SlideShare a Scribd company logo
08-2014
Pretty Easy
Privacy
1971
“or something similar”
‣ Ray Tomlinson sent first email
ever. In an “internet” of about 10
nodes.
‣ >1 bn nodes
‣ huge political and economical impact
‣ big players like Google, NSA
2014
not letters:
‣ Emails can be read in transit.
‣ by your email provider (google, gmx, yahoo,
microsoft.)
‣ by governments and agencies
Emails are Postcards
mostly automated, for
‣ commercial
‣ surveillance
‣ espionage
purposes
Email analysis
Consequence?
or:
08-2014
Pretty easy
email crypto!
“Pretty Good Privacy – Encryption for
the Masses”
‣ strong cryptography
‣ for everyone
‣ without central infrastructure
1991: PGP 1.0
Phil Zimmerman
...because
‣ it is too complicated to use
‣ hard to use on mobile
‣ forces users to use specific email clients
‣ users have „nothing to hide“
2014: rarely used
‣ is easy to use
‣ is easy to get started
‣ works with your email address
‣ works on all devices
‣ works with most email programs
‣ is open source
easy email encryption
08-2014
How does
that work?
‣ that you plug in at home.
‣ has a cute name like
pink-pony.kinko.me
‣ and a unique SSL
certificate
kinko.me is a box
‣ that encrypts your mail when you send it
SMTP proxy
‣ synchronizes your IMAP account with the box
‣ decrypting email in the process
IMAP sync
‣ Read email in your browser
Webmail
1. Configure email address
2. Configure email client:
‣ one-click install
‣ QR Code
‣ Installation Guides
Easy to get started
‣ connects your phone or table with the box at your
home
‣ noone can read that data in transit
..and a shuttle service
08-2014
Top
Questions
No.
Any PGP-compatible software will work.
(And you could share your box, too.)
Does the recipient
need a box?
No.
It works with your current one.
Do I need a new
email address?
No.
kinko.me takes care of that, most of the time.
Do I need to know
the recipient’s key?
08-2014
past
&
future
‣ started in Oct 2013
‣ presentation at 30c3, EFF CUP (San Francisco)
‣ runner-up at IT Sicherheitspreis
‣ working prototype
A sound foundationthe past
additional crypto and privacy tools
‣ DropBox clone
‣ Video Chat
‣ 3rd party apps on open platform
etc.
A beacon of privacythe future
support us at
getkinko.com
Crowdfundingright now
Trust needs
Community
Trust needs
Community
Aug 30th, 2014, Berlin
support us at
getkinko.com

More Related Content

Viewers also liked

үгийн утга слайд
үгийн утга слайд үгийн утга слайд
үгийн утга слайд enhuush_99
 
Mongol helnii horshih yos
Mongol helnii horshih yosMongol helnii horshih yos
Mongol helnii horshih yos
National University Of Mongolia
 
үгийн утгын ангилал
үгийн утгын ангилалүгийн утгын ангилал
үгийн утгын ангилалmuuduu
 
үгийн сангийн утга
үгийн сангийн утгаүгийн сангийн утга
үгийн сангийн утга
National University Of Mongolia
 
Үгийн утга гэж юу вэ
Үгийн утга гэж юу вэҮгийн утга гэж юу вэ
Үгийн утга гэж юу вэ
National University Of Mongolia
 
Writing topic sentences
Writing topic sentences  Writing topic sentences
Writing topic sentences
GAROSEMENA
 
스파이럴캣츠 등급제1 수정안
스파이럴캣츠 등급제1 수정안스파이럴캣츠 등급제1 수정안
스파이럴캣츠 등급제1 수정안Geonyeong Ju
 
La edad antigua
La edad antiguaLa edad antigua
La edad antigua
papanatounianos
 
صور الملك1
صور الملك1صور الملك1
صور الملك1naila600
 
14.03.14 Exegesis - Lent 2
14.03.14 Exegesis -  Lent 214.03.14 Exegesis -  Lent 2
14.03.14 Exegesis - Lent 2morrisenglish
 
Trauma symposium 2012
Trauma symposium 2012Trauma symposium 2012
Trauma symposium 2012
naim manhas
 
Chemical reaction activities
Chemical reaction activitiesChemical reaction activities
Chemical reaction activitiesjvprofe
 
OCDE
OCDEOCDE
The Role of Information Communication Technology & Geoinformatics in Vector C...
The Role of Information Communication Technology & Geoinformatics in Vector C...The Role of Information Communication Technology & Geoinformatics in Vector C...
The Role of Information Communication Technology & Geoinformatics in Vector C...
ANUMBA JOSEPH UCHE
 
Cannabis: a double edged sword
Cannabis: a double edged swordCannabis: a double edged sword
Cannabis: a double edged swordHarriet Trayling
 
Social Media: Creating an Effective Digital Strategy
Social Media: Creating an Effective Digital StrategySocial Media: Creating an Effective Digital Strategy
Social Media: Creating an Effective Digital Strategy
Bare Knuckle Digital
 

Viewers also liked (20)

үгийн утга слайд
үгийн утга слайд үгийн утга слайд
үгийн утга слайд
 
Mongol helnii horshih yos
Mongol helnii horshih yosMongol helnii horshih yos
Mongol helnii horshih yos
 
үгийн утгын ангилал
үгийн утгын ангилалүгийн утгын ангилал
үгийн утгын ангилал
 
үгийн сангийн утга
үгийн сангийн утгаүгийн сангийн утга
үгийн сангийн утга
 
Үгийн утга гэж юу вэ
Үгийн утга гэж юу вэҮгийн утга гэж юу вэ
Үгийн утга гэж юу вэ
 
Writing topic sentences
Writing topic sentences  Writing topic sentences
Writing topic sentences
 
God is everywhere final
God is everywhere finalGod is everywhere final
God is everywhere final
 
스파이럴캣츠 등급제1 수정안
스파이럴캣츠 등급제1 수정안스파이럴캣츠 등급제1 수정안
스파이럴캣츠 등급제1 수정안
 
37 Ways for a better world (Marc Heleven)
37 Ways for a better world (Marc Heleven)37 Ways for a better world (Marc Heleven)
37 Ways for a better world (Marc Heleven)
 
La edad antigua
La edad antiguaLa edad antigua
La edad antigua
 
Saioa p54
Saioa p54Saioa p54
Saioa p54
 
صور الملك1
صور الملك1صور الملك1
صور الملك1
 
Kinectomania
KinectomaniaKinectomania
Kinectomania
 
14.03.14 Exegesis - Lent 2
14.03.14 Exegesis -  Lent 214.03.14 Exegesis -  Lent 2
14.03.14 Exegesis - Lent 2
 
Trauma symposium 2012
Trauma symposium 2012Trauma symposium 2012
Trauma symposium 2012
 
Chemical reaction activities
Chemical reaction activitiesChemical reaction activities
Chemical reaction activities
 
OCDE
OCDEOCDE
OCDE
 
The Role of Information Communication Technology & Geoinformatics in Vector C...
The Role of Information Communication Technology & Geoinformatics in Vector C...The Role of Information Communication Technology & Geoinformatics in Vector C...
The Role of Information Communication Technology & Geoinformatics in Vector C...
 
Cannabis: a double edged sword
Cannabis: a double edged swordCannabis: a double edged sword
Cannabis: a double edged sword
 
Social Media: Creating an Effective Digital Strategy
Social Media: Creating an Effective Digital StrategySocial Media: Creating an Effective Digital Strategy
Social Media: Creating an Effective Digital Strategy
 

Similar to kinko.me auf dem Webmontag Frankfurt #63 #wmfra

Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Eno Thierbach
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
Future Insights
 
kinko.me @ ownCloud Contributor Conference
kinko.me @ ownCloud Contributor Conferencekinko.me @ ownCloud Contributor Conference
kinko.me @ ownCloud Contributor Conference
kinkome
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
John Mayfield
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
John Mayfield
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
Gregory Hanis
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey ManagementIntroduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
n|u - The Open Security Community
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
Jisc
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
Felipe Prado
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Using PGP for securing the e-mail
Using PGP for securing the e-mailUsing PGP for securing the e-mail
Using PGP for securing the e-mail
davidepiccardi
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
Temok IT Services
 
Stepping Up conference 2013
Stepping Up conference 2013Stepping Up conference 2013
Stepping Up conference 2013
kumar641
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGP
auremoser
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 

Similar to kinko.me auf dem Webmontag Frankfurt #63 #wmfra (20)

Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
kinko.me @ ownCloud Contributor Conference
kinko.me @ ownCloud Contributor Conferencekinko.me @ ownCloud Contributor Conference
kinko.me @ ownCloud Contributor Conference
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey ManagementIntroduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Using PGP for securing the e-mail
Using PGP for securing the e-mailUsing PGP for securing the e-mail
Using PGP for securing the e-mail
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
Stepping Up conference 2013
Stepping Up conference 2013Stepping Up conference 2013
Stepping Up conference 2013
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGP
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

kinko.me auf dem Webmontag Frankfurt #63 #wmfra