SlideShare a Scribd company logo
1 of 44
Download to read offline
E-Money
vs
Cryptocurrency
Dimaz Ankaa Wijaya
▸Education
▹UGM – B. Computer Science (2007)
▹MONASH Uni.– M. Networks & Security (2016)
▹MONASH Uni. – Ph.D Student (2017-current)
▸Field of Expertise
▹Dig. forensic, cybersecurity
▹Cryptocurrency, Blockchain
▸Work Experience
▹Indonesian Government official (2009-2017)
Dimaz Ankaa Wijaya
2
Today’s Menu
▸Money
▸E-Money
▸Cryptocurrency
▸E-Money vs Cryptocurrency
▸Cryptocurrency in Depth
3
MONEY
4
Functions of Money (Mankiw, 2014)
▸Medium of exchange (to buy stuff)
▸Unit of account (to measure prices and
values)
▸Store of value (to transfer purchasing
power to the future)
5
Evolution of Money
▸Simple form (salt, shells, etc)
▸Precious metals (gold, silver)
▸Paper money and coins (fiat money)
▸Digital currency
▹Electronic money (electronic fiat money)
▹Cryptocurrency?
6
Challenges With Physical Money
▸International Trade
▸Internet
▸E-Commerce
▸Smartphone Apps
7
E-Money
8
Electronic Money / e-Money
▸Fiat money in digital form
▸Issued by bank/financial institution
▹Hardware-based: credit card
▹Software-based: e-Cash, Go-Pay
9
Why e-Money Has Value
▸E-Money reflects your fiat currency
▸Convenience: no physical money needed
▸Highly regulated
▸Financial technology
▸Fits the function of money
10
International Trade System: e-Money Needed
11
Attacks on e-Money
12
Cryptocurrency
13
Various Types of Cryptocurrency
14
Source: bitslog
Overview of Bitcoin
▸Created by “Satoshi Nakamoto”
▹A Peer-to-Peer Electronic Cash System (Nakamoto, 2008)
▸Limited supply
▸“Low” transaction fee
▸ID theft protection
▸“Fast” settlement
15
What’s Special About Bitcoin
▸Blockchain (public ledger)
▸No central authority
▹Double spending
▹Peer-to-Peer network
▸No middleman
▸Customized transaction
16
Blockchain: Identical Ledgers Across Nodes
17
How Blockchain Works
18
Double Spending Problem
19
Peer-to-Peer Network
▸Identical information in each server/node.
20
No Central Authority: Byzantine Generals Problem/BGP
21
Proof of Work / PoW
▸Solving BGP
▸Required to construct a new block
▸Find a hash value based on a criteria
▸Mining
22
Remove The Middleman
23
Customized Transaction
▸Escrow transaction
▸Hash-locked transaction
▸Time-locked transaction
24
Comparisons
E-money vs Cryptocurrency
25
E-Money vs Cryptocurrency
26
No Characteristics E-Money Cryptocurrency
5 Authentication Method ID card, password, PIN Digital signature
1 Medium Digital Digital
2 Transaction network Banks or Financial Institution Peer-to-peer
3 New money creation Government Miners
4 Validator Banks or Financial Institution Node and Miners
E-Money vs Cryptocurrency (2)
27
No Characteristics E-Money Cryptocurrency
9 Collateral asset Fiat money N/A
6 Money Supply Government Consensus
7 Backer Government N/A
8 Exchange rate Currency market & Government Currency market
Summary: Centralized vs Decentralized
28
Cryptocurrency
Security Issues
Attacks and Mitigation Strategies
29
Cryptocurrency Exchange Hacks
30
Private Keys Theft/Lost
31
51% Attack
▸Controlling the majority of the consensus.
▸Mitigation:
▹Discourage such event
▹Evaluate consensus method
32
Denial of Service
▸Flooding nodes with invalid requests.
▸Flooding network with dust transactions.
▸Mitigation:
▹Drop requests, filtering
▹Prioritize transactions.
33
Sybil Attack
▸Several malicious nodes providing wrong
information.
▸Mitigation:
▹Whitelist of trusted nodes.
34
Selfish Mining
▸Not broadcasting a new block.
▸Keep mining based on the block.
▸After a certain length, the blocks are
published.
▸Double spending potential.
▸Mitigation?
35
Private Key Theft
▸Stealing private keys.
▸Mitigation:
▹Shamir secret sharing
▹Multisignature
▹Security hardening
36
Conclusion
37
Comparing Benefits: E-Money vs Cryptocurrency
38
No Criteria E-Money Cryptocurrency
1 Consumer Protection V X
2 Well Regulated V X
3 Stable Value V X
4 Fast Settlement X V
5 Infeasible to tamper the data X V
6 Transaction Fee X V
Comparing Problems: E-Money vs Cryptocurrency
39
No Criteria E-Money Cryptocurrency
1 Single Point of Failure V X
2 Consensus Problems X V
3 Privacy and Anonymity V V
Attack Vectors: E-Money vs Cryptocurrency
40
No Criteria E-Money Cryptocurrency
1 Software Security V V
2 Network Security V V
3 Dishonest Authority V X
4 ID Theft, Secret Key Theft V V
NEXT: Government-issued Cryptocurrency?
41
Blockchain on Other Areas?
42
43
https://kriptologi.com/buku
44
THANKS!
Any questions?
You can find me at @kriptologi & dimaz@kriptologi.com

More Related Content

What's hot

Suggestive Topics For Economics Project CBSE XII 2017-18
Suggestive Topics For Economics Project CBSE XII 2017-18 Suggestive Topics For Economics Project CBSE XII 2017-18
Suggestive Topics For Economics Project CBSE XII 2017-18 CS. Sohil Gajjar
 
DLT PowerPoint Presentation Slides
DLT PowerPoint Presentation SlidesDLT PowerPoint Presentation Slides
DLT PowerPoint Presentation SlidesSlideTeam
 
Foreign Direct Investment in India (FDI)
Foreign Direct Investment in India (FDI)Foreign Direct Investment in India (FDI)
Foreign Direct Investment in India (FDI)Ameya Gandhi
 
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKET
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKETA STUDY OF ONLINE TRADING IN INDIAN STOCK MARKET
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKETMANSI DHINGRA
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
NCFM - Banking sector module (NSE)
NCFM - Banking sector module  (NSE)NCFM - Banking sector module  (NSE)
NCFM - Banking sector module (NSE)Nimesh Parekh
 
"Disinvestment policy of india" Project work
"Disinvestment policy of india" Project work"Disinvestment policy of india" Project work
"Disinvestment policy of india" Project workNikhil Gupta
 
Initial Coin Offering
Initial Coin OfferingInitial Coin Offering
Initial Coin OfferingLawPlus Ltd.
 
Financial Services Digital Disruption – Trends & Innovations
Financial Services Digital Disruption – Trends & InnovationsFinancial Services Digital Disruption – Trends & Innovations
Financial Services Digital Disruption – Trends & InnovationsCarmelon Digital Marketing
 
Design Thinking for Digital Banking
Design Thinking for Digital BankingDesign Thinking for Digital Banking
Design Thinking for Digital BankingKMSSolutionsMarketin
 

What's hot (20)

Suggestive Topics For Economics Project CBSE XII 2017-18
Suggestive Topics For Economics Project CBSE XII 2017-18 Suggestive Topics For Economics Project CBSE XII 2017-18
Suggestive Topics For Economics Project CBSE XII 2017-18
 
DLT PowerPoint Presentation Slides
DLT PowerPoint Presentation SlidesDLT PowerPoint Presentation Slides
DLT PowerPoint Presentation Slides
 
Foreign Direct Investment in India (FDI)
Foreign Direct Investment in India (FDI)Foreign Direct Investment in India (FDI)
Foreign Direct Investment in India (FDI)
 
Fintech introduction
Fintech introductionFintech introduction
Fintech introduction
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKET
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKETA STUDY OF ONLINE TRADING IN INDIAN STOCK MARKET
A STUDY OF ONLINE TRADING IN INDIAN STOCK MARKET
 
Cashless economy
Cashless economyCashless economy
Cashless economy
 
E money
E moneyE money
E money
 
Digital banking
Digital bankingDigital banking
Digital banking
 
Fintech 2021: Overview and Applications
Fintech 2021: Overview and Applications  Fintech 2021: Overview and Applications
Fintech 2021: Overview and Applications
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
Service sector presentation
Service sector presentationService sector presentation
Service sector presentation
 
NCFM - Banking sector module (NSE)
NCFM - Banking sector module  (NSE)NCFM - Banking sector module  (NSE)
NCFM - Banking sector module (NSE)
 
"Disinvestment policy of india" Project work
"Disinvestment policy of india" Project work"Disinvestment policy of india" Project work
"Disinvestment policy of india" Project work
 
Digital Lending
Digital LendingDigital Lending
Digital Lending
 
Initial Coin Offering
Initial Coin OfferingInitial Coin Offering
Initial Coin Offering
 
Financial Services Digital Disruption – Trends & Innovations
Financial Services Digital Disruption – Trends & InnovationsFinancial Services Digital Disruption – Trends & Innovations
Financial Services Digital Disruption – Trends & Innovations
 
Brochure
BrochureBrochure
Brochure
 
Design Thinking for Digital Banking
Design Thinking for Digital BankingDesign Thinking for Digital Banking
Design Thinking for Digital Banking
 
Gold dinar
Gold dinarGold dinar
Gold dinar
 

Similar to E-Money vs Cryptocurrency: Key Differences and Security Issues

Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...Raffaele Mauro
 
Business Analysis.pptx
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptxAlexKalsoft
 
Cryptocurrencies: Issues, Challenges and Way Forward
Cryptocurrencies: Issues, Challenges and Way ForwardCryptocurrencies: Issues, Challenges and Way Forward
Cryptocurrencies: Issues, Challenges and Way ForwardVinod Kashyap
 
cryptocurrency-170515154509.pdf
cryptocurrency-170515154509.pdfcryptocurrency-170515154509.pdf
cryptocurrency-170515154509.pdfNithinRaj247269
 
Wavemaker Cryptocurrency Overview Dec 2017
Wavemaker Cryptocurrency Overview Dec 2017Wavemaker Cryptocurrency Overview Dec 2017
Wavemaker Cryptocurrency Overview Dec 2017David Siemer
 
Analyzing the DEX Landscape - Key Insights into Past & Future Growth
Analyzing the DEX Landscape - Key Insights into Past & Future GrowthAnalyzing the DEX Landscape - Key Insights into Past & Future Growth
Analyzing the DEX Landscape - Key Insights into Past & Future Growthintotheblock
 
Toward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyToward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyGeorge Giaglis
 
Crypto Mining : The Digital Gold Rush
Crypto Mining : The Digital Gold RushCrypto Mining : The Digital Gold Rush
Crypto Mining : The Digital Gold Rushcryptolearn
 
The Role of Cryptocurrencies in the Global Economy.pdf
The Role of Cryptocurrencies in the Global Economy.pdfThe Role of Cryptocurrencies in the Global Economy.pdf
The Role of Cryptocurrencies in the Global Economy.pdfDanielMiron10
 
Crypto and the Future of Banking 4.docx
Crypto and the Future of Banking 4.docxCrypto and the Future of Banking 4.docx
Crypto and the Future of Banking 4.docxprincehassan0013
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts:The New Wave of Decentralizat...Cryptocurrencies, Blockchain & Smart Contracts:The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...Raffaele Mauro
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...Raffaele Mauro
 

Similar to E-Money vs Cryptocurrency: Key Differences and Security Issues (20)

Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...
 
Crypto currency1
Crypto currency1Crypto currency1
Crypto currency1
 
Business Analysis.pptx
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptx
 
Cryptocurrencies: Issues, Challenges and Way Forward
Cryptocurrencies: Issues, Challenges and Way ForwardCryptocurrencies: Issues, Challenges and Way Forward
Cryptocurrencies: Issues, Challenges and Way Forward
 
cryptocurrency-170515154509.pdf
cryptocurrency-170515154509.pdfcryptocurrency-170515154509.pdf
cryptocurrency-170515154509.pdf
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Wavemaker Cryptocurrency Overview Dec 2017
Wavemaker Cryptocurrency Overview Dec 2017Wavemaker Cryptocurrency Overview Dec 2017
Wavemaker Cryptocurrency Overview Dec 2017
 
Analyzing the DEX Landscape - Key Insights into Past & Future Growth
Analyzing the DEX Landscape - Key Insights into Past & Future GrowthAnalyzing the DEX Landscape - Key Insights into Past & Future Growth
Analyzing the DEX Landscape - Key Insights into Past & Future Growth
 
Toward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M MoneyToward Money-over-IP? From Bitcoin to M2M Money
Toward Money-over-IP? From Bitcoin to M2M Money
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
 
Crypto Mining : The Digital Gold Rush
Crypto Mining : The Digital Gold RushCrypto Mining : The Digital Gold Rush
Crypto Mining : The Digital Gold Rush
 
Cryptocurrency
Cryptocurrency Cryptocurrency
Cryptocurrency
 
The Role of Cryptocurrencies in the Global Economy.pdf
The Role of Cryptocurrencies in the Global Economy.pdfThe Role of Cryptocurrencies in the Global Economy.pdf
The Role of Cryptocurrencies in the Global Economy.pdf
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
 
Crypto and the Future of Banking 4.docx
Crypto and the Future of Banking 4.docxCrypto and the Future of Banking 4.docx
Crypto and the Future of Banking 4.docx
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Cryptocurrency
Cryptocurrency Cryptocurrency
Cryptocurrency
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts:The New Wave of Decentralizat...Cryptocurrencies, Blockchain & Smart Contracts:The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
 
Document 12.pdf
Document 12.pdfDocument 12.pdf
Document 12.pdf
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralizat...
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

E-Money vs Cryptocurrency: Key Differences and Security Issues