SlideShare a Scribd company logo
1 of 11
Passing Sensitive Data Through the Public Domain
Steve Cornish
steve@blazingpath.com | @stevesquirrol | linkedin.com/in/stevecornish
4th May 2016
About me
By day…
• Contracting Digital / Integration
Architect
• Currently @ Vodafone
By night…
• CTO of Squirrol – a Social Network
for Collectors
• Cool tech
• Pre-funding stage
• Site is live: https://squirrol.com
Why protect data?
Public domain => Internet => untrusted network
• Is the integrity of the data important?
• Is the privacy of the data important?
Data Integrity / Authentication
HMAC functions can be used to verify a message…
a) Comes from the expected source
b) Has not been tampered with in flight
With HMAC, both the source and target generate a token (the MAC)
from the message using a shared key which is compared to establish
integrity.
HMAC
…
Message
…
Generate MAC
from message
Generate MAC
from message
MAC 1
Shared Secret
Shared Secret
Source
Target
MAC 2 Compare
MACs
Data Privacy
• Symmetric and Asymmetric cryptography can be used to secure
data in flight
• Symmetric encryption (e.g. AES):
• The same key is used to encrypt the data and to decrypt the cipher
• Asymmetric encryption (”Public Key Cryptography” / PKI):
• Consists of a public/private key pair
• The data is encrypted using the public key, and decrypted using the private
key
Symmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
Shared Key
Shared Key
Source
Target
Asymmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
(Target) Public Key
(Target) Private Key
Source
Target
Summary
• Data Integrity and Data Privacy are two concerns of Data Security
• Data Integrity can be assured using HMACs
• Data Privacy can be enforced using cryptography
Data Security is a big subject – we’ve only scratched the surface
Thank you… Questions?
Appendix
Performance
• HMAC-SHA256
• 1m MACs in 4.76s
• AES-128
• 1m encrypts in 2.54s
• 1m decrypts in 2.13s
(Run on a 5 year old Dell Latitude E6410 with Core i5, 4GB RAM, Win 7 32-Bit…)

More Related Content

Viewers also liked

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Digital Henley
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Digital Henley
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Digital Henley
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDigital Henley
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Digital Henley
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Digital Henley
 

Viewers also liked (8)

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"
 
social media
social media social media
social media
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
 
social media
social mediasocial media
social media
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudTrent Adams
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionRobert Parker
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain" (20)

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
final ppt TS.pptx
final ppt TS.pptxfinal ppt TS.pptx
final ppt TS.pptx
 
week 12
week 12week 12
week 12
 
s117
s117s117
s117
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Sw2
Sw2Sw2
Sw2
 

More from Digital Henley

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Digital Henley
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Digital Henley
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Digital Henley
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Digital Henley
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Digital Henley
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Digital Henley
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"Digital Henley
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Digital Henley
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Digital Henley
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Digital Henley
 

More from Digital Henley (10)

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Editor's Notes

  1. What do I mean by public domain? The internet - any network you don't have control over 2 key questions if you are passing data through untrusted networks Integrity Is it critical that the data could not have been altered? Is it critical that the recipient can trust the source of the data? Privacy Does the data contain any sensitive information
  2. HMAC = Hash-based Message Authentication Code
  3. Subject message: The quick brown fox jumps over the lazy dog