, managers, researchers
Prerequisites
None
Join us for SecAppDev. You will not regret it!
Grab your seat now
Bart Preneel
Full professor, COSIC - University of Leuven
Expertise: Applied cryptography, privacy, cybersecurity policy
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Post-Quantum Cryptography (PQC): The Risk of Being Late
Deep-dive lecture by Bart Preneel in room Lemaire
Monday June 1st, 11:00 - 12:30
Post-Quantum Cryptography (PQC) answers the threat posed by quantum computers. We discuss the emerging standards and national agencies' recommendations for migration. We conclude with performance benchmarks and crypto agility challenges.
Key takeaway: If you have not yet developed a PQC migration strategy, you should do so in the next 6 months.
The Art of Cross-site Leaks
Advanced lecture by Tom Van Goethem in room West Wing
Wednesday June 3rd, 14:00 - 15:30
XS-Leaks bypass the same-origin policy to infer sensitive user data via browser side-channels. Learn how these invisible attacks work, what browser vendors are doing, and the simple steps you can take to secure your applications.
Key takeaway: XS-Leaks bypass SOP through side channels and native browser features; learn how SameSite and Fetch Metadata help defend your apps.
Privacy Attacks on Deep Learning Systems
Advanced lecture by Katharine Jarmul in room Lemaire
Wednesday June 3rd, 14:00 - 15:30
In this session, you'll dive into how this creates interesting vectors for privacy attacks on AI/ML systems. You'll also be introduced to what types of interventions might work to address such issues.
Key takeaway: Information exfiltration due to memorization is an interesting attack vector for today's AI/deep learning models.