SlideShare a Scribd company logo
💀 RIP Seed Phrases
Security myths and the future of wallet security
Not your keys
Not your coins
Your keys
Your problems
People lose their wallets
A seed phrase is a set of words that gives
you the illusion of security, even in Vegas
- Daniel Ocean
● A single-factor system
● Mobile or hardware, security depends on it
● You have to “keep it somewhere safe”
Seed phrases are vulnerable
Seed Phrase Wallets
First some.. magic
Why?
Because humans are 🤪
Because the *out-of-wallet* back up
I forgot my password
Phishing
Lost my seed
Forgot to back-up
Wiped my computer
Kids threw it
Software leaked it
The “future of crypto security”
The “future of crypto security”
The “future of crypto security”
The “future of crypto security”
$100,000,000,000
Seed-based wallets are
like cars without breaks,
seatbelts, airbags and
crash detection
So what then?
The future of crypto security: Multi-factor
Custodial Single-Factor Multi-factor
The future of crypto security: Keyless
Shamir Secret
Multi-Sig
Smart-Contract + AA
Multi-Party Computation
Seed phrases
The future of crypto security: Recovery
TOTP
Password-less
Secure Biometrics
Passwords / Pin
MPC Wallets
ᐩ Simple onboarding
ᐩ Math first. Software first.
ᐩ Multi-factor authentication by default
ᐩ No add-ons
ᐩ Assisted + protected
ᐩ User is in control
ᐩ Built-in transaction protections
The future of crypto security: MPC
Seed Phrases
ᐩ Complex onboarding
ᐩ Tedious recovery
ᐩ Single-factor backup
ᐩ Weak authentication
ᐩ Buy Hardware / Steel Plate / Vault
ᐩ User is alone
ᐩ $ Billions lost / stolen
800,000+
0
www.zengo.com

More Related Content

What's hot

CNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersCNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream Ciphers
Sam Bowne
 
CNIT 128 7. Attacking Android Applications (Part 2)
CNIT 128 7. Attacking Android Applications (Part 2)CNIT 128 7. Attacking Android Applications (Part 2)
CNIT 128 7. Attacking Android Applications (Part 2)
Sam Bowne
 
Hand Gesture recognition
Hand Gesture recognitionHand Gesture recognition
Hand Gesture recognition
Nimishan Sivaraj
 
Iot rpl
Iot rplIot rpl
Iot rpl
DESHPANDE M
 
smart parking system
smart parking system smart parking system
smart parking system Che Tna
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
Jyothsna Sridhar
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...mahesh_rman
 
Real Time Vehicle Monitoring Using Raspberry Pi
Real Time Vehicle Monitoring Using Raspberry Pi Real Time Vehicle Monitoring Using Raspberry Pi
Real Time Vehicle Monitoring Using Raspberry Pi
Albin George
 
Atm ppt
Atm pptAtm ppt
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Luca Bongiorni
 
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
CODE BLUE
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
Akanksha Upadhyay
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper Presentation
Kaushik Gupta
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
Maulik Patel
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
Mithileysh Sathiyanarayanan
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
amar koppal
 
Vehicle access control using anpr
Vehicle access control using anprVehicle access control using anpr
Vehicle access control using anpr
techlead-india
 
Bus tracking application in Android
Bus tracking application in AndroidBus tracking application in Android
Bus tracking application in Android
yashonil
 

What's hot (20)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
CNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersCNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream Ciphers
 
CNIT 128 7. Attacking Android Applications (Part 2)
CNIT 128 7. Attacking Android Applications (Part 2)CNIT 128 7. Attacking Android Applications (Part 2)
CNIT 128 7. Attacking Android Applications (Part 2)
 
Hand Gesture recognition
Hand Gesture recognitionHand Gesture recognition
Hand Gesture recognition
 
Iot rpl
Iot rplIot rpl
Iot rpl
 
smart parking system
smart parking system smart parking system
smart parking system
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
 
Real Time Vehicle Monitoring Using Raspberry Pi
Real Time Vehicle Monitoring Using Raspberry Pi Real Time Vehicle Monitoring Using Raspberry Pi
Real Time Vehicle Monitoring Using Raspberry Pi
 
Atm ppt
Atm pptAtm ppt
Atm ppt
 
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
 
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper Presentation
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
Vehicle access control using anpr
Vehicle access control using anprVehicle access control using anpr
Vehicle access control using anpr
 
Bus tracking application in Android
Bus tracking application in AndroidBus tracking application in Android
Bus tracking application in Android
 

Similar to RIP seed phrases - the death and future of crypto wallets

Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
IT-oLogy
 
Crypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfCrypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourself
hannob
 
Which are the best wallets for USDC_.pptx
Which are the best wallets for USDC_.pptxWhich are the best wallets for USDC_.pptx
Which are the best wallets for USDC_.pptx
Agio Support Solutions
 
Importance of wallet security in Bitcoin
Importance of wallet security in BitcoinImportance of wallet security in Bitcoin
Importance of wallet security in Bitcoin
NajafAli87
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
44CON
 
Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019
Blockchain Council
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
Amirul Wiramuda
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
mozilla.presentations
 
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKETKEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
Steven Rhyner
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
alihaider191777
 
NVCPA Conference - "How Thieves Break In" 10-4-11
NVCPA Conference - "How Thieves Break In"   10-4-11NVCPA Conference - "How Thieves Break In"   10-4-11
NVCPA Conference - "How Thieves Break In" 10-4-11
Dale Bowman, CPP, PSP, CML, CJIL
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile Tribe
Dan Keldsen
 
Securing your Bitcoin wallet
Securing your Bitcoin walletSecuring your Bitcoin wallet
Securing your Bitcoin wallet
Ron Reiter
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingDanae Rosville
 
RFID-Blocking Products: Why Now Is the Time to Switch
RFID-Blocking Products: Why Now Is the Time to SwitchRFID-Blocking Products: Why Now Is the Time to Switch
RFID-Blocking Products: Why Now Is the Time to Switch
Dale Shimasaki
 
Rfid Blocker Wallet
Rfid Blocker WalletRfid Blocker Wallet
Rfid Blocker Wallet
Nor Azri Nor Hashim
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
OVHcloud
 
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Ouriel Ohayon
 

Similar to RIP seed phrases - the death and future of crypto wallets (20)

Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
Crypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfCrypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourself
 
Which are the best wallets for USDC_.pptx
Which are the best wallets for USDC_.pptxWhich are the best wallets for USDC_.pptx
Which are the best wallets for USDC_.pptx
 
Importance of wallet security in Bitcoin
Importance of wallet security in BitcoinImportance of wallet security in Bitcoin
Importance of wallet security in Bitcoin
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019
 
Vvvv
VvvvVvvv
Vvvv
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
 
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKETKEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
KEEPKEY AND TREZOR: BITCOIN VAULTS IN YOUR POCKET
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
NVCPA Conference - "How Thieves Break In" 10-4-11
NVCPA Conference - "How Thieves Break In"   10-4-11NVCPA Conference - "How Thieves Break In"   10-4-11
NVCPA Conference - "How Thieves Break In" 10-4-11
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile Tribe
 
Securing your Bitcoin wallet
Securing your Bitcoin walletSecuring your Bitcoin wallet
Securing your Bitcoin wallet
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
 
RFID-Blocking Products: Why Now Is the Time to Switch
RFID-Blocking Products: Why Now Is the Time to SwitchRFID-Blocking Products: Why Now Is the Time to Switch
RFID-Blocking Products: Why Now Is the Time to Switch
 
Rfid Blocker Wallet
Rfid Blocker WalletRfid Blocker Wallet
Rfid Blocker Wallet
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
 

More from Ouriel Ohayon

The future of crypto wallets
The future of crypto walletsThe future of crypto wallets
The future of crypto wallets
Ouriel Ohayon
 
Blockchain(s) past, present, futures feb 2018
Blockchain(s) past, present, futures feb 2018Blockchain(s) past, present, futures feb 2018
Blockchain(s) past, present, futures feb 2018
Ouriel Ohayon
 
Apple Study: 8 easy steps to beat Microsoft (and Google)
Apple Study: 8 easy steps to beat Microsoft (and Google)Apple Study: 8 easy steps to beat Microsoft (and Google)
Apple Study: 8 easy steps to beat Microsoft (and Google)
Ouriel Ohayon
 
How to market your app
How to market your appHow to market your app
How to market your app
Ouriel Ohayon
 
Pourquoi Google Nest Pas Invincible...
Pourquoi Google Nest Pas Invincible...Pourquoi Google Nest Pas Invincible...
Pourquoi Google Nest Pas Invincible...
Ouriel Ohayon
 
Why Could Google Die...
Why Could Google Die...Why Could Google Die...
Why Could Google Die...
Ouriel Ohayon
 
Tout ce que vous vouliez savoir sur Google
Tout ce que vous vouliez savoir sur GoogleTout ce que vous vouliez savoir sur Google
Tout ce que vous vouliez savoir sur GoogleOuriel Ohayon
 
All about Google
All about GoogleAll about Google
All about Google
Ouriel Ohayon
 
Screenshots Fit3dlive by FittingBox
Screenshots Fit3dlive by FittingBoxScreenshots Fit3dlive by FittingBox
Screenshots Fit3dlive by FittingBoxOuriel Ohayon
 
Social Networks Monetization
Social Networks MonetizationSocial Networks Monetization
Social Networks Monetization
Ouriel Ohayon
 
PréSentation De Read & Go
PréSentation De Read & GoPréSentation De Read & Go
PréSentation De Read & GoOuriel Ohayon
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
Ouriel Ohayon
 
Facebook Analysis and Study
Facebook Analysis and StudyFacebook Analysis and Study
Facebook Analysis and Study
Ouriel Ohayon
 

More from Ouriel Ohayon (14)

The future of crypto wallets
The future of crypto walletsThe future of crypto wallets
The future of crypto wallets
 
Blockchain(s) past, present, futures feb 2018
Blockchain(s) past, present, futures feb 2018Blockchain(s) past, present, futures feb 2018
Blockchain(s) past, present, futures feb 2018
 
Apple Study: 8 easy steps to beat Microsoft (and Google)
Apple Study: 8 easy steps to beat Microsoft (and Google)Apple Study: 8 easy steps to beat Microsoft (and Google)
Apple Study: 8 easy steps to beat Microsoft (and Google)
 
How to market your app
How to market your appHow to market your app
How to market your app
 
Pourquoi Google Nest Pas Invincible...
Pourquoi Google Nest Pas Invincible...Pourquoi Google Nest Pas Invincible...
Pourquoi Google Nest Pas Invincible...
 
Why Could Google Die...
Why Could Google Die...Why Could Google Die...
Why Could Google Die...
 
Tout ce que vous vouliez savoir sur Google
Tout ce que vous vouliez savoir sur GoogleTout ce que vous vouliez savoir sur Google
Tout ce que vous vouliez savoir sur Google
 
All about Google
All about GoogleAll about Google
All about Google
 
Screenshots Fit3dlive by FittingBox
Screenshots Fit3dlive by FittingBoxScreenshots Fit3dlive by FittingBox
Screenshots Fit3dlive by FittingBox
 
Social Networks Monetization
Social Networks MonetizationSocial Networks Monetization
Social Networks Monetization
 
PréSentation De Read & Go
PréSentation De Read & GoPréSentation De Read & Go
PréSentation De Read & Go
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Facebook Analysis and Study
Facebook Analysis and StudyFacebook Analysis and Study
Facebook Analysis and Study
 
DLD trends 2007
DLD trends 2007DLD trends 2007
DLD trends 2007
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

RIP seed phrases - the death and future of crypto wallets