SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
Client-side password
Encryption

Pedro Fortuny & Carlos Amieva
(& Rafael Casado “in absentia”)
Client-side password
Encryption

No worries, James, let the sysadmin deal with the problem.
Client-side password
Encryption
Honestly:
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?

I mean
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?

really?
Client-side password
Encryption

I said really
Client-side password
Encryption
We need
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
One step
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
One step
Protecting passwords from local access /
MITM
Client-side password
Encryption

The Sibyl v2.0
Client-side password
Encryption
State of affairs 2013 - blind trust

Client
Server
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

Server
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

Server

no

ol
fo
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
[pregnant silence]
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
[pregnant silence]

[pid 9] crypt(“patata”,“$7$21212104040SaLt.$”)
Client-side password
Encryption

?

Do you
really
think
hackers
do NOT
use
strace
Client-side password
Encryption

BUT
Your sysadmin is
good
(tm)

[assumming you have not been rooted]
Client-side password
Encryption

BUT
Your sysadmin is
good
(tm)

[assumming you have not been rooted]

Trust in me...
Client-side password
Encryption

Can do better
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Server
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Store “RSA(scrypt(pwd))”
on the server

Server
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Store “RSA(scrypt(pwd))”
on the server

Server

RSA channel
Sibyl

Use a hardware
module to authenticate
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

Server

Sibyl
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

msg=PUBi(hash)
Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side
msg=PUBi(hash)

- but “
trust

in me.

..”

only stores
PUB0(hash)

Server
Priv(PUB0(hash))
==
Login?
Priv(PUBi(hash))
Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L

- but “
trust

Client
[Pub key]
hash=scrypt(pwd) is run
on the client side
msg=PUBi(hash)

in me.

..”

only stores
PUB0(hash)

Server
Priv(PUB0(hash))
==
Login?
Priv(PUBi(hash))

Only the Sibly can answer this

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption

There is no encryption
performed
on the server
Client-side password
Encryption

The Sibyl can be
completely dumb
[not yet implemented]
no access to the priv. key
Client-side password
Encryption

The sysadmin has no
way to MITM or whatever
Trustless pwd management
Client-side password
Encryption
Isn’t it better to trust
people, Charlie Brown?
Client-side password
Encryption
Isn’t it better to trust
people, Charlie Brown?

No, Lucy, no...
Client-side password
Encryption

Details
[...]
skip if necessary
Client-side password
Encryption
client

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)
[V1,V2]

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]
decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no
grant/deny

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no
grant/deny

much gorier
(already
done)

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption

Thank you

??

And don’t forget to
have a nice meal

Más contenido relacionado

Similar a Client-side Password Encryption with Sibyl Hardware Module

SQL Server Security And Encryption
SQL Server Security And EncryptionSQL Server Security And Encryption
SQL Server Security And EncryptionHamid J. Fard
 
ExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityAlexander Benoit
 
Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Abhishek Kumar
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With RailsTony Amoyal
 
Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5bilcorry
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
 
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)JonathanGMCraymer
 
What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?pqrs1234
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In LinuxAhmed Mekkawy
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Alan Quayle
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitAmazon Web Services
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionMatt Dawdy
 
In headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustIn headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustpipasnacave
 
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftIntro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftAmazon Web Services
 

Similar a Client-side Password Encryption with Sibyl Hardware Module (20)

SQL Server Security And Encryption
SQL Server Security And EncryptionSQL Server Security And Encryption
SQL Server Security And Encryption
 
ExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint Security
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
 
Breaking ssl
Breaking sslBreaking ssl
Breaking ssl
 
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
 
What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 
In headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustIn headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trust
 
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftIntro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Client-side Password Encryption with Sibyl Hardware Module