SlideShare a Scribd company logo
1 of 270
Download to read offline
Jabber security
Peter Saint-Andre
stpeter@jabber.org
https://stpeter.im/
secure communication
with Jabber
what is Jabber?
open XML technologies
real-time messaging
presence
multimedia negotiation
collaboration
and more
invented by Jeremie
   Miller in 1998
in essence...
streaming XML
over long-lived
TCP connection
client-server
architecture
decentralized
  network
inter-domain
  messaging
like email
but really fast
with built-in presence
not just one
open-source project
multiple codebases
open-source and
  commercial
interoperability via
XML wire protocol
core protocol
standardized @ IETF
Extensible
Messaging
and
Presence
Protocol
(XMPP)
RFCs 3920 + 3921
multiple
implementations
serious deployment
how many users?
we don’t know
decentralized
 architecture
100k+ servers
50+ million IM users
not just IM
generic XML routing
lots of applications
     beyond IM
continually defining
 XMPP extensions
XMPP Standards
Foundation (XSF)
developer-driven
standards group
that’s great, but...
how secure is it?
what is security?
secure conversation
    in real life...
a good friend
visits your home
you know and trust
    each other
only the two of you
strangers can’t enter
     your home
your home is not
     bugged
conversation is not
    recorded
what you say is private
  and confidential
contrast that with
  the Internet...
lots of potential attacks
man-in-the-middle
eavesdropping
unauthenticated users
address spoofing
weak identity
rogue servers
denial of service
directory harvesting
buffer overflows
spam
spim
spit
splogs
viruses
worms
trojan horses
malware
phishing
pharming
information leaks
inappropriate logging
    and archiving
you get the picture
the Internet is a
dangerous place
how do we fight
 these threats?
sorry, but...
Jabber is not a
perfect technology
not originally built
 for high security
don’t require PGP keys
    or X.509 certs
don’t require ubiquitous
       encryption
tradeoffs between
security and usability
maybe that’s why we
have 50+ million users...
but privacy and security
     are important
so what have we
 done to help?
Jabber architecture...
similar to email
client connects to
server (TCP 5222)
(or connect via HTTP
  binding over SSL)
client MUST
authenticate
originally: plaintext (!) or
    hashed password
Simple Authentication &
 Security Layer (SASL)
RFC 4422
many SASL mechanisms
PLAIN (OK over
encrypted connection)
DIGEST-MD5
EXTERNAL (with
  X.509 certs)
GSSAPI
(a.k.a. Kerberos)
ANONYMOUS
etc.
all users are
authenticated
sender addresses not
  merely asserted
server stamps
user ‘from’ address
Jabber IDs are
logical addresses
IP addresses
not exposed
Jabber ID looks like
  an email address
romeo@montague.net
juliet@capulet.com
not limited to
US-ASCII characters
jiři@čechy.cz
πλατω@ἑλλας.gr
มฌำปจ@jabber.th
@jabber.jp
∞@math.it
full Unicode opens
  phishing attacks
STPETER@jabber.org
ᏚᎢᎵᎬᎢᎬᏒ@jabber.org
clients should use
    “petnames”
store in buddy list [tm]
    (a.k.a. “roster”)
server stores
 your roster
server broadcasts
  your presence
but only to subscribers
 you have authorized
most traffic goes
through server
traffic is pure XML
servers reject
malformed XML
servers may validate
traffic against schemas
difficult to inject
 binary objects
difficult to propagate
      malware
break alliance between
   viruses and spam
spam virtually unknown
  on Jabber network
why?
hard to spoof
  addresses
hard to send
inline binary
XHTML subset
(no scripts etc.)
user approval required
   for file transfer
privacy lists to block
  unwanted users
XMPP not immune
   to spam
have spam-fighting tools
 ready when it appears
challenge-response to
 register an account
challenge-response to
     communicate
spam reporting
working on more
 anti-spam tools
server reputation
     system?
anonymized IP address?
   (groupchat spam)
spammers need to
   overcome...
bandwidth limits
connection limits
other denial-of-service
 prevention measures
distributed attack or
 run a rogue server
not impossible
just harder than other
networks (got email?)
no rogue servers
      (yet)
optional to federate
with other servers
many private
XMPP servers
public servers federate
as needed (TCP 5269)
DNS lookup to get
 server IP address
only one hop
between servers
server identities
  are validated
server dialback
(identity verification)
effectively prevents
  server spoofing
receiving server checks
    sending domain
no messages from
“service@paypal.com”
DNS poisoning
can invalidate
need something
   stronger?
Transport Layer
 Security (TLS)
RFC 4346
IETF “upgrade” to SSL
TLS + SASL EXTERNAL
   with X.509 certs
strong authentication
   of other servers
but only if certs are
  not self-signed
$$$
real X.509 certs
 are expensive
VeriSign, Thawte, etc.
a better way...
xmpp.net
intermediate CA for
   XMPP network
free digital certificates
for XMPP server admins
(need to prove you
 own the domain)
root CA: StartCom
ICA: XMPP Standards
     Foundation
hopefully other CAs
     in future
so channel encryption
    is a no-brainer
man-in-the-middle
 is much harder
“Mallory” is foiled
but what about
“Isaac” and “Justin”?
we can encrypt
 the channels
but traffic is cleartext
   within servers!
need end-to-end
encryption (“e2e”)
first try: OpenPGP
   (XEP-0027)
great for geeks
but Aunt Tillie
doesn’t use PGP
second try: S/MIME
   (RFC 3923)
great for geeks (and
 some employees)
but Aunt Tillie
doesn’t use X.509
XML encryption and
 digital signatures?
seems natural, but not
much interest (c14n?)
doesn’t provide perfect
   forward secrecy
off-the-record
communication (OTR)?
great idea
opportunistic
encryption (à la SSH)
perfect forward secrecy
but encrypts only the
plaintext message body
we need to encrypt
 the entire packet
why?
because XMPP is more
     than just IM
protect IPs sent in
multimedia negotiation
protect shared XML
    editing data
etc.
solution: encrypted
      sessions
big set of
requirements...
packets are confidential
packet integrity
replay protection
key compromise does
not reveal past comms
don’t depend on public
  key infrastructure
entities authenticated
    to each other
3rd parties cannot
 identify entities
robustness against
attack (multiple hurdles)
upgradeability if bugs
   are discovered
encryption of full
 XMPP packets
implementable by
 typical developer
usable by
typical user
how to address all
  requirements?
just a dream?
bootstrap from
cleartext to encryption
in-band Diffie-Hellman
     key exchange
translate “SIGMA”
approach to XMPP
similar to Internet Key
    Exchange (IKE)
details in XSF XEPs
   116, 188, 200
simplified profile
  in XEP-0217
major priority for
   2007-2008
support from NLnet
     (thanks!)
pursuing full
security analysis
code bounties
GSoC project
Jabber security summit
more at
blog.xmpp.org
wide implementation
in next ~12 months
so how are we doing?
spam free
hard to spoof addresses
pure XML discourages
   binary malware
DoS attacks possible
   but not easy
widespread channel
    encryption
working hard on
end-to-end encryption
widely deployed in high-
 security environments
Wall Street
investment banks
U.S. military
MIT and other
 universities
many public servers
   since 1999
no major security
    breaches
can’t be complacent
always more to do
security is a never-
  ending process
analysis and hacking
  are encouraged
if it breaks,
 we’ll fix it
security@xmpp.org
join the conversation
let’s build
a more secure Internet

More Related Content

What's hot

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashAnkit Mehta
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2Olle E Johansson
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemAvishek Datta
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 

What's hot (12)

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
 
NTLM
NTLMNTLM
NTLM
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
Core java day1
Core java day1Core java day1
Core java day1
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Day5
Day5Day5
Day5
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Pkcs 5
Pkcs 5Pkcs 5
Pkcs 5
 
3.Network
3.Network3.Network
3.Network
 
Pgp
PgpPgp
Pgp
 

Similar to Secure Communications with Jabber

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10dianacheng
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmppPrem Narain
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.pptUskuMusku1
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoLuis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 

Similar to Secure Communications with Jabber (20)

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Cours4.pptx
Cours4.pptxCours4.pptx
Cours4.pptx
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmpp
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 

More from stpeter

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and Youstpeter
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Updatestpeter
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internetstpeter
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overviewstpeter
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprisestpeter
 
Jabber 101
Jabber 101Jabber 101
Jabber 101stpeter
 

More from stpeter (7)

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and You
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Update
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internet
 
Jingle
JingleJingle
Jingle
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overview
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprise
 
Jabber 101
Jabber 101Jabber 101
Jabber 101
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Secure Communications with Jabber