 Dans la cabine, à nous-mêmes. Y'a beaucoup de gens sur la table. Y'a beaucoup de gens sur la table. Oui, oui. Vous ne pouvez pas le lire. Vous ne pouvez pas le lire. Vous pouvez ? J'ai essayé. Je pense que vous m'avez oublié deux fois. Donc, s'il vous plait, recuez ça. C'est... Oh... C'est bon. Est-ce qu'ils annoncent la translation anglophone en anglais ? Ou est-ce qu'ils... Maintenant, vous avez la chance de dire hi à votre mère. C'est très mauvais en Spanien. C'est pas très bon en Spanien. C'est bon. Allons-y. Allons-y. Allons-y. Merci. C'est... Un... Un... C'est... C'est incroyable, non ? Je suis en train de faire un puce. Comment vous-vous ? Est-ce que les anciens aussi ont un puce ? Un de eux fait un autre... Bon... Bon, on peut jouer un petit jeu ? Vous savez, le défrang... Le truc de fréquence. Pourquoi n'est-ce pas... Faire votre table à des computers ? Parce que l'un d'entre vous doit s'en sortir. Et si vous avez un sac à la suite, parce que vous croyez que votre amie va le faire, utilisez votre legage du Absinthe d'auge, et vous retirez vos mains si vous avez un sac à la suite, un sac à la suite. Comment vous-vous... Vous avez eu de la salle avant les répliques. Et vous avez été... Allons-y. Nous avons gagné. Donc, nous pouvons se dispenser avec la fragmentation, et bien, nous avons des factures pour vous. Je vais faire l'exercice pour la fermeture. Il a été travaillé très bien en Hamburg. Si ça fonctionne, on verra. Tu prends cette demi-part et je prends l'autre demi-part. Donc on va le couper dans le milieu où les caméras sont. Tu es ma demi-part. Nous aimerions avoir un Mexican wave avec toi parce que c'est une longue durée et le crash du Mexican wave. Nous aimerions se battre là-bas. Et maintenant, s'il te plait. Allez, on va. Oui. Oh non. Oui. Great. Et la toute autre façon de faire le round. Avec le son. Attends, attends. C'est très lourd. 1, 2, 3. Mexican wave. Je suis au Gänse. Oui. Oui. Et maintenant pour les faits. Nous avons fait des recherches avec les angels. Parce que, comme vous savez, les angels sont les gens... Vous le savez tous. Et je vais vous dire pourquoi plus tard. Ce sont les gens qui organisent tout. C'est un grand plus pour ça, pour commencer. Maintenant, il m'a dit. Maintenant, il m'a dit. Il m'a dit. Est-ce que c'est une joie? Ou est-ce qu'il y a quelque chose qui se passe? Oh. Maintenant, tout en all, nous avons... Les figures sont assez petites, en fait. 1.043. Ça pourrait être 1.042, pour que ça soit meilleur. Mais nous avons 1.043 personnes et jours. 2.900. C'est 2.969 angels avec au moins une heure. Géglider. Divider dans 40... 59 types d'angles. 59 types d'angles. Donc, différents tasks pour faire de collecter les bottes pour s'entraîner ici et entretenir vous. Et j'ai eu avec un minimum de 9,50 et en multipliant ceci. Je vais y aller. Je vais y aller. D'accord. Donc, avec un minimum de 9,50 vous avez 79,268 euros. Mais c'est un minimum de minimum. Mais vous êtes des gens IT, hein? Et j'ai fait ça avec say, 99 euros par heure. La friendship c'est un minimum de 200.000 Je peux construire le CCC pour ça? Et tous ensemble, 2.400 3.400 personnes sont signées pour les 2 angels. C'est 5.400? Donc, les deux ont essayé d'en faire de l'aide. Et j'ai vu ça. D'accord, maintenant, nous sommes préparés. Qui, cette année, a eu ce moment que je vous ai dit? Qui a-t-il cette fois-ci? Allez-y, les gens. Ce n'est pas correct. Ok, maintenant, ils sont venus avec la famille, la compagnie. Ah! Ah, bien sûr. Oui. Qui sait quelqu'un qui a eu ce moment? 5 fois? Non, pas beaucoup. Mais ce n'est pas si mauvais pour vous. Nous allons vous donner une nouvelle photo de ces deux. RONDEN FRANK dans la 13e édition. Un applaudissement. Je pense que c'est la 19e édition. C'est 1.3 en Hex. C'est ce qu'ils disent. Hello Thank you. Welcome to the Security Nightmares. Hello Leipzig. Hello New Zealand. Hello Territory of the Unknown. Nice to have you all here. The 19th edition on the 35th Congress. And that, of course, is a certain limit for the Congress because I think two or three years ago we told someone that everything that's older than 35 can actually go to a museum. So that means that next year the Eiderstedt Burger House the oldest location of the Congress or wasn't it the oldest that's going to go there. We'll have to research that by the way. All right. Who's here for the first time? All right. All right. That's good. Less than previously. I think that's a good trend. And who of you can explain the basics of TCPIP? And who of you has learned it at this Congress? Hmm. No one. All right. Dig Deeper? Who knows who can explain the basics of SPXIX? IR15? Oh. Not too bad. SNA? Mm-hmm. Layer 1 and 2 of Wi-Fi? Ah, we've got a few Wi-Fi cable experts here. And Laura 1 Interesting. It's always the same people showing up. Remember these guys? They are the ones we will need before the apocalypse. And those that will have net after the apocalypse maybe. What's always funny is I always put those numbers into my converter and see in which number system a nice number turns out. And this is the 23rd event in octo. That's nice. So 23 in octo. And you see the notation there 0 0 23 and that reminds me of something. And then I thought yes that's the way I saw it anyway. Okay. And also the actual image of the year I've just seen a moment ago on Twitter and with the GDPR and the European regulation the Santa Claus jokes have taken on a completely new dimension. He makes a list of children that are nice and those that are not so nice or naughty and of course he will receive an official letter with a return envelope and have to comment on how he's going to delete the data. I think those information requests, those GDPR information requests are great. The delivery process most parents have these funny games where they either rent a father or they find something they improvise and suddenly the sac with the presents is there and the father Christmas is gone and Santa Claus and how do you then deliver that do you how do you deliver that request for information do you attach to the sac and hope that the sac will be collected and will that be valid over that period of time from one year to the next? Ah chaos post, that works yes chaos post would work it arrived I received postcards yes and next year we can start with the 20 year review but for now we would like to continue with the 10 year review because otherwise we would have to do it last 10 years all over again now 10 years ago we had the topic of better testers for new surveillance technology and it would be nice if german MPs could have been obliged because they always passed these laws but apparently at least as far as we can see it they don't actually notice what they actually cause what they unleash because they may not be affected and if you were to change that then maybe the attitude would change as well and something we had this year is that not the MPs but the Ministers tried had innovative surveillance technology at least there was a Trojan that take over command and control over email which I found innovative because there's not so much new in command and control there so you send something, there's reply it's very comfortable this way I think probably next year it will be existent as a chat bot as well so hey Trojan pst yeah and the other thing that's missing is that spam will be in steganography or special cookies or something it will be actually an innovative command and control system to get advertising cookies if Trojans act when you clicked on advertising and the cookies then act as they were the content you wanted or something in the same category there was the issue of public data retention for all German members of parliament and that did work within limits because the first WhatsApp groups were leaked the contents of those that started last year didn't it so it didn't take 10 years but 9 but this will only move on continue from here we may have been a bit early there but there is still hope the trend is right and louder the router issue 10 years ago was actually US authorities 3500 faked routers with Cisco logo louder they wanted to talk louder about the router to using American pronunciation 10 years ago the US authorities had 3500 faked routers with Cisco logos and they removed them and were a bit concerned these were not Cisco routers they just looked like they were and this year we had the hardware backdoor debate comprehensive we've got hardware implants in motherboards and by super micro that several cloud operators were using but they didn't prove it and they didn't bring forward the evidence these images were all furture shopped I think it took a week to come out that the images were all works of art and my assumption is that they heard about something that actually happened but that wasn't what they actually reported on and the discussion is interesting when it went on and kind of created the background for Huawei because the Americans have been causing a little stress around the world to get Huawei out saying that Chinese vectors were in there and the discussion I found amusing because there was this comment saying that the back doors in American products weren't actually that rare and the question now is whether the politics that are being conducted which vector supply would you like to have exactly I mean you can pick the little games where you first think do they kick those out first where they had a back door but didn't excuse me fuck them do they kick the back door out first where they think somebody else has it and do you is that joke viable you need three scanners an American to catch the Russians a Russian to catch the Americans who was the third one a finish one for the Swedes yeah equal opportunity back dooring is the word I mean there's always space between a firewall or firewall to add another firewall the back door the back door hard where back doors where another theme in the tunnels they're sealed and the question is does the implant come off the line or is it installed in service so they just sort of decide we gotta weigh them now this year this year they found out weigh weigh doesn't help because they they make them so small that there is no difference and now they know and they know that they're being weighed and so they just add tear it out or reflex it out take a little bit out so the additional chip is not is not deducted so the next countermeasure is to see if it's rotational balance or not and so you put it on a rotational tablette and find out if you shouldn't open them anyhow if the seal is broken they're not compliant and so they have to open one up where they're completely sure that it's okay just look and have a final check and then make a baseline from that and say that's the way all the others should act and when are you gonna rotate your servers around in your oh when you start rotating your servers they're gonna lose all the screws that hold them together oh they're all SSD yeah but still you got all the SSD chips lying in one end of the server yeah that's I don't want to think about it oh yeah 10 years ago they had these spam mail commission killer spam mail I am your killer today I have got the order to kill you but you can buy your liberty or your life would you just please send the money or buy me some iTunes, cards or maybe some packages that was 10 years ago there there were no bitcoins around then so it was hitman spam mail hitman spam mail that's right that was the word thank you what what were the bitcoins were 10 years ago you bought one hamburger for them well in the meantime even that sort of has developed there was this article in Wired about somebody who knows somebody and did some research who was this who ran assassin where you order them sort of you know get a website to order your assassin and they got different brands I think money for it yeah Bitcoin of course and and talk about escrow and it would go over an escrow account and if you send them some Bitcoin and oh yeah the killer is informed and two days later and he's on the way two days later and there was a slight disconon with the delays in operation and he's stuck somewhere and could you could you please send some bitcoins because you ran out of petrol or whatever and another week now it didn't work that well but he's got the money and a little slightly higher price we could add somebody professional to make that job oh there's loads of stories there and in the end he jerks his way out of it and he steals in the end he just steals time and money from those who want to others killed and that would be morally completely complacent that's an interesting you can make a nice story out of that yeah let's go on with the next one 10 years ago we said what was social networks will be for data crimes best but we should look at that 10 years time so social data crimes in social networks oh gsm safety leaks don't have to say anything oh there's an interesting question how many how many different versions of opening a gsm base station on a come on the boards are from china they're completely safe and secure yeah the national filters were up at that time the browser plugin to compare attitudes national on a national basis we could a VPN or a browser plugin to how the internet looks from another different perspective or national boundaries or what the others think about us review from the next door country never know and in the meantime that seems to happen already and the upload download filters obviously and seems to be more interesting what it looks like from the other country becomes more in it's sort of virtual vanity for all of us on a national state nation states interesting is what does this website look like if I don't call it with my cookies and I think the plugins for that are still lacking there's still work to do there but at least there's a market because of location based pricing and some people realize that when they empty their browser cache and throw their cookies away and then ask again what the flight from A to B does cost suddenly the price is very very different often cheaper ok the normality update for the internet for 2018 partly figures from 2017 because we still don't have the figures there's four then that is definitely for the android phones with the Trojan off the rack that's rather efficient and yeah you have to make your money somehow there was a paper that where I thought that is really weird that it's kept obvious on his way when I have devops and and I explicitly put another dev sick up I'll be faster than normal that's not surprising but it's what's surprising maybe that you're 11.5 times as fast if you use, if you deploy 20 times faster and that means you have to you have to fix your security level at least 10 times as often to keep the level skimming attacks damages from 1.0 to 2.2 million euro now attacks on ATMs, that's not so interesting the figures worsened slightly but not that much and what was interesting that behind this headline and a few others I didn't really notice it during the year only when I try to look back across the whole year within a time space of about 1 or 2 weeks suddenly you see that many of these headlines say that these 2.2 million euros damage are only really 15% only 15% of those occurred in Germany because there are international accords now moving the damage to the country with the lowest security level and there are other items reports saying that damage was this and that figure and this amount had to be paid for ransomware behind you see that the insurance paid for it international treaties insurances interesting I would have expected that the security level would be raised because insurances expect things like that well if you look at those ATMs those cash points the efforts you need for skimming you can just get the money out directly but it was B-Port and convinced to spit everything out where to talk it doesn't work with the wireless keyboards I think I think every cash point should have a dongle for a wireless keyboard that would improve the service quality considerably Google removed 700,000 evil apps Apple removed many Apple said that they had removed 700,000 evil apps from the play store they at least give you a figure Apple it's a bit like the Eskimos and the snow they have many words for snow and no precise figure well the thing is that apps that are evil particularly when it comes to tracking and data exfiltration have become a business area and it's obviously not so easy to recognize these so that as soon as they enter the play store they could be sorted out so it will be an interesting battleground also with devices that the makers they buy components from all kinds of suppliers and particularly if you buy these cheap Android tablets you can run across an ad where that was pre-installed and Lenovo for example stop that this year actually that was last year but this year they had to pay for that and quite a lot 7.3 million that doesn't seem like a huge amount for a company like this but surely it is something that internally could be used to improve things right now another figure more than 12 petabyte company data on the net online so someone put this figure out and said I have been scanning IPv4 and found 12 petabytes of company data so because data are the oil of the 21st century this kind of nice data wealth the oil is on the street it swims on the lake it swims on the lake you kind of slush around in there and most of that interestingly was in some open S3 buckets or FTP servers and it was the case with Lucky Luke wasn't it where they just pinched the ground and then you had this oil gushing out and everyone walking around with blackened faces and that's not the case with data otherwise the researchers would look so different but it is funny isn't it to have data wealth look like a toner explosion well then I would be something would happen to me quicker than it does right take support scams grew by 24% that's this model where you call somebody somebody calls you Microsoft calling you have a virus on your computer and we would like to repair that together with you and I always had the impression yeah but that doesn't happen in Germany for the language barrier and actually it seems to be it's growing no question the reports that this is happening in 180 countries but there are cases in Germany so let's ask to the public do you know somebody who's had a virus call from my oh hey yeah oh some at least a few and who had the call in German and who had the call in English oh half and half wow yeah we have a theory we'll talk about that later interesting applause applause for let's encrypt more than half of all public reachable certificates are 50% of all publicly let's encrypt and Microsoft trust this oh, since August yeah Microsoft is a careful company they don't trust anybody at least not immediately oh things about that never stop like the next years we'll go on for another 10 years yeah what's really fascinating is the dimension of this these IP addresses there's and sometimes they were up to 5,000 hosts behind one IP address infected by WannaCry how can you how can you attain such infection rates maybe we need an old time hardware registration inside you know old timer in Germany you're allowed to drive where other modern cars need a special license with an old timer 30 years old maybe we'll have to lower that for 10 to 15 years if it's a 15 years old and then what you do with it with the server how do you handle that oh single cell that if you have an old timer you get an H on your registration plane and that's they call it Hannibal Lecter sign let's look back at this year the parliament hack in the German Bundestag was the interior minister said technically complicated sophisticated sophisticated the tax money that was invested to first clean up they were invested proper because it was sophisticated sophisticated use of tax money yeah that was oh where I went our interior minister think something is sophisticated well yeah ok the British came around general headquarters central so if there's something around that everybody knows would like to know and because all these nasty people are encoding encrypting and we can't so we have to open their computers and use a mastercloid so we gotta be able to open as many computers as possible they want the right and of course the means 10 150, 100,000 computers to open them proactive just without just for the sake of it let's listen to what happening and they need this jackpoint trojan if you install it properly people start telling you everything at 3 o'clock in the morning they don't define it laptops or PCs but that includes the television sets and tomorrow maybe the bar, probably the Barbies Barbie dolls yeah Barbie dolls and oh Alexa let's not forget Alexa oh and the home board and the google device what's it called the CIA communication systems discovered using google now of course normally we have many of what report is technically very sophisticated and there was this story this year that had been around a few years ago but always comes back up and that was that the CIA communication system that they use for making arrangements with their sources in different countries using web systems that they had bought for millions of dollars from an American government contractor and only that at some point the Iranians had placed a double agent in there and that told the Iranians what the website would look like that they use for communication and then you could google for similar websites a few dozens of them and then monitored the people connected with that and took them and then talked to the Chinese that could contribute something as well and that led to the CIA as a proof of its amazing e-government competency had lost its whole agent networks in these countries and some actually died so you see that e-government is a difficult task still even if you have technically sophisticated things to defend against the technical term for that is a google doc you could google it right the next thing is an absolute screamer because in Australia a law was passed about the called the assistance and access bill nicely abbreviated as bill by its fans and there are great explanatory videos which are just amazingly funny and these then would like to introduce back doors to be allowed to introduce back doors and they want to go really wide they want Australian citizens they want to motivate want to be able to motivate to put back doors in the companies where they work and all that from a country that has another scandal going which is called the cabinet files what was that about you ask well the answer is a newspaper had several covers of files received those which had been on the second hand market for those for those pieces of furniture but with content they obviously forgot to empty them before they put them on the market so I would now ask why were they sold with content because we lost the keys right great so let us repeat what we said last year this is a new business model people under hypnosis you could help them to using hypnosis to remember their old past phrases that will come amazing one of the large debates this year was TLS 1.3 where various participants in the debates were of the opinion that it is too safe too secure because you can't look into it anymore at least not so easily and well you have to remark the old security models where it was said you have to be able to look in said we have an inside network that we can trust and then the encrypted connections arrive and because everything is safe within the network we decrypt it at the entrance point in practice if you look into these formally encrypted data streams if the trojans start communicating via e-mail it gets difficult so therefore they say trustless networks should be built so even internal networks are built so that you don't have trust to service only encrypted communications and that's what this TLS 1.3 was actually intended for right we will see how this will develop oh the e-fail attack on SMIME and OpenPGP so called e-fail attack the details are interesting because you should read this if you have got the time we didn't quite include it here to bash it even further but I don't know how you feel but this year I met 2 people already who I thought would officially be of the opinion that they cannot get this get their grips with the e-mail encryption in their company so they gave up and does anyone else know anyone that gave up ah, only so few well there's still hope then hmm I believe we'll have to turn out the lights and then ask the question again ah right who is in a company where they didn't ever start using PGP ah, let's explain right who this year had to explain let's try and explain this whole thing of encrypted e-mail to their colleagues or heads superiors, well that's not too bad right we had to quickly go through a couple of quite remarkable oh, this denial of service for the GDPR let's I want to who thought there was that thing with GDPR all the stress was not worth it who liked it who thought it was funny ok most of you were just amused what were the please please excuse me, click here so you can keep receiving all the news on the most innovative views and nobody ran up or most of you never ran up to a lawyer non who had something to do with rotating hyperventilating hyperventilating GDPRs people gone wild oh the best headline I loved serious fault in a plugin in a GDPR plugin for wordpress I like that Microsoft's BitLocker trusts the firmwork the company that does the firmwork on their hard disk the encryption on the hard disk Microsoft is a company that handles OAM requests and jobs every day and they listen to OAMs every day and look at this new driver and look, this is coming and then and then they believe the hard disk hey, I'm handling this completely yeah yeah everything is poisoned we had the topic in bad apps and tryonized apps and browser plugins and downloads, DLLs whatever libraries sometimes from people that are cut off from outside like soldiers and everybody has internet now and at least they get their fingers on it and they get the bandwidth and they go to the dating apps and oh fitness apps yeah, the army goes to the fitness apps yeah where do they train the super secret special forces all you have to go do is look worldwide where where the fitness data comes in thickly where nobody lives and this is probably where the special forces are training at the moment oh there's this question how do you guarantee integrity of open source sorry because the better the security of the distribution infrastructure is the higher above the chain the attacks will go also the bugs thing isn't the same isn't just there with the normal software also malware itself there was this interesting case where something happened in Saudi Arabia a trojan was found a more complex kind of malware that didn't work because it was buggy it happens testing is hard let's go shopping oh HP ILO trojan that's a new milestone in the integrated lights out Intel calls it Intel management engine IBM calls it integrated management you know they integrate the ransom trojans and HP was the first one there were the first one for their system there was achievement unlocked the first ransom trojan around ransomware ransomware trojan yeah and then yeah the in the context of the things that have been smoldering for a long time we had in OpenSSH a 19 year old security hole was fixed in OpenSSH that was used to better guess valid usernames and in that context we wondered if you look at other things such as the OpenSSH eBerry root kit thing of what was that from 2006 2013 or whatever that has now 21 sub variants and it's as it is with normal windows viruses do we make too many windows jokes and the 2003 server that still isn't switched off or do we actually have to look at old versions of linux and target those and the answer is obviously yes who of you still knows a running system with a kernel 1 the one version kernel ok 2 kernel version 2 ah yeah we'll stop here because I think this old time registration that will be a thing again we'll have time to talk about that yeah with all these IoT devices that you will have to throw away because no kernel this will get funny who of you is still maintaining an OS 2 installation yes another 3 still 3 right oh the browser wall seems to be over and Google 1 sort of looks like it Microsoft gave up that's not such a good news but that means Google is defining for the next time for the next years how much Apple is going to invest in that we'll see monoculture click in the this is quite remarkable just as remarkable this Google assistant that booking restaurant tables by phone which one of you heard the audio demos ah that many but not all fascinating the fascinating thing was not it caused and I said this is the Google assistant I'd like to book a table the crazy thing was what he answered when the other side let me look when the other side answered I have to look and he said ok yeah the silent intermediate intranations that aren't really remarks but just sort of transport he has understood what I said and keep on going the non-verbal touring test for us humans if somebody calls you and does not clear his throat and don't trust him he's probably a bot you should put some test stretches and add like great deviation and what and if the other side doesn't say huh or if he just says yeah then you're probably talking not to the guy the question is whether we do this ourselves or whether we need an assistant for that right then that gets us to keywords for the next year evil, hard and software networks data is the headline sometimes we are off by a few years but the trend that everything that you could imagine possibly now will receive a microprocessor and of course it needs a microprocessor a microprocessor always needs software that runs on it so that's why hardware is never just hardware but also software every time and this software wants to betray you actually it doesn't want to do that, a thing doesn't want anything it is capable of compelled to what's this about is everywhere you have processors now whether it's useful or not whether it makes sense or not every light switch now cannot be imagined without a CPU in it so you have to actually almost think that it will be the exception that nothing calculating will be in there d's that blink or display something at least a battery controller is there that will do its calculations and have a firmware and then there is data that's generated and these data will be stored somewhere and then they will get lost or leaked and that is due to the fact that software quality simply is bad and compliance testing you don't need at first you don't need that later you prefer it to work or to make people buy you don't need that and that just brings such a flood of things onto the market made by people who are doing it for the first time and therefore that's the way it has to go and then there's something else I've read a very nice article from a Ben someone that was something, the headline was something like thinking about AI so how you should think about AI and he had a nice analogy which was that artificial intelligence these days or machine learning that is somewhat advanced is like a four year old or yeah a four year old child of either gender it never tires doesn't want cookies and if you need another 30 you click once right and four year olds can do things that your computer cannot yet do pattern recognition is there a rabbit in this picture how many unicorns are those those things and of course it's a fantastic analogy because do you know how four year olds deal with family secrets exactly just like that qu'il y a des kindergartens c'est qu'il y a des kindergartens où vous avez des sciences disant que si vous ne croyez pas tout que votre enfant parle en kindergartens c'est ce qu'il dit qu'on ne croyez pas tout que votre enfant parle en maison donc la question est qu'est-ce que c'est l'analyse pour ça c'est juste le même le lexer pas tout le monde est vrai ou le lexer oui mais pas tout est mal il y a des choses qui ont l'imprové techniquement avance en défense et l'attaque lead à la fiche AI et la fiche anti-fiche apple est travaillant très en approving c'est operé pour les PC sandboxing a été introduit à une large scale les choses qui sont normales pour les smartphones et les systèmes de tablette parce que c'était dans leur long et tout ça l'IOT c'est tout terrible mais ce que les gens directement interagent ça se fait mieux si c'est été apprécié et ce qui se passe c'est que les attaques contre tout ce que l'IOT s'est passé avec la force brute la force brute, l'accompagnement de l'accompagnement et tout mais la range midi la PC moins possible tous ces systèmes de progrès comme des tablettes plus ou moins modernes il n'y a pas de systèmes de progrès il y a quelques apps et la sécurité du système c'est supporté par la sécurité de l'accompagnement des chips maintenant, ce sont un peu plus plus difficiles pour l'attaquer et pour nous la question est qu'est-ce qui s'est passé parce que l'évolution est en place et nous n'avons pas eu la situation où les criminels ont été arrêtés donc la conséquence c'est que la sécurité plus en plus devient un problème de layer 8 le problème est entre la fenêtre et la chair et nous avons eu un peu des ancêtres nous avons vu un peu des ancêtres de ça il y avait un trojan que dans une banque particulière en utilisant un exploit dans la table suivante l'on s'était un transfert vous avez reçu 750 euros dans une banque transfert et c'était une erreur et vous voulez re-transfer ce n'était pas un attaque de sécurité c'était seulement un attaque pour vous parce que vous venez d'être une personne honnête donc les gens se transforment et ils n'ont jamais reçu et il n'y a pas de mesures de sécurité parce que les gens veulent ça et je pense que exactement c'est ce qu'il y a pour les attaques pour attaquer pour attaquer pour attaquer le cerveau humain et les attaques techniques sont juste des mesures de soutien et la question est comment vous faites et les humains sont relativement impatients et bien souvent au moins distractibles je ne dirais pas que c'est stupide mais distractible et ça signifie que un bon travail pour un horde de 10 000 4 ans hum un AI fichier vous pouvez imaginer euh vous j'ai besoin d'un crème vous pouvez avoir votre mobile nous voulons tous nous voulons de la poignée oui je pense je vous aime quand c'était 20, 18 ans aussi alors quelqu'un de Berringtab m'a dit j'ai installé des windows juste pour l'opinion pour ouvrir l'email parce que c'est pour ma fille donc les gens vont de longues manières pour entendre le message si le message est correct donc et la prochaine chose c'est que chaque accident de data qui s'occupe là-bas est faute pour cet AI donc chaque petit peu de data qui s'est perdue aide une sorte d'AI pour vous envoyer des emails de fichiers et la question est qui va recevoir ça d'abord ou d'abord avec l'AI parce que tout est connecté et ce n'est pas mal parce que fichier c'est juste une forme de marketing fais quelque chose maintenant pas acheter mais cliquer donc la motivation c'est l'éducation l'éducation c'est le bonheur donc c'est là qu'on vient pour le cercle c'est tout que vous utilisez et la question sera un très moral ce qui est encore ok et ce qui n'est pas ok ce qui n'est pas ok c'est de me convaincre d'acheter des e-tunes des cartes pour payer mon tax debt mais peut-être j'aimerais la software pour que même aujourd'hui je peux apprendre 5 minutes en anglais j'aimerais apprendre 5 minutes en anglais ok qui donnera le droit de nous manipuler et avec quelle motivation et si vous parlez en anglais vous croyez que vous voulez apprendre en anglais la question est pourquoi vous croyez si vous voulez apprendre en anglais ce que la software manipulé à cet état de main si vous voulez apprendre en anglais peut-être que la software veut vendre un tour à Londres et vous avez le translat et la question est quelle manipulation de la base moral de la technologie et d'où nous étendons la ligne ce sera une issue de sécurité c'est la question de la sécurité personne parce que nous étendons l'AI qui peut presser nos boutons et on voit très bien ce qui pourrait être possible avec Facebook et Co si nous avons des systèmes de machine-learning qui nous permettent d'être excitées ou angriels c'est possible que ce débat ne puisse pas être postpone plus longtemps comment vous translatez cela dans le sport et les secteurs de business nous pensons que vous avez perdu l'overview à quel point vous avez perdu aujourd'hui ou cette semaine sur moi qui le sait tout le monde le sait ma mère n'a pas fait le nom encore pour éviter ce truc quel est l'un de ces réponses qui le sait tout le monde le sait j'ai été porné c'est un site qui collecte toutes les registrations et j'ai été porné et je peux envoyer dans mon e-mail et ils vont me envoyer avec des leaks et toutes ces autres leaks devraient être portées dans différents places de sécurité si quelqu'un d'autre trouve tous les passwords c'est peut-être un autre problème et nous avons besoin d'un manager doxé que nous avons besoin comme un manager de passeword où est-il ma data store ? comment on va oh oui c'est de la même manière c'est de l'exercice c'est de l'exercice c'est de l'exercice on va l'ignorer et on va l'exercice et on va l'exercice et la qualité s'improvera parfois et le monde s'éteint de téléphone pour les confrances et plus et plus de gens on va voir que il utilise un téléphone et il y a encore une caméra plus et plus de gens comment on pense que c'est de l'exercice je pense que c'est une pure telco qui devient des confrances vidéos parce que le bandwidth est là qui pense que c'est dommage qui pense que c'est dommage j'aimerais que sans être noté je comprends que vous pouvez monitor votre pulse ou la fréquence de breath c'est ma c'est il commence à respirer parce que j'ai dis le droit peut-être que c'est de l'air peut-être qu'il n'a pas trop de café mais si c'est une tendance il y a d'autres données mais vous devez vous défendre et en appuyant vous pouvez vous défendre vous pouvez cliquer le cool ou le poker face le poker face 250 ou le complétant le complétant c'est 5$ peut-être parfois vous voulez avoir honte pour avoir honte pour votre santé c'est beaucoup mieux s'il vous plaît pouvez-vous aller et compléter parce que je ne veux pas être compléter où sont ces émotions que vous pouvez regarder il y a des avatars intelligents qui adaptent à comment vous regardez il y a de l'air pour plus et enfin on croit la question de l'année vous vous interessez est-ce un script ? est-ce machine learning ? est-ce A.I ? on ne peut pas être humain on ne sera pas là quelle est la différence ? si son point de vue est A.I si son point de vue est machine learning si son point de vue est ingénieur et si ils mettent des computers quantum et des computers quantum c'est pour l'ingénierie oui vous devez prendre et vous ne vous inquiétez pas à qui je parle mais comment je peux trouver le problème j'utilise un script j'ai besoin de machine learning ou je dois attendre pour A.I oui en ce sens en ce sens en ce moment nous aimerions une transition à l'année 1984 l'image est de Laipzig de la belle typo c'est un bon type j'aime ça