 My name is Ralph. I'm a researcher at Technician Institute in Munich and you may have heard about all this stuff concerning SSL and men in the middle that you did note our meltdown of this year. So what we propose is following a suggestion by Kai Engert to have a little tool. You may know convergence, okay? So this is a setup of our tool. You have some user surfing, going to a server and then back checking with our notary server if she's seeing the correct certificate. Our server does the check. You get a report of the result and what happens. Okay. So far so good. And this is what everything changes because unlike convergence or perspectives, what we propose now to do is to trace through to the server. So Alice does a trace route across the men in the middle, reports the result to our cross bear tool. And this actually has a list of hunting tasks that you can pull from the server. So any user out there can pull this hunting task list and also do trace routes for us to the server. And the whole goal now is to get a good estimate of where the men in the middle is sitting in this case in the left corner. And it's usually a Wi-Fi access point in this case. But that's what we're interested really in. We want to collect data. Where is the man in the middle? What is he doing? That's what we do as a researcher. So Bob reports, we get the results and we evaluate all that stuff. I don't have much time to go into details here, but of course, the more users we have, the more accurate our traces will be. And our hope, for example, is can we distinguish if we have a state level attacker where the man in the middle is sitting on the border router of the autonomous system, or do we have some weird hacker or black hat who's sitting on the Wi-Fi access point of some hotel. That's what we propose to do. It's a young project. We have written most of it. First release will be mid-January, but we need Bob's and Bobina's to use it. Feel free to talk to me after the talk here. I'll be sitting somewhere over there and you can access our website, find us on Twitter or here. Well, that's all from me. Thanks. And actually, you've got two minutes and 50 seconds if you want to take questions. Are you good? Sure. Okay. We have Harold Angels with microphones, so please just try to flag them down and we'll head over to you as quickly as possible. Again, because there are many more people watching this on the streams, they won't hear you unless you speak into a microphone. So please go ahead and if you have a question, say it into the mic and find one of these guys. They'll come to you. Any questions? One down here. Can you only use data from people that are sure that they are in a man in the middle attack or can you use data from everyone? You can use it with any Firefox at the moment, whatever your situation is in. It has two components. One is the guarding part, which is exactly like convergence. In fact, convergence is one of our backends. Or you can use the second component as well where you pull the hunting tasks and work for us. So for a moment, it's only Firefox, manpower and all that. More questions? Okay. Give them a huge round of applause for finishing on time.