SlideShare a Scribd company logo
What does this presentation all about
• Don’t	shout	at	me	with	“cut	the	crap,	show	me	the	hack!”
• More	academic	approach	rather	than	practical	hack
• Build up the situational awareness when National	Public Key Infrastructure	(“PKI”)	fully implemented
• Encouraging netizen to understand what National	PKI	is,	without necessarily pushing the hard words,	
such as	PKCS#8	vs	PKCS#12	or PKCS#10	CSR	in	DER	vs	PEM.	
• Open	ended question:	“Friend of Foe”
IDSECCONF 2016 CFP 2 24--25 SEP 2016
/usr/bin/finger	@tintinnya
Login: @tintinnya Name: B. Noviansyah
Directory: /Freelancers/@tintinnya Shell: /bin/bash
On since 1998—2002 (ITB) on Bachelor of Informatics
On since 2002—2012 (Many Employers) on Java EE Programmer
On since 2012—2014 (CMU Heinz) on MSISPM + Cyber Forensics and Incident Handler Track
On since 2014—now (Some Bosses) on Many activities, included AFDI
No Mail.
No Plan, just an Independent IT Researcher on night shift, an employee on morning shift.
IDSECCONF 2016 CFP 3 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Article	1
• Point	9:	“Electronic		Certificate”	means	a	certificate	in	electronic	nature	that	bears	an	Electronic	Signature and	identity,	
demonstrating	a	status	of	a	legal	subject	of	parties	to		an	Electronic	Transaction	issued	by	Certification	Service	
Providers.	
• Point	10:	“Electronic		Certification		Service		Provider”	means	a	legal	entity that	acts	as	a	reliable	party,	issues	and	audits	
Electronic	Certificates.
• Point	12:	“Electronic		Signature”	means		a		signature		that	contains	Electronic	Information	that	is	attached	to,		associated		
or		linked		with		other		Electronic	Information		that	is	used	for	means	of	verification	and	authentication.	
• Point	13:	“Signatory/Signer”		means		a		legal		subject	associated		or		linked		with		an		Electronic	Signature.
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 4 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Article	11 Paragraph	(1):	
Electronic	Signatures	shall	have	lawful	legal	force	and	legal	effect	to	the	extent	satisfying	the	following	requirements:
a. Electronic	Signature-creation	data	shall	be	associated	only	with	the	Signatories/Signers;	
b. Electronic	Signature-creation	data	at	the	time	the	electronic	signing	process	shall	be	only	in	the	power	of	the	
Signatories/Signers;
c. Any	alteration	in	Electronic	Signatures	that	occur	after	the	signing	time	is	knowable;
d. Any	alteration	in	Electronic	Information	associated	with	the	Electronic	Signatures	after	the	signing	time	is	knowable;
e. There	are	certain	methods	adopted	to	identify	the	identity	of	the	Signatories/Signers;	and
f. There	are	certain	methods	to	demonstrate	that	the	Signatories/Signers	have	given	consent	to	the	associated	
Electronic	Information;
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 5 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Elucidation	of	Article	11	Paragraph	(1):	
This		Law		grants		recognition		definitely		that	despite		codes,		Electronic		Signatures		have		an	equal	position	to	manual	
signatures	in	general,	with	legal	force	and	legal	effect.	
The		requirements		as		intended		by		this		Article	shall		be		the		requirements		that		minimally		any	Electronic		Signature		
must		satisfy.			This	provision		gives		as		wide		opportunities		as	possible		to		anyone		to		develop		methods,	techniques,		or		
process		for		creating		Electronic	Signatures.
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 6 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	is	endorsed	to	strengthen	the	positioning	of	digital	objects	in	legal	aspect
• Digital	Signature	could	be	generated	using	PGP/GPG	system,	but	Indonesia	Government	(c.q.	
Kemkominfo)	and	Republic	of	Korea	(via	Korea	International	Cooperation	Agency,	KOICA)	introduced	
National	RootCA based	on	EJBCA	as	PKI	Platform.
• Lingering	question:
• Why	choose	PKI	instead	of	PGP?
• Does	it	have	unintended	consequences?
• Does	it	protect	our	privacy?
• How	does	the	operational	site,	including	signing	request?
IDSECCONF 2016 CFP 7 24--25 SEP 2016
PKI	and	Cryptography
• PKI	is	mechanism	to	provide	Confidentiality	and	Integrity	(in	C-I-A	triangle)	using	public	key	cryptography	
or	known	as	Asymmetric-key	Cryptography
• Asymmetric-key	Cryptography	ensures	that	the	message	was	encrypted	using	public	key	(that	is	achieved	
the	confidentiality)	and	only	the	person	who	has	the	private	key	could	decrypt	the	message	(hence,	the	
integrity	also	maintained).
• Symmetric-key	Cryptography	only	guarantees	the	message	was	encrypted,	but	unable	to	verify	the	
integrity	of	the	message	since	anyone	who	knows	the	key	would	be	able	to	decrypt	the	message,	alter	
the	message,	and	encrypt	the	message	again.
IDSECCONF 2016 CFP 8 24--25 SEP 2016
Symmetric-key	Cryptography
• What	will	happen	if	C	knows	qA?
A B
qA
Plain	
TextqA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text qA qA
qAB qAB qA
IDSECCONF 2016 CFP 9 24--25 SEP 2016
N	=	3
• Key space =	{qAB,	qAC,	qBC}	
N	=	5
• Keyspace =	{qAB,	qAC,	qAD,	qAE,	qBC,	qBD,	qBE,	qCD,	
qCE,	qDE}	
Symmetric-key	Cryptography
A
B C
qBC
A
B
C
D E
qAC
qDE
IDSECCONF 2016 CFP 10 24--25 SEP 2016
Symmetric-key	Cryptography
• Problems	in	operational
• Key	revocation	process	is	cumbersome	when	one	key	is	compromised
• Size	of	keyspace in	the	system	increases	in	geometry	progression
• Key Secrecy should be conducted by both parties.	If	either party fails to keep it secret,	both parties
should never use the old key
( )
2
1-´
=
nn
K
IDSECCONF 2016 CFP 11 24--25 SEP 2016
Asymmetric-key	Cryptography
A B
pA
Plain	
TextqA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text pB qB
IDSECCONF 2016 CFP 12 24--25 SEP 2016
24--25 SEP 2016IDSECCONF 2016 CFP
Asymmetric-key	Cryptography	with	
Digital	Signature
A B
pA
Plain	
Text
qA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text
pB qB
qBSignature
Hash
SignaturepB
Hashmatch?
Hashing
hashing
qA Signature Signature
Hash
pA
Hash
Hash
Hashing
Hash
match?
Hashing
13
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-key	Cryptography
• Encrypt data	with Asymmetric-key?
• Are	you nuts?!?
Algorithm
Sign
Operation/s	
Sign	[2]
Operation/s	
RSA	512 17,319.9	 18,723.5	
RSA	1024 5,856.4	 7,196.9	
RSA	2048 905.3	 1,612.9	
RSA	4096 126.4	 154.0	
Algorithm
Verify
Operation/s	
Verify	[2]
Operation/s2	
RSA	512 183,807.3	 235,756.6	
RSA	1024 77,728.0	 107,917.2	
RSA	2048 29,373.6	 35,649.9	
RSA	4096 8,307.4	 9,973.9	
Algorithm Input	in	bytes operations/s	 operations	[2]/s	
AES-128-CBC 16-bytes 7,299,678.7	 8,318,077.0	
AES-128-CBC 64-bytes 2,024,042.7	 2,330,365.0	
AES-128-CBC 256-bytes 503,996.0	 597,138.3	
AES-128-CBC 1024-bytes 129,954.0	 149,161.7	
AES-128-CBC 8192-bytes 15,797.0	 18,749.3	
Tested with OpenSSL 1.0.2g	openssl speed
MacBook	Pro	10,1	Retina	Display	15"	Mid	2012
Intel	Core	i7	3720QM	@	2.6GHz	4	cores
Memory	16GB	DDR3	1600MHz
SSD	512GB	SM512E	SATA	III	6Gbps
Tested with OpenSSL 1.0.2g	openssl speed
HP	zBook 15	G2
Intel	Core	i7	4810MQ	@	2.80GHz	4	cores
Memory	16GB	DDR3	1600MHz
HDD	HGST	HTS721010A9E630	1TB	SATA	III	6Gbps	
7200rpm	32MB	Buffer
14
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-key	Cryptography	with	
Digital	Signature	with	Symmetric	Key
A B
Plain	
Text
Cipher	
Text
Reply	
Text
Cipher	
Text
Reply	
Text
pB
qB
qBSignature
Hash
SignaturepB
Hashmatch?
Hashing
hashing
qA Signature Signature
Hash
pA
Hash
Hash
Hashing
Hash
match?
Hashing
pA
qA
Plain	
Text
15
Decentralized
• PGP	system allows users to distribute their key to
their correspondents,	e.g.	Distribute via	email,	or
web	page
• It could be also published on PGP	Key Server	such
as	pgp.mit.edu
• MIT	Keyserver does not	guarantee the real	owner
of public key,	it is the user obligation to trust the
ownership of public key
Centralized
• PKI	creates chain of trust,	starts from Root CA
• Once	user trusts the Root CA,	all public keys
signed by Root CA	will be automatically
trusted by user
• Public Key should only be published by
Trusted CA
Asymmetric-Key	Key	Management
IDSECCONF 2016 CFP 16 24--25 SEP 2016
A
B C
D
E
Certificattion
AuthorityA
B C
D
E
CA
CA
CA CA
CA
Asymmetric-Key	Key	Management
IDSECCONF 2016 CFP 17 24--25 SEP 2016
Decentralized Centralized
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-Key	Signing	Request
• In	order	to be trusted by system in	PKI,	user’s Public Key should be signed by Certification Authority (CA)	that
is under Trusted Root CA	issuance process
• After	public key signed by CA,	it can be used by other party,	either for encryption purpose or for digital	
signature verification.	While the private key is never published and should only be in	party A possession.		
18
AqA
PKCS#10	CSR in	
PEM/DER
pA
Certification	
Authority
CER	in	X.509	format	in	ASN.1	Structure
pA
CA
CA
pCA
Target	Acquired!
• Article	1
• Point	9:	“Electronic		Certificate”	means	a	certificate	in	electronic	nature	that	bears	an	Electronic	Signature and	identity,	
demonstrating	a	status	of	a	legal	subject	of	parties	to		an	Electronic	Transaction	issued	by	
Certification	Service	Providers.	
• Point	10:	“Electronic		Certification		Service		Provider”	means	a	legal	entity that	acts	as	a	reliable	party,	issues	and	audits	
Electronic	Certificates.
• Point	12:	“Electronic		Signature”	means		a		signature		that	contains	Electronic	Information	that	is	attached	to,		associated		
or		linked		with		other		Electronic	Information		that	is	used	for	means	of	verification	and	authentication.	
• Point	13:	“Signatory/Signer”		means		a		legal		subject	associated		or		linked		with		an		Electronic	Signature.	
24--25 SEP 2016IDSECCONF 2016 CFP 19
National	PKI
National	PKI	for	Digital	Signature	only?
• Another	purposes:
• SSL	certificate	for	official	website,
• Secure	Email,	Internet	Banking,	
• e-Taxation,	e-Custom
• e-Commerce,	Cyber	Trading,	e-Banking
• IoT,	FIDO
24--25 SEP 2016IDSECCONF 2016 CFP 20
Source:	Riki Arif Gunawan,	“Digital	Signature	Roadmap,”	presented	at	the	4th
Public	Key	Infrastructure	Awareness	and	EJBCA/TOOLKIT	Seminar,	Jakarta,	Indonesia,	Feb.	29,	2016.
Gain	our	Trust!
• Update	all	Trusted	CA	list	in	OSes
• Microsoft	Trusted	Root	Certificate,	https://technet.microsoft.com/en-us/library/cc751157.aspx
• Apple	Root	Certificate	Program,	https://www.apple.com/certificateauthority/ca_program.html
• Google	Chromium	Projects	with	Root	Certificate	Policy,	https://www.chromium.org/Home/chromium-
security/root-ca-policy
• Mozilla	Firefox	Certificate	Store	with	Mozilla	CA	Certificate	Policy.	https://www.mozilla.org/en-
US/about/governance/policies/security-group/certs/policy/
• Get	audited	based	on	Chartered	Professional	Accountants	of	Canada	(previously:	AICPA/CICA)	WebTrust
Program	for	Certification	Authorities	http://www.webtrust.org/item64428.aspx
24--25 SEP 2016IDSECCONF 2016 CFP 21
Alternate	use	of	National	PKI
• Code	Signing
• Application	Signing
• Library	Signing
• Not	Mobile	App	Signing,	it’s	their	money	J
• SSL/TLS	Certificate
• HTTPS
• FTPS
• VPN	over	SSL/TLS
24--25 SEP 2016IDSECCONF 2016 CFP 22
Friend	or	Foe:	Code	Signing	(1)
• Prevent	unauthorized	modification	of	critical	applications
• Application	Signing
• This	certificate	is	intended	to	protect	applications	being	tampered	in	application	distribution	process.	These	applications	
could	be	application	for	National	ID	(KTP)	registration	process	in	Municipal	Office	(Kantor	Walikota)	or	District	Office	
(Kantor	Kelurahan)	
• Driver/Library	Signing
• This	certificate	is	intended	to	protect	applications	being	tampered	in	application	while	in	operational	routines.	Case	of	
Bangladesh	Heist,	SWIFT	Alliance	Access	has	been	tampered	in	library/driver	level.
24--25 SEP 2016IDSECCONF 2016 CFP 23
Friend	or	Foe:	Code	Signing	(2)
24--25 SEP 2016IDSECCONF 2016 CFP 24
Friend	or	Foe:	Code	Signing	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 25
Friend	or	Foe:	Code	Signing	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 26
Friend	or	Foe:	Code	Signing	(5)
24--25 SEP 2016IDSECCONF 2016 CFP 27
Friend	or	Foe:	SSL/TLS	Certificate
• Alignment	with	PANDI’s	campaign:	“Proud	using	.ID	domain”
• All	.ID	domains	validated,	hence	the	visitors	are	protected	from	visiting	fraudulent	website
• National	Sovereignty,	no	dollar	will	be	sent	out	to	non-Indonesia	Company	overseas
• Another	extra	layer	could	be	added	with	Domain	Validation	(DV)	
24--25 SEP 2016IDSECCONF 2016 CFP 28
Friend	or	Foe:	SSL/TLS	Interceptor	(1)
• HTTPS	inspection	by	intercepting	SSL/TLS	layer
• DPI,	DLP,	IDS/IPS,	Content	Filtering	(!)
• Implements	Transparent	Web	Proxy	in	Network	Access	Point	(NAP)
• Enforces	all	web	browsers	to	use	National	Root	CA	by	applying	HTTP	Strict	Transport	Security	(HSTS)
• Generic	encrypted	traffic	via	SSL/TLS,	no	information	could	be	seen	unless	the	information	below:	
• (i)	source	IP,	(ii)	source	port,	(iii)	destination	IP,	(iv)	destination	port,	and	(v)	protocol	
• Using	SSL/TLS	Interceptor,	more	information	are	visible:	
• (i)	hostname,	(ii)	URI,	(iii)	POST/GET	data
• Will	not	be	working	if	all	clients	or	web	apps	using	Certificate	Pinning
• Think	of	“MITM”	in	National	Scale,	not	just	in	simulated	network,	or	medium	enterprise	network
• Burpsuite in	national	Internet,	if	you	are	on	“proxy”	level
• Dissecting	SSL/TLS	using	wireshark with	National	Private	Key,	for	network	forensics	investigation
24--25 SEP 2016IDSECCONF 2016 CFP 29
24--25 SEP 2016IDSECCONF 2016 CFP 30
Friend	or	Foe:	SSL/TLS	Interceptor	(2)
24--25 SEP 2016IDSECCONF 2016 CFP 31
Friend	or	Foe:	SSL/TLS	Interceptor	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 32
Friend	or	Foe:	SSL/TLS	Interceptor	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 33
Friend	or	Foe:	SSL/TLS	Interceptor	(5)
24--25 SEP 2016IDSECCONF 2016 CFP 34
Friend	or	Foe:	SSL/TLS	Interceptor	(6)
24--25 SEP 2016IDSECCONF 2016 CFP 35
Friend	or	Foe:	SSL/TLS	Interceptor	(7)
24--25 SEP 2016IDSECCONF 2016 CFP 36
Friend	or	Foe:	SSL/TLS	Interceptor	(8)
24--25 SEP 2016IDSECCONF 2016 CFP 37
Friend	or	Foe:	SSL/TLS	Interceptor	(9)
24--25 SEP 2016IDSECCONF 2016 CFP 38
Friend	or	Foe:	SSL/TLS	Interceptor	(10)
24--25 SEP 2016IDSECCONF 2016 CFP 39
Friend	or	Foe:	SSL/TLS	Interceptor	(11)
Friend	or	Foe:	No	Protection	of	Private	key?	(1)
• Great	power	comes	with	the	great	responsibility.	Are	you	responsible	enough	to	handle	it?
• Choosing	of	private	key
• Algorithm	and	Keylength:	RSA	4096?	What	about	cryptographic	power	of	embedded	system?	Yubico YubiKey USB	
perhaps?
• RSA	1024?	SRSLY?	Haven’t	you	play	any	CTF	that	crack	RSA	1024?
• Storage	Security	of	private	key
• Filesystem	only?	Yeah,	right!	Lay	it	on	drive	C:TEMP so	that	everyone	can	access	it.
• PFX	or	P12	format	password	protected?	Prone	to	be	bruteforce,	with	no	limitation	of	trial.
• Don’t	ended	in	Documentary	movie	like	Zero	Days:	“Olympic	Games”	Stuxnet with	Realtek Digital	Signature
• Think	about	things	like	Hardware	Security	Module	(HSM)
24--25 SEP 2016IDSECCONF 2016 CFP 40
Friend	or	Foe:	No	Protection	of	Private	key?	(2)
• HSM
• Personal	and	low	computing	power:	USB
• Private	Key	is	stored	in	specific	partition	of	storage,	equipped	with	low	cryptographic	processor	but	limited	in	USB	Bus	
Speed.
• Requires	password	to	access	the	partition
• Directly	supported	with	Cryptography	API	using	PKCS#11	or	using	specific	driver	for	older	OSes
• Limits	bruteforce.	Locked	after	10	times	consecutive	trial	with	wrong	password
• Dedicated	processor	to	offloading	cryptographic	calculation:	PCI-e	Card
• Similar	with	USB,	but	high	bandwidth	from	Card	to	CPU
• More	powerfull (and	of	course	more	Benjamins):	Network-based	HSM
24--25 SEP 2016IDSECCONF 2016 CFP 41
Friend	or	Foe:	No	Protection	of	Private	key?	(3)
• HSM
• More	powerful	(and	of	course	more	Benjamins):	Network-based	HSM
• Multiple	Layers	of	Access	List
• Requires	HSM	activation	using	specific	USB	token	and	PIN	activation	before	HSM	can	be	accessed	via	network	
• Requires	Certificate	exchange	between	server	and	HSM	to	setup	Network	Trusted	Link	(NTL)	Service,	hence	the	communication	
channel	is	encrypted	with	asymmetric-key	cryptography
• Has	multiple	partitions.	Hence,	requires	PIN	or	password	to	access	intended	partitions
• Has	multiple	key	objects	in	single	partitions.	Hence,	requires	specific	password	to	access	different	key	objects
• Could	offload	the	cryptographic	processing	to	HSM’s	processor	using	provided	API	from	manufacturers,	hence	lowering	
down	the	CPU	load	in	Server	side.	
24--25 SEP 2016IDSECCONF 2016 CFP 42
24--25 SEP 2016IDSECCONF 2016 CFP 43
Friend	or	Foe:	No	Protection	of	Private	key?	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 44
Friend	or	Foe:	No	Protection	of	Private	key?	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 45
Friend	or	Foe:	No	Protection	of	Private	key?	(5)
SafeNet HSM	Network	Based,
24--25 SEP 2016IDSECCONF 2016 CFP 46
Friend	or	Foe:	No	Protection	of	Private	key?	(6)
Questions	that	remain	unanswered
• CA	Hierarchy
• Root	CA	is	maintained	by	Kemkominfo,	while	SubCA is	maintained	by	respective	Ministry
• But,	How	deep	the	level	of	CA?	Too	deep	will	slowing	down	the	process.	Too	shallow	will	jeopardizing	all	chain	
of	trust,	when	SubCA or	even	RootCA’s private	key	is	compromised
• CA	requires	Directory	Services	to	attach	user	information	in	certificate.	
• What	will	the	directory	services	be?	LDAP,	Microsoft	ADDS,	Oracle	Internet	Directory,	Apache	Directory	Server,	
Sun	Java	System	Directory	Server?
• Replicate	or	query	to	http://dukcapil.kemendagri.go.id/ceknik
• What	will	the	private	key	be	for	end-user/citizen?	
• Media?	Don’t	tell	me	the	e-KTP	card.
24--25 SEP 2016IDSECCONF 2016 CFP 47
What Next?
• Strengthen the Implementation and the operational site,	do not	ended up with case like
DigiNortar
• New PKI	with Fast	IDentification Online	(FIDO)	and Enhanced	Privacy	ID	(EPID)
• Blockchain in	PKI	to	enhance	the	chain	of	trust
IDSECCONF 2016 CFP 48 24--25 SEP 2016
“
”
National	Public	Key	Infrastructure:
Friend	or	Foe?
Hand-in-hand	to	make	it	friendly…
24--25 SEP 2016IDSECCONF 2016 CFP 49

More Related Content

Similar to National Public Key Infrastructure: Friend or Foe?

CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
Alan Quayle
 
Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
MarketingArrowECS_CZ
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
Gökhan Şengün
 
Portland Splunk User Group May 2020
Portland Splunk User Group May 2020 Portland Splunk User Group May 2020
Portland Splunk User Group May 2020
Amanda Richardson
 
NodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontendsNodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontends
Carlos Santana
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
MongoDB and Spark
MongoDB and SparkMongoDB and Spark
MongoDB and Spark
Norberto Leite
 
MongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and SparkMongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and Spark
MongoDB
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
Cambridge Intelligence
 
Cisco Learning Pathway
Cisco Learning PathwayCisco Learning Pathway
Cisco Learning Pathway
Elvis Chakwizira
 
DevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteira
Diego Gabriel Cardoso
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
Kai Wähner
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
Codemotion
 
Spring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceSpring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application Service
VMware Tanzu
 
Achieving Software Assurance with Hybrid Analysis Mapping
Achieving Software Assurance with Hybrid Analysis Mapping  Achieving Software Assurance with Hybrid Analysis Mapping
Achieving Software Assurance with Hybrid Analysis Mapping
Denim Group
 
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco DevNet
 
Facciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
Facciamo il Punto su Presente e Futuro dei framework Hadoop e SparkFacciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
Facciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
Mario Cartia
 
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
Codemotion
 
New NeXt for Advanced Developers
New NeXt for Advanced DevelopersNew NeXt for Advanced Developers
New NeXt for Advanced Developers
Cisco DevNet
 

Similar to National Public Key Infrastructure: Friend or Foe? (20)

CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
 
Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
 
Portland Splunk User Group May 2020
Portland Splunk User Group May 2020 Portland Splunk User Group May 2020
Portland Splunk User Group May 2020
 
NodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontendsNodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontends
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
MongoDB and Spark
MongoDB and SparkMongoDB and Spark
MongoDB and Spark
 
MongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and SparkMongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and Spark
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
 
Cisco Learning Pathway
Cisco Learning PathwayCisco Learning Pathway
Cisco Learning Pathway
 
DevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteira
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
 
Spring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceSpring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application Service
 
Achieving Software Assurance with Hybrid Analysis Mapping
Achieving Software Assurance with Hybrid Analysis Mapping  Achieving Software Assurance with Hybrid Analysis Mapping
Achieving Software Assurance with Hybrid Analysis Mapping
 
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
 
Facciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
Facciamo il Punto su Presente e Futuro dei framework Hadoop e SparkFacciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
Facciamo il Punto su Presente e Futuro dei framework Hadoop e Spark
 
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
Webinar: Mario Cartia - Facciamo il Punto su Presente e Futuro dei framework ...
 
New NeXt for Advanced Developers
New NeXt for Advanced DevelopersNew NeXt for Advanced Developers
New NeXt for Advanced Developers
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

National Public Key Infrastructure: Friend or Foe?