SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
ANDROID APP SECURITY:
ON A BUDGET
SCOTT ALEXANDER-BOWN
ANDROID FREELANCER
@SCOTTYAB
DEVELOPER - ANDROID
AUTHOR - ANDROID SECURITY COOKBOOK
ORGANISER - SWMOBILE GROUP
@SCOTTYAB
SCOTT ALEXANDER-BOWN
TL;DR
STORY OF IMPROVING APP SECURITY.
MIN EFFORT. MAX IMPACT
@SCOTTYAB
APP: ACME CORP
DISCLAIMER:
ALL CHARACTERS APPEARING IN THIS
WORK ARE FICTITIOUS. ANY
RESEMBLANCE TO REAL PERSONS, LIVING
OR DEAD, IS PURELY COINCIDENTAL.
@SCOTTYAB
OUR REPUTATION!
@SCOTTYAB
WHAT CAN YOU DO?
@SCOTTYAB
@SCOTTYAB
3 Sneaky Sprints
1. Connection between app and api/server 

2. Device integrity and Data

3. Apk integrity and protection.
@SCOTTYAB
SNEAK SPRINT 1:
NETWORK
@SCOTTYAB
Let’s make
SSL
Stronger!
@SCOTTYAB
SSL Connection spec
Use only strong cipher suites (128bit+) 

TLS versions (TLS v1.2)
@SCOTTYAB
Patch against SSL exploits
• Android relies on a security ‘Provider’ to provide secure network
communications.
• Google Play Services provides a way to update the device security
provider
• ProviderInstaller.installIfNeeded(getContext());
@SCOTTYAB
SSL/TLS Pinning
Pinning limits the trusted root CA’s
Devices ship with 100+ Certificate Authorities (CA) and
users can install their own
Two types of pinning
* Certificate pinning
* Public Key pinning
What is SSL pinning?
@SCOTTYAB
SSL Pinning with OKhttp
SSL pin generator

http://bit.ly/sslpin

OKHttp Version 

OkHttp 3.1.2+ 

OkHttp 2.7.4+
@SCOTTYAB
Let’s make Webview less shit
safer
Webview
Disable risky settings

Javascript

File access

White list urls / domains

https://gist.github.com/scottyab/6f51bbd82a0ffb08ac7a
@SCOTTYAB
SNEAK SPRINT 2:
DEVICE INTEGRITY AND DATA
@SCOTTYAB
Device Integrity
Check the execution environment 

Root Check 

Root Beer - https://github.com/scottyab/rootbeer

SafteyNet API (Google Play services)

SafetyNet Wrapper - https://github.com/scottyab/safetynethelper
@SCOTTYAB
Encrypt (obfuscate) Data
Shared preferences - replaces with secure-preferences (or Hawk)

https://github.com/scottyab/secure-preferences 

SQLlite - replaced with SQL Cipher for Android

https://github.com/sqlcipher/android-database-sqlcipher

Realm - has an encryption option

https://github.com/realm/realm-java/tree/master/examples/
encryptionExample
@SCOTTYAB
Encryption without storing key
App pin code

Android Keystore 

Device pin 

Finger printreader
SNEAK SPRINT 3:
APK INTEGRITY & PROTECTION
@SCOTTYAB
Tamper check
Android requires all apps to be
digitally signed

Consistent for life of app

Needed to publish app updates
@SCOTTYAB
Build time
1. Get you certificate signature
$keytool -list -v -keystore your_app.keystore
2. Embed in app
String CERTIFICATE_SHA1 = “71920AC9486E087DCBCF5C7F6F…”
@SCOTTYAB
Run time
3. Get the Signature from the
PackageManager
4. Hash the Signature
5. Compare the signature hashes strings
@SCOTTYAB
Obfuscation: ProGuard
Java code obfuscator

Part of the Android SDK (free!)

To turn on: minifyEnabled=true
@SCOTTYAB
ProGuard tips
Add to config when you add a new lib

Strip Log statements

Crash stack traces

Gradle Proguard plugin 

https://github.com/hotchemi/gradle-proguard-plugin 

Consider: DexGuard (paid)
@SCOTTYAB
Cons
More code==more complexity 

APK file size was larger

Slower to start up

Encrypted data is really only obfuscated

ProGuard config was time consuming

No credit for our hard work
@SCOTTYAB
Pros
Less vulnerable to MITM

Webviews are less vulnerable to XSS attacks

Curious rooted users cannot simply edit our db and pref data

Rooted users will struggle

Re-complication is hampered tamper check

Understanding the decompiled code is hampered by the obfuscation
@SCOTTYAB
DID WE WIN?
DID WE WIN?
DID WE WIN?
DID WE WIN?Much
Win wow
so security
WHAT CAN YOU DO?
@SCOTTYAB
@SCOTTYAB
STRENGTH SSL/TLS
SSL PINNING
WHITE LIST WEBVIEW
CHECK FOR ROOT
ENCRYPT DATA AT REST
TAMPER CHECK
OBFUSCATE
Resources
Secure mobile development best practices - https://github.com/
nowsecure/secure-mobile-development 

OWASP Mobile security risks - http://bit.ly/owaspmobile 

Android security cookbook - http://bit.ly/MscEFu

Best Practices for Security & Privacy - https://developer.android.com/
training/best-security.html 

Adding Tamper detection to your apps - https://www.airpair.com/android/
posts/adding-tampering-detection-to-your-android-app
@SCOTTYAB
THANKS… @SCOTTYAB
HELLO@SCOTTYAB.COM
Good practices…
Using SSL for API

Using Context.MODE_PRIVATE

Not using the SDcard to store anything

Not logging user details to Android.Log

Contenu connexe

Tendances

PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
mwbrooks
 
البرامج الخبيثه
البرامج الخبيثه البرامج الخبيثه
البرامج الخبيثه
renowasfi99
 

Tendances (20)

Intro to IronWASP
Intro to IronWASPIntro to IronWASP
Intro to IronWASP
 
Spyros Garyfallos [Microsoft] | Deploy, Monitor and Manage Your High-Value AI...
Spyros Garyfallos [Microsoft] | Deploy, Monitor and Manage Your High-Value AI...Spyros Garyfallos [Microsoft] | Deploy, Monitor and Manage Your High-Value AI...
Spyros Garyfallos [Microsoft] | Deploy, Monitor and Manage Your High-Value AI...
 
Guidebook Case Study
Guidebook Case StudyGuidebook Case Study
Guidebook Case Study
 
Aws(sns)
Aws(sns)Aws(sns)
Aws(sns)
 
Teqnation 19 - Live Hacking
Teqnation 19 - Live Hacking Teqnation 19 - Live Hacking
Teqnation 19 - Live Hacking
 
Ikano Google Apps Partner Edition.Ppt
Ikano Google Apps Partner Edition.PptIkano Google Apps Partner Edition.Ppt
Ikano Google Apps Partner Edition.Ppt
 
SVPMA API Panel | April 2013
SVPMA API Panel | April 2013SVPMA API Panel | April 2013
SVPMA API Panel | April 2013
 
Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...
Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...
Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...
 
Python in SQL 2019
Python in SQL 2019Python in SQL 2019
Python in SQL 2019
 
Cloud Vulnerabilities and Its Threats
Cloud Vulnerabilities and Its ThreatsCloud Vulnerabilities and Its Threats
Cloud Vulnerabilities and Its Threats
 
Meteor Framework Introduction
Meteor Framework IntroductionMeteor Framework Introduction
Meteor Framework Introduction
 
5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing
 
Heading towards the great release of angular 8.0 development observe the uno...
Heading towards the great release of angular 8.0 development  observe the uno...Heading towards the great release of angular 8.0 development  observe the uno...
Heading towards the great release of angular 8.0 development observe the uno...
 
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) ProfessionalsAndroid Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
 
Seamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related ProblemsSeamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related Problems
 
Elements of a Great API Reference
Elements of a Great API ReferenceElements of a Great API Reference
Elements of a Great API Reference
 
PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
PhoneGap 2014 & Beyond - PhoneGap Day EU 2015 (2015-05-18)
 
GSuite SSO AWS - AWS Meetup POA
GSuite SSO AWS - AWS Meetup POA GSuite SSO AWS - AWS Meetup POA
GSuite SSO AWS - AWS Meetup POA
 
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.shAPIdays Paris 2019 - The Rise of  Shadow APIs by Guillaume Montard, Bearer.sh
APIdays Paris 2019 - The Rise of Shadow APIs by Guillaume Montard, Bearer.sh
 
البرامج الخبيثه
البرامج الخبيثه البرامج الخبيثه
البرامج الخبيثه
 

En vedette

Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
 Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato  Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
PROIDEA
 

En vedette (19)

[CONFidence 2016] Piotr Kaźmierczak, Seweryn Kucharski - Red Team - najlepszy...
[CONFidence 2016] Piotr Kaźmierczak, Seweryn Kucharski - Red Team - najlepszy...[CONFidence 2016] Piotr Kaźmierczak, Seweryn Kucharski - Red Team - najlepszy...
[CONFidence 2016] Piotr Kaźmierczak, Seweryn Kucharski - Red Team - najlepszy...
 
4Developers2016: Introduction to Xamarin.Platform
4Developers2016: Introduction to Xamarin.Platform4Developers2016: Introduction to Xamarin.Platform
4Developers2016: Introduction to Xamarin.Platform
 
4Developers2016: Łukasz Szydło- Continuous Deployment - alternatywa dla żmudn...
4Developers2016: Łukasz Szydło- Continuous Deployment - alternatywa dla żmudn...4Developers2016: Łukasz Szydło- Continuous Deployment - alternatywa dla żmudn...
4Developers2016: Łukasz Szydło- Continuous Deployment - alternatywa dla żmudn...
 
MCE^3 - Lasse Koskela - Full-Text Search on iOS and Android
MCE^3 - Lasse Koskela - Full-Text Search on iOS and AndroidMCE^3 - Lasse Koskela - Full-Text Search on iOS and Android
MCE^3 - Lasse Koskela - Full-Text Search on iOS and Android
 
Atmosphere - Waldemar Piszczewiat - CI/CD: How I Learned to Stop Worrying and...
Atmosphere - Waldemar Piszczewiat - CI/CD: How I Learned to Stop Worrying and...Atmosphere - Waldemar Piszczewiat - CI/CD: How I Learned to Stop Worrying and...
Atmosphere - Waldemar Piszczewiat - CI/CD: How I Learned to Stop Worrying and...
 
infraxstructure: Paweł Serwan i Jarosław Sobel "Wirtualizacja aplikacji czy ...
infraxstructure: Paweł Serwan i Jarosław Sobel  "Wirtualizacja aplikacji czy ...infraxstructure: Paweł Serwan i Jarosław Sobel  "Wirtualizacja aplikacji czy ...
infraxstructure: Paweł Serwan i Jarosław Sobel "Wirtualizacja aplikacji czy ...
 
4Developers: Make your Wordpress Themes faster by using a bunch of great tool...
4Developers: Make your Wordpress Themes faster by using a bunch of great tool...4Developers: Make your Wordpress Themes faster by using a bunch of great tool...
4Developers: Make your Wordpress Themes faster by using a bunch of great tool...
 
Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
 Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato  Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
Atmosphere 2016 - Gustavo Elias - How to deal with a hot potato
 
[4developers] Utrzymanie bezpieczeństwa aplikacji produkcyjnych na przykładac...
[4developers] Utrzymanie bezpieczeństwa aplikacji produkcyjnych na przykładac...[4developers] Utrzymanie bezpieczeństwa aplikacji produkcyjnych na przykładac...
[4developers] Utrzymanie bezpieczeństwa aplikacji produkcyjnych na przykładac...
 
PLNOG16: Komunikacja i zdalna współpraca w nowoczesnym środowisku  pracy, Tom...
PLNOG16: Komunikacja i zdalna współpraca w nowoczesnym środowisku  pracy, Tom...PLNOG16: Komunikacja i zdalna współpraca w nowoczesnym środowisku  pracy, Tom...
PLNOG16: Komunikacja i zdalna współpraca w nowoczesnym środowisku  pracy, Tom...
 
MCE^3 - Sebastiano Poggi, Eugenio Marletti - Life Without Fragments
MCE^3 - Sebastiano Poggi, Eugenio Marletti - Life Without FragmentsMCE^3 - Sebastiano Poggi, Eugenio Marletti - Life Without Fragments
MCE^3 - Sebastiano Poggi, Eugenio Marletti - Life Without Fragments
 
4Developers2016: Piotr Miazga - Typescript - an OO approach in Javascript
4Developers2016: Piotr Miazga - Typescript - an OO approach in Javascript4Developers2016: Piotr Miazga - Typescript - an OO approach in Javascript
4Developers2016: Piotr Miazga - Typescript - an OO approach in Javascript
 
4Developers- Lock anatomy and scalable multicore programming Bartosz Adamczewski
4Developers- Lock anatomy and scalable multicore programming Bartosz Adamczewski4Developers- Lock anatomy and scalable multicore programming Bartosz Adamczewski
4Developers- Lock anatomy and scalable multicore programming Bartosz Adamczewski
 
[4developers] OWASP ASVS - ściągawka z bezpieczeństwa dla programisty
[4developers] OWASP ASVS - ściągawka z bezpieczeństwa dla programisty[4developers] OWASP ASVS - ściągawka z bezpieczeństwa dla programisty
[4developers] OWASP ASVS - ściągawka z bezpieczeństwa dla programisty
 
[4developers] The saga pattern v3- Robert Pankowiecki
[4developers] The saga pattern v3- Robert Pankowiecki[4developers] The saga pattern v3- Robert Pankowiecki
[4developers] The saga pattern v3- Robert Pankowiecki
 
4Developers2016: Grzegorz Godlewski- Dlaczego oni są nienormalni?
4Developers2016: Grzegorz Godlewski- Dlaczego oni są nienormalni?4Developers2016: Grzegorz Godlewski- Dlaczego oni są nienormalni?
4Developers2016: Grzegorz Godlewski- Dlaczego oni są nienormalni?
 
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
 
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
 

Similaire à MCE^3 - Scott Alexander-Bown - Android App Security on a Budget

Applications Development
Applications DevelopmentApplications Development
Applications Development
The Sapper UAE
 

Similaire à MCE^3 - Scott Alexander-Bown - Android App Security on a Budget (20)

Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App PerformanceApteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App Performance
 
Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices
 
Applications Development
Applications DevelopmentApplications Development
Applications Development
 
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensics
 
Enough with the Mobile SDK Mess: A New Technology Is Born
Enough with the Mobile SDK Mess: A New Technology Is BornEnough with the Mobile SDK Mess: A New Technology Is Born
Enough with the Mobile SDK Mess: A New Technology Is Born
 
Serverless Swift for Mobile Developers
Serverless Swift for Mobile DevelopersServerless Swift for Mobile Developers
Serverless Swift for Mobile Developers
 
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...
APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...
APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...
 
How to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hoursHow to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hours
 
How to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hoursHow to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hours
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Meteor Introduction - Ashish
Meteor Introduction - AshishMeteor Introduction - Ashish
Meteor Introduction - Ashish
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 
How to Optimize Apps for Apple iOS Search and iOS 9 Universal Links - SMX Wes...
How to Optimize Apps for Apple iOS Search and iOS 9 Universal Links - SMX Wes...How to Optimize Apps for Apple iOS Search and iOS 9 Universal Links - SMX Wes...
How to Optimize Apps for Apple iOS Search and iOS 9 Universal Links - SMX Wes...
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

MCE^3 - Scott Alexander-Bown - Android App Security on a Budget