SlideShare a Scribd company logo
TurtleSec
@pati_gallardo
Turtle
Sec
@pati_gallardo
TurtleSec
@pati_gallardo 2The Turtle vs The Hare
TurtleSec
@pati_gallardo 3
The Turtle
63.1%
The Hare
36.9%
TurtleSec
@pati_gallardo@pati_gallardo
Who can you trust?
Who feeds you the data?
TurtleSec
@pati_gallardo
Why Is Election Security
So Hard?
Paranoia 2019
Patricia Aas
Turtle
Sec
TurtleSec
@pati_gallardo
Patricia Aas - Trainer & Consultant
C++ Programmer, Application Security
Currently : TurtleSec
Previously : Vivaldi, Cisco Systems, Knowit, Opera Software
Master in Computer Science
Pronouns: she/her
@pati_gallardo
Turtle
Sec
TurtleSec
@pati_gallardo 7
TurtleSec
@pati_gallardo 8@pati_gallardo
Complex?
TurtleSec
@pati_gallardo@pati_gallardo
Is the Norwegian
Election System
complex?
9@pati_gallardo
TurtleSec
@pati_gallardo
No, not really.
10
TurtleSec
@pati_gallardo
“The testing is performed using a prototype
implementation in Java. Though the implementation
does not take into consideration security and
anonymity concerns, it is a full implementation of
the Electoral System.”
Evaluating the suitability of EML 4.0 for the Norwegian Electoral System : A prototype approach
Patricia Aas, Masters Thesis UiO, 2005
https://www.duo.uio.no/handle/10852/9298
11
TurtleSec
@pati_gallardo
What are these “security and
anonymity concerns”?
12
TurtleSec
@pati_gallardo
It’s complicated.
13
TurtleSec
@pati_gallardo 14@pati_gallardo
What are we
protecting?
TurtleSec
@pati_gallardo
Worst Case Scenario
An accepted, but manipulated
Election Result
15
TurtleSec
@pati_gallardo@pati_gallardo
What is the
Election Result?
16@pati_gallardo
TurtleSec
@pati_gallardo
The Election Result
is the distribution of the
mandates
17
TurtleSec
@pati_gallardo
An Election doesn’t have to be
flawless
as long as
The Election Result
is correct
18
TurtleSec
@pati_gallardo 19@pati_gallardo
What is the Threat
Model?
TurtleSec
@pati_gallardo@pati_gallardo
What are you
afraid of?
20@pati_gallardo
TurtleSec
@pati_gallardo
Adding ballots
Removing ballots
Changing ballots
Reporting wrong counts
21
TurtleSec
@pati_gallardo
At its most extreme:
Preventing a coup
Keeping a democracy
22
TurtleSec
@pati_gallardo
Who are the Threat Actors in
Elections?
23
TurtleSec
@pati_gallardo
The most likely Threat Actor
Historically
Internationally
Is the sitting (local) government
24
TurtleSec
@pati_gallardo
Others include:
Foreign governments,
private companies, terrorists,
activists, lone wolfs
25
TurtleSec
@pati_gallardo
The most likely Threat Actor
in an election
is the sitting government
26
TurtleSec
@pati_gallardo
The same government
running the election
27
TurtleSec
@pati_gallardo
Two “acceptable” outcomes
1. A correct election
2. Prevented a rigged election
(hopefully correctable)¹
28¹ How feasible is a new election?
TurtleSec
@pati_gallardo 29@pati_gallardo
What about
Anonymity?
TurtleSec
@pati_gallardo@pati_gallardo
How does a
secret ballot play
into elections?
30@pati_gallardo
TurtleSec
@pati_gallardo
True democracy requires
the freedom to
Vote your conscience
31
TurtleSec
@pati_gallardo
Prevent coercion
Prevent vote selling
Prevent persecution
now or in the future
32
#goals
TurtleSec
@pati_gallardo
No.
The answer is not blockchain
33
TurtleSec
@pati_gallardo
Why?
34
TurtleSec
@pati_gallardo
To prevent persecution
You don’t want to connect a
vote to a person
35
TurtleSec
@pati_gallardo
To prevent coercion and vote selling
You don’t want a person to be able to
prove what they voted
36
TurtleSec
@pati_gallardo
And what put that vote on the
blockchain?
Who’s in charge of that?
How about chain of custody?
37
TurtleSec
@pati_gallardo 38@pati_gallardo
Man vs Machine
TurtleSec
@pati_gallardo@pati_gallardo
What?
You hate
computers?
39@pati_gallardo
TurtleSec
@pati_gallardo
Nah. I love computers.
But manual elections are hard to beat.
They’re just that good.
40
TurtleSec
@pati_gallardo
Isn’t manual counting slow?
41
TurtleSec
@pati_gallardo
Surprisingly, no.
It’s massively distributed.
42
TurtleSec
@pati_gallardo
Isn’t manual counting error prone?
43
TurtleSec
@pati_gallardo
Yes.
And no.
It’s complicated.
44
TurtleSec
@pati_gallardo
Norwegian risk model for
ballot counting errors
Manual vs Machine
45
TurtleSec
@pati_gallardo 46
1. Can it affect the Election Result?
2. Can it go undetected?
3. Can it discredit the Election Result?
4. Can it create more work?
Evaluating severity
TurtleSec
@pati_gallardo 47
1. Historically how common is it?
2. Is there a known threat?
Evaluating likelihood
TurtleSec
@pati_gallardo
48
Likelihood
Severity
Innocent
manual
Innocent
machine
Premeditated
manual
Premeditated
machine
Likelihood Innocent Premeditated
Manual High Low
Machine Low-Medium¹ Low
Severity Innocent Premeditated
Manual Low² Medium³
Machine Medium-High High
Risk diagram: Counting Errors (no Machine Count Audit)
¹ Bugs: Has happened many times irl
² Distributed proportionally on parties
³ Will almost certainly be detected, but cast doubt
and ballots are compromised
TurtleSec
@pati_gallardo 49@pati_gallardo
What is the
alternative?
TurtleSec
@pati_gallardo@pati_gallardo
Manual
elections?
50@pati_gallardo
TurtleSec
@pati_gallardo
Software independence¹
51¹ Ron Rivest (The R in RSA) and John P. Wack (NIST)
TurtleSec
@pati_gallardo 52
“A voting system is software-independent if
an undetected change or error in its software
cannot cause
an undetectable change or error in
an election outcome”
On the notion of “software-independence” in voting systems
http://people.csail.mit.edu/rivest/RivestWack-OnTheNotionOfSoftwareIndependenceInVotingSystems.pdf
TurtleSec
@pati_gallardo 53@pati_gallardo
Auditability
TurtleSec
@pati_gallardo
“Verify the election results,
not the voting system”
54
Rivest & Wack, On the notion of “software-independence” in voting systems
TurtleSec
@pati_gallardo
What is a “manual” election?
Paper ballots
Manual count¹
55¹ Keep computers for all parts that are auditable
TurtleSec
@pati_gallardo
Auditable elections
Paper ballots
Manual audit
56
TurtleSec
@pati_gallardo 57
Likelihood
Severity
Innocent
manual
Innocent
machine
Premeditated
manual
Premeditated
machine
Premeditated
machine
Innocent
machine
Risk diagram: Counting Errors (with Machine Count Audit)
An Audit will reveal
- Bugs
- Manipulations
TurtleSec
@pati_gallardo
What is an auditable
election?
58
TurtleSec
@pati_gallardo 59@pati_gallardo
Implementation
TurtleSec
@pati_gallardo
Norway 2019
Manual preliminary count¹
60¹ Ask me about this process sometime ;)
TurtleSec
@pati_gallardo
Norway has two counts:
Preliminary and Final
Results can be compared
61
TurtleSec
@pati_gallardo
Goal for many US researchers
Risk-Limiting Audits
62
TurtleSec
@pati_gallardo
What’s a Risk Limiting Audit?
A statistical model for manual
ballot sampling
63
TurtleSec
@pati_gallardo
“The Norwegian electoral system: a study of EVA
Skanning, implemented error detection mechanisms,
and applicability of risk-limiting audits”
Vilde Elise Samnøy Amundsen, Masters Thesis NTNU, 2019
Thesis Advisor: Patricia Aas
http://www.valgforum.no/wp-content/uploads/2019/02/Masteroppgave-Vilde-Amundsen.pdf
64
TurtleSec
@pati_gallardo
What was the problem in
Norway?
65
TurtleSec
@pati_gallardo
No audit.
66
TurtleSec
@pati_gallardo
Paper ballots are not enough
There has to be an audit
Performed by regular folks
67
TurtleSec
@pati_gallardo
Manually counted elections
have a built-in audit
People.
68
TurtleSec
@pati_gallardo
Manually counted elections can
also be rigged
But everyone knows they are
69
TurtleSec
@pati_gallardo
If an election is rigged
and nobody knows,
do you have a democracy?
70
TurtleSec
@pati_gallardo
No.
You’ve had a coup.
And you don’t even know it.
71
TurtleSec
@pati_gallardo 72@pati_gallardo
TurtleSec
@pati_gallardo
Best way to rig an election?
Internet voting.
73
TurtleSec
@pati_gallardo
Turtle
Sec
@pati_gallardo
Than
yo !
TurtleSec
@pati_gallardo 75
Høringssvar, Patricia Aas, TurtleSec, https://elections.no/2018/12/13/hoeringssvar_turtlesec.html
“Election Cybersecurity Progress Report”, Professor J. Alex Halderman (University of Michigan), https://youtu.be/U-184ssFce4
“Electronic Voting In 2018: Threat Or Menace”, Professor Matt Blaze, Joe Hall, Margaret MacAlpine, and Harri Hursti,
https://youtu.be/Lo3iibtVh6M
“Testimony of Prof. Matt Blaze”, Professor Matt Blaze (University of Pennsylvania),
https://oversight.house.gov/wp-content/uploads/2017/11/Blaze-UPenn-Statement-Voting-Machines-11-29.pdf
“Securing the Vote: Protecting American Democracy”, The National Academies of Sciences, Engineering, and Medicine,
https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy
“DEF CON 26 Voting Village Report”, Blaze, Braun, Hursti, Jefferson, MacAlpine, Moss,
https://defcon.org/images/defcon-26/DEF%20CON%2026%20voting%20village%20report.pdf
Resources

More Related Content

Similar to Why Is Election Security So Hard? (Paranoia 2019)

DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)
Patricia Aas
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slides
Alan Richardson
 
Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI
Margriet Groenendijk
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
Amirul Wiramuda
 
Thrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the StackapocalypseThrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the Stackapocalypse
Effin Amazing
 
Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)
Patricia Aas
 
Rise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine LearningRise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine Learning
Catalyst
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
Nestor Angulo de Ugarte
 
Why am I doing this???
Why am I doing this???Why am I doing this???
Why am I doing this???
Anne-Marie Tousch
 
Social Media use by Italian Critical Care doctors and nurses - 30° SMART
Social Media use by Italian Critical Care doctors and nurses - 30° SMARTSocial Media use by Italian Critical Care doctors and nurses - 30° SMART
Social Media use by Italian Critical Care doctors and nurses - 30° SMART
Tommaso Scquizzato
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
Gert-Jan Bruggink
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To Start
Patricia Aas
 
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIOJTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
Peter Gallagher
 
How (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your SprintHow (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your Sprint
eBranding Ninja
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment Testing
Alan Richardson
 
Conversionboost - Bart Schutz
Conversionboost - Bart SchutzConversionboost - Bart Schutz
Conversionboost - Bart Schutz
Online Dialogue
 

Similar to Why Is Election Security So Hard? (Paranoia 2019) (16)

DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slides
 
Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI Trusting machines with robust, unbiased and reproducible AI
Trusting machines with robust, unbiased and reproducible AI
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Thrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the StackapocalypseThrive, don’t just survive the Stackapocalypse
Thrive, don’t just survive the Stackapocalypse
 
Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)Introduction to Memory Exploitation (Meeting C++ 2021)
Introduction to Memory Exploitation (Meeting C++ 2021)
 
Rise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine LearningRise of the Machines: What Marketers Need to Know about Machine Learning
Rise of the Machines: What Marketers Need to Know about Machine Learning
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
 
Why am I doing this???
Why am I doing this???Why am I doing this???
Why am I doing this???
 
Social Media use by Italian Critical Care doctors and nurses - 30° SMART
Social Media use by Italian Critical Care doctors and nurses - 30° SMARTSocial Media use by Italian Critical Care doctors and nurses - 30° SMART
Social Media use by Italian Critical Care doctors and nurses - 30° SMART
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To Start
 
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIOJTAG Debugging with the ESP32, Visual Micro and PlatformIO
JTAG Debugging with the ESP32, Visual Micro and PlatformIO
 
How (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your SprintHow (and why) to Factor Tech Ethics into Your Sprint
How (and why) to Factor Tech Ethics into Your Sprint
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment Testing
 
Conversionboost - Bart Schutz
Conversionboost - Bart SchutzConversionboost - Bart Schutz
Conversionboost - Bart Schutz
 

More from Patricia Aas

NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdfNDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
Patricia Aas
 
Telling a story
Telling a storyTelling a story
Telling a story
Patricia Aas
 
Return Oriented Programming, an introduction
Return Oriented Programming, an introductionReturn Oriented Programming, an introduction
Return Oriented Programming, an introduction
Patricia Aas
 
I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)
Patricia Aas
 
Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)
Patricia Aas
 
Classic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdfClassic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdf
Patricia Aas
 
Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)
Patricia Aas
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
Patricia Aas
 
Thoughts On Learning A New Programming Language
Thoughts On Learning A New Programming LanguageThoughts On Learning A New Programming Language
Thoughts On Learning A New Programming Language
Patricia Aas
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
Patricia Aas
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
Patricia Aas
 
The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)
Patricia Aas
 
The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))
Patricia Aas
 
Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019) Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019)
Patricia Aas
 
Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)
Patricia Aas
 
Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)
Patricia Aas
 
The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)
Patricia Aas
 
Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)
Patricia Aas
 
Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)
Patricia Aas
 
The Anatomy of an Exploit
The Anatomy of an ExploitThe Anatomy of an Exploit
The Anatomy of an Exploit
Patricia Aas
 

More from Patricia Aas (20)

NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdfNDC TechTown 2023_ Return Oriented Programming an introduction.pdf
NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
 
Telling a story
Telling a storyTelling a story
Telling a story
 
Return Oriented Programming, an introduction
Return Oriented Programming, an introductionReturn Oriented Programming, an introduction
Return Oriented Programming, an introduction
 
I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)I can't work like this (KDE Academy Keynote 2021)
I can't work like this (KDE Academy Keynote 2021)
 
Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)Dependency Management in C++ (NDC TechTown 2021)
Dependency Management in C++ (NDC TechTown 2021)
 
Classic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdfClassic Vulnerabilities (MUCplusplus2022).pdf
Classic Vulnerabilities (MUCplusplus2022).pdf
 
Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)Classic Vulnerabilities (ACCU Keynote 2022)
Classic Vulnerabilities (ACCU Keynote 2022)
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
 
Thoughts On Learning A New Programming Language
Thoughts On Learning A New Programming LanguageThoughts On Learning A New Programming Language
Thoughts On Learning A New Programming Language
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
 
Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020Trying to build an Open Source browser in 2020
Trying to build an Open Source browser in 2020
 
The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)The Anatomy of an Exploit (NDC TechTown 2019)
The Anatomy of an Exploit (NDC TechTown 2019)
 
The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))The Anatomy of an Exploit (NDC TechTown 2019))
The Anatomy of an Exploit (NDC TechTown 2019))
 
Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019) Survival Tips for Women in Tech (JavaZone 2019)
Survival Tips for Women in Tech (JavaZone 2019)
 
Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)Chromium Sandbox on Linux (NDC Security 2019)
Chromium Sandbox on Linux (NDC Security 2019)
 
Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)Keynote: Deconstructing Privilege (C++ on Sea 2019)
Keynote: Deconstructing Privilege (C++ on Sea 2019)
 
The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)The Anatomy of an Exploit (CPPP 2019)
The Anatomy of an Exploit (CPPP 2019)
 
Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)Make it Fixable (NDC Copenhagen 2018)
Make it Fixable (NDC Copenhagen 2018)
 
Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)Trying to learn C# (NDC Oslo 2019)
Trying to learn C# (NDC Oslo 2019)
 
The Anatomy of an Exploit
The Anatomy of an ExploitThe Anatomy of an Exploit
The Anatomy of an Exploit
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Why Is Election Security So Hard? (Paranoia 2019)