SlideShare a Scribd company logo
1 of 270
Download to read offline
Jabber security
Peter Saint-Andre
stpeter@jabber.org
https://stpeter.im/
secure communication
with Jabber
what is Jabber?
open XML technologies
real-time messaging
presence
multimedia negotiation
collaboration
and more
invented by Jeremie
   Miller in 1998
in essence...
streaming XML
over long-lived
TCP connection
client-server
architecture
decentralized
  network
inter-domain
  messaging
like email
but really fast
with built-in presence
not just one
open-source project
multiple codebases
open-source and
  commercial
interoperability via
XML wire protocol
core protocol
standardized @ IETF
Extensible
Messaging
and
Presence
Protocol
(XMPP)
RFCs 3920 + 3921
multiple
implementations
serious deployment
how many users?
we don’t know
decentralized
 architecture
100k+ servers
50+ million IM users
not just IM
generic XML routing
lots of applications
     beyond IM
continually defining
 XMPP extensions
XMPP Standards
Foundation (XSF)
developer-driven
standards group
that’s great, but...
how secure is it?
what is security?
secure conversation
    in real life...
a good friend
visits your home
you know and trust
    each other
only the two of you
strangers can’t enter
     your home
your home is not
     bugged
conversation is not
    recorded
what you say is private
  and confidential
contrast that with
  the Internet...
lots of potential attacks
man-in-the-middle
eavesdropping
unauthenticated users
address spoofing
weak identity
rogue servers
denial of service
directory harvesting
buffer overflows
spam
spim
spit
splogs
viruses
worms
trojan horses
malware
phishing
pharming
information leaks
inappropriate logging
    and archiving
you get the picture
the Internet is a
dangerous place
how do we fight
 these threats?
sorry, but...
Jabber is not a
perfect technology
not originally built
 for high security
don’t require PGP keys
    or X.509 certs
don’t require ubiquitous
       encryption
tradeoffs between
security and usability
maybe that’s why we
have 50+ million users...
but privacy and security
     are important
so what have we
 done to help?
Jabber architecture...
similar to email
client connects to
server (TCP 5222)
(or connect via HTTP
  binding over SSL)
client MUST
authenticate
originally: plaintext (!) or
    hashed password
Simple Authentication &
 Security Layer (SASL)
RFC 4422
many SASL mechanisms
PLAIN (OK over
encrypted connection)
DIGEST-MD5
EXTERNAL (with
  X.509 certs)
GSSAPI
(a.k.a. Kerberos)
ANONYMOUS
etc.
all users are
authenticated
sender addresses not
  merely asserted
server stamps
user ‘from’ address
Jabber IDs are
logical addresses
IP addresses
not exposed
Jabber ID looks like
  an email address
romeo@montague.net
juliet@capulet.com
not limited to
US-ASCII characters
jiři@čechy.cz
πλατω@ἑλλας.gr
มฌำปจ@jabber.th
@jabber.jp
∞@math.it
full Unicode opens
  phishing attacks
STPETER@jabber.org
ᏚᎢᎵᎬᎢᎬᏒ@jabber.org
clients should use
    “petnames”
store in buddy list [tm]
    (a.k.a. “roster”)
server stores
 your roster
server broadcasts
  your presence
but only to subscribers
 you have authorized
most traffic goes
through server
traffic is pure XML
servers reject
malformed XML
servers may validate
traffic against schemas
difficult to inject
 binary objects
difficult to propagate
      malware
break alliance between
   viruses and spam
spam virtually unknown
  on Jabber network
why?
hard to spoof
  addresses
hard to send
inline binary
XHTML subset
(no scripts etc.)
user approval required
   for file transfer
privacy lists to block
  unwanted users
XMPP not immune
   to spam
have spam-fighting tools
 ready when it appears
challenge-response to
 register an account
challenge-response to
     communicate
spam reporting
working on more
 anti-spam tools
server reputation
     system?
anonymized IP address?
   (groupchat spam)
spammers need to
   overcome...
bandwidth limits
connection limits
other denial-of-service
 prevention measures
distributed attack or
 run a rogue server
not impossible
just harder than other
networks (got email?)
no rogue servers
      (yet)
optional to federate
with other servers
many private
XMPP servers
public servers federate
as needed (TCP 5269)
DNS lookup to get
 server IP address
only one hop
between servers
server identities
  are validated
server dialback
(identity verification)
effectively prevents
  server spoofing
receiving server checks
    sending domain
no messages from
“service@paypal.com”
DNS poisoning
can invalidate
need something
   stronger?
Transport Layer
 Security (TLS)
RFC 4346
IETF “upgrade” to SSL
TLS + SASL EXTERNAL
   with X.509 certs
strong authentication
   of other servers
but only if certs are
  not self-signed
$$$
real X.509 certs
 are expensive
VeriSign, Thawte, etc.
a better way...
xmpp.net
intermediate CA for
   XMPP network
free digital certificates
for XMPP server admins
(need to prove you
 own the domain)
root CA: StartCom
ICA: XMPP Standards
     Foundation
hopefully other CAs
     in future
so channel encryption
    is a no-brainer
man-in-the-middle
 is much harder
“Mallory” is foiled
but what about
“Isaac” and “Justin”?
we can encrypt
 the channels
but traffic is cleartext
   within servers!
need end-to-end
encryption (“e2e”)
first try: OpenPGP
   (XEP-0027)
great for geeks
but Aunt Tillie
doesn’t use PGP
second try: S/MIME
   (RFC 3923)
great for geeks (and
 some employees)
but Aunt Tillie
doesn’t use X.509
XML encryption and
 digital signatures?
seems natural, but not
much interest (c14n?)
doesn’t provide perfect
   forward secrecy
off-the-record
communication (OTR)?
great idea
opportunistic
encryption (à la SSH)
perfect forward secrecy
but encrypts only the
plaintext message body
we need to encrypt
 the entire packet
why?
because XMPP is more
     than just IM
protect IPs sent in
multimedia negotiation
protect shared XML
    editing data
etc.
solution: encrypted
      sessions
big set of
requirements...
packets are confidential
packet integrity
replay protection
key compromise does
not reveal past comms
don’t depend on public
  key infrastructure
entities authenticated
    to each other
3rd parties cannot
 identify entities
robustness against
attack (multiple hurdles)
upgradeability if bugs
   are discovered
encryption of full
 XMPP packets
implementable by
 typical developer
usable by
typical user
how to address all
  requirements?
just a dream?
bootstrap from
cleartext to encryption
in-band Diffie-Hellman
     key exchange
translate “SIGMA”
approach to XMPP
similar to Internet Key
    Exchange (IKE)
details in XSF XEPs
   116, 188, 200
simplified profile
  in XEP-0217
major priority for
   2007-2008
support from NLnet
     (thanks!)
pursuing full
security analysis
code bounties
GSoC project
Jabber security summit
more at
blog.xmpp.org
wide implementation
in next ~12 months
so how are we doing?
spam free
hard to spoof addresses
pure XML discourages
   binary malware
DoS attacks possible
   but not easy
widespread channel
    encryption
working hard on
end-to-end encryption
widely deployed in high-
 security environments
Wall Street
investment banks
U.S. military
MIT and other
 universities
many public servers
   since 1999
no major security
    breaches
can’t be complacent
always more to do
security is a never-
  ending process
analysis and hacking
  are encouraged
if it breaks,
 we’ll fix it
security@xmpp.org
join the conversation
let’s build
a more secure Internet

More Related Content

What's hot

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashAnkit Mehta
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2Olle E Johansson
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemAvishek Datta
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 

What's hot (12)

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
 
NTLM
NTLMNTLM
NTLM
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
Core java day1
Core java day1Core java day1
Core java day1
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Day5
Day5Day5
Day5
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Pkcs 5
Pkcs 5Pkcs 5
Pkcs 5
 
3.Network
3.Network3.Network
3.Network
 
Pgp
PgpPgp
Pgp
 

Similar to Secure Communications with Jabber

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10dianacheng
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmppPrem Narain
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.pptUskuMusku1
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoLuis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 

Similar to Secure Communications with Jabber (20)

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Cours4.pptx
Cours4.pptxCours4.pptx
Cours4.pptx
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmpp
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 

More from stpeter

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and Youstpeter
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Updatestpeter
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internetstpeter
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overviewstpeter
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprisestpeter
 
Jabber 101
Jabber 101Jabber 101
Jabber 101stpeter
 

More from stpeter (7)

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and You
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Update
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internet
 
Jingle
JingleJingle
Jingle
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overview
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprise
 
Jabber 101
Jabber 101Jabber 101
Jabber 101
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Secure Communications with Jabber