Deep Dive-Podcast:
dopeIN® a sweet solution - how individual taste leads to secure authentication
Did you know that your personal way of thinking can help you to be safer online?
With the dopeIN® method, you are the key to secure login - without a second device or fingerprint. Instead of entering the same passwords over and over again, use your own logic. This not only makes it safer, but also a little more personal.
Curious? Then listen in and discover how you can take action against cyber attacks yourself – with a method that is completely customised to your taste. 🎧 Headphones on - experience safety in a different way!

Deep Dive-Podcast:
dopeIN® a sweet solution - how individual taste leads to secure authentication
(EN)
Created with AI, editorially checked by the dopeIN® team.*
* The following AI technologies were used:
- NotebookLM from Google to create the audio file
- ChatGTP of OpenAI for support in the search and evaluation of sources
- Perplexity from Perplexity AI Inc. for support in the search and evaluation of sources
The following sources were referenced:
- https://www.spektrum.de/magazin/alice-und-bob-im-geheimraum/1408646
- https://www.elektronik-kompendium.de/sites/net/1909021.htm
- https://en.wikipedia.org/wiki/Alice_and_Bob
- https://de.wikipedia.org/wiki/Alice_und_Bob
- https://www.computerweekly.com/de/definition/Alice-und-Bob
- https://www.security-insider.de/wer-sind-alice-und-bob-a-1084935/
- https://jungle.world/artikel/2020/04/alice-bob-und-die-verschluesselung
- https://www.computec.ch/archiv/dokumente/kryptologie/cryptool-skript_kryptographie_mathematik_und_mehr.pdf
- https://www.dataguard.de/blog/welche-verschluesselungsverfahren-gibt-es/
- https://de.wikipedia.org/wiki/Geschichte_der_Kryptographie
- https://www.hornetsecurity.com/de/wissensdatenbank/kryptographie/
- https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Onlinekommunikation/Verschluesselt-kommunizieren/Arten-der-Verschluesselung/arten-der-verschluesselung_node.html
- https://www.bundesdruckerei.de/de/innovation-hub/die-geschichte-der-kryptographie
- https://de.wikipedia.org/wiki/Kryptographie
- https://de.wikipedia.org/wiki/Quantenkryptographie
- http://ais.informatik.uni-freiburg.de/teaching/ws17/systems1/slides/kap09-sicherheit_cut.pdf
- https://lehrerfortbildung-bw.de/u_matnatech/informatik/gym/weiteres/fb4/1_krypto/4_loesungen/01_ab-mit-lsg/arbeitsblaetter_mitloesung.pdf
- https://juergarnold.ch/kryptografie.html
- https://www.hs-rm.de/fileadmin/Home/Fachbereiche/Ingenieurwissenschaften/Studiengaenge/Angewandte_Mathematik_B.Sc/SS-2018/Was_ist_Kryptographie.pdf
- https://lehrerfortbildung-bw.de/u_matnatech/informatik/gym/bp2016/fb1/3_rechner_netze/1_hintergrund/9_krypto/1_darsteller/
- https://beckassets.blob.core.windows.net/product/readingsample/525919/9783898646024_excerpt_001.pdf
- https://cdn-assetservice.ecom-api.beck-shop.de/product/readingsample/16408357/4_der%20advanced%20encryption%20standard%20(aes).pdf
- http://www.stillart.ch/programming/Kryptografie_Verfahren_Protokolle.pdf
- https://www.dopein.de/
- https://www.dopein.de/awareness_by_design