WICCA x Sentyron: Because Backflow Is a Vulnerability
Details
On April 22 Sentyron is hosting WICCA for a meetup about hardware security. From breaking hardware to enforcing one-way data flows, discover how security is built at every layer. An inside look at the real-world of hardware cyber defense, where paranoia meets engineering, and trust is designed by default.
Location: Sentyron, Olof Palmestraat 6, 2616 LM Delft.
Date: April 22, 2026
Time: 18:00 - 21:00
Program:
18:00 - 18:30: Walk-in with Pizza
18:30 - 19:15: Hardware security: Paranoia or Protection? - Laura Muntenaar
19:15 - 20:00: Everything about Data Diodes - Melda Malkoc
20:00 - 20:45: OpenVPN for the Government - Danielle van der Werff
Hardware security: Paranoia or Protection? (English)
A part of my job is thinking about how malicious agents will attempt to “hack” a piece of hardware and what measures I need to take to ensure that doesn’t happen. The extent of this sometimes makes us ride a fine line between paranoia and protection. How far do you go to protect information on a piece of hardware? And how do you ensure your hardware doesn’t accidentally leak important information? I will explain what hardware security is and some examples of the extent of what we think about.
Laura Muntenaar
Laura Muntenaar is hardware developer at Sentyron. She spends her day doing what she loves; design, make and especially break hardware. At Sentyron her days are filled with testing hardware, soldering, designing schematics and layouting PCBs. Outside of work, she tries to live the least technical life. She loves taking care of her 50+ plants, going to the gym, enjoying life with her friends and not having smart lights.
Everything about Data Diodes (Dutch)
During this session, I’ll explain what a data diode is, why it is such an important part of modern security architectures, and the technical challenges we as developers face when building truly secure systems.
This presentation will be in Dutch.
Melda Malkoc
Melda Malkoc is a software developer at Sentyron for three years. After completing her Bachelor’s in Computer Science and her Master’s in AI, she joined Sentyron, where she works on the software for Sentyron’s data diode. This is a hardware solution that ensures data can be transmitted and stored securely, even in the most critical environments.
OpenVPN for the Government (English)
OpenVPN‑NL is the high‑assurance, government‑approved variant of OpenVPN, designed to meet the strict security requirements set by the Dutch national authorities. In this presentation we’ll look at what is involved in coming to such a variant, from cryptographic standards and implementation constraints to the evaluation and testing process. I’ll also highlight the key differences between OpenVPN‑NL and the standard OpenVPN implementation, and why these distinctions matter for environments where assurance and trust are essential.
Danielle van der Werff
Danielle van der Werff is a Solution Architect at Sentyron. Her fascination for cyber security started almost a decade ago during her studies, when we attempted to hack a pacemaker, thankfully without success :-) That early spark set her on a path that took her from the Fox‑IT SOC, to embedded software development, to presales engineering in Brussels, and ultimately (back) to Sentyron. She focuses mainly on Sentyron’s VPN portfolio within the presales team, and together with her amazing colleagues she helps advise the customers on secure environments.
There are only a limited number of spots available (40) and women have priority registration. Please sign off if you can no longer attend so somebody else can take your place. Two of the presentations are held in English and one will be in Dutch.
