SecAppDev 2026 lecture details
The ongoing crypto wars
This talk traces crypto wars from limits on research and key escrow to Apple vs. FBI. It covers debates on scanning communications and EU plans for access to encrypted data, ending with privacy risks of the EU Digital Identity Wallet.
Schedule TBD
Abstract
This talk explores the history of the crypto wars, highlighting tensions between privacy and government surveillance. It covers early attempts to restrict cryptographic research and mandate key escrow, followed by landmark cases like Apple vs. FBI on device access. Today’s debate centers on scanning communications for child abuse material and age verification. Future EU plans suggest broader access to encrypted data. The talk concludes with a critical look at privacy risks in the European Digital Identity Wallet.
Key takeaway
Crypto wars show ongoing tension between privacy & surveillance, with growing risks to online privacy
Content level
Introductory
Target audience
Software developers, managers, researchers
Prerequisites
None
Join us for SecAppDev. You will not regret it!
Grab your seat now
Bart Preneel
Full professor, COSIC - University of Leuven
Expertise: Applied cryptography, privacy, cybersecurity policy
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Post-Quantum Cryptography (PQC): The Risk of Being Late
Deep-dive lecture by Bart Preneel
Post-Quantum Cryptography (PQC) answers the threat posed by quantum computers. We discuss the emerging standards and national agencies' recommendations for migration. We conclude with performance benchmarks and crypto agility challenges.
Key takeaway: If you have not yet developed a PQC migration strategy, you should do so in the next 6 months.
Privacy Attacks on Deep Learning Systems
Advanced lecture by Katharine Jarmul
In this session, you'll dive into how this creates interesting vectors for privacy attacks on AI/ML systems. You'll also be introduced to what types of interventions might work to address such issues.
Key takeaway: Information exfiltration due to memorization is an interesting attack vector for today's AI/deep learning models.
Security by default - A European perspective on cyber resilience
Deep-dive lecture by Freddy Dezeure in room Lemaire
A technical deep dive into how Microsoft implements security, resilience, and regulatory compliance at scale—mapping NIS2, DORA, and Secure‑by‑Default principles to concrete controls, engineering processes, and tenant‑level protections
Key takeaway: Learn how regulatory requirements become enforceable controls, measurable metrics, and practical Secure‑by‑Default engineering across cloud systems