 Hello from the ST State and Embedded World 2015 in Nuremberg, where we're talking about security and the increasing demand for it in both computers and consumer devices. Thierry Bousquet has been kind enough to join me. Let's talk about the ST secure element and how it's helping to protect data privacy and the internet of things world. Yes, exactly. So I will demonstrate in this demonstration how you can build a secure solution using STM32 plus a secure element which is called KERKI. What is KERKI? KERKI is a secure element. It is embedded in this board which is inside this IoT. Okay, but let's play and let's start with a demo and let's start with a game. Okay, so in this game I will measure my health using this MEMS and you will see on screen my health. But after I will corrupt the data and will show you how the secure element can help you to protect your data privacy. Okay, so let's start by measurement of my health. As you can see on screen, shaking the MEMS, I measure my health and well done, it seems... Congratulations. Okay, but this is a good story. Okay, in the bad story you can imagine that someone acts your system and because you have no secure elements, your measurement will be bad forever and someone will publish data on the internet and not good data. Okay, so let's imagine and we enable a fake server device. Okay, I know I will restart and I will play with my game. If I measure my health, well done, there is something bad. As you can see, 25% of my health, my system was corrupted by a server. Okay, in fact the server is what? The server is a man in the middle attack. Someone in the internet, change the data between the IoT and the server. Okay, now I will prefer to show you the good things. The good thing is the fact that there is a secure element and the secure element protects your data. Kierke secure elements, ST chip protects your data. So now I will enable the secure elements. Okay, now we are in mode secure. As you can see, there was data exchange between the IoT and the server. The first data that was sent by the fake server, in fact the server detected that the device IoT connected was not authenticated. So there was something that detects that the system was fully active. Okay, go, go, go. So after there is many other cases. In fact, in terms of cryptography, there is different attack that can be done. You could have attack for device authentication that could have attack for data integrity. Someone can change your data. Okay, but also you can have problem of firmware upgrade. Firmware upgrade is what is somewhat change the software that is upgraded to your IoT. Let's see that. So just to finish, last example. Okay, let's imagine I publish a bad firmware inside my IoT. Okay, as you can see there, the firmware is upgrading, but thanks to the secure elements, there will have something that detects that the firmware sent to the secure element was bad. And as you can see, the firmware verification failed and the firmware was corrupted. So everything is fine with the secure elements. I'm reassured. Thank you. Thanks for your time.