SlideShare une entreprise Scribd logo
1  sur  75
Télécharger pour lire hors ligne
TurtleSec
@pati_gallardo
Turtle
Sec
@pati_gallardo
TurtleSec
@pati_gallardo 2The Turtle vs The Hare
TurtleSec
@pati_gallardo 3
The Turtle
63.1%
The Hare
36.9%
TurtleSec
@pati_gallardo@pati_gallardo
Who can you trust?
Who feeds you the data?
TurtleSec
@pati_gallardo
Why Is Election Security
So Hard?
Paranoia 2019
Patricia Aas
Turtle
Sec
TurtleSec
@pati_gallardo
Patricia Aas - Trainer & Consultant
C++ Programmer, Application Security
Currently : TurtleSec
Previously : Vivaldi, Cisco Systems, Knowit, Opera Software
Master in Computer Science
Pronouns: she/her
@pati_gallardo
Turtle
Sec
TurtleSec
@pati_gallardo 7
TurtleSec
@pati_gallardo 8@pati_gallardo
Complex?
TurtleSec
@pati_gallardo@pati_gallardo
Is the Norwegian
Election System
complex?
9@pati_gallardo
TurtleSec
@pati_gallardo
No, not really.
10
TurtleSec
@pati_gallardo
“The testing is performed using a prototype
implementation in Java. Though the implementation
does not take into consideration security and
anonymity concerns, it is a full implementation of
the Electoral System.”
Evaluating the suitability of EML 4.0 for the Norwegian Electoral System : A prototype approach
Patricia Aas, Masters Thesis UiO, 2005
https://www.duo.uio.no/handle/10852/9298
11
TurtleSec
@pati_gallardo
What are these “security and
anonymity concerns”?
12
TurtleSec
@pati_gallardo
It’s complicated.
13
TurtleSec
@pati_gallardo 14@pati_gallardo
What are we
protecting?
TurtleSec
@pati_gallardo
Worst Case Scenario
An accepted, but manipulated
Election Result
15
TurtleSec
@pati_gallardo@pati_gallardo
What is the
Election Result?
16@pati_gallardo
TurtleSec
@pati_gallardo
The Election Result
is the distribution of the
mandates
17
TurtleSec
@pati_gallardo
An Election doesn’t have to be
flawless
as long as
The Election Result
is correct
18
TurtleSec
@pati_gallardo 19@pati_gallardo
What is the Threat
Model?
TurtleSec
@pati_gallardo@pati_gallardo
What are you
afraid of?
20@pati_gallardo
TurtleSec
@pati_gallardo
Adding ballots
Removing ballots
Changing ballots
Reporting wrong counts
21
TurtleSec
@pati_gallardo
At its most extreme:
Preventing a coup
Keeping a democracy
22
TurtleSec
@pati_gallardo
Who are the Threat Actors in
Elections?
23
TurtleSec
@pati_gallardo
The most likely Threat Actor
Historically
Internationally
Is the sitting (local) government
24
TurtleSec
@pati_gallardo
Others include:
Foreign governments,
private companies, terrorists,
activists, lone wolfs
25
TurtleSec
@pati_gallardo
The most likely Threat Actor
in an election
is the sitting government
26
TurtleSec
@pati_gallardo
The same government
running the election
27
TurtleSec
@pati_gallardo
Two “acceptable” outcomes
1. A correct election
2. Prevented a rigged election
(hopefully correctable)¹
28¹ How feasible is a new election?
TurtleSec
@pati_gallardo 29@pati_gallardo
What about
Anonymity?
TurtleSec
@pati_gallardo@pati_gallardo
How does a
secret ballot play
into elections?
30@pati_gallardo
TurtleSec
@pati_gallardo
True democracy requires
the freedom to
Vote your conscience
31
TurtleSec
@pati_gallardo
Prevent coercion
Prevent vote selling
Prevent persecution
now or in the future
32
#goals
TurtleSec
@pati_gallardo
No.
The answer is not blockchain
33
TurtleSec
@pati_gallardo
Why?
34
TurtleSec
@pati_gallardo
To prevent persecution
You don’t want to connect a
vote to a person
35
TurtleSec
@pati_gallardo
To prevent coercion and vote selling
You don’t want a person to be able to
prove what they voted
36
TurtleSec
@pati_gallardo
And what put that vote on the
blockchain?
Who’s in charge of that?
How about chain of custody?
37
TurtleSec
@pati_gallardo 38@pati_gallardo
Man vs Machine
TurtleSec
@pati_gallardo@pati_gallardo
What?
You hate
computers?
39@pati_gallardo
TurtleSec
@pati_gallardo
Nah. I love computers.
But manual elections are hard to beat.
They’re just that good.
40
TurtleSec
@pati_gallardo
Isn’t manual counting slow?
41
TurtleSec
@pati_gallardo
Surprisingly, no.
It’s massively distributed.
42
TurtleSec
@pati_gallardo
Isn’t manual counting error prone?
43
TurtleSec
@pati_gallardo
Yes.
And no.
It’s complicated.
44
TurtleSec
@pati_gallardo
Norwegian risk model for
ballot counting errors
Manual vs Machine
45
TurtleSec
@pati_gallardo 46
1. Can it affect the Election Result?
2. Can it go undetected?
3. Can it discredit the Election Result?
4. Can it create more work?
Evaluating severity
TurtleSec
@pati_gallardo 47
1. Historically how common is it?
2. Is there a known threat?
Evaluating likelihood
TurtleSec
@pati_gallardo
48
Likelihood
Severity
Innocent
manual
Innocent
machine
Premeditated
manual
Premeditated
machine
Likelihood Innocent Premeditated
Manual High Low
Machine Low-Medium¹ Low
Severity Innocent Premeditated
Manual Low² Medium³
Machine Medium-High High
Risk diagram: Counting Errors (no Machine Count Audit)
¹ Bugs: Has happened many times irl
² Distributed proportionally on parties
³ Will almost certainly be detected, but cast doubt
and ballots are compromised
TurtleSec
@pati_gallardo 49@pati_gallardo
What is the
alternative?
TurtleSec
@pati_gallardo@pati_gallardo
Manual
elections?
50@pati_gallardo
TurtleSec
@pati_gallardo
Software independence¹
51¹ Ron Rivest (The R in RSA) and John P. Wack (NIST)
TurtleSec
@pati_gallardo 52
“A voting system is software-independent if
an undetected change or error in its software
cannot cause
an undetectable change or error in
an election outcome”
On the notion of “software-independence” in voting systems
http://people.csail.mit.edu/rivest/RivestWack-OnTheNotionOfSoftwareIndependenceInVotingSystems.pdf
TurtleSec
@pati_gallardo 53@pati_gallardo
Auditability
TurtleSec
@pati_gallardo
“Verify the election results,
not the voting system”
54
Rivest & Wack, On the notion of “software-independence” in voting systems
TurtleSec
@pati_gallardo
What is a “manual” election?
Paper ballots
Manual count¹
55¹ Keep computers for all parts that are auditable
TurtleSec
@pati_gallardo
Auditable elections
Paper ballots
Manual audit
56
TurtleSec
@pati_gallardo 57
Likelihood
Severity
Innocent
manual
Innocent
machine
Premeditated
manual
Premeditated
machine
Premeditated
machine
Innocent
machine
Risk diagram: Counting Errors (with Machine Count Audit)
An Audit will reveal
- Bugs
- Manipulations
TurtleSec
@pati_gallardo
What is an auditable
election?
58
TurtleSec
@pati_gallardo 59@pati_gallardo
Implementation
TurtleSec
@pati_gallardo
Norway 2019
Manual preliminary count¹
60¹ Ask me about this process sometime ;)
TurtleSec
@pati_gallardo
Norway has two counts:
Preliminary and Final
Results can be compared
61
TurtleSec
@pati_gallardo
Goal for many US researchers
Risk-Limiting Audits
62
TurtleSec
@pati_gallardo
What’s a Risk Limiting Audit?
A statistical model for manual
ballot sampling
63
TurtleSec
@pati_gallardo
“The Norwegian electoral system: a study of EVA
Skanning, implemented error detection mechanisms,
and applicability of risk-limiting audits”
Vilde Elise Samnøy Amundsen, Masters Thesis NTNU, 2019
Thesis Advisor: Patricia Aas
http://www.valgforum.no/wp-content/uploads/2019/02/Masteroppgave-Vilde-Amundsen.pdf
64
TurtleSec
@pati_gallardo
What was the problem in
Norway?
65
TurtleSec
@pati_gallardo
No audit.
66
TurtleSec
@pati_gallardo
Paper ballots are not enough
There has to be an audit
Performed by regular folks
67
TurtleSec
@pati_gallardo
Manually counted elections
have a built-in audit
People.
68
TurtleSec
@pati_gallardo
Manually counted elections can
also be rigged
But everyone knows they are
69
TurtleSec
@pati_gallardo
If an election is rigged
and nobody knows,
do you have a democracy?
70
TurtleSec
@pati_gallardo
No.
You’ve had a coup.
And you don’t even know it.
71
TurtleSec
@pati_gallardo 72@pati_gallardo
TurtleSec
@pati_gallardo
Best way to rig an election?
Internet voting.
73
TurtleSec
@pati_gallardo
Turtle
Sec
@pati_gallardo
Than
yo !
TurtleSec
@pati_gallardo 75
Høringssvar, Patricia Aas, TurtleSec, https://elections.no/2018/12/13/hoeringssvar_turtlesec.html
“Election Cybersecurity Progress Report”, Professor J. Alex Halderman (University of Michigan), https://youtu.be/U-184ssFce4
“Electronic Voting In 2018: Threat Or Menace”, Professor Matt Blaze, Joe Hall, Margaret MacAlpine, and Harri Hursti,
https://youtu.be/Lo3iibtVh6M
“Testimony of Prof. Matt Blaze”, Professor Matt Blaze (University of Pennsylvania),
https://oversight.house.gov/wp-content/uploads/2017/11/Blaze-UPenn-Statement-Voting-Machines-11-29.pdf
“Securing the Vote: Protecting American Democracy”, The National Academies of Sciences, Engineering, and Medicine,
https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy
“DEF CON 26 Voting Village Report”, Blaze, Braun, Hursti, Jefferson, MacAlpine, Moss,
https://defcon.org/images/defcon-26/DEF%20CON%2026%20voting%20village%20report.pdf
Resources

Contenu connexe

Similaire à Why Is Election Security So Hard? (Paranoia 2019)

DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)Patricia Aas
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesAlan Richardson
 
Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI Margriet Groenendijk
 
Thrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the StackapocalypseThrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the StackapocalypseEffin Amazing
 
Rise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine LearningRise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine LearningCatalyst
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkGert-Jan Bruggink
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartPatricia Aas
 
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIOJTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIOPeter Gallagher
 
How (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your SprintHow (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your SprinteBranding Ninja
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment TestingAlan Richardson
 
Conversionboost - Bart Schutz
Conversionboost - Bart SchutzConversionboost - Bart Schutz
Conversionboost - Bart SchutzOnline Dialogue
 

Similaire à Why Is Election Security So Hard? (Paranoia 2019) (14)

DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slides
 
Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Thrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the StackapocalypseThrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the Stackapocalypse
 
Rise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine LearningRise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine Learning
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
 
Why am I doing this???
Why am I doing this???Why am I doing this???
Why am I doing this???
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To Start
 
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIOJTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
 
How (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your SprintHow (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your Sprint
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment Testing
 
Conversionboost - Bart Schutz
Conversionboost - Bart SchutzConversionboost - Bart Schutz
Conversionboost - Bart Schutz
 

Plus de Patricia Aas

NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdfNDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdfPatricia Aas
 
Return Oriented Programming, an introduction
Return Oriented Programming, an introductionReturn Oriented Programming, an introduction
Return Oriented Programming, an introductionPatricia Aas
 
I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)Patricia Aas
 
Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)Patricia Aas
 
Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)Patricia Aas
 
Classic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdfClassic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdfPatricia Aas
 
Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)Patricia Aas
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Patricia Aas
 
Thoughts On Learning A New Programming Language
Thoughts On Learning A New Programming LanguageThoughts On Learning A New Programming Language
Thoughts On Learning A New Programming LanguagePatricia Aas
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Patricia Aas
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Patricia Aas
 
The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)Patricia Aas
 
The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))Patricia Aas
 
Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019) Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019) Patricia Aas
 
Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)Patricia Aas
 
Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)Patricia Aas
 
The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)Patricia Aas
 
Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)Patricia Aas
 
Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)Patricia Aas
 

Plus de Patricia Aas (20)

NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdfNDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
 
Telling a story
Telling a storyTelling a story
Telling a story
 
Return Oriented Programming, an introduction
Return Oriented Programming, an introductionReturn Oriented Programming, an introduction
Return Oriented Programming, an introduction
 
I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)
 
Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)
 
Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)
 
Classic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdfClassic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdf
 
Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
 
Thoughts On Learning A New Programming Language
Thoughts On Learning A New Programming LanguageThoughts On Learning A New Programming Language
Thoughts On Learning A New Programming Language
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
 
The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)
 
The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))
 
Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019) Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019)
 
Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)
 
Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)
 
The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)
 
Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)
 
Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Why Is Election Security So Hard? (Paranoia 2019)