SlideShare une entreprise Scribd logo
1  sur  33
2.0
Hacking
a
Bird
in
the
Sky
Exploiting
Satellite
Trust
Relationship
    Jim
Geovedi             Raditya
Iryandi
  jim.geovedi@bellua.com   raditya.iryandi@bellua.com
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                           Disclaimer
This presentation is intended to demonstrate the inherent security, 
design and configuration flaws in publicly accessible satellite 
communication networks and promote the use of safer satellite 
communication systems. Viewers and readers are responsible for their 
own actions and strongly encourage to behave themselves. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Slanguage
Dictionary
   ‣ Bird: a variety term for satellite; "The proposed 
     channel would be carried by an Asian bird to be 
     launched next spring."
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               Satellite
   ‣ A satellite is any
object
that
orbits
another
object 
     (which known as its primary).
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                           HITBSecConf Dubai 2008




                               Artificial
Satellite
   ‣ It was the English sci‐fi writer 
     Arthur C. Clarke who 
     conceived the
possibility
of

     artificial
communication

     satellites in 1945. Clarke 
     examined the logistics of 
     satellite launch, possible 
     orbits and other aspects.
                                                                     Arthur C. Clarke, science fiction author, meeting with 
                                                                        fans, at his home office in Colombo, Sri Lanka.
                                                                     source: http://en.wikipedia.org/wiki/Arthur_C._Clarke
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                    HITBSecConf Dubai 2008




                                    Artificial
Satellite
   ‣ The first artificial satellite 
     was Sputnik
1 launched 
     by Soviet Union on 
     4 October 1957.

       In 1957, the Soviet Union launched Sputnik, a basketball‐size capsule that became the Earth’s first man‐made satellite. Sputnik’s radio signals 
      were a “raspberry” from the Soviets, fumed one U.S. pundit. The next year, the United States created NASA, and the space race was under way.
                          source: http://magma.nationalgeographic.com/ngm/2007‐10/space‐travel/space‐travel‐photography.html
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008



                Satellite
Internet
Services
   ‣ One‐way
multicast: used for IP multicast‐based data, 
     audio and video distribution. 
        ‣ Most Internet protocols will not work correctly over 
          one‐way access, since they require a return channel. 
   ‣ One‐way
with
terrestrial
return: used with traditional 
     dial‐up access to the Internet, but downloads are sent via 
     satellite at a speed near that of broadband Internet  
     access.
   ‣ Two‐way
satellite
access: allows upload and download 
     data communications. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship             HITBSecConf Dubai 2008




         Very
Small
Aperture
Terminal
   ‣ A one or two‐way terminal used in 
     a star, mesh or point to point network 
     with. Antenna size is restricted to 
     being less than or equal to 3.8 m at 
     Ku band and 7.8 m at C band.
   ‣ It consists of a large high performance 
     hub earth station (with an antenna of 
     up to 9 m in diameter) and a large 
     number of smaller, lower performance 
     terminals. These small terminals can 
     be receive only, transmit only or 
     transmit/receive.                                                    A 2.5m parabolic dish antenna for 
                                                                     bidirectional high‐speed satellite Internet.
                                                                     source: http://en.wikipedia.org/wiki/VSAT
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                          HITBSecConf Dubai 2008




        Frequency
Band
Designations
                                               300 MHz                                                          3 GHz

                              VHF                                             UHF
                                                                     1 GHz




                             VHF                                   UHF                            L            S



           3 GHz                                                                              30 GHz

                                                SHF                                                     EHF
                             8 GHz              12 GHz               18 GHz                        40 GHz       75 GHz




                      C                 X                  Ku                   K             Ka              V




                                        source: http://www.satcom‐services.com/sat_freq.htm
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                  HITBSecConf Dubai 2008




               Data communication service using satellite access media with Time Division Multiplex (TDM) / Time Division Multiple 
                                           Access (TDMA) technology based on Internet‐protocol.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatIP/tabid/85/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                                                HITBSecConf Dubai 2008




                        Data communication service using satellite access media with Single Channel per Carrier (SCPC) 
                                             connecting point‐to‐point and point‐to‐multipoint.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatLink/tabid/86/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship    HITBSecConf Dubai 2008




   Attacks
against
Satellite
Systems
   ‣ Hypothetical Attacks
        ‣      Denial of services (uplink/downlink jamming, overpower uplink), orbital 
               positioning attacks (raging transponder spoofing, direct commanding, 
               command replay, insertion after confirmation but prior to execution)

   ‣ Practical Attacks
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




               Abusing
Satellite
Systems


                         "Satellite Piggyjacking"
               (Exploiting Satellite Trust Relationship on VSAT Network)
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                       Satellite
Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find "free" frequency
   ‣ Transmit and receive
   ‣ Detection evasion
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                                   Demo
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        HITBSecConf Dubai 2008




   Rogue
Carrier
Detection
Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                Detection
Issues
   ‣ Require at least another satellite and satellite 
      operator to detect rogue carrier (similar to GPS 
      mechanism).
     ‣ Satellite operator alliance co‐operation.
        ‣ Specialised company detecting rogue carrier.
   ‣ Hard to detect if rogue carrier has ability to 
     switch frequency automatically prior detection.
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   HITBSecConf Dubai 2008




                                               The
End
   ‣ Two years ago, we presented how to 
     compromise data link layer.
   ‣ Today, we present how to compromise network 
     layer.


                      Data
Link
+
Network
=
?

Contenu connexe

Similaire à Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship

Similaire à Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship (20)

Bringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridBringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGrid
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 
OptIPlanet Collaboratory
OptIPlanet CollaboratoryOptIPlanet Collaboratory
OptIPlanet Collaboratory
 
How Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific ResearchHow Global-Scale Personal Lighwaves are Transforming Scientific Research
How Global-Scale Personal Lighwaves are Transforming Scientific Research
 
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
The Academic and R&D Sectors' Current and Future Broadband and Fiber Access N...
 
How Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific ResearchHow Global-Scale Personal Lightwaves are Transforming Scientific Research
How Global-Scale Personal Lightwaves are Transforming Scientific Research
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
 
Blowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary ComputerBlowing up the Box--the Emergence of the Planetary Computer
Blowing up the Box--the Emergence of the Planetary Computer
 
BSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listeningBSides Canberra 2018: A low cost guide to satellite listening
BSides Canberra 2018: A low cost guide to satellite listening
 
Is it Live or is it Telepresence?
Is it Live or is it Telepresence?Is it Live or is it Telepresence?
Is it Live or is it Telepresence?
 
How Fiber Optics are Transforming our World
How Fiber Optics are Transforming our WorldHow Fiber Optics are Transforming our World
How Fiber Optics are Transforming our World
 
Small Ku Band Phased Array Anteena System
Small  Ku Band Phased Array Anteena SystemSmall  Ku Band Phased Array Anteena System
Small Ku Band Phased Array Anteena System
 
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsOptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
 
Experiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical WorldExperiments in Living in the Virtual/Physical World
Experiments in Living in the Virtual/Physical World
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
2010
 2010 2010
2010
 
Envisioning the Future
Envisioning the FutureEnvisioning the Future
Envisioning the Future
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
 
Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...
 

Plus de Jim Geovedi

Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour rule
Jim Geovedi
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry Birds
Jim Geovedi
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite Hacking
Jim Geovedi
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Jim Geovedi
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Jim Geovedi
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
Jim Geovedi
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot Security
Jim Geovedi
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
Jim Geovedi
 

Plus de Jim Geovedi (20)

Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
 
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
Perbandingan distribusi frekuensi kata bahasa Indonesia di Kompas, Wikipedia,...
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Cheating the 10,000 hour rule
Cheating the 10,000 hour ruleCheating the 10,000 hour rule
Cheating the 10,000 hour rule
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
 
Satellite Telephony Security
Satellite Telephony SecuritySatellite Telephony Security
Satellite Telephony Security
 
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry BirdsHacking a Bird in the Sky: The Revenge of Angry Birds
Hacking a Bird in the Sky: The Revenge of Angry Birds
 
Warezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite HackingWarezzman - DVB-Satellite Hacking
Warezzman - DVB-Satellite Hacking
 
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Wireless Hotspot Security
Wireless Hotspot SecurityWireless Hotspot Security
Wireless Hotspot Security
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship