SlideShare a Scribd company logo
1 of 11
Passing Sensitive Data Through the Public Domain
Steve Cornish
steve@blazingpath.com | @stevesquirrol | linkedin.com/in/stevecornish
4th May 2016
About me
By day…
• Contracting Digital / Integration
Architect
• Currently @ Vodafone
By night…
• CTO of Squirrol – a Social Network
for Collectors
• Cool tech
• Pre-funding stage
• Site is live: https://squirrol.com
Why protect data?
Public domain => Internet => untrusted network
• Is the integrity of the data important?
• Is the privacy of the data important?
Data Integrity / Authentication
HMAC functions can be used to verify a message…
a) Comes from the expected source
b) Has not been tampered with in flight
With HMAC, both the source and target generate a token (the MAC)
from the message using a shared key which is compared to establish
integrity.
HMAC
…
Message
…
Generate MAC
from message
Generate MAC
from message
MAC 1
Shared Secret
Shared Secret
Source
Target
MAC 2 Compare
MACs
Data Privacy
• Symmetric and Asymmetric cryptography can be used to secure
data in flight
• Symmetric encryption (e.g. AES):
• The same key is used to encrypt the data and to decrypt the cipher
• Asymmetric encryption (”Public Key Cryptography” / PKI):
• Consists of a public/private key pair
• The data is encrypted using the public key, and decrypted using the private
key
Symmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
Shared Key
Shared Key
Source
Target
Asymmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
(Target) Public Key
(Target) Private Key
Source
Target
Summary
• Data Integrity and Data Privacy are two concerns of Data Security
• Data Integrity can be assured using HMACs
• Data Privacy can be enforced using cryptography
Data Security is a big subject – we’ve only scratched the surface
Thank you… Questions?
Appendix
Performance
• HMAC-SHA256
• 1m MACs in 4.76s
• AES-128
• 1m encrypts in 2.54s
• 1m decrypts in 2.13s
(Run on a 5 year old Dell Latitude E6410 with Core i5, 4GB RAM, Win 7 32-Bit…)

More Related Content

Viewers also liked

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Digital Henley
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Digital Henley
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Digital Henley
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDigital Henley
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Digital Henley
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Digital Henley
 

Viewers also liked (8)

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"
 
social media
social media social media
social media
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
 
social media
social mediasocial media
social media
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudTrent Adams
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionRobert Parker
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain" (20)

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
final ppt TS.pptx
final ppt TS.pptxfinal ppt TS.pptx
final ppt TS.pptx
 
week 12
week 12week 12
week 12
 
s117
s117s117
s117
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Sw2
Sw2Sw2
Sw2
 

More from Digital Henley

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Digital Henley
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Digital Henley
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Digital Henley
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Digital Henley
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Digital Henley
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Digital Henley
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"Digital Henley
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Digital Henley
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Digital Henley
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Digital Henley
 

More from Digital Henley (10)

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Editor's Notes

  1. What do I mean by public domain? The internet - any network you don't have control over 2 key questions if you are passing data through untrusted networks Integrity Is it critical that the data could not have been altered? Is it critical that the recipient can trust the source of the data? Privacy Does the data contain any sensitive information
  2. HMAC = Hash-based Message Authentication Code
  3. Subject message: The quick brown fox jumps over the lazy dog