SlideShare a Scribd company logo
Exposing the Spy in your Pocket
1
I n t r o d u c t i o n s
Mobile devices are ubiquitous
3
All that usage creates a lot of raw data
4
Add sensor data that doesn’t rely on usage
5
And you can figure out a lot…
6
In other words…
7
Do you trust <insert app here> with all this?
8
Don’t desktops have the same issue?
9
Mobile/IoT Problem
10
So what is your phone
doing anyway?
11
Let’s look under the hood
12
Things to watch
13
Demo
14
Basic Fiddler Setup
15
iPhone Setup
16
iPhone Setup – Connection Proxy
17
<explore>
18
HTTPS Fiddler Setup
19
HTTPS iPhone Setup
20
</explore>
21
What did we see?
22
What can we, the poor consumer,
do to defend ourselves?
23
Back up, what did we just do?
24
What could we have done?
25
Demo
26
Doesn’t this alert the user? 27
Not necessarily
28
Pen Pineapple
29
What can we, the devs, do for our users?
30
Inspect
31
Verify certificates
32
OWASP
33
Be your own
White Hat
34
Assess your threat risk model 35
Security == difficulty level
36
Questions?
37
• Josh.Gillespie@PolarisSolutions.com
• @jcgillespie
All images in the public domain except where otherwise attributed.
38

More Related Content

Viewers also liked

BelAir Networks BN1SH0001-B
BelAir Networks BN1SH0001-BBelAir Networks BN1SH0001-B
BelAir Networks BN1SH0001-B
savomir
 
Davini metodos de enseñanza
Davini metodos de enseñanzaDavini metodos de enseñanza
Davini metodos de enseñanza
Evelyn Ferreyra
 
Commscope-Andrew 540 DM-10DM
Commscope-Andrew 540 DM-10DMCommscope-Andrew 540 DM-10DM
Commscope-Andrew 540 DM-10DM
savomir
 
Telect 02028-1+B7
Telect 02028-1+B7Telect 02028-1+B7
Telect 02028-1+B7
savomir
 
Med Diploma and translation
Med Diploma and translationMed Diploma and translation
Med Diploma and translationIleana Aponte
 
Marcos andrade
Marcos andradeMarcos andrade
Marcos andradeliterafro
 
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
ExternalEvents
 
Enem2009 matematica
Enem2009 matematicaEnem2009 matematica
Enem2009 matematicajwfb
 
Apostila contabilidade fundamental ii
Apostila contabilidade fundamental iiApostila contabilidade fundamental ii
Apostila contabilidade fundamental iigabaritocontabil
 
Informatica instrumental aline moura de araujo
Informatica instrumental aline moura de araujoInformatica instrumental aline moura de araujo
Informatica instrumental aline moura de araujo
Aline Moura
 
Jansen van Nieuwenhuizen Alicia ESL Teacher CV
Jansen van Nieuwenhuizen Alicia ESL Teacher CVJansen van Nieuwenhuizen Alicia ESL Teacher CV
Jansen van Nieuwenhuizen Alicia ESL Teacher CVAlicia Nieuwenhuizen
 

Viewers also liked (12)

BelAir Networks BN1SH0001-B
BelAir Networks BN1SH0001-BBelAir Networks BN1SH0001-B
BelAir Networks BN1SH0001-B
 
Davini metodos de enseñanza
Davini metodos de enseñanzaDavini metodos de enseñanza
Davini metodos de enseñanza
 
Commscope-Andrew 540 DM-10DM
Commscope-Andrew 540 DM-10DMCommscope-Andrew 540 DM-10DM
Commscope-Andrew 540 DM-10DM
 
Telect 02028-1+B7
Telect 02028-1+B7Telect 02028-1+B7
Telect 02028-1+B7
 
Med Diploma and translation
Med Diploma and translationMed Diploma and translation
Med Diploma and translation
 
Marcos andrade
Marcos andradeMarcos andrade
Marcos andrade
 
Revis o cg_-_aluno
Revis o cg_-_alunoRevis o cg_-_aluno
Revis o cg_-_aluno
 
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
Autorización de Uso de la Denominación de Origen y Consejo Regulador, Raquel ...
 
Enem2009 matematica
Enem2009 matematicaEnem2009 matematica
Enem2009 matematica
 
Apostila contabilidade fundamental ii
Apostila contabilidade fundamental iiApostila contabilidade fundamental ii
Apostila contabilidade fundamental ii
 
Informatica instrumental aline moura de araujo
Informatica instrumental aline moura de araujoInformatica instrumental aline moura de araujo
Informatica instrumental aline moura de araujo
 
Jansen van Nieuwenhuizen Alicia ESL Teacher CV
Jansen van Nieuwenhuizen Alicia ESL Teacher CVJansen van Nieuwenhuizen Alicia ESL Teacher CV
Jansen van Nieuwenhuizen Alicia ESL Teacher CV
 

Similar to Exposing the Spy in Your Pocket

5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
 
Apple Watch Development with Xamarin Watch Kit
Apple Watch Development with Xamarin Watch KitApple Watch Development with Xamarin Watch Kit
Apple Watch Development with Xamarin Watch Kit
Tom Soderling
 
iPad Academy 2014
iPad Academy 2014iPad Academy 2014
iPad Academy 2014
Martin Cisneros
 
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
Nikolaos Vasiloglou
 
Are You Ready for iOS 8?
Are You Ready for iOS 8?Are You Ready for iOS 8?
Are You Ready for iOS 8?
Keynote Mobile Testing
 
The state of mobile - In The Pocket
The state of mobile - In The PocketThe state of mobile - In The Pocket
The state of mobile - In The PocketMarie Martens
 
10 things that will change the online landscape
10 things that will change the online landscape10 things that will change the online landscape
10 things that will change the online landscape
Bart De Waele
 
Tablets: is aviation ready for the post-pc era - Singapore 2011
Tablets: is aviation ready for the post-pc era - Singapore 2011Tablets: is aviation ready for the post-pc era - Singapore 2011
Tablets: is aviation ready for the post-pc era - Singapore 2011
Paul Saunders
 
I've got an iPad, now what?
I've got an iPad, now what?I've got an iPad, now what?
I've got an iPad, now what?
Jindou Lee
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
 
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
Amcom
 
TOP 5 apps from CES 2014
TOP 5 apps from CES 2014TOP 5 apps from CES 2014
TOP 5 apps from CES 2014
ComboApp, Inc
 
The Apple Watch. Not
The Apple Watch. NotThe Apple Watch. Not
The Apple Watch. Not
SlashData
 
Effective feedback design
Effective feedback designEffective feedback design
Effective feedback design
Harshal Patil
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
Marie Weaver
 
Future insights
Future insightsFuture insights
Future insights
Scott Jenson
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
Justino Lourenço
 
Tablets - is aviation ready for the post-pc era?
Tablets - is aviation ready for the post-pc era?Tablets - is aviation ready for the post-pc era?
Tablets - is aviation ready for the post-pc era?
Paul Saunders
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
Justino Lourenço
 

Similar to Exposing the Spy in Your Pocket (20)

5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Apple Watch Development with Xamarin Watch Kit
Apple Watch Development with Xamarin Watch KitApple Watch Development with Xamarin Watch Kit
Apple Watch Development with Xamarin Watch Kit
 
iPad Academy 2014
iPad Academy 2014iPad Academy 2014
iPad Academy 2014
 
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
Mcc 2018 leveraging the tightly connected aviation ecosystem for ai based mai...
 
Are You Ready for iOS 8?
Are You Ready for iOS 8?Are You Ready for iOS 8?
Are You Ready for iOS 8?
 
The state of mobile - In The Pocket
The state of mobile - In The PocketThe state of mobile - In The Pocket
The state of mobile - In The Pocket
 
10 things that will change the online landscape
10 things that will change the online landscape10 things that will change the online landscape
10 things that will change the online landscape
 
Tablets: is aviation ready for the post-pc era - Singapore 2011
Tablets: is aviation ready for the post-pc era - Singapore 2011Tablets: is aviation ready for the post-pc era - Singapore 2011
Tablets: is aviation ready for the post-pc era - Singapore 2011
 
I've got an iPad, now what?
I've got an iPad, now what?I've got an iPad, now what?
I've got an iPad, now what?
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
"What Makes a Mobile-Enabled Workforce Tick?" - Brett Looney
 
TOP 5 apps from CES 2014
TOP 5 apps from CES 2014TOP 5 apps from CES 2014
TOP 5 apps from CES 2014
 
The Apple Watch. Not
The Apple Watch. NotThe Apple Watch. Not
The Apple Watch. Not
 
Effective feedback design
Effective feedback designEffective feedback design
Effective feedback design
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Future insights
Future insightsFuture insights
Future insights
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
 
Tablets - is aviation ready for the post-pc era?
Tablets - is aviation ready for the post-pc era?Tablets - is aviation ready for the post-pc era?
Tablets - is aviation ready for the post-pc era?
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 

More from Josh Gillespie

Introduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and HowIntroduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and How
Josh Gillespie
 
Practical Security Practices: Threat Modeling
Practical Security Practices: Threat ModelingPractical Security Practices: Threat Modeling
Practical Security Practices: Threat Modeling
Josh Gillespie
 
Automation: PowerShell & DSC
Automation: PowerShell & DSCAutomation: PowerShell & DSC
Automation: PowerShell & DSC
Josh Gillespie
 
Teaching the cloud to think
Teaching the cloud to thinkTeaching the cloud to think
Teaching the cloud to think
Josh Gillespie
 
Who are you?
Who are you?Who are you?
Who are you?
Josh Gillespie
 
A Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit TestingA Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit Testing
Josh Gillespie
 
Dude, I just stepped into your code
Dude, I just stepped into your codeDude, I just stepped into your code
Dude, I just stepped into your code
Josh Gillespie
 
A DevOps Discussion
A DevOps DiscussionA DevOps Discussion
A DevOps Discussion
Josh Gillespie
 

More from Josh Gillespie (8)

Introduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and HowIntroduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and How
 
Practical Security Practices: Threat Modeling
Practical Security Practices: Threat ModelingPractical Security Practices: Threat Modeling
Practical Security Practices: Threat Modeling
 
Automation: PowerShell & DSC
Automation: PowerShell & DSCAutomation: PowerShell & DSC
Automation: PowerShell & DSC
 
Teaching the cloud to think
Teaching the cloud to thinkTeaching the cloud to think
Teaching the cloud to think
 
Who are you?
Who are you?Who are you?
Who are you?
 
A Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit TestingA Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit Testing
 
Dude, I just stepped into your code
Dude, I just stepped into your codeDude, I just stepped into your code
Dude, I just stepped into your code
 
A DevOps Discussion
A DevOps DiscussionA DevOps Discussion
A DevOps Discussion
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Exposing the Spy in Your Pocket