SlideShare une entreprise Scribd logo
1  sur  60
Encryption for Everyone:
What We Do Is Secret
Dru Streicher
Dru Streicher
•Systems Administrator ()
•Hardware Hacker
•Open Source Punk Rocker
•Collector of Arcane Technology
& Vinyl Records
About Me
Encryption Basics
Encryption: What Is It for?
Why Is Encryption Important?
What Does It Look Like?
Encryption is Hard!
One Way Functions
• Phonebook encryption
• Plaintext: S-E-C-R-E-T
• S = Jenny Smith 867-5309
• Cypher text then becomes 6 phone numbers
• To decrypt you would have to find each phone
number in the phone book
• Easy to make & Hard to solve
One Way Functions
HTTP vs HTTPS
HTTP vs. HTTPS
HTTP vs. HTTPS
HTTPS
Meet Alice & Bob
Alice wants to share a secret
message with Bob
They don't want Eve to be able to
get their secret message
They Use Symmetrical
Encryption:
Alice encrypts the message with a
password and sends it to Bob
Even if Eve intercepts the
message, without the password it
can't be decrypted
Bob knows the password so he
can decrypt the message
Real world use for
symmetric encryption:
Disk Encryption
Disk Encryption
• There are ways to access your drive
and get around all that logging in stuff
• Encryption makes it private
Tools for disk encryption In linux
Asymmetrical Encryption
Alice and Bob have never met:
They use Asymmetrical
Encryption
Public vs. Private Keys
Alice and Bob trade public keys
Alice encrypts her secret message
using Bob's public key
Bob can then use his private
key to decrypt the message
Key Servers
Creating Keys Using
the Command Line
If you lose your private key's password or your private key
becomes compromised you can revoke the key.
Revocation Certificate
Creating a Revocation
Certificate
Thunderbird & Enigmail:
Your one stop for PGP & Email
• Walk you through creating a gpg key in wizard mode.
• Manage all your keys
• Encrypt and Decrypt mail Automagically
• Sign outgoing email with your public key
Web Based Email
Gmail and Yahoo and other web based email providers
don't support encryption and decryption natively.
• The Onion Router
• “Tor directs Internet traffic through a free, worldwide
volunteer network consisting of more than three
thousand relays to conceal a user's location or usage
from anyone conducting network surveillance or
traffic analysis.” -Wikipedia
How Tor Works
How Tor Works
How Tor Works
Tor Software
• Exit nodes can be monitored
• Can be hard to configure
• Speed
Problems With Tor
• Virtual Private Network
• Creates an encrypted point-to-point network
• Allows you to remotely access your local network
resources such as printers, servers, computers
VPN
VPN
Software VPN Options
Hardware VPN Options
• Lifehacker.com: How To
• Raspberry Pi
• Your Home Router:
• DD-WRT
• Tomato Router
• IM – Off The Record (OTR) plugin for Pidgin
• Android – K9
• SMS Encryption – TextSecure for Android
Other Encryption Tools
Encryption is About Privacy
More Info
Web
Beginners Guide
- Steven Levy
The Codebreakers - Dav
Questions?
Thanks
• Ohio Linux Fest
• Ian Gillespie for the great slides
Contact Me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Contenu connexe

Tendances

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 

Tendances (8)

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 

En vedette

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsJohn Congdon
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsYury Chemerkin
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationGovindarrajan NV
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 

En vedette (12)

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Internet security
Internet securityInternet security
Internet security
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similaire à Encryption for Everyone

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
20 security
20 security20 security
20 securityabiy2004
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHAndrew Morris
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 

Similaire à Encryption for Everyone (20)

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
20 security
20 security20 security
20 security
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 
Internet security
Internet securityInternet security
Internet security
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Cryptography
CryptographyCryptography
Cryptography
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Ss
SsSs
Ss
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Plus de Coastal Pet Products, Inc. (13)

Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
IT Security in 2014
IT Security in 2014IT Security in 2014
IT Security in 2014
 
Printer Security
Printer SecurityPrinter Security
Printer Security
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Using Big Data for Security Alerting
Using Big Data for Security Alerting Using Big Data for Security Alerting
Using Big Data for Security Alerting
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
Sounds of Security
Sounds of SecuritySounds of Security
Sounds of Security
 
Beyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise SecurityBeyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise Security
 
Attacking and Defending Full Disk Encryption
Attacking and Defending Full Disk EncryptionAttacking and Defending Full Disk Encryption
Attacking and Defending Full Disk Encryption
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Forensics for the Defense
Forensics for the DefenseForensics for the Defense
Forensics for the Defense
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Cloud Security: Ten Things
Cloud Security: Ten ThingsCloud Security: Ten Things
Cloud Security: Ten Things
 

Dernier

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Encryption for Everyone