SlideShare a Scribd company logo
1 of 270
Download to read offline
Jabber security
Peter Saint-Andre
stpeter@jabber.org
https://stpeter.im/
secure communication
with Jabber
what is Jabber?
open XML technologies
real-time messaging
presence
multimedia negotiation
collaboration
and more
invented by Jeremie
   Miller in 1998
in essence...
streaming XML
over long-lived
TCP connection
client-server
architecture
decentralized
  network
inter-domain
  messaging
like email
but really fast
with built-in presence
not just one
open-source project
multiple codebases
open-source and
  commercial
interoperability via
XML wire protocol
core protocol
standardized @ IETF
Extensible
Messaging
and
Presence
Protocol
(XMPP)
RFCs 3920 + 3921
multiple
implementations
serious deployment
how many users?
we don’t know
decentralized
 architecture
100k+ servers
50+ million IM users
not just IM
generic XML routing
lots of applications
     beyond IM
continually defining
 XMPP extensions
XMPP Standards
Foundation (XSF)
developer-driven
standards group
that’s great, but...
how secure is it?
what is security?
secure conversation
    in real life...
a good friend
visits your home
you know and trust
    each other
only the two of you
strangers can’t enter
     your home
your home is not
     bugged
conversation is not
    recorded
what you say is private
  and confidential
contrast that with
  the Internet...
lots of potential attacks
man-in-the-middle
eavesdropping
unauthenticated users
address spoofing
weak identity
rogue servers
denial of service
directory harvesting
buffer overflows
spam
spim
spit
splogs
viruses
worms
trojan horses
malware
phishing
pharming
information leaks
inappropriate logging
    and archiving
you get the picture
the Internet is a
dangerous place
how do we fight
 these threats?
sorry, but...
Jabber is not a
perfect technology
not originally built
 for high security
don’t require PGP keys
    or X.509 certs
don’t require ubiquitous
       encryption
tradeoffs between
security and usability
maybe that’s why we
have 50+ million users...
but privacy and security
     are important
so what have we
 done to help?
Jabber architecture...
similar to email
client connects to
server (TCP 5222)
(or connect via HTTP
  binding over SSL)
client MUST
authenticate
originally: plaintext (!) or
    hashed password
Simple Authentication &
 Security Layer (SASL)
RFC 4422
many SASL mechanisms
PLAIN (OK over
encrypted connection)
DIGEST-MD5
EXTERNAL (with
  X.509 certs)
GSSAPI
(a.k.a. Kerberos)
ANONYMOUS
etc.
all users are
authenticated
sender addresses not
  merely asserted
server stamps
user ‘from’ address
Jabber IDs are
logical addresses
IP addresses
not exposed
Jabber ID looks like
  an email address
romeo@montague.net
juliet@capulet.com
not limited to
US-ASCII characters
jiři@čechy.cz
πλατω@ἑλλας.gr
มฌำปจ@jabber.th
@jabber.jp
∞@math.it
full Unicode opens
  phishing attacks
STPETER@jabber.org
ᏚᎢᎵᎬᎢᎬᏒ@jabber.org
clients should use
    “petnames”
store in buddy list [tm]
    (a.k.a. “roster”)
server stores
 your roster
server broadcasts
  your presence
but only to subscribers
 you have authorized
most traffic goes
through server
traffic is pure XML
servers reject
malformed XML
servers may validate
traffic against schemas
difficult to inject
 binary objects
difficult to propagate
      malware
break alliance between
   viruses and spam
spam virtually unknown
  on Jabber network
why?
hard to spoof
  addresses
hard to send
inline binary
XHTML subset
(no scripts etc.)
user approval required
   for file transfer
privacy lists to block
  unwanted users
XMPP not immune
   to spam
have spam-fighting tools
 ready when it appears
challenge-response to
 register an account
challenge-response to
     communicate
spam reporting
working on more
 anti-spam tools
server reputation
     system?
anonymized IP address?
   (groupchat spam)
spammers need to
   overcome...
bandwidth limits
connection limits
other denial-of-service
 prevention measures
distributed attack or
 run a rogue server
not impossible
just harder than other
networks (got email?)
no rogue servers
      (yet)
optional to federate
with other servers
many private
XMPP servers
public servers federate
as needed (TCP 5269)
DNS lookup to get
 server IP address
only one hop
between servers
server identities
  are validated
server dialback
(identity verification)
effectively prevents
  server spoofing
receiving server checks
    sending domain
no messages from
“service@paypal.com”
DNS poisoning
can invalidate
need something
   stronger?
Transport Layer
 Security (TLS)
RFC 4346
IETF “upgrade” to SSL
TLS + SASL EXTERNAL
   with X.509 certs
strong authentication
   of other servers
but only if certs are
  not self-signed
$$$
real X.509 certs
 are expensive
VeriSign, Thawte, etc.
a better way...
xmpp.net
intermediate CA for
   XMPP network
free digital certificates
for XMPP server admins
(need to prove you
 own the domain)
root CA: StartCom
ICA: XMPP Standards
     Foundation
hopefully other CAs
     in future
so channel encryption
    is a no-brainer
man-in-the-middle
 is much harder
“Mallory” is foiled
but what about
“Isaac” and “Justin”?
we can encrypt
 the channels
but traffic is cleartext
   within servers!
need end-to-end
encryption (“e2e”)
first try: OpenPGP
   (XEP-0027)
great for geeks
but Aunt Tillie
doesn’t use PGP
second try: S/MIME
   (RFC 3923)
great for geeks (and
 some employees)
but Aunt Tillie
doesn’t use X.509
XML encryption and
 digital signatures?
seems natural, but not
much interest (c14n?)
doesn’t provide perfect
   forward secrecy
off-the-record
communication (OTR)?
great idea
opportunistic
encryption (à la SSH)
perfect forward secrecy
but encrypts only the
plaintext message body
we need to encrypt
 the entire packet
why?
because XMPP is more
     than just IM
protect IPs sent in
multimedia negotiation
protect shared XML
    editing data
etc.
solution: encrypted
      sessions
big set of
requirements...
packets are confidential
packet integrity
replay protection
key compromise does
not reveal past comms
don’t depend on public
  key infrastructure
entities authenticated
    to each other
3rd parties cannot
 identify entities
robustness against
attack (multiple hurdles)
upgradeability if bugs
   are discovered
encryption of full
 XMPP packets
implementable by
 typical developer
usable by
typical user
how to address all
  requirements?
just a dream?
bootstrap from
cleartext to encryption
in-band Diffie-Hellman
     key exchange
translate “SIGMA”
approach to XMPP
similar to Internet Key
    Exchange (IKE)
details in XSF XEPs
   116, 188, 200
simplified profile
  in XEP-0217
major priority for
   2007-2008
support from NLnet
     (thanks!)
pursuing full
security analysis
code bounties
GSoC project
Jabber security summit
more at
blog.xmpp.org
wide implementation
in next ~12 months
so how are we doing?
spam free
hard to spoof addresses
pure XML discourages
   binary malware
DoS attacks possible
   but not easy
widespread channel
    encryption
working hard on
end-to-end encryption
widely deployed in high-
 security environments
Wall Street
investment banks
U.S. military
MIT and other
 universities
many public servers
   since 1999
no major security
    breaches
can’t be complacent
always more to do
security is a never-
  ending process
analysis and hacking
  are encouraged
if it breaks,
 we’ll fix it
security@xmpp.org
join the conversation
let’s build
a more secure Internet

More Related Content

What's hot

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashAnkit Mehta
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2Olle E Johansson
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemAvishek Datta
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 

What's hot (12)

Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
 
NTLM
NTLMNTLM
NTLM
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
Core java day1
Core java day1Core java day1
Core java day1
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Day5
Day5Day5
Day5
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key CryptosystemSecure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Pkcs 5
Pkcs 5Pkcs 5
Pkcs 5
 
3.Network
3.Network3.Network
3.Network
 
Pgp
PgpPgp
Pgp
 

Similar to Secure Communications with Jabber

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10dianacheng
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmppPrem Narain
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.pptUskuMusku1
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoLuis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 

Similar to Secure Communications with Jabber (20)

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Cours4.pptx
Cours4.pptxCours4.pptx
Cours4.pptx
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmpp
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 

More from stpeter

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and Youstpeter
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Updatestpeter
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internetstpeter
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overviewstpeter
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprisestpeter
 
Jabber 101
Jabber 101Jabber 101
Jabber 101stpeter
 

More from stpeter (7)

Jabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and YouJabber, the Real-Time Internet, and You
Jabber, the Real-Time Internet, and You
 
XMPP Standards Update
XMPP Standards UpdateXMPP Standards Update
XMPP Standards Update
 
Presence and the Real-Time Internet
Presence and the Real-Time InternetPresence and the Real-Time Internet
Presence and the Real-Time Internet
 
Jingle
JingleJingle
Jingle
 
Jingle Technology Overview
Jingle Technology OverviewJingle Technology Overview
Jingle Technology Overview
 
The Real-Time Enterprise
The Real-Time EnterpriseThe Real-Time Enterprise
The Real-Time Enterprise
 
Jabber 101
Jabber 101Jabber 101
Jabber 101
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Secure Communications with Jabber