KIM 1.5: Even more Kaos in the Medical Telematics Infrastructure (TI)

Two years after the first KIM lecture at the 37C3: The weak points shown have now been closed. Furthermore, with the current KIM 1.5+, large files up to 500 MB can now be transferred, and signature handling has been simplified for users by no longer being able to view the detailed information of the signature. But is the system secure now or are there new problems? KIM has established itself as a service for medical e-mails: Electronic certificates of incapacity for work (eAU), dental treatment and cost plans, laboratory information, and medication dosages are to be transmitted securely via KIM. Security is to be guaranteed inconspicuously and automatically in the background, without interaction with the users. For this purpose, the encryption and decryption as well as the signing functionalities are abstracted in an extra software, the so-called client module. This talk will shed light on the design of this security abstraction and the vulnerabilities it causes, such as the forgery or decryption of KIMs. Continuation of 37C3: KIM: Kaos In the Medical Telematics Infrastructure (TI) [https://media.ccc.de/v/37c3-12030-kim_kaos_in_der_medizinischen_telematikinfrastruktur_ti] Licensed to the public under http://creativecommons.org/licenses/by/4.0

LicenseCreative Commons Attribution

Includes AI

More videos by this producer

The art of text (rendering)

Typography is the art of arranging type to make written language legible, readable, and appealing when displayed. However, for the neophyte, typography is mostly apprehended as the juxtaposition of characters displayed on the screen while for the expert, typography means typeface, scripts, unicode,

Black Box Palantir

Who uses Palantir software in Germany and who plans to do so in the near future? What are the legal requirements for the use of such analysis tools? And what is Interior Minister Alexander Dobrindt planning for the federal police forces in the matter of Palantir? Palantir software analyzes the data