SlideShare a Scribd company logo
1 of 61
Download to read offline
Consensus	and


Raft	Algorithm
Huynh	Quang	Thao


Zendesk


Telegram	and	Signal


How	these	systems	handle	users’	
communication	privacy
End-to-end	encryption
Want	to	get	a	coffee	?
Bob
Alice
Want	to	get	a	coffee	?
Yes
Yes
End-to-end	encryption
Want	to	get	a	coffee	?
Bob
Alice
Want	to	get	a	coffee	?
Yes
Yes
End-to-end	encryption
Want	to	get	a	coffee	?
Bob
Alice
Want	to	get	a	coffee	?
Yes
No
N
o
End-to-end	encryption
Want	to	get	a	coffee	?
Bob Alice
Want	to	get	a	coffee	?
Yes
Yes
TLS	/	HTTPS
TLS	/	HTTPS
End-to-end	encryption
Want	to	get	a	coffee	?
Bob Alice
Want	to	get	a	coffee	?
Yes
Yes
TLS	/	HTTPS
TLS	/	HTTPS
End-to-end	encryption
Want	to	get	a	coffee	?
Bob Alice
Want	to	get	a	coffee	?
Yes
Yes
TLS	/	HTTPS
Government
Data	breach
Advertisement
TLS	/	HTTPS
End-to-end	encryption
Want	to	get	a	coffee	?
Bob Alice
Want	to	get	a	coffee	?
Yes
Yes
TLS	/	HTTPS
TLS	/	HTTPS
CA	Server
End-to-end	encryption
%!%!@%!!#!$
Bob Alice
%!%!@%!!#!$
!$!!(($#
!$!!(($#
TLS	/	HTTPS
TLS	/	HTTPS
Bob’s	private	key
Alice’s	private	key
End-to-end	encryption
%!%!@%!!#!$
Bob Alice
%!%!@%!!#!$
!$!!(($#
!$!!(($#
TLS	/	HTTPS
TLS	/	HTTPS
Bob’s	private	key
Alice’s	private	key
Is	HTTPS	still		necessary	here?
End-to-end	encryption
%!%!@%!!#!$
Bob Alice
%!%!@%!!#!$
!$!!(($#
!$!!(($#
TLS	/	HTTPS
TLS	/	HTTPS
Bob’s	private	key
Alice’s	private	key
Information	Leakage


- Bob	used	Signal/Telegram/Facebook	Messenger


- Bob	talks	with	Alice


- Keys	are	compromised	at	some	points	in	the	future	—>	All	previous	conversations	can	be	decrypted


- Alice	sold	Bob	to	the	government.
Structure
- Background	of	founders	and	applications


- Infrastructure	


- Private	communication	between	2	people


- Group	communication
Telegram
History
Founder:	Pavel	Durov	-	Russian


2007:	Founded	the	social	network	site	named	VK	(cloned	from	Facebook)


2011-2013:	have	many	issues	related	to	censorship	with	Russia	government.


2013:	Founded	Telegram.	A	secure	social	platform	for	users	without	compromising	from	governments.


2015:		Moved	Telegram	team	to	Dubai	to	avoid	Russia	censorship.	


Company	will	continue	to	move	the	headquarter	to	other	countries	when	Dubai’s	policy	changes.
Application
• Worked	as	a	social	network	with	pull-based	model.


• client-side	open	source.	server-side	close	source.	


Claim	from	the	founder:	there	is	no	point	to	open	source	the	server	side,	because	server	can	execute	arbitrary	
code	which	is	different	from	open-source	version.


• Android	and	iOS	source:	reproducible	builds.	


also	known	as	deterministic	compilation,	is	a	process	of	compiling	software	which	ensures	the	resulting	binary	
code	can	be	reproduced.


We	can	compare	between	manual-compiled	binary	version	with	website	version	to	verify	there	is	no	single	
changes	in	the	website	version.
Infrastructure
Telegram	is	traditional	client-server	side.	All	datas	will	be	stored	on	the	Telegram	servers.	


However,	Telegram	guarantees	(through	their	public	records):


- Data	will	not	be	shared	for	third	parties,	and	Telegram	will	not	ever	read	those	data.


- Encryption	key	will	be	divided	into	many	parts	stored	on	many	datacenter	->	hard	to	compromise	
when	one	server	is	hacked


- End-user’s	data	will	be	divided	and	stored	on	many	data	center	expands	to	many	countries


- A	single	government	will	harder	to	get	end-user	data	because	it	needs	to	compromise	between	
many	countries.
Single	Chat
Not	end-to-end	by	default.	Can	be	enabled


Question:	Is	that	safe	to	use	end-to-end	encryption	in	Telegram?


Answer:	Yes.	Because	we	have	end-to-end	encryption	+	client-side	open	source	(with	reproducible	
build	to	verify)


Question:	Is	that	safe	to	not	use	end-to-end	encryption	in	Telegram?


Answer:	No.		Theoretically,	Telegram	hold	data	and	can	decrypt	that	data.
Group	Chat
• No	end-to-end	encryption


• All	datas	are	encrypted	on	server	and	encrypted	client-server-client


• Can	be	restored	on	the	new	device


Question:	Is	that	safe	to	use	Telegram	group	chat?


Answer:	No.	Theoretically,	Telegram	can	decrypt	and	retrieve	all	chat	contents.
Signal
History
Founder


• Moxie	Marlinspike	-	computer	security	researcher	.	Former	head	of	security	team	at	Twitter.


• Publish	many	security	vulnerabilities


• Author	of	the	Signal	protocol:	used	in	Signal	/	Whatsapp	/	Facebook	Messenger	/	Skype


• 2014:	Founded	Signal	application


• Secondary	Security	Screening	Selection	(SSSS)
Application
• Fully	open	source:	client	side	and	server	side.	


• Android	and	iOS	applications	are	reproducible	builds.


• Does	not	store	user’s	information	on	server.


• Design	in	mind:	even	if	server	is	compromised,	user’s	data	cannot	be	leaked.
In	the	“
f
irst	half	of	2016”	(the	most	speci
f
ic	we’re	permitted	to	be),	we	received	a	subpoena	from	the	Eastern	District	of	Virginia.	The	subpoena	required	us	to	provide	information	about	two	Signal	users	for	a	
federal	grand	jury	investigation.


We’ve	designed	the	Signal	service	to	minimize	the	data	we	retain	about	Signal	users,	so	the	only	information	we	can	produce	in	response	to	a	request	like	this	is	the	date	and	time	a	user	registered	with	Signal	and	
the	last	date	of	a	user’s	connectivity	to	the	Signal	service.


Notably,	things	we	don’t	have	stored	include	anything	about	a	user’s	contacts	(such	as	the	contacts	themselves,	a	hash	of	the	contacts,	any	other	derivative	contact	information),	anything	about	a	user’s	groups	
(such	as	how	many	groups	a	user	is	in,	which	groups	a	user	is	in,	the	membership	lists	of	a	user’s	groups),	or	any	records	of	who	a	user	has	been	communicating	with.


All	message	contents	are	end-to-end	encrypted,	so	we	don’t	have	that	information	either.


This	is	the	
f
irst	subpoena	that	we’ve	received.	It	originally	included	a	broad	gag	order	that	would	have	prevented	us	from	publishing	this	notice,	but	the	ACLU	represented	us	in	quickly	and	successfully	securing	our	
ability	to	publish	the	transcripts	below.	We’re	committed	to	treating	any	future	requests	the	same	way:	working	with	effective	and	talented	organizations	like	the	ACLU,	and	publishing	transcripts	of	our	responses	
to	government	requests	here.


Below	is	the	transcript	for	this	request.
Grand	jury	subpoena	for	Signal	user	data,	Eastern	District	of	Virginia


https://signal.org/bigbrother/eastern-virginia-grand-jury/
Single	private	chat
• end-to-end	by	default,	and	the	only	option.


• Using	safety	number	(a.k.a:	
f
ingerprint)	to	identity


• Guarantee	2	properties:	Deniability	+	Forward	Secrecy
Safety	number
Old	approach:	
f
ingerprint	(a.k.a:	public	key)


• Fingerprint	is	the	identity	per-user


• User	must	know	about	the	cryptography


• Verify	
f
ingerprint	is	not	a	trivial	task	for	end-users
Safety	number
Old	approach:	
f
ingerprint	(a.k.a:	public	key)


• Fingerprint	is	the	identity	per-user


• User	must	know	about	the	cryptography


• Verify	
f
ingerprint	is	not	a	trivial	task	for	end-users
Your	phone Your	friend	phone
There	are	4	combinations	here	….
Safety	number
New	approach:	Safety	number


• Hash	of	A	and	B’s	public	key.	Unique	per	conversation.	(per-user	before)


• Compare	easier


• Interesting	property:	Even	after	hashing,	A	can	verify	with	C	that	they	communicate	to	a	same	person.


A	<->	B1			??		B2	<->	C
Your	phone Your	friend	phone
Deniability
2	conditions	must	be	satis
f
ied:	


• If	someone	receives	a	message	from	you,	they	can	be	absolutely	sure	you	sent	it	


• can’t	prove	to	anyone	else	that	it	was	a	message	you	wrote.
Forward	Secrecy
Situation:


An	attacker	were	to	record	all	of	a	target’s	cipher	text	traf
f
ic	over	some	extended	period	of	time.


At	some	point	in	the	future,		one	key	is	compromise	(e.g.:	the	government	seize	the	computer	of	one	party),	they	
would	have	the	ability	to	decrypt	all	all	of	the	previously	recorded	cipher	text


—>	We	want	to	reduce	this	effect.
Diff-Hellman
Is	a	method	of	securely	exchanging	cryptographic	keys	over	a	public	
channel


Step	1:	Exchange	public	key	


• Bob	sends	to	Alice	Bob’s	public	key	(public	value	everyone	can	get)


• Alice	sends	to	Bob	Alice’s	public	key	(public	value	everyone	can	get)


Step	2:	Combine	keys	to	create	a	shared	secret


• Bob:	Bob	private	key	+	Alice	public	key	→	common	key.


• Alice:	Alice	private	key	+	Bob	public	key	→	common	key.


Because	shared	secret	is	created	from	at	least	Bob	or	Alice	private	key,	
no	one	on	the	connection	can	know	the	shared	secret.
Diff-Hellman
Diff-Hellman
Bob Alice
Bob’s	public	key Mallory’s	public	key
Mallory
Alice’s	public	key
Mallory’s	public	key
Man-in-middle	attack
Diff-Hellman
Bob Alice
Bob’s	public	key Mallory’s	public	key
Mallory
Alice’s	public	key
Mallory’s	public	key
When	started	the	conversation,	Bob	and	Alice	must	check	each	other	public	key	


(Image	/	video	call	/	cold	paper	…)


Your	phone Your	friend	phone
In	Signal,	we	compare	Safety	Number
MAC	-	Message	Authentication	Code
Encryption ensures the con
fi
dentiality, but not the integrity.
Question: If an attacker changes any byte of encrypted text, decrypted value becomes useless. Why is encryption
algorithm not enough?
Answer: Some encryption algorithms allow to change some bytes, which can be used to change the semantic of the
meaning.
There are 2 possible ways to
fi
x
• Using class of “Authenticated encryption algorithm”: encrypt and authenticate at the same time. Example: OCB
Mode or GCM Mode
• Using class of MAC algorithms for integrity and authentication. Example: HMAC
MAC	-	Message	Authentication	Code
There	are	3	ways	to	combine	a	MAC	algorithm	and	Encryption	algorithm


Mac-then-Encrypt:


• Compute	the	MAC	on	the	clear	text	->	append	MAC	data	to	the	encrypt	value	as	whole.


• Result:	Encrypt(Message	+	Mac(message))


• Used	in	TLS


Encrypt-and-MAC:


• Compute	MAC	on	the	clear	text	->	encrypt	the	clear	text	->	append	MAC	at	the	end	of	the	cipher	text.


• Result:	Encrypt(Message)	+	Mac(Message)


• Used	in	SSH


Encrypt-then-MAC:


• Encrypt	the	clear	text	->	compute	the	MAC	on	the	cipher	text.


• Result:	Mac(Encrypt(Message))	+	Encrypt(Message)


• Used	in	IPSec.


—>	Proved	to	be	the	best	choice
MAC	-	Message	Authentication	Code
The	cryptographic	Doom	Principle


	if	you	have	to	perform	any	cryptographic	operation	before	verifying	the	MAC	on	a	message	you’ve	received,	it	
will	somehow	inevitably	lead	to	doom.


https://moxie.org/2011/12/13/the-cryptographic-doom-principle.html	


Moxie	Marlinspike


Encrypt-then-MAC:


• Encrypt	the	clear	text	->	compute	the	MAC	on	the	cipher	text.


• Result:	Mac(Encrypt(Message))	+	Encrypt	Message


• Consumer:	Verify	MAC	->	Decrypt	Message
Signal	algorithm
• Step	1:	Using	key-exchange	algorithm	Diff-Hellman	to	create	a	shared	secret


• Step	2:	Using	the	shared	secret	to


• derive	a	sending	and	receiving	cipher	key	for	each	party,


• a	set	of	MAC	keys	for	each	party
Deniability
Property	1:	Security


We	use	common	shared	secret,	which	is	only	known	by	2	parties	->	no	other	can	decrypt	messages


Property	2:	Integrity	and	authenticity	


We	use	MAC	as	the	mechanism	for	integrity	and	authenticity


Property	3:	Deniability


- For	any	message	M,	Bob	and	Alice	can	produce	a	same	message	with	the	same	signature	because	they	
use	the	same	key


- Bob	knew	that	he	doesn’t	create	a	message	M,	as	the	result,	Alice	did.


- However,	Bob	cannot	prove	with	any	third	party	that	Alice	send	that	message	because	Bob	has	the	
ability	to	send	a	same	message	with	the	exact	signature.
Forward	Secrecy
• Ephemeral Dif
fi
e-Hellman: periodically change key while communicating
• Piggyback the Dif
fi
e-Hellman algorithm in each sent message
Group	communication
• Communicate	between	group	of	people


• Due	to	the	natural	of	end-to-end	group	communication,	when	a	new	comer	joins	an	existing	group,	he	
cannot	see	old	messages.


• Actually	when	a	new	person	joined	a	group,	a	new	group	is	created.
Design	Consideration
• 2	properties	of	private	chat:	deniability	and	forward	secrecy


• Other	interesting	property	transcript	consistency:	assurance	that	all	members	of	a	conversation	are	
seeing	the	same	message	transcript


Example:


• Messages	which	are	selectively	delivered	or	re-ordered	to	only	some	members


• Messages	which	contain	different	plaintext	for	different	members.
Example:


Bob	sends	to	the	group:	“Who	wants	to	kill	the	president?”	


Except	Alice,	to	whom	Bob	instead	sends	“Who	wants	to	get	some	ice	cream?”


Alice	responds	“I	do,	how	about	this	afternoon!”
Design
• 2	properties	of	private	chat:	deniability	and	forward	secrecy


• Other	interesting	property	transcript	consistency:	assurance	that	all	members	of	a	conversation	are	
seeing	the	same	message	transcript


Example:


• Messages	which	are	selectively	delivered	or	re-ordered	to	only	some	members


• Messages	which	contain	different	plaintext	for	different	members.
Example:


Bob	sends	to	the	group:	“Who	wants	to	kill	the	president?”	


Except	Alice,	to	whom	Bob	instead	sends	“Who	wants	to	get	some	ice	cream?”


Alice	responds	“I	do,	how	about	this	afternoon!”
Design
Signal will treat group chat as 1-1 chat between multiple people
• Keep all advantages of the developed private chat protocol
• Signal doesn’t aware about the group -> maintain the secrecy about group membership
unencrypted	message	sending	
f
low


Signal:	fan-out	model
Group	metadata	management
At old design, Signal doesn’t store any information about group’s metadata. Disadvantages:
- No role system: All users will have a same role in the group (because individual can claims they’re the group
leader)
- Update same resource (group information / avatar / …): race condition -> must developed an asynchronous
communication consensus. Not a trivial task because some devices can go of
fl
ine at any time.
Group	metadata	management
New version: Signal stored encrypted group information on server using MasterKey from clients.
Question: All data are encrypted (even Signal doesn’t know), how can Signal authenticate users?
Zero	knowledge	proof
Scenario:	


There	is	a	door	to	connect	2	tunnels	that	need	a	password	to	unlock.


Victor	(aka:	Veri
f
ier)	want	to	verify	Peggy	(Prover)	that	she	knows	the	password


At	the	same	time


• Peggy	doesn’t	want	to	show	the	password	to	Victor


• Peggy	doesn’t	want	anybody	else	know	that	she	knew	the	password	—>	Even	Victor	goes	around	and	
say	that	Peggy	knew	the	password,	they	have	the	reason	to	not	trust	him.
Zero	knowledge	proof
Wrong	solution:	


- Victor	waits	at	the	door,	at	check	if	Peggy	can	go	from	B	->	A	or	A	->	B


- If	Peggy	can	come	out	from	the	different	path	->	Peggy	de
f
initely	know	the	password.


Problem:


- If	Victor	brings	the	camera	with	him	and	record	again	the	whole	process.	Anyone	watch	this	
video	will	de
f
initely	know	Peggy	know	the	solution


->	Not	zero	knowledge	proof.
Zero	knowledge	proof
Step	1:	Peggy	randomly	takes	either	path	A	or	B,	while	Victor	waits	outside
Zero	knowledge	proof
Step	2:	Victor	randomly	chooses	an	exit	path
Zero	knowledge	proof
Peggy	reliably	appears	at	the	exit	Victor	names
Zero	knowledge	proof
We	see	that:


• If	Peggy	doesn’t	know	the	password,	the	probability	that	Peggy	luckily	choose	the	correct	path	
that	Victor	will	select	later	will	be	50%.


• If	Victor	and	Peggy	try	again	the	test	and	Peggy	still	come	out	at	the	correct	path.	The	probability	is:	
0.5*0.5=0.25


• Let	say	we	try	this	for	20	times	and	Peggy	always	come	out	at	the	correct	tunnel.	The	probability	
that	Peggy	doesn’t	know	the	password	is	0.5^20	=	0.000000953674316


->	Very	small	chance	that	Peggy	doesn’t	know	the	password	to	unlock	the	door.	We	can	assume	that	
Peggy	actually	know	the	password.
Zero	knowledge	proof
Peggy	can	cooperate	with	Victor,	arrange	some	series	of	paths:	A	B	B	A	B	A	B	A	


->	Peggy	always	come	out	at	the	correct	path	


->	we	have	a	reason	not	trust	Victor.


->	The	information	that	“Peggy	knows	the	password”	doesn’t	leak	out
Zero	knowledge	proof
Peggy
Red-green	colour-blind


Victor
These	balls	are	


different	colour
Zero	knowledge	proof
Peggy
Red-green	colour-blind


Victor
Victor	hides	2	balls	behind	his	back
Zero	knowledge	proof
Peggy
Red-green	colour-blind


Victor
Victor	randomly	gets	one	ball	and	shows	to	Peggy
Zero	knowledge	proof
Peggy
Red-green	colour-blind


Victor
Victor	hides	2	balls	again	behind	his	back
Zero	knowledge	proof
Peggy
Red-green	colour-blind


Victor
Do	I	switch	the	ball?
Yes
Victor	randomly	gets	one	ball	(obviously	he	know	different/same	with	the	last	one)	and	shows	to	Peggy
Do	it	again	20	times
Zero	knowledge	proof
-	Victor	gives	Peggy	a	sudoku	problem.	How	can	Peggy	proves	she	solved	the	sudoku	without	
revealing	the	solution.


-	Victor	and	Peggy	has	2	numbers.	How	can	Victor	veri
f
ies	that	Peggy	has	the	same	number	without	
revealing	the	number.
Signal	group	metadata	management
Alice is the member of the group -> Alice has GroupMasterKey (Signal doesn’t hold this key).
Alice will come to the server, using the Zero Knowledge Proof to prove with Signal server that Alice can decrypt this
information without revealing any information about the group.
Alice adds Bob to the group:
She sends the server a new entry encrypting Bob’s UID. Alice also sends Bob the GroupMasterKey via an encrypted
Signal message.
Now that Bob is a member of the group, he’d like to learn who’s in the group. He can prove he is a member using his
AuthCredential, then download all the entries and decrypt them with the GroupMasterKey. If he has been granted the
appropriate role, Bob could also add Charlie to the group, just like Alice added him.
References
Contact	Discovery	API


-	https://signal.org/blog/contact-discovery/


-	https://signal.org/blog/private-contact-discovery/	


Private	communication	


-	https://signal.org/blog/asynchronous-security/


-	https://signal.org/blog/simplifying-otr-deniability/	


-	https://signal.org/blog/secure-value-recovery/	


-	https://signal.org/blog/sealed-sender/	


-	https://signal.org/blog/advanced-ratcheting/	


Group	communication


-	https://signal.org/blog/private-groups/	


-	https://signal.org/blog/signal-private-group-system/	


-	The	Signal	Private	Group	System	and	Anonymous	Credentials	Supporting	Ef
f
icient	Veri
f
iable	Encryption
Bring	home	…
- There	are	many	considerate	things	in	privacy	than	only	end-to-end	encryption


- Don’t	mess	with	end-users	


- We	cannot	easily	switch	to	another	chat	platform	:(
Q&A	Session

More Related Content

More from Thao Huynh Quang

More from Thao Huynh Quang (8)

Blockchain introduction
Blockchain introductionBlockchain introduction
Blockchain introduction
 
Concurrency pattern in Kotlin
Concurrency pattern in KotlinConcurrency pattern in Kotlin
Concurrency pattern in Kotlin
 
Observability and its application
Observability and its applicationObservability and its application
Observability and its application
 
GraphQL in Android
GraphQL in AndroidGraphQL in Android
GraphQL in Android
 
Android GRPC
Android GRPCAndroid GRPC
Android GRPC
 
Android Reverse Engineering
Android Reverse EngineeringAndroid Reverse Engineering
Android Reverse Engineering
 
nosql
nosqlnosql
nosql
 
android deep linking
android deep linkingandroid deep linking
android deep linking
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Recently uploaded (20)

WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 

2021-03-08-telegram-vs-signal.pdf