SlideShare uma empresa Scribd logo
1 de 102
Baixar para ler offline
The (Io)Things you
don’t even need to
hack.
Should we worry?
Sławomir Jasek
Confidence, 26.05.2015
Pentester / security consultant.
Assessments and consultancy
regarding security of various
applications - web, mobile,
embedded, ...
Since 2003 / over 400 systems and
applications
Sławomir Jasek
What is IoT?
Things you don’t even need to hack:
IP cameras
Industrial equipment
Bluetooth low energy devices
Smart meters
Should we worry? How can we help?
Agenda
INTERNET OF
THINGS
Another buzzword (?).
Several definitions and a bit of confusion.
Just like a few years back „cloud”, „big data” or
„mobile”.
Let's simplify: network-connected devices with
embedded processing power.
Add the mobile, cloud and big data, of course ;)
What is „Internet of Things”?
IoT - Variety
h"p://www.talk2thefuture.com/internet-of-things-english/
IoT - Variety
h"p://www.beechamresearch.com
IoT - Variety
h"p://postscapes.com/what-exactly-is-the-internet-of-things-infographic
IoT – prevalence prediction
h"p://www.audiotech.com/trends-magazine/internet-things-begins-take-shape/
CASE #1: IP
CAMERAS
The best-priced IP camera with
PoE and ONVIF
Management standard (was
supposed to) assure painless
integration of the video in my
installation.
Camera
WWW interface
WWW interface
That has to be false positive, right?
PORT						STATE	SERVICE				VERSION	
23/tcp				open		telnet					Busybox	telnetd	
80/tcp				open		tcpwrapped	
554/tcp			open		rtsp?	
8899/tcp		open		soap							gSOAP	soap	2.7	
9527/tcp		open		unknown	
34561/tcp	open		unknown	
34567/tcp	open		unknown	
34599/tcp	open		unknown	
Services
Debug Service
John the Ripper?
Online hash crack?
md5crypt(?) = $1$RYIwEiRA$d5iRR(...) anyone?
#	binwalk	firmware.img		
DECIMAL			HEX				DESCRIPTION		
------------------------------------------------------------------		
0								0x0				uImage	header,	header	size:	64	bytes,	header	CRC:	
0x4F9FDADF,	created:	Thu	Apr	17	10:22:14	2014,	image	size:	3428352	
bytes,	Data	Address:	0x80000,	Entry	Point:	0x580000,	data	CRC:	
0xD5BE4969,	OS:	Linux,	CPU:	ARM,	image	type:	OS	Kernel	Image,	
compression	type:	gzip,	image	name:	"linux"		
64							0x40		CramFS	filesystem,	little	endian	size	3428352	
version	#2	sorted_dirs	CRC	0x9bbb241e,	edition	0,	1159	blocks,	175	
files			
		
Alt: firmware rev
#	mount	-o	loop,offset=64	firmware.img	/mnt/loop	
#	ls	-l	/mnt/loop	
drwxrwxr-x	2		543			31	4096	Jan		1		1970	bin		
drwxrwxr-x	2		543			31	4096	Jan		1		1970	boot		
drwxrwxr-x	2		543			31	4096	Jan		1		1970	dev		
drwxrwxr-x	5		543			31	4096	Jan		1		1970	etc		
drwxrwxr-x	2		543			31	4096	Jan		1		1970	home		
drwxrwxr-x	2		543			31	4096	Jan		1		1970	lib		
	(...)	
Alt: firmware rev
#	tcpdump	host	camera.local	
18:48:41.290938	IP	camera.local.49030	>	
ec2-54-72-86-70.eu-
west-1.compute.amazonaws.com.8000:	UDP,	
length	25	
What the?
„Cloud service” – HRLP
„Cloud service” – we clome
„Cloud service”
„Cloud service” FAQ
The same most probably applies to your
smart TV, home installations, refrigerators,
microwaves, babysitters, keylocks,
toothbrushes, internet-connected sex
toys...
PWN-ing these kind of devices does not
involve „hacking” and does not impress.
This is boring, obvious and well-known for
years. Aka „junk hacking”.
Also frequently used to spread FUD by
some antivirus companies.
„Junk hacking”
h"p://seclists.org/dailydave/2014/q3/52
THE DEVICE SUPPLY
CHAIN
AKA does anybody care?
Device supply chain
Board	Support	Package	-	drivers,	bootloader,	kernel-level	SDK	
Broadcom,	Texas	Instruments,	Intel,	WindRiver...	
Original	Device	Manufacturer	–	web	interface,	SDK,	cloud...	
usually	unknown	from	China,	Taiwan	etc.	
Original	Equipment	Manufacturer	–		composing,	branding	ODMs	
+	support,	license,	warranty...	
Value	Added	Reseller	/	Distributor	
End	user
Device supply chain
Board	Support	Package	-	drivers,	bootloader,	kernel-level	SDK	
Broadcom,	Texas	Instruments,	Intel,	WindRiver...	
Original	Device	Manufacturer	–	web	interface,	SDK,	cloud...	
usually	unknown	from	China,	Taiwan	etc.	
Original	Equipment	Manufacturer	–		composing,	branding	ODMs	
+	support,	license,	warranty...	
Value	Added	Reseller	/	Distributor	
End	user	
Features!	Price!	
Features!	Price!	
Features!	Price!	
Features!	Price!
Device supply chain
Board	Support	Package	-	drivers,	bootloader,	kernel-level	SDK	
Broadcom,	Texas	Instruments,	Intel,	WindRiver...	
Original	Device	Manufacturer	–	web	interface,	SDK,	cloud...	
usually	unknown	from	China,	Taiwan	etc.	
Original	Equipment	Manufacturer	–		composing,	branding	ODMs	
+	support,	license,	warranty...	
Value	Added	Reseller	/	Distributor	
End	user	
Security?	
?	
?	
?
BUT SHOULD WE
WORRY?
That depends on the device and usage scenario.
For most - you are supposed to be aware and treat the
devices accordingly:
•  just don’t connect this type of hardware directly to
the Internet via public IP.
•  and monitor the outgoing traffic, too.
But should we care about the others?
Should we worry?
There’s cameras like Hel!
On the way from pub to appartment...
Self-powered and lens-less cameras for IoT
h"p://www.cs.columbia.edu/CAVE/projects/
self_powered_camera/	
Image sensors that can not only
capture images, but also generate
the power needed to do so.
h"p://www.rambus.com/documentaaon/emerging-
soluaons/lensless-smart-sensors	
Replace the lenses with ultra-miniaturized diffractive
sensor, extract the image with computation:
extremely small, low-cost „camera”
Publicly available IP cameras
Publicly available IP cameras
Publicly available IP cameras
Publicly available IP cameras
Publicly available IP cameras
Publicly available IP cameras
Publicly available IP cameras
Indexed „public” cameras (rough IP-based
geolocation)
+
exact location (crowdsource?)
+
Cloud, Big Data (face recognition?)
=
PROBLEM?
And what if someone connects the dots?
h"ps://www.flickr.com/photos/opensourceway
INDUSTRIAL
INSECURITY
Thousands of interfaces publicly available.
Trivial to discover, already scanned & catalogued
likewise cameras.
Modbus-TCP, Serial-TCP, default passwords or
password-less web management interfaces...
I won’t reveal the links here ;)
Industrial insecurity
Industrial insecurity – public interfaces
Industrial insecurity – public interfaces
Industrial insecurity – public interfaces
Read RFIDs mounted in privileged trucks to
automatically open the gate.
Industrial RFID reader
PORT						STATE	SERVICE				VERSION	
23/tcp				open		telnet					Busybox	telnetd	
4007/tcp		open		pxc-splr?	
4684/tcp		open		unknown	
10001/tcp	open		tcpwrapped	
Service	Info:	Host:	UHF-RFID-Dev	
Industrial RFID reader – port scan
No need to hack - just RTFM
Command-line „client”
$	echo	-e	"xAAxBBx01x01x11x01xAAxCC"	|	nc	<IP>	4007	|	
hexdump		
0000000	bbaa	0101	8111	aa00	aacc	07bb	aa00	aacc		
0000010	07bb	aa00	aacc	07bb	aa00	aacc	07bb	aa00		
0000020	aacc	07bb	aa00	aacc	07bb	aa00	aacc	07bb		
0000030	aa00	aacc	07bb	aa00	aacc	07bb	aa00	aacc		
(...)	
0000350	aacc	07bb	aa00	aacc	07bb	aa00	aacc	07bb		
0000360	aa00	aacc	07bb	aa00	aacc	07bb	aa00	aacc		
0000370	07bb	aa00	aacc	01bb	1101	ffc1	0103	0247		
0000380	1353	ed6b	ccaa	bbaa	0007	ccaa	bbaa	0101		
0000390	c111	0300	0001	5302	6b13	05ed	aa00	aacc		
(...)	
...and now we can clone the tag
The incoming vehicles are also traditionally verified by
security staff.
The device is available in restricted LAN only.
The tag can also be scanned from the truck itself.
BUT: you have to be aware of the technology
shortcomings and not to alter the above conditions!
Should we worry?
BLUETOOTH SMART
- AKA Bluetooth Low Energy, BLE, Bluetooth
4
Bluetooth Smart != Bluetooth 3
Completely different stack –
from RF to upper layers.
Designed from the ground-up
for low energy usage.
Network topology
a) Broadcaster + Observer
b) Master + Peripheral
Broadcast - beacon
h"ps://www.flickr.com/photos/jnxyz/13570855743	
	
UUID (vendor)
2F234454-CF6D-4A0F-
ADF2-F4911BA9FFA6	
Major (group)
45044	
Minor (individual)
5	
	
Tx Power
-59	
The mobile app can measure precise
distance to specified beacon.
Beacons – emulation #1: LightBlue
h"ps://itunes.apple.com/us/app/lightblue-bluetooth-low-energy/id557428110	
Available	for	iPhone,	iPad,	Mac
#	hcitool	cmd	0x08	0x0008	1E	02	01	1A	1A	FF	4C	00	02	
15	84	2A	F9	C4	08	F5	11	E3	92	82	F2	3C	91	AE	C0	5E	FD	
E8	AF	C8	C5	00	
	
Beacons – emulation #2: Bluez
#	hcitool	cmd	0x08	0x0008	1E	02	01	1A	1A	FF	4C	00	02	
15	84	2A	F9	C4	08	F5	11	E3	92	82	F2	3C	91	AE	C0	5E	FD	
E8	AF	C8	C5	00	
	
	
Beacons – emulation #2: Bluez
#	hcitool	cmd	0x08	0x0008	1E	02	01	1A	1A	FF	4C	00	02	
15	84	2A	F9	C4	08	F5	11	E3	92	82	F2	3C	91	AE	C0	5E	FD	
E8	AF	C8	C5	00	
	
iBeacon data broadcast
iBeacon	prefix	(constant)	
UUID:	
842AF9C4-08F51-1E39-282F-23C91AE
C05E	
Major:		
FD	E8	=	65	000	
Minor:	
AF	C8	=	45	000	
TX	power
Additional info on products based on precise location.
Rewards for visiting places.
Indoor guide, help to navigate the blind etc.
Your home or toys can automatically react to you.
Be warned that your bike or car is no longer in the
garage.
Beacons – some example usage scenarios
Beacons – additional info based on location
Abuse?
Beacons – the navigating usage scenario
Abuse?
OTHER BLE
DEVICESBeacons are just the beginning...
1.  Buy SDK+devices from selected vendor (Nordic,
TI...)
2.  Import ready-to-use sample code.
3.  Add your bright usage scenario (and sometimes a
bit of hacking).
4.  Create convincing bootstrap webpage + videos.
5.  Run successful Kickstarter campaign.
6.  Profit!
How to make your own BLE device?
Electric plugs, lightbulbs, locks, kettles,
sensors, wallets, socks, pans, jars,
toothbrushes, bags, plates, dildos,
sitting pads, measuring your farts
devices, calorie-counting mugs...
„It was just a dumb thing. Then we put
a chip in it. Now it's a smart
thing.” (weputachipinit.tumblr.com)
Crowdfunding: a new kind of celebrity.
Too often ridiculous meets big money.
Beacons are just the beginning...
www.myvessyl.com
They have been assured the communication is unbreakable because they use
AES.
I showed an intruder may approach the unsuspecting victim’s phone once (even
with autounlock feature off), to be able to get full control over the car for
consecutive times without consent of the victim.
Other BLE devices
www.loxet.io
SMART METERS
BLE Broadcast smart meter
BLE	module	with	
photodiode
Smart meter: BLE broadcast
#	hcidump	-X	-R		
	
	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	07	00	f4		2f	12	00	dc	05	02	0a	08		......../.......	
	
		0020:	aa																																																.	
	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	06	00	01		30	12	00	dc	05	02	0a	08		........0.......	
	
		0020:	a7			
																																														.	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	24	00	49		30	12	00	dc	05	02	0a	08		.....$.I0.......	
	
		0020:	a9
Smart meter: BLE broadcast
#	hcidump	-X	-R		
	
	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	07	00	f4		2f	12	00	dc	05	02	0a	08		......../.......	
	
		0020:	aa																																																.	
	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	06	00	01		30	12	00	dc	05	02	0a	08		........0.......	
	
		0020:	a7			
																																														.	
>	0000:	04	3e	1e	02	01	00	00	1d		61	35	6f	12	00	12	02	01		.>......a5o.....	
	
		0010:	06	0b	ff	12	82	24	00	49		30	12	00	dc	05	02	0a	08		.....$.I0.......	
	
		0020:	a9
Smart meter: BLE broadcast
	
	
12	82	07	00	f4 	2f	12	00	dc	05	02	0a	08	
	
	
12	82	06	00	01		30	12	00	dc	05	02	0a	08	
	
	
12	82	24	00	49		30	12	00	dc	05	02	0a	08	
	
	
12	82	07	00	50		30	12	00	dc	05	02	0a	08
Smart meter: BLE broadcast
	
	
12	82	07	00	f4	 	2f	12	00	dc	05	02	0a	08	
	
	
12	82	06	00	01		30	12	00	dc	05	02	0a	08	
	
	
12	82	24	00	49		30	12	00	dc	05	02	0a	08	
	
	
12	82	06	00	50		30	12	00	dc	05	02	0a	08
Smart meter: BLE broadcast
	
	
12	82	07	00	f4 	2f	12	00	dc	05	02	0a	08	
	
	
12	82	06	00	01		30	12	00	dc	05	02	0a	08	
	
	
12	82	24	00	49		30	12	00	dc	05	02	0a	08	
	
	
12	82	06	00	50		30	12	00	dc	05	02	0a	08	
	
	
	
Temp.	impulses	
Total	number	of	impulses
In fact, we didn’t even have to.
Wow, we can sniff the power
usage of a victim!
That looks like a serious
vulnerability, doesn’t it?
But is it really?
OMG! We have „hacked” it!
h"ps://www.flickr.com/photos/viirok/2498157861
Conditions to exploit:
-  distance 5-10 m from my house
The impact:
- A „not so anonymous” intruder can monitor my power
usage and deduce e.g. my presence at home.
But: my presence at home is also perfectly visible from
5.3 km distance.
And I can detect the intruder, too ;)
BLE Broadcast smart meter - risk
You can also reset this
device – I haven’t bother
to set the password ;)
As well as take a brick
and break my window,
but I honestly hope you
won’t.
BTW
h"ps://www.flickr.com/photos/memestate/2840195/
RF SMART METERS
Additional head mounted on the
water meter transmits the
indication wirelessly to mobile
collectors.
Several hundred thousands
(and counting) installed in
Poland.
Wireless smart meters
RTL DVB-T USB stick ~ 40 PLN
Free software (e.g. GNU Radio)
Great beginner’s video tutorial:
http://greatscottgadgets.com/sdr/
Hacking wireless: Software Defined Radio
http://www.uke.gov.pl/pozwolenia-radiowe-dla-klasycznych-sieci-
radiokomunikacji-ruchomej-ladowej-5458
Public list of operators, frequencies etc.
Isolate the signal
GFSK demodulation – GNU Radio
How about a better gain?
1. The data is transmitted clear-text or without proper encryption.
2. The precision of transmitted data is higher than needed for billing.
3. Be in the range of wireless transmitter - max few hundred meters.
4. (A not-so-common-yet knowledge of wireless signals decoding)
Risk for the end-user – conditions to exploit
Image:	h"p://www.taswater.com.au/Customers/Residenaal/Water-Meters
(this meter just broadcasts the indication)
Presence?
-  it would be easier to observe e.g. parked cars or lights.
Personal habits?
-  when does he bath (or not?), make laundry
-  whether has a dishwasher,
-  how big is the family...
Emulate tampering alarm signal for the bad neigbour?
Risk for the end-user – impact
If the device would broadcast too detailed indication, a
regulation could prohibit it.
(there are actually such regulations for energy meters)
How much would it cost to replace several hundred
thousand devices?
Risk for the operator?
Risk for the operator?
868	Mhz	transmi"er					8	PLN	
Arduino 	 	30	PLN	
6	x	3	=	18	PLN	
TOTAL:	56	PLN
The yearly bill
SUMMARY
It depends.
The risk is not always obvious. An intruder may hack
the thing, but in the end it may not matter. But you may
also implement seemingly safe use scenario that may
dramatically increase the risk.
The physical presence condition does reduce the
attack possibilities significantly.
The risk may increase in time – new tools, exploits,
adoption of technology.
Should we worry?
Wanna-be-hackers
•  Act in good faith to reduce potential for harm.
•  You won’t impress us with hacking speaking dolls to say
naughty words or teledildonics to vibrate abnormally ;)
•  Please do take real risk into consideration, and the impact on
involved parties, too.
Pentesters
•  Adapt new skills, labs for the emerging market
•  Sometimes it’s just enough to RTFM
Enthusiasts, hackers, pentesters, consultants...
Confront your ideas with security professionals.
Startups:
•  Bugcrowd www.bugcrowd.com
•  Free consultancy www.securing.pl/konsultacje (form in PL),
contact us for EN. Drop us your device and we’ll see what we
can do in our spare time.
Proactively predict the future compliance (the FCC, EU,
governments are working on).
Educate the users, design secure by default devices – e.g. enforce
non-default passwords.
Vendors, inventors, entrepreneurs...
Understand the technology and associated risks – be
aware of it’s shortcomings and secure usage scenarios.
Depending on risk (e.g. industrial, urban, government,
medical...), consider security assessment of your
configuration.
Get used to the loss of privacy. You are no longer in
control of your data – no matter if you use the
technology or try to avoid it.
Demand the security.
End-users
Demand the security!
Board	Support	Package	-	drivers,	bootloader,	kernel-level	SDK	
Broadcom,	Texas	Instruments,	Intel,	WindRiver...	
Original	Device	Manufacturer	–	web	interface,	SDK,	cloud...	
usually	unknown	from	China,	Taiwan	etc.	
Original	Equipment	Manufacturer	–		composing,	branding	ODMs	
+	support,	license,	warranty...	
Value	Added	Reseller	/	Distributor	
End	user	
Security	!!!
And for the Happy(?)-End – the pentester’s view
Features	at	low	cost	compromising	on	security	is	just	obscene	;)	Let’s	do	it	be"er!
Thank you,
looking forward to contact!
slawomir.jasek@securing.pl
MORE THAN
SECURITY
TESTING

Mais conteúdo relacionado

Mais procurados

Latest computing devices & latest technology innovations
Latest computing devices & latest technology innovationsLatest computing devices & latest technology innovations
Latest computing devices & latest technology innovationsKhisal Iftikhar
 
New technology
New technologyNew technology
New technologyArpit Jain
 
Making an on-device personal assistant a reality
Making an on-device personal assistant a realityMaking an on-device personal assistant a reality
Making an on-device personal assistant a realityQualcomm Developer Network
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable ComputerSaumya Shah
 
Agents, Teams and the Future
Agents, Teams and the FutureAgents, Teams and the Future
Agents, Teams and the FutureJeff Kramer
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha Maheshwari
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable ComputerViral Mehta
 
Future force presentation_to_ministry_of_defence
Future force presentation_to_ministry_of_defenceFuture force presentation_to_ministry_of_defence
Future force presentation_to_ministry_of_defenceAuggy Augmate
 
Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?Hariharan Ganesan
 
Mind the Gap: Designing the Space Between Devices
Mind the Gap: Designing the Space Between DevicesMind the Gap: Designing the Space Between Devices
Mind the Gap: Designing the Space Between DevicesJosh Clark
 
Future of interface design 2010
Future of interface design 2010Future of interface design 2010
Future of interface design 2010Pavel Růžička
 
External Device Integration with Mobile
External Device Integration with MobileExternal Device Integration with Mobile
External Device Integration with MobileSoftweb Solutions
 
The growth of wearable technology
The growth of wearable technologyThe growth of wearable technology
The growth of wearable technologyGuillaume AGIS
 
Wearable computing devices & its appllcation
Wearable computing devices & its appllcationWearable computing devices & its appllcation
Wearable computing devices & its appllcationgautam khillare
 

Mais procurados (20)

Hardware is cool again
Hardware is cool againHardware is cool again
Hardware is cool again
 
Latest computing devices & latest technology innovations
Latest computing devices & latest technology innovationsLatest computing devices & latest technology innovations
Latest computing devices & latest technology innovations
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
New technology
New technologyNew technology
New technology
 
Making an on-device personal assistant a reality
Making an on-device personal assistant a realityMaking an on-device personal assistant a reality
Making an on-device personal assistant a reality
 
More Immersive XR through Split-Rendering
More Immersive XR through Split-RenderingMore Immersive XR through Split-Rendering
More Immersive XR through Split-Rendering
 
Wearable Computers
Wearable ComputersWearable Computers
Wearable Computers
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Agents, Teams and the Future
Agents, Teams and the FutureAgents, Teams and the Future
Agents, Teams and the Future
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Future force presentation_to_ministry_of_defence
Future force presentation_to_ministry_of_defenceFuture force presentation_to_ministry_of_defence
Future force presentation_to_ministry_of_defence
 
Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?
 
Mind the Gap: Designing the Space Between Devices
Mind the Gap: Designing the Space Between DevicesMind the Gap: Designing the Space Between Devices
Mind the Gap: Designing the Space Between Devices
 
Future of interface design 2010
Future of interface design 2010Future of interface design 2010
Future of interface design 2010
 
External Device Integration with Mobile
External Device Integration with MobileExternal Device Integration with Mobile
External Device Integration with Mobile
 
Google glass
Google glassGoogle glass
Google glass
 
The growth of wearable technology
The growth of wearable technologyThe growth of wearable technology
The growth of wearable technology
 
Wearable computing devices & its appllcation
Wearable computing devices & its appllcationWearable computing devices & its appllcation
Wearable computing devices & its appllcation
 

Destaque

[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...
[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...
[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...PROIDEA
 
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter [CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter PROIDEA
 
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and Jenkins
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and JenkinsAtmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and Jenkins
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and JenkinsPROIDEA
 
PLNOG16: It's time to start 5G - RAPID, Michał Szczęsny
PLNOG16: It's time to start 5G - RAPID, Michał SzczęsnyPLNOG16: It's time to start 5G - RAPID, Michał Szczęsny
PLNOG16: It's time to start 5G - RAPID, Michał SzczęsnyPROIDEA
 
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...PROIDEA
 
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...4Developers: Adam Sznajder- Taking advantage of microservice architecture and...
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...PROIDEA
 
MCE^3 - Marin Todorov - Building Swift Libraries for iOS
MCE^3 - Marin Todorov -  Building Swift Libraries for iOSMCE^3 - Marin Todorov -  Building Swift Libraries for iOS
MCE^3 - Marin Todorov - Building Swift Libraries for iOSPROIDEA
 
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative Design
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative DesignCE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative Design
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative DesignPROIDEA
 
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego [CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego PROIDEA
 
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mityPROIDEA
 
infraxstructure: Agata Kowalska "Cloud computing w sektorze finansowym i ube...
infraxstructure: Agata Kowalska  "Cloud computing w sektorze finansowym i ube...infraxstructure: Agata Kowalska  "Cloud computing w sektorze finansowym i ube...
infraxstructure: Agata Kowalska "Cloud computing w sektorze finansowym i ube...PROIDEA
 
4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik
4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik
4developers2016- Strumieniowanie danych w Sparku- Bartosz KowalikPROIDEA
 
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...PROIDEA
 
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...PROIDEA
 
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...PROIDEA
 
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...PROIDEA
 
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...PROIDEA
 

Destaque (17)

[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...
[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...
[CONFidence 2016] Alexander Bolshev, Ivan Yushkevich - When the medicine is m...
 
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter [CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter
[CONFidence 2016] Mateusz Kocielski - Torturing the PHP interpreter
 
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and Jenkins
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and JenkinsAtmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and Jenkins
Atmosphere 2016 - Adam Walach - Continuous IoT - with Docker, Go and Jenkins
 
PLNOG16: It's time to start 5G - RAPID, Michał Szczęsny
PLNOG16: It's time to start 5G - RAPID, Michał SzczęsnyPLNOG16: It's time to start 5G - RAPID, Michał Szczęsny
PLNOG16: It's time to start 5G - RAPID, Michał Szczęsny
 
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...
Atmosphere 2016 - Albert Lacki, Jaroslaw Bloch - Real user monitoring at scal...
 
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...4Developers: Adam Sznajder- Taking advantage of microservice architecture and...
4Developers: Adam Sznajder- Taking advantage of microservice architecture and...
 
MCE^3 - Marin Todorov - Building Swift Libraries for iOS
MCE^3 - Marin Todorov -  Building Swift Libraries for iOSMCE^3 - Marin Todorov -  Building Swift Libraries for iOS
MCE^3 - Marin Todorov - Building Swift Libraries for iOS
 
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative Design
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative DesignCE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative Design
CE^3 - Liam Spradlin, Francisco Franco - The Living Interface: Mutative Design
 
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego [CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego
[CONFidence 2016] Artur Kalinowski - Wyciek danych z pespektywy atakującego
 
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity
4Developers: Maciej Aniserowicz- O mikroserwisach mikro-fakty i mikro-mity
 
infraxstructure: Agata Kowalska "Cloud computing w sektorze finansowym i ube...
infraxstructure: Agata Kowalska  "Cloud computing w sektorze finansowym i ube...infraxstructure: Agata Kowalska  "Cloud computing w sektorze finansowym i ube...
infraxstructure: Agata Kowalska "Cloud computing w sektorze finansowym i ube...
 
4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik
4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik
4developers2016- Strumieniowanie danych w Sparku- Bartosz Kowalik
 
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
 
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
 
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
 
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
 
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
 

Semelhante a CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? - Slawomir Jasek

The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?SecuRing
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 
Advertise Yourself! - reelyActive at Bluetooth World 2014
Advertise Yourself! - reelyActive at Bluetooth World 2014Advertise Yourself! - reelyActive at Bluetooth World 2014
Advertise Yourself! - reelyActive at Bluetooth World 2014reelyActive
 
Physical Computing and IoT
Physical Computing and IoTPhysical Computing and IoT
Physical Computing and IoTEduardo Oliveira
 
Internet of things(1)pdf BY ifshal zahid
Internet of things(1)pdf BY ifshal zahidInternet of things(1)pdf BY ifshal zahid
Internet of things(1)pdf BY ifshal zahidifshalzahid
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18Mark Goldstein
 
IRJEWT-An Intelligent Remote Controlled System for Smart Home Automation
IRJEWT-An Intelligent Remote Controlled System for Smart Home AutomationIRJEWT-An Intelligent Remote Controlled System for Smart Home Automation
IRJEWT-An Intelligent Remote Controlled System for Smart Home AutomationIRJET Journal
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsOmkar Shinge
 
IRJET- Smart Mirror using Voice Interface
IRJET- Smart Mirror using Voice InterfaceIRJET- Smart Mirror using Voice Interface
IRJET- Smart Mirror using Voice InterfaceIRJET Journal
 
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15Mark Goldstein
 
IoT and Privacy by Design in the Smart Home
IoT and Privacy by Design in the Smart HomeIoT and Privacy by Design in the Smart Home
IoT and Privacy by Design in the Smart HomeESET Middle East
 
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...Mark Goldstein
 
CES 2017 Assistive Tech Related Product Overview
CES 2017 Assistive Tech Related Product OverviewCES 2017 Assistive Tech Related Product Overview
CES 2017 Assistive Tech Related Product OverviewBen Salatin
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9Guy Bieber
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data CollectionLeandro Agro'
 
NCompass Live: Technology in Libraries: What's Next?
NCompass Live: Technology in Libraries: What's Next?NCompass Live: Technology in Libraries: What's Next?
NCompass Live: Technology in Libraries: What's Next?Nebraska Library Commission
 

Semelhante a CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? - Slawomir Jasek (20)

The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
IoT
IoTIoT
IoT
 
Advertise Yourself! - reelyActive at Bluetooth World 2014
Advertise Yourself! - reelyActive at Bluetooth World 2014Advertise Yourself! - reelyActive at Bluetooth World 2014
Advertise Yourself! - reelyActive at Bluetooth World 2014
 
Physical Computing and IoT
Physical Computing and IoTPhysical Computing and IoT
Physical Computing and IoT
 
Internet of things(1)pdf BY ifshal zahid
Internet of things(1)pdf BY ifshal zahidInternet of things(1)pdf BY ifshal zahid
Internet of things(1)pdf BY ifshal zahid
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18
IEEE CS Phoenix - Internet of Things Innovations & Megatrends Update 12/12/18
 
IRJEWT-An Intelligent Remote Controlled System for Smart Home Automation
IRJEWT-An Intelligent Remote Controlled System for Smart Home AutomationIRJEWT-An Intelligent Remote Controlled System for Smart Home Automation
IRJEWT-An Intelligent Remote Controlled System for Smart Home Automation
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
IRJET- Smart Mirror using Voice Interface
IRJET- Smart Mirror using Voice InterfaceIRJET- Smart Mirror using Voice Interface
IRJET- Smart Mirror using Voice Interface
 
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
 
Project glass
Project glassProject glass
Project glass
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
 
IoT and Privacy by Design in the Smart Home
IoT and Privacy by Design in the Smart HomeIoT and Privacy by Design in the Smart Home
IoT and Privacy by Design in the Smart Home
 
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...
 
CES 2017 Assistive Tech Related Product Overview
CES 2017 Assistive Tech Related Product OverviewCES 2017 Assistive Tech Related Product Overview
CES 2017 Assistive Tech Related Product Overview
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9
 
Massive Data Collection
Massive Data CollectionMassive Data Collection
Massive Data Collection
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 
NCompass Live: Technology in Libraries: What's Next?
NCompass Live: Technology in Libraries: What's Next?NCompass Live: Technology in Libraries: What's Next?
NCompass Live: Technology in Libraries: What's Next?
 

Último

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Último (11)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? - Slawomir Jasek