SlideShare una empresa de Scribd logo
1 de 37
E-voting
Bozhidar Bozhanov
Vanity slide
• Still a developer
• http://blog.bozho.net
• http://techblog.bozho.net
• http://twitter.com/bozhobg
• E-government adviser to the deputy prime
minister of Bulgaria
E-voting
• e-voting / i-voting / machine voting / remote
e-voting
• a.k.a. “let’s vote from home”
• sounds tempting
• ...and risky
Complicated task
• uncontrolled environment
• single vote AND vote secrecy
• coercion prevention
• verifiability
• independent observers
• results should not be replaceable
• defence against attacks and viruses
Before technology
A fundamental question:
• Is it required that every voter understands
the whole voting process?
• Does every voter understand fully the
current process?
Identification
• necessary precondition
• e-id (“chip in the ID card”)
• other practices
• preliminary registration
• scratch-cards
• TAN
Who would develop it?
• companies with e-voting expertise
• Cybernetica AS (Estonia)
• Scytle (Switzerland, France, Norway)
• ...
• it’s “how” that’s important
How
• open source from day 1
• peer-reviewed
• audited
• with pilots
• in-person at first
• 7 days before paper election day
Wait, wait...
There are unanswered questions.
There are problems to be solved.
There is a lot of noise...
Invalid arguments “for”
• if e-banking works, then e-voting should
also work
• breaches and fraud
• different task
• if anyone can hack voting, why doesn’t he
hack banks instead?
• why not both?
Invalid arguments “for”
• “what can happen”
• everything
• we have many good software specialists
• the task is complicated and niche
• it will solve the problems of our democracy
• no, it won’t (bit it can help)
Invalid arguments “against”
• someone will buy your IP
• it’s a devil’s creation
• it must be 100% secure
• paper voting is not 100% secure
• someone can change something
• there is no guarnatee for ballot secrecy
• there is no guarantee for one voter-one vote
Invalid arguments “against”
• “It’s not being used in big countries”
• “Germany banned it”
• “The Estonian system doesn’t work”
• mainly OpSec problems
• client malware
• Press-conference a week prior to the elections
saying “it doesn’t work”?
• “It will be developed by incompetent people”
Questions
• vote secrecy and one voter = one vote
• verifiability of the validity of the result
• access for observers
• coercion prevention
• usability
Vote secrecy
• double-envelope method
• identity is separated from the vote before counting
• votes are encrypted with the public key of the
counting server
• anonymized votes are sent to the counting server
on a CD
• the private key is activated by multiple owners
Vote secrect
• blind signature
• e.g. carbon paper envelope with your name used
for blind stamping
• confirms the vote without knowledge of it
• requires trust in the client software
Vote secrecy
• Mixnets
• layers of decryption
• receiver doesn’t know who the sender is
• Tor-like
Revoting
• е-voting before the paper voting
• manual removal of the e-vote
• automatically guarantees 1 man = 1 vote
• with double envelope
• the unanonymized (encrypted) ballot is replaced
• with blind signature and mixnet
• using a receipt code?
Verifiability
• E2E verifiable
• “stored as cast”, “counted as stored”
• receipt, incl. a mobile phone
• checking the vote for a limited period of time (risks
the secrecy)
• checking if receipt codes are matching
Validity of the result
• individual checks
• independent counting
• public bulletin board
• public ledger (blockchain, votecoin?)
• push to registered observers?
Observers
• monitoring public logs (or blockchain
transactions)
• on-site in the server room
• live streaming
Coercion prevention
• panic/tamper PIN
• PIN written backwards :)
• hard to implement
• webcam with face recognition
• partial guarantee that nobody else is in front of the
monitor
• cooldown period
• against multiple voting from a single machine
Usability
• if paper voting is removed from polling
stations as well
• touch-screen is very intuitive
• everyone can use it, even uneducated voters
• UX-tests
Problems
• client-side malware
• DDoS attacks
• network attacks (dropping packets)
• remote penetration attacks
• OpSec
• insider attacks
• 0-day vulnerabilities
Client-side malware
• desktop client vs browser
• vote changing, not sending votes,
compromising secrecy before encryption
• solutions:
• 2 factor (sms, app)
• biometric confirmation
• card reader with hardware keypad and display
• voting from a virtualized environment
DDoS attacks
DDoS attacks
• DDoS prevention:
• preparedness and adequate procedures
• tier 1 providers, telecoms
• blocking of command & control servers
• scrubbing centers
• cutting external traffic
Network attacks
• packet analysis => dropping the vote
• solutions:
• retry
• detectable (no receipt/confirmation sent)
• Tor / mixnets
• paper voting if e-voting doesn’t work for you
OpSec
• operational security
• passwords
• DMZ
• HSM
• intrusion detection, netflow anaylsis
• audit trail
• main criticism against Estonia
• verifiability of results exposes intrusions
Insider attacks
• OpSec, audit trail
• verifiable using “virtual paper trail” (e.g.
blockchain)
• Security agencies should catch it 
0-day vulnerabilities
• ...well, crap
• general procedures for cancelling or postponing
elections
• if intrusions are detectable => patch
General procedures
• annulling online results
• notification of online voters
• postponing the eleciton
(not as hard and expensive as they are in
paper voting)
Paper voting?
• some of the problems above are valid for
paper voting as well
• results of paper voting are ultimately
aggregated on a computer
• with checks and paper trail
• …but what if it doesn’t match?
We must be paranoid
• everything can go wrong
• viruses are real
• state-level attacks are real
• manipulation attempts are real
• “it just works” doesn’t work
• “election security is national security”
The way forward?
• not all problems are addressed 100%
• there is no 100% secure solution
• we are looking for a solution that doesn’t
allow large-scale manipulations
• looks like such a solution is possible
• need for more R&D
• dynamic/direct democracy
• we are obligated to do it, sooner or later
Sources
https://eprint.iacr.org/2015/809.pdf
https://www.usvotefoundation.org/sites/default/files/E2EVIV_full_report.pdf
http://static.usenix.org/legacy/events/evtwote11/tech/slides/haenni.pdf
http://www.e-voting.cc/wp-content/uploads/Proceedings%202010/8.1.Spycher_2010.pdf
http://www.chaum.com/publications/Remotegrity-Design-and-Use-of-an-End-to-End-Verifiable-Remote-Voting-System.pdf
http://www.scytl.com/wp-content/uploads/2014/11/IDC-report_Implementing-End-to-End-Verifiable-Online-Voting_Enabling-Secure-Transparent-and-Tamper-Proof-Elections.pdf
https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_SECUSO/Papers/GI_Workshop_2014.pdf
http://download.springer.com/static/pdf/730/chp%253A10.1007%252F3-540-45961-8_15.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Fchapter%2F10.1007%2F3-540-
45961-8_15&token2=exp=1446764746~acl=%2Fstatic%2Fpdf%2F730%2Fchp%25253A10.1007%25252F3-540-45961-
8_15.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Fchapter%252F10.1007%252F3-540-45961-
8_15*~hmac=a7540fc29317746377a541091e07619a274e2048dbbfeb46f2abf76a58bf9918
https://vote.heliosvoting.org/
http://e-collection.library.ethz.ch/eserv/eth:3046/eth-3046-01.pdf
http://followmyvote.com
http://www.scytl.com/wp-content/uploads/2014/11/IDC-report_Implementing-End-to-End-Verifiable-Online-Voting_Enabling-Secure-Transparent-and-Tamper-Proof-Elections.pdf
http://www.bitcongress.org
https://bitcoinmagazine.com/21031/blockchain-technology-key-secure-online-voting/
https://people.csail.mit.edu/rivest/voting/papers/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.pdf
http://arxiv.org/abs/1401.4151
https://www.regjeringen.no/globalassets/upload/krd/kampanjer/valgportal/valgobservatorer/2013/rapport_cartersenteret2013.pdf
http://techblog.bozho.net/why-all-the-fear-in-electronic-voting/
Thank you

Más contenido relacionado

La actualidad más candente

E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
tangytangling
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
Shubham Jadhav
 

La actualidad más candente (20)

Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
E voting app
E voting appE voting app
E voting app
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
An Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAn Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification Techniques
 
Votechain
VotechainVotechain
Votechain
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
Features of blockchain voting
Features of blockchain votingFeatures of blockchain voting
Features of blockchain voting
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
Online e voting
Online e votingOnline e voting
Online e voting
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint technique
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger Print
 
Town of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowTown of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method Slideshow
 

Destacado

PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
Nandasaba Wilson
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
The federation of lazy jobless people (FLJP)
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 

Destacado (20)

E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
E voting
E voting E voting
E voting
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
 
Common Sense Driven Development
Common Sense Driven DevelopmentCommon Sense Driven Development
Common Sense Driven Development
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...
 
Bio Metric-E-Voting
Bio Metric-E-VotingBio Metric-E-Voting
Bio Metric-E-Voting
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
 
A comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingA comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed voting
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
 

Similar a E-voting

Forensics intro
Forensics introForensics intro
Forensics intro
test tt
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
Nicholas Davis
 
TEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan AlecuTEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan Alecu
Alina Moisoiu
 

Similar a E-voting (20)

Polys | Online voting system
Polys | Online voting systemPolys | Online voting system
Polys | Online voting system
 
Forensics intro
Forensics introForensics intro
Forensics intro
 
igloovote
igloovoteigloovote
igloovote
 
Codebits 2011
Codebits 2011Codebits 2011
Codebits 2011
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Internet security
Internet securityInternet security
Internet security
 
Christian bull eVoting
Christian bull eVoting Christian bull eVoting
Christian bull eVoting
 
How you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 yearsHow you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 years
 
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
TEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan AlecuTEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan Alecu
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 

Más de Bozhidar Bozhanov

Más de Bozhidar Bozhanov (20)

Антикорупционен софтуер
Антикорупционен софтуерАнтикорупционен софтуер
Антикорупционен софтуер
 
Nothing is secure.pdf
Nothing is secure.pdfNothing is secure.pdf
Nothing is secure.pdf
 
Elasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and MultitenancyElasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and Multitenancy
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
Blockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabiltyBlockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabilty
 
Електронна държава
Електронна държаваЕлектронна държава
Електронна държава
 
Blockchain - what is it good for?
Blockchain - what is it good for?Blockchain - what is it good for?
Blockchain - what is it good for?
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Scaling horizontally on AWS
Scaling horizontally on AWSScaling horizontally on AWS
Scaling horizontally on AWS
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Политики, основани на данни
Политики, основани на данниПолитики, основани на данни
Политики, основани на данни
 
Отворено законодателство
Отворено законодателствоОтворено законодателство
Отворено законодателство
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
 
Сигурност на електронното управление
Сигурност на електронното управлениеСигурност на електронното управление
Сигурност на електронното управление
 
Opensource government
Opensource governmentOpensource government
Opensource government
 
Биометрична идентификация
Биометрична идентификацияБиометрична идентификация
Биометрична идентификация
 
Регулации и технологии
Регулации и технологииРегулации и технологии
Регулации и технологии
 
Regulations and technology
Regulations and technologyRegulations and technology
Regulations and technology
 
Архитектура на електронното управление
Архитектура на електронното управлениеАрхитектура на електронното управление
Архитектура на електронното управление
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

E-voting