SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Encryption for Everyone:
What We Do Is Secret
Dru Streicher
Dru Streicher
•Systems Administrator ()
•Hardware Hacker
•Open Source Punk Rocker
•Collector of Arcane Technology
& Vinyl Records
About Me
Encryption Basics
Encryption: What Is It for?
Why Is Encryption Important?
What Does It Look Like?
Encryption is Hard!
One Way Functions
• Phonebook encryption
• Plaintext: S-E-C-R-E-T
• S = Jenny Smith 867-5309
• Cypher text then becomes 6 phone numbers
• To decrypt you would have to find each phone
number in the phone book
• Easy to make & Hard to solve
One Way Functions
HTTP vs HTTPS
HTTP vs. HTTPS
HTTP vs. HTTPS
HTTPS
Meet Alice & Bob
Alice wants to share a secret
message with Bob
They don't want Eve to be able to
get their secret message
They Use Symmetrical
Encryption:
Alice encrypts the message with a
password and sends it to Bob
Even if Eve intercepts the
message, without the password it
can't be decrypted
Bob knows the password so he
can decrypt the message
Real world use for
symmetric encryption:
Disk Encryption
Disk Encryption
• There are ways to access your drive
and get around all that logging in stuff
• Encryption makes it private
Tools for disk encryption In linux
Asymmetrical Encryption
Alice and Bob have never met:
They use Asymmetrical
Encryption
Public vs. Private Keys
Alice and Bob trade public keys
Alice encrypts her secret message
using Bob's public key
Bob can then use his private
key to decrypt the message
Key Servers
Creating Keys Using
the Command Line
If you lose your private key's password or your private key
becomes compromised you can revoke the key.
Revocation Certificate
Creating a Revocation
Certificate
Thunderbird & Enigmail:
Your one stop for PGP & Email
• Walk you through creating a gpg key in wizard mode.
• Manage all your keys
• Encrypt and Decrypt mail Automagically
• Sign outgoing email with your public key
Web Based Email
Gmail and Yahoo and other web based email providers
don't support encryption and decryption natively.
• The Onion Router
• “Tor directs Internet traffic through a free, worldwide
volunteer network consisting of more than three
thousand relays to conceal a user's location or usage
from anyone conducting network surveillance or
traffic analysis.” -Wikipedia
How Tor Works
How Tor Works
How Tor Works
Tor Software
• Exit nodes can be monitored
• Can be hard to configure
• Speed
Problems With Tor
• Virtual Private Network
• Creates an encrypted point-to-point network
• Allows you to remotely access your local network
resources such as printers, servers, computers
VPN
VPN
Software VPN Options
Hardware VPN Options
• Lifehacker.com: How To
• Raspberry Pi
• Your Home Router:
• DD-WRT
• Tomato Router
• IM – Off The Record (OTR) plugin for Pidgin
• Android – K9
• SMS Encryption – TextSecure for Android
Other Encryption Tools
Encryption is About Privacy
More Info
Web
Beginners Guide
- Steven Levy
The Codebreakers - Dav
Questions?
Thanks
• Ohio Linux Fest
• Ian Gillespie for the great slides
Contact Me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Weitere ähnliche Inhalte

Was ist angesagt?

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 

Was ist angesagt? (8)

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 

Andere mochten auch

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsJohn Congdon
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsYury Chemerkin
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationGovindarrajan NV
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 

Andere mochten auch (12)

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Internet security
Internet securityInternet security
Internet security
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Ähnlich wie Encryption for Everyone

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
20 security
20 security20 security
20 securityabiy2004
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHAndrew Morris
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 

Ähnlich wie Encryption for Everyone (20)

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
20 security
20 security20 security
20 security
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 
Internet security
Internet securityInternet security
Internet security
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Cryptography
CryptographyCryptography
Cryptography
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Ss
SsSs
Ss
 

Mehr von Coastal Pet Products, Inc. (13)

Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
IT Security in 2014
IT Security in 2014IT Security in 2014
IT Security in 2014
 
Printer Security
Printer SecurityPrinter Security
Printer Security
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Using Big Data for Security Alerting
Using Big Data for Security Alerting Using Big Data for Security Alerting
Using Big Data for Security Alerting
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
Sounds of Security
Sounds of SecuritySounds of Security
Sounds of Security
 
Beyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise SecurityBeyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise Security
 
Attacking and Defending Full Disk Encryption
Attacking and Defending Full Disk EncryptionAttacking and Defending Full Disk Encryption
Attacking and Defending Full Disk Encryption
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Forensics for the Defense
Forensics for the DefenseForensics for the Defense
Forensics for the Defense
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Cloud Security: Ten Things
Cloud Security: Ten ThingsCloud Security: Ten Things
Cloud Security: Ten Things
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Encryption for Everyone