SlideShare a Scribd company logo
@ameellio
SECURITYIoT
ame@simplysecure.org
USER
&
EXPERIENCE
PRIVACY
:
DESIGNERS DEVELOPERS RESEARCHERS USERS
Simply Secure is a
nonprofit for security,
privacy, ethics, people
2
3
THREAT MODELS BETTER BASICS NEW FRONTIERS
4
Who are you worried
about having your
data? It depends on
your threat model
COMPANIESGOVERNMENTSHACKERS STALKERS
5
Twitter and US
National Security
Letters in 2014
Graphic by Troy Hunt
6
US Immigration &
Customs Enforcement
seeking help fro tech
companies to monitor
people
ICE has a 20,000
member police force
that arrests people and
deports them
I hate when people say,
I have a Muslim name. I and get regularly asked
where I’m really from. I do not take it lightly.
But using these services is a requirement for participating
– San Francisco, March 2017.
in modern society.
‘Well what do you have to hide?’
9
THREAT MODELS NEW FRONTIERSBETTER BASICS
Graphic by Dan Grover
10
Beyond “usable,”
interfaces must be
understandable,
accountable, trusted
Browsers also use
icons to communicate
security risk
11
Read receipts use a
limited visual
vocabulary to change
behavior
12
The details that fight
phishing build trust
Phishing is the
attempt to obtain
sensitive
information like
_ user names

_ passwords

_ credit card details
by masquerading
as a trustworthy
entity in an
electronic
communication.
– Adapted from
Wikipedia
15
http://berlinstreetwear.com/signup/?
id=43289s32
https://berlinstreetwear.siliconalllee.com
https://berlinstreetwear.siliconallee.com
https://berlinstreetwear.com/ezpay
https://berlinstreetwear.ezpay.com 
https://ezpay.com/berlinstreetwear
Easy to spoof
Your site, not 3rd party
http://acm.us2.list-manage.com/track/
clicku=db7c289da&id=e70bf2b789&e
Content strategy and
site information
architecture prevent
phishing with good
URLs
Dangerous URLs are
hard to detect on
mobile
16
Via Eric Lawrence @ericlaw https://twitter.com/ericlaw/status/900429796240277504
Defense: Writing style
guide for consistent
tone builds trust
17
18
Defense: Style guides
codifying visual design
build trust
19
THREAT MODELS NEW FRONTIERSBETTER BASICS
San Francisco and
other US cities have
microphones listening
for gunshots
People give away
personal data for the
price of a coffee
21
App permissions
surprise people
Alexa and voice-based
assistants are a
serious challenge to
transparency
24https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/
IoT botnets break the
internet by overwhelming
capacity (DDOS attacks)
NEW FRONTIERS
25
THREAT MODELS BETTER BASICS
26
Who are you worried
about having your
data? It depends on
your threat model
COMPANIESGOVERNMENTSHACKERS
27
Style guides codify
visual design, and that
consistency builds
trust
App permissions
surprise people
29
https://
simplysecure.org/
knowledge-base
slack@simplysecure.org
GET
YOUTHANK
INVOLVED
!
@simplysecureorg @ameellio
ame@simplysecure.org

More Related Content

What's hot

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Manish Chauhan
 
The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out For
Beth Rigby
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Make your online business more secure
Make your online business more secureMake your online business more secure
Make your online business more secure
robiulIslam113
 
Phishing Course 2
Phishing Course 2Phishing Course 2
Phishing Course 2
Aaron Keating
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
Neelu Tripathy
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
Paubox, Inc.
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
E.S.G. JR. Consulting, Inc.
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
Symantec
 
ComputerSecurity-Brochure
ComputerSecurity-BrochureComputerSecurity-Brochure
ComputerSecurity-Brochure
Benjamin Vevang
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
Symantec
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
Christopher Papazian
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
Quick Heal Technologies Ltd.
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
Scott Schober
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
Christine Spicuzza
 

What's hot (18)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out For
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Make your online business more secure
Make your online business more secureMake your online business more secure
Make your online business more secure
 
Phishing Course 2
Phishing Course 2Phishing Course 2
Phishing Course 2
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
ComputerSecurity-Brochure
ComputerSecurity-BrochureComputerSecurity-Brochure
ComputerSecurity-Brochure
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 

Similar to Ame Elliott UX security ThingsCon 2017 workshop

Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Dave Holland
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
Tanzim Rizwan
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
Nickkisha Farrell
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
arnit1
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
EricaCiko
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
RohitBisht345647
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
Excellence Foundation for South Sudan
 

Similar to Ame Elliott UX security ThingsCon 2017 workshop (13)

Users guide
Users guideUsers guide
Users guide
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 

More from ThingsConAMS

ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS
 
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacyThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS
 
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoTThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtecThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtec
ThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef LubbersThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander SmitThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsConAMS
 
ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman HaqueThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper CugunThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper Cugun
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter ReeskampThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel SchouwenaarThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsConAMS
 
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris SpeedThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsConAMS
 
Helma van Rijn presents Linkx
Helma van Rijn presents Linkx Helma van Rijn presents Linkx
Helma van Rijn presents Linkx
ThingsConAMS
 
Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai
ThingsConAMS
 
Ismael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc ToysIsmael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc Toys
ThingsConAMS
 
Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti
ThingsConAMS
 
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna GouldenThingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
ThingsConAMS
 
Thingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smitThingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smit
ThingsConAMS
 
Thingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
Thingscon Salon 4 - DATAStudio Klaas KuitenbrouwerThingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
Thingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
ThingsConAMS
 

More from ThingsConAMS (20)

ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacyThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
 
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoTThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
 
ThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtecThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtec
 
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef LubbersThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
 
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander SmitThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
 
ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque
 
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman HaqueThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
 
ThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper CugunThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper Cugun
 
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter ReeskampThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
 
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel SchouwenaarThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
 
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
 
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris SpeedThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
 
Helma van Rijn presents Linkx
Helma van Rijn presents Linkx Helma van Rijn presents Linkx
Helma van Rijn presents Linkx
 
Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai
 
Ismael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc ToysIsmael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc Toys
 
Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti
 
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna GouldenThingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
 
Thingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smitThingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smit
 
Thingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
Thingscon Salon 4 - DATAStudio Klaas KuitenbrouwerThingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
Thingscon Salon 4 - DATAStudio Klaas Kuitenbrouwer
 

Recently uploaded

CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
PabloMartelLpez
 
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economicoZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
jhonguerrerobarturen
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
GOWSIKRAJA PALANISAMY
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
Virtual Real Design
 
Timeless Principles of Good Design
Timeless Principles of Good DesignTimeless Principles of Good Design
Timeless Principles of Good Design
Carolina de Bartolo
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
qo1as76n
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
Revolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in IndiaRevolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in India
amrsoftec1
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
pmgdscunsri
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
Knight Moves
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
Decomart Studio
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
Bianca Woods
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
qo1as76n
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
eloprejohn333
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
Jaime Brown
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
talaatahm
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
millarj46
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NishantRathi18
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 

Recently uploaded (20)

CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
 
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economicoZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
 
Timeless Principles of Good Design
Timeless Principles of Good DesignTimeless Principles of Good Design
Timeless Principles of Good Design
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
Revolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in IndiaRevolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in India
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 

Ame Elliott UX security ThingsCon 2017 workshop