SlideShare a Scribd company logo
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
Kelley Robinson
Account Security Team, Twilio
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
54.6B
US SPAM CALLS IN 2019
GREW 108% SINCE 2018
@kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TABLE OF CONTENTS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
1. Telephony "security"
2. SHAKEN/STIR explained
3. Regulation & Limitations
4. What will happen next?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TELEPHONY "SECURITY"
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony 30 Years Ago
AMERITECH
AT&T US WEST
NYNEX
Business Customer
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony Today
AMERITECH
AT&T
US WEST
NYNEX
U
U
U
U
U
U
U
U
U U
U
U
U
U
U
CustomerBusiness
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Acronym Hell
PSTN - Public Switched Telephone Network. Global
interconnected telephony.
VoIP - Voice over IP. Internet-connected telephony.
SIP - Session Initiation Protocol. Standard used to manage
VoIP calling.
PBX - Private Branch eXchange. Private enterprise network.
@kelleyrobinson
☎ Phun Phact
The word "Hello" has only been around since 1827.
Thomas Edison popularized the greeting and urged
people to say "hello" when answering his phone.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THE PROBLEM:
UNWANTED ROBOCALLS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📈 Robocall spam & spoofing
• Automated dialing is cheap
• A lot of access points to the PSTN
• Easy to spoof "From" number
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
Legitimate use cases for masking phone numbers
Doctor calls from personal #
displays office number
Business calls from
contact center
displays toll-free callback
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
2009 Truth in Caller ID Act
• Spoofing is illegal if there is "intent to defraud, cause
harm or wrongly obtain anything of value"
• Difficult to enforce
@kelleyrobinson
☎ Phun Phact
Alexander Graham Bell campaigned to use
"Ahoy-hoy" as the standard telephone greeting
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT IS SHAKEN/STIR?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
LEMON-TWIST - LEveraging MOdels for
Enterprise dialiNg - Tnauth list With an
enterprise Identity Secured Token
@kelleyrobinson
😱
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Calls would have their caller ID
“signed” as legitimate by originating
carriers and validated by other carriers
before reaching consumers.
SHAKEN/STIR defined | FCC.gov
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Borrowing from other
web authentication
• Public Key Infrastructure (PKI)
• Certificates
• JSON Web Tokens (JWT)
• Similar to email's DKIM/DMARC
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📲Caller
Originating
Service Provider
Other
Service Providers
Terminating
Service Provider
🔒Signing Service
✅Verification Service
📳Callee
🏛Certificate
Authorities
SHAKEN/STIR
signing and verification
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Certificate authorities
• Approved by the STI-GA (Secure Telephone Identity
Governance Authority)
• Managed by ATIS (Alliance for Telecommunications
Industry Solutions)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SIP IDENTITY HEADER
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
{
"attest": "A", " Attestation Level
"dest": {"tn":["14155550101"]}, " Destination Phone #
"iat": 1548859982,
"orig": {"tn":"14155550171"}, " Origination Phone #
"origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254"
} " Orig. Customer ID
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Attestation Levels
I know this
customer
and they
can use
the calling
number
A
✅
I know the
customer
but I don't
know the
calling
number
B
🤷
I don't
know the
customer
but I know
where this
call came
from
C
🤔
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
]
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
- cryptographic signature
- certificate URL
- algorithm
- passport type
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
ENFORCEMENT
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TRACED Act
• Signed into law 2019-12-30
• Allows $10,000 fine for offenders
• Requires telecom companies to implement call
authentication in the next 18 months
(Telephone Robocall Abuse Criminal Enforcement Deterrence)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
• VOIP: Implement STIR/SHAKEN
• Non VOIP: "Reasonable measures to implement an effective call authentication framework"
TRACED Act
Authentication Requirements
@kelleyrobinson
☎ Phun Phact
Not every 555 number is fake. Only 555-0100
through 555-0199 are specifically reserved for
fictional use.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: TV Tropes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
LIMITATIONS OF SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
"The phone network is an
ungodly beast."
- Randy Weinberger, curmudgeon, telecom expert
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Part of the ungodly beast:
Time-division multiplexing (TDM)
• Physical switches used by the PSTN
• TRACED Act explicitly acknowledges TDM as a potential
burden to SHAKEN/STIR rollout
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
The long tail of service providers
• 4000 service providers in the US alone
• Requires significant investment to comply
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
And what about...
• Disconnected and reassigned phone numbers?
• International numbers and calls?
• Text messages?
@kelleyrobinson
☎ Phun Phact
Phone calls from The New York Times showed up
as (111) 111-1111 until 2011. They now use a (212)
number you can actually call back.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: NYTimes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT HAPPENS NEXT?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Ongoing legislation
• FCC gave telcos authority to block unwanted robocalls
without explicit subscriber permission
• TRACED Act enforcement will begin at the end of 2020
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Motivations driving implementation
• Consumer pressure to decrease robocalls
• Business pressure to increase answered calls
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
APPLICATION SECURITY
PROTECTIONS TODAY
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Mitigate damage from unwanted
inbound calls
• Protect your numbers from web scraping bots
• Don't assign sequential phone numbers to your employees
• Challenge suspicious callers with a voice CAPTCHA
• Use actual authentication in your call centers
• Install the FCC blacklist DB on your PBX
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Apps for spam detection
• Nomorobo, Robokiller, Call App, etc.
• AT&T partnership with Hiya
@kelleyrobinson
Telephony is complicated.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
But it will help rebuilt trust in telephony.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THANK YOU
@kelleyrobinson

More Related Content

What's hot

Subex cv akhil_singh_rawat
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawat
Akhil Singh Rawat
 
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Clive Aldred
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
Richard Hickson
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Ryan Thurman
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
XINTEC
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
Shishupal Nagar
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
Firdaus Fadzil
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
mrkhanlodhi
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
XINTEC
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
Ayodele Thomas
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
XINTEC
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
Alexandria Bishop
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
RaniPatil11
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions
TeleSign Corporation
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
Thomas McNally
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
Sim box
Sim boxSim box

What's hot (20)

Subex cv akhil_singh_rawat
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawat
 
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Sim box
Sim boxSim box
Sim box
 

Similar to Intro to SHAKEN/STIR

Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
Kelley Robinson
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
Kelley Robinson
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
Kelley Robinson
 
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays
 
Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street
MAD//Fest London
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
Alan Quayle
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
Kelley Robinson
 
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
Michael Einbinder-Schatz
 
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
Elizabeth (Lizzie) Siegle
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
apidays
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
Kelley Robinson
 
Tips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part II
CSFCorp
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
Kelley Robinson
 
Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)
Financial Poise
 
POPI and Email Marketing
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing
Everlytic
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
Samantha Park
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Alan Quayle
 
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
Elizabeth (Lizzie) Siegle
 
10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo
Lugenbuhl, Wheaton, Peck, Rankin & Hubbard
 

Similar to Intro to SHAKEN/STIR (20)

Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
 
Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
 
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
 
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
 
Tips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part II
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)
 
POPI and Email Marketing
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
 
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
 
10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo
 

More from Kelley Robinson

Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
Kelley Robinson
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
Kelley Robinson
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
Kelley Robinson
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
Kelley Robinson
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
Kelley Robinson
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
Kelley Robinson
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
Kelley Robinson
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
Kelley Robinson
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
Kelley Robinson
 
Authentication Beyond SMS
Authentication Beyond SMSAuthentication Beyond SMS
Authentication Beyond SMS
Kelley Robinson
 
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
Kelley Robinson
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
Kelley Robinson
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
Kelley Robinson
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
Kelley Robinson
 
2FA WTF
2FA WTF2FA WTF
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Kelley Robinson
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
Kelley Robinson
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson
 
2FA, OTP, WTF?
2FA, OTP, WTF?2FA, OTP, WTF?
2FA, OTP, WTF?
Kelley Robinson
 

More from Kelley Robinson (20)

Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
Authentication Beyond SMS
Authentication Beyond SMSAuthentication Beyond SMS
Authentication Beyond SMS
 
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
2FA, OTP, WTF?
2FA, OTP, WTF?2FA, OTP, WTF?
2FA, OTP, WTF?
 

Recently uploaded

The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 

Recently uploaded (20)

The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 

Intro to SHAKEN/STIR

  • 1. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR Kelley Robinson Account Security Team, Twilio @kelleyrobinson © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 2. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 3. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 54.6B US SPAM CALLS IN 2019 GREW 108% SINCE 2018 @kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
  • 4. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 5. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 6. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 7. TABLE OF CONTENTS © 2019 TWILIO INC. ALL RIGHTS RESERVED. 1. Telephony "security" 2. SHAKEN/STIR explained 3. Regulation & Limitations 4. What will happen next?
  • 8. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TELEPHONY "SECURITY"
  • 9. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony 30 Years Ago AMERITECH AT&T US WEST NYNEX Business Customer
  • 10. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony Today AMERITECH AT&T US WEST NYNEX U U U U U U U U U U U U U U U CustomerBusiness
  • 11. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Acronym Hell PSTN - Public Switched Telephone Network. Global interconnected telephony. VoIP - Voice over IP. Internet-connected telephony. SIP - Session Initiation Protocol. Standard used to manage VoIP calling. PBX - Private Branch eXchange. Private enterprise network. @kelleyrobinson
  • 12. ☎ Phun Phact The word "Hello" has only been around since 1827. Thomas Edison popularized the greeting and urged people to say "hello" when answering his phone. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 13. © 2019 TWILIO INC. ALL RIGHTS RESERVED. THE PROBLEM: UNWANTED ROBOCALLS
  • 14. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📈 Robocall spam & spoofing • Automated dialing is cheap • A lot of access points to the PSTN • Easy to spoof "From" number @kelleyrobinson
  • 15. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson Legitimate use cases for masking phone numbers Doctor calls from personal # displays office number Business calls from contact center displays toll-free callback
  • 16. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 2009 Truth in Caller ID Act • Spoofing is illegal if there is "intent to defraud, cause harm or wrongly obtain anything of value" • Difficult to enforce @kelleyrobinson
  • 17. ☎ Phun Phact Alexander Graham Bell campaigned to use "Ahoy-hoy" as the standard telephone greeting © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 18. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT IS SHAKEN/STIR?
  • 19. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited @kelleyrobinson
  • 20. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited LEMON-TWIST - LEveraging MOdels for Enterprise dialiNg - Tnauth list With an enterprise Identity Secured Token @kelleyrobinson 😱
  • 21. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Calls would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. SHAKEN/STIR defined | FCC.gov
  • 22. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Borrowing from other web authentication • Public Key Infrastructure (PKI) • Certificates • JSON Web Tokens (JWT) • Similar to email's DKIM/DMARC @kelleyrobinson
  • 23. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📲Caller Originating Service Provider Other Service Providers Terminating Service Provider 🔒Signing Service ✅Verification Service 📳Callee 🏛Certificate Authorities SHAKEN/STIR signing and verification
  • 24. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Certificate authorities • Approved by the STI-GA (Secure Telephone Identity Governance Authority) • Managed by ATIS (Alliance for Telecommunications Industry Solutions) @kelleyrobinson
  • 25. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SIP IDENTITY HEADER
  • 26. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 @kelleyrobinson
  • 27. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken @kelleyrobinson
  • 28. © 2019 TWILIO INC. ALL RIGHTS RESERVED. dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken { "attest": "A", " Attestation Level "dest": {"tn":["14155550101"]}, " Destination Phone # "iat": 1548859982, "orig": {"tn":"14155550171"}, " Origination Phone # "origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254" } " Orig. Customer ID @kelleyrobinson
  • 29. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Attestation Levels I know this customer and they can use the calling number A ✅ I know the customer but I don't know the calling number B 🤷 I don't know the customer but I know where this call came from C 🤔
  • 30. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ] MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken - cryptographic signature - certificate URL - algorithm - passport type @kelleyrobinson
  • 31. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ENFORCEMENT
  • 32. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TRACED Act • Signed into law 2019-12-30 • Allows $10,000 fine for offenders • Requires telecom companies to implement call authentication in the next 18 months (Telephone Robocall Abuse Criminal Enforcement Deterrence) @kelleyrobinson
  • 33. © 2019 TWILIO INC. ALL RIGHTS RESERVED. • VOIP: Implement STIR/SHAKEN • Non VOIP: "Reasonable measures to implement an effective call authentication framework" TRACED Act Authentication Requirements @kelleyrobinson
  • 34. ☎ Phun Phact Not every 555 number is fake. Only 555-0100 through 555-0199 are specifically reserved for fictional use. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: TV Tropes
  • 35. © 2019 TWILIO INC. ALL RIGHTS RESERVED. LIMITATIONS OF SHAKEN/STIR
  • 36. © 2019 TWILIO INC. ALL RIGHTS RESERVED. "The phone network is an ungodly beast." - Randy Weinberger, curmudgeon, telecom expert
  • 37. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Part of the ungodly beast: Time-division multiplexing (TDM) • Physical switches used by the PSTN • TRACED Act explicitly acknowledges TDM as a potential burden to SHAKEN/STIR rollout @kelleyrobinson
  • 38. © 2019 TWILIO INC. ALL RIGHTS RESERVED. The long tail of service providers • 4000 service providers in the US alone • Requires significant investment to comply @kelleyrobinson
  • 39. © 2019 TWILIO INC. ALL RIGHTS RESERVED. And what about... • Disconnected and reassigned phone numbers? • International numbers and calls? • Text messages? @kelleyrobinson
  • 40. ☎ Phun Phact Phone calls from The New York Times showed up as (111) 111-1111 until 2011. They now use a (212) number you can actually call back. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: NYTimes
  • 41. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT HAPPENS NEXT?
  • 42. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Ongoing legislation • FCC gave telcos authority to block unwanted robocalls without explicit subscriber permission • TRACED Act enforcement will begin at the end of 2020 @kelleyrobinson
  • 43. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Motivations driving implementation • Consumer pressure to decrease robocalls • Business pressure to increase answered calls @kelleyrobinson
  • 44. © 2019 TWILIO INC. ALL RIGHTS RESERVED. APPLICATION SECURITY PROTECTIONS TODAY
  • 45. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Mitigate damage from unwanted inbound calls • Protect your numbers from web scraping bots • Don't assign sequential phone numbers to your employees • Challenge suspicious callers with a voice CAPTCHA • Use actual authentication in your call centers • Install the FCC blacklist DB on your PBX @kelleyrobinson
  • 46. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Apps for spam detection • Nomorobo, Robokiller, Call App, etc. • AT&T partnership with Hiya @kelleyrobinson
  • 47. Telephony is complicated. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 48. Telephony is complicated. SHAKEN/STIR won't fix everything. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 49. Telephony is complicated. SHAKEN/STIR won't fix everything. But it will help rebuilt trust in telephony. © 2019 TWILIO INC. ALL RIGHTS RESERVED.