SlideShare a Scribd company logo
1 of 81
Crypto-Book:
An Architecture for Privacy
Preserving Online Identities
John Maheswaran, David Isaac Wolinsky, Bryan Ford

HotNets ’13 (11/22/2013)
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Cross-site Authentication
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Privacy and Security Concerns
Problem Summary
• Increasingly use of cross-site authentication
– OAuth, OpenID, Facebook/Twitter/Google+ login

• Use social network for online IDs
– Convenient, easy to use

• Using these IDs brings privacy/tracking risks
– Cross-site tracking, browsing history, actions across
different sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Goals
• Crypto-Book aims to
– Allow users to use social network IDs
– Provide better privacy between social network
and third party sides
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Anonymized IDs – one pseudonym per site

Crypto-Book privacy preserving layer

Personally identifiable
social networking ID
Crypto-Book Layer

Crypto-Book privacy preserving layer
Crypto-Book Layer

Crypto-Book privacy preserving layer

Not linkable by
Facebook, Crypto-Book
or by third party sites
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Key Assignment
• Cross-site authentication often relies on
OAuth/OpenID
• Crypto-Book fits into OAuth protocol to isolate
third party site from social network
– Protects cross-site privacy
– Assigns key pairs to social network IDs
OAuth
OAuth

Give me a limited
scope OAuth
access token
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
Key Assignment
• To use privacy preserving cryptographic
techniques
– have to assign public/private keypairs to users

• Cloud of key servers with split trust
• Clients do not provide own key
– Allows us to conscript users into anonymity sets
without their knowledge/permission
OAuth

Give me a limited
scope OAuth
access token

Issue me an OAuth
access token with
requested scope
OAuth
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow
Crypto-Book Workflow

abuse resistant anonymous
1-to-1 mapping
Anytrust key servers
• An anytrust cloud is:
– a decentralized client/server network model
– trust there is at least one honest server

• Anytrust cloud of key servers
– assigns key pairs to each social network user
– Run by various privacy advocates e.g. EFF
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Anytrust key servers
Key Server

Key Server
Key Server
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Anonymity set conscription
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Balancing Anonymity with
Accountability
• Need to balance:
– Supporting free speech, free expression of
opinion
– Improving the quality of public discourse. By
allowing people to fully hide anonymously, they
may do things they would not otherwise
• e.g. Wikipedia sock-puppetry, vandalism
Balancing Anonymity with
Accountability
• Solution needs to provide both
– Anonymity
– Accountability

• Wikipedia would like to allow users to remain
anonymous, but are worried about vandalism
– Users need to be anonymous yet accountable
Digital Signature
Digital Signature
Digital Signature
Digital Signature
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
Linkable Ring Signature (LRS)
• Created by member of a group of users (each
have keys)
• Third party can verify:
– Some member of the group signed something
– If two signatures are by same member

• Third party cannot discover
– Which specific user created the signature
Privacy Preserving Crypto Layer
• LRS has linkage tag
– If a client generates two LRSs, they will have the
same linkage tag
– Means LRSs can be linked across time

• Linkage tag provides accountability
– 1-to-1 mapping between Facebook users and
anonymized identities
Crypto-Book Summary
Crypto-Book Summary

abuse resistant anonymous
1-to-1 mapping
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Talk Overview
• The problem
– Cross-site Authentication
– Social network privacy concerns

• Solution
– Overview
– Key assignment
– Conscripting an anonymity set
– Anonymous login

• Conclusions and future work
Future Work
• Provide OAuth/OpenID API
– Integration with more third party sites

• Deploy Crypto-Book key servers at various
host institutions
• Abuse resistant way of using anonymous
systems such as Tor
• Investigation of anonymity set selection
Conclusion
• Crypto-Book provides privacy preserving
online identities
– anonymous
– abuse resistant

• www.crypto-book.com
– Demo video
– More info, SOSP’13 poster, more talk slides
– Link to source code on GitHub
Questions?
www.crypto-book.com

More Related Content

What's hot

Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineDEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineFelipe Prado
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Understanding the basics of web design 2
Understanding the basics of web design 2Understanding the basics of web design 2
Understanding the basics of web design 2Jesus Obenita Jr.
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetShalin Hai-Jew
 
common online terminologies
common online terminologiescommon online terminologies
common online terminologiesjayceenavarrete
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligencePhilippe Lin
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 

What's hot (20)

Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineDEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
 
Blognone - Feb 09
Blognone - Feb 09Blognone - Feb 09
Blognone - Feb 09
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Basics of Maltego
Basics of MaltegoBasics of Maltego
Basics of Maltego
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Understanding the basics of web design 2
Understanding the basics of web design 2Understanding the basics of web design 2
Understanding the basics of web design 2
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
common online terminologies
common online terminologiescommon online terminologies
common online terminologies
 
Hacking
HackingHacking
Hacking
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Similar to Hotnets Slides

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slideschintaan
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...South Tyrol Free Software Conference
 
20 security
20 security20 security
20 securityabiy2004
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...Felipe Prado
 
Dublin Blockchain Group
Dublin Blockchain GroupDublin Blockchain Group
Dublin Blockchain GroupAWH
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android projectMuthukumaranM13
 
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docxChapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docxbartholomeocoombs
 
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...Alessandro Confetti
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadAnish Mohammed
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointZack Meyers
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureTiago Mendo
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingJose L. Quiñones-Borrero
 

Similar to Hotnets Slides (20)

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
SFSCON23 - Frank Karlitschek - What the AI revolution means for Open Source, ...
 
20 security
20 security20 security
20 security
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Dublin Blockchain Group
Dublin Blockchain GroupDublin Blockchain Group
Dublin Blockchain Group
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docxChapter 13Network EncryptionChapter 13 OverviewRole of.docx
Chapter 13Network EncryptionChapter 13 OverviewRole of.docx
 
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
Scuttlebutt or how to exit facebook and start coding your first web 3.0 socia...
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Fundamentals of Cryptography
Fundamentals of CryptographyFundamentals of Cryptography
Fundamentals of Cryptography
 
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_uploadBlockchain_ver0.5_MIT_security_and Privacy_am_final_upload
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Hotnets Slides