 Hi, so please introduce yourself. Hi, I'm Eric Ford from ProvenRun. And at ProvenRun we are helping our customer to succeed in securing their devices in the IoT market. And cyber security is all about ProvenRun. So we are helping our customer to identify their security risks. We are helping them to put in place the right security architecture. And we are helping them also to succeed in their cyber security certification. On the other side, this is where we are helping the customer, you know, in moving forward in the process of securing the devices. We are also providing really highly secure products. So we have our flagship product, Provencore, right? And Provencore is a secure micro-canon that has been certified at the highest security possible level, common criteria EL7. And this is a world premiere. This is for Cortex-A, for RISC 5, 64-bit processors. We are also helping our customer for smaller devices based on the MCU's right with a second secure micro-canon. As an example, we have a very nice partnership with ST Microelectronics on the STM32 H5. And we have also a secure app provider. So in a very brief nutshell, this is what we are providing to our customer, help to succeed in their certification process, in their cyber security certification, and also in implementing their cyber security services on top of our product. Thank you very much. So right here, you say, is this the most secure in the world system? Yeah, we are the only one. Most secure. Can you describe how it's the most secure? And what does it mean by the first, when you say the level? I gave the CC level. What is the CC level? It's common criteria. This is the most demanding cyber security norms. And EL7 means that we have developed proven core secure kernel, secure operating system using formal methods, and we have proven mathematically the correctness of the kernel and the cyber security functionality of the kernel. So it's not that easy to get to that level? Not at all. It took us about seven years to develop the kernel and two years to achieve the mathematical proof, the formal proof. Can you describe what's the challenge in developing the kernel to be secure like that? Yes, I can describe it. First of all, the current security kernel, you know, has been developed with a usual development method using a C language, for instance. The challenge is that when you are using formal methods to develop software, those methods were well-fitting for functional software, piece of code, but not well-fitting for developing an operating system, a secure operating system. So we had to create our own formal language as a first step in order to be able to achieve the development of the secure operating system and to be able to prove it formally, means proving it mathematically. And so you have a long experience in getting stuff like that done? Yes, yes. Our CEO and founder, Dominic Bolignano, has been the inventor of the concept of the trusted execution environment, which means the secure kernel more than 20 years ago. And because he found out that the way of the existing TE in the market, you have one in your mobile phone so far, we never reached the sufficient level of cybersecurity. He decided to go further down the road to target the highest possible level of cybersecurity that we can achieve currently. If you go over there, you have a few posters. You have the proven core M. Yes, this is the micro-carnate here for MCUs. This is what is currently part of the ST Microratonic ST M32 H5 secure manager. If you go to the ST booth, you will see this live. You will have live demos. We have also a very nice partnership with Xilinx on the CREA, some module that is a Null Trascale MPSOC based system on module where our flagship product proven core is providing security services. Also nice innovation. Beyond ARM architecture, currently RISC 5 is growing up in the embedded market. So we have a partnership with the sci-fi to demonstrate how proven core brings security functionality above sci-fi, world-guard separation mechanism. And last but not least, it's great to talk about partnership, to talk about innovation. But it's also really great to present a real-life product. For instance, we have worked with Engrave, that is a company building a crypto wallet. This is a product that is on the market. As you can imagine, when you are talking about cryptocurrency, you need a very high level of security. And Engrave has used our product to secure their crypto wallet and to keep the secret very safe in regard of the security requirement. And this wallet has been developed using ST micro processors using proven core, our product, and using also Linux as a retrace. Isn't the most secure crypto wallet in the world? We believe so. You would have to ask a question to Engrave, but we are very proud about this achievement with our customer, with Engrave. And can you explain a little bit the trust execution environment and there's an open-source version of it? Yes, you have an open-source solution, OPTI, exactly. And you are involved in that one? No, but our funder has been at the root of the T concept and he invented the concept. OPTI is an open-source T, but OPTI has a fairly low level of cybersecurity. So if you scale OPTI on the Command Criteria cybersecurity scale, OPTI, you can reach Command Criteria level two, level two plus. Cyber certification level has at proven core. We have achieved Command Criteria EL7 cyber certification. To do security, it has to do with keeping some secrets and stuff like that. You want to not reveal the secrets. There's not only encryption. It's like an architecture that you don't tell people how it works and stuff like that. No, it's not by hiding the people. I can show you how does it work for instance here. So let me rewind a little bit about the T and the Secure S concept. Cyber security is all about the trusted computing base. So the trusted computing base is the piece of software that has to be highly secure and on which you will build your security services. Currently, many people are already doing cybersecurity with an operating system like Linux, Android, RTOS, right? But those are very big. And we've got... those have cybersecurity issues almost every day. If you look at Linux, you will find vulnerabilities published on a daily basis, right? So it's too big to protect properly your application, your device. So what's happened is that we use a TV that is sitting in a secure area provided by the hardware, for instance for ARM. This is the ARM TrustZone Secure World, right? Or if you use RISC 5, it is in a trusted area, a separated area, managed by WorldGuard. And then you can have a very highly secure microkernel, right? Very small, proven at the highest level of cybersecurity on top of which you create your secure application. You are talking about secure storage. It is one example. So you will manage your secrets like keys, like certificates through this environment, right? And the RISC OS will request the secure environment to cipher, decipher the data, for instance, to manage the keys and so on. But we are not stopping at just encryption, decryption at a secure storage. We have the ability to implement more sophisticated cybersecurity services such as firmware updates, such as filtering, data filtering that goes over the network, right? You want to control like VPN, for instance. So there is many additional services. And here you have the list of services, for instance, right? You may want to implement trusted user interface. You may want to implement intrusion detection systems. So you don't trust Linux or Android to do this. You will trust the secure part to achieve this kind of task. Nice. You're based in France? Yeah, we are a French company. We are a French company based in both Paris and Sofie Antipolis near Nice. And when we talk about cybersecurity and the continent of Europe wants to have better security, and even the chips might come manufactured in another continent, you want to bring it over, you want to be secure, but you work with customers all over the world. Yes, we have customers all over the world. We have customers in North America, obviously in France, in Europe. We have customers in Asia-Pac also. Cool. And is it busy in the middle world? It was very good for us. We were really busy, busy all those past three days. Cool.