Dan Kennedy
Google
Advanced Practices Team
Germany's use of the Enigma and other cipher machines in WWII created such a volume of encrypted traffic that it drove the allies to accelerate the development of computing and techniques like traffic analysis. Many view it as part of the very foundations of today's cyber industry.
Most machines were intentionally destroyed, and their compromise was kept secret for thirty years - so very few people ever get to see this technology working.
This is an *** extraordinarily rare *** opportunity to see this tech up close and working and get a better handle on the origins of cyber.