Booking.com
W
E
AR
E
H
IR
IN
G
Work @ Booking: http://grnh.se/seomt7
Security Theatre
@thomas_shone
Image by Matt McGee released under CC BY-ND 2.0
https://joind.in/talk/172ca
Illusion
Denial
I know about OWASP!
If you are hacked via OWASP Top
10, you’re not allowed to call it
“advanced” or “sophisticated”
@thegrugq
Reference: https://twitter.com/thegrugq/status/658991205816995840
But I use antivirus!
Crypting services makes most
antivirus techniques useless
Reference: http://krebsonsecurity.com/2014/05/antivirus-is-dead-long-live-antivirus/
Security Theatre - PHP UK Conference
Let us put an unsecured node.js
server on your personal
computer
TrendMicro Antivirus on Windows
Jan 2016
https://code.google.com/p/google-security-research/issues/detail?id=693
Remote code-executions via your
mail client downloading an
email
Sophos Antivirus
June 2015
https://lock.cmpxchg8b.com/sophailv2.pdf
Security Theatre - PHP UK Conference
Internet of Things
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Reference: https://www.yahoo.com/tech/dutch-consumer-group-demands-samsung-151703102.html
We’re all bad at security
Users are bad at security
➢ Weak passwords
➢ Password reset questions
➢ Human verification sucks
➢ Clickbait and phishing
➢ Attachments
➢ URL mistype
➢ Routine and workarounds
➢ Convenience trumps security
Developers are bad at security
Reference: https://github.com/
Hackers are bad at security
A study in scarlet
43 applications, libraries or frameworks
over 4,800 versions
over 10 million files
255,000 scans
About 6k/month from June 2012 till now
Results
July 2015
Most popular software
It’s not what you think
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
How bad is it?
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Why is it so bad?
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
I have seen things
Ph'nglui mglw'nafh Cthulhu R'lyeh wgah'nagl fhtagn
Security Theatre - PHP UK Conference
Versioning Hell
1.3-final-beta6-pre-patch3
OpenX
Backdoored for almost a year
Security Theatre - PHP UK Conference
Lessons Learnt
Versioning
Projects with bad versioning also have some
of the worst security issues
Automatic Patching
If your software comes with automatic
upgrading, people will use it
Plugins and Templates
If an update needs manual changes for
plugins or template, no one updates
Patch Fatigue Exists
Image by Aaaron Jacobs released under CC BY-SA 2.0
Anger
Image by Josh Janssen released under CC BY-ND 2.0
Why doesn’t someone do
something about it?
Private industry keep
threatening security researchers
"How many Fortune 500
companies are hacked right now?
Answer, 500."
Mikko Hypponen, CRO of F-Secure
Reference: https://twitter.com/mikko/status/184329161257652227
Why don’t we have some form of
standard?
We have ISO 27001/2, ISO 15408,
RFC 2196, PCI DSS, NIST, …
Reference: https://en.wikipedia.org/wiki/Cyber_security_standards
Why doesn’t the government do
something about it?
A Ukrainian power plant was
hacked & shutdown because
someone had macros enabled in
Excel
Reference: https://t.co/PA7cDQC9EI
Security Theatre - PHP UK Conference
NSA: We’re just upgrading your
megaflops, promise.
Reference: https://t.co/PA7cDQC9EIImage by Unknown released into the Public Domain
Bargaining
Image by Jeroen Moes released under CC BY-SA 2.0
But what if we installed
advanced IDSs, WAFs and
specialised network hardware
We probably only knew about
one of the two backdoors in our
system
Juniper Networks
Dec 2015
http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-
government-backdoors/
IDSs produce reports. Managers
likes reports: it helps them feel
like they can "manage" security
http://security.stackexchange.com/questions/12164/how-effective-is-an-ids-at-catching-targeted-
attacks
We’ll start following prescribed
security standards
That’s great for your insurance
premiums
Depression
Ninety percent of
everything is crap.
Sturgeon's law
Reference: https://en.wikipedia.org/wiki/Sturgeon%27s_law
Acceptance
Image by Stephan Brunet released under CC BY-SA 3.0
Effective?
Most of our security
practices are ineffective
We do security in
isolation
Holistic
Hardware
Drivers
Services
Your Dependencies
Operating System
Your Software
Humans
Network / Internet
Area of Influence
Drivers
Services
Operating System
203.5M LoC
Area of Influence
Hardware
Disclaimer: Numbers generated using cloc (Service LoC limited to latest releases of MySQL, Apache and PHP)
Operating System
Area of Influence
Humans DNA
7B LoC
Source: http://www.examiner.com/article/dna-the-ultimate-source-code
Hardware
Drivers
Services
Your Dependencies
Operating System
Your Software
Humans
Network / Internet
HR/Training
System
Administrators
Downstream
Providers
Layered
Image by Cadw released under OGL via Commons
Image by Albert Bridge released under CC BY-SA 2.0
Surface Area
Alertness
Image by MeganCollins released under CC BY-NC-ND 3.0
Mitigation
Image by Pivari.com released under CC BY-SA 3.0
Trust
Trust?
Be aware of what you’re
trusting
The hardest part of
security is not writing
secure code
It’s understanding
where you misplace
your trust
Trust is a chain
I trust my computer is not
compromised
Up-to-date patches
TR
U
ST
I trust that the software is
without vulnerability
Vulnerability research and security updates
TR
U
ST
I trust that the software is
configured properly
Automated provisioning
TR
U
ST
I trust that the network is
configured properly and secure
Good system administrators
TR
U
ST
I trust you are who you say you
are
TLS Certificate Peer Verification or
Authentication
TR
U
ST
I trust you are allowed to talk to
me about this topic
Authorization
TR
U
ST
I trust that what you send me
hasn’t been tampered with
Hashes or signatures
TR
U
ST
I trust that what we talk about is
just between us
Public and private keys
TR
U
ST
I trust your computer is not
compromised
????
TR
U
ST
I trust that what we talk about
won’t be share with others
Contracts, Legalities, Terms of use, ????
TR
U
ST
I trust that the user won’t be the
weak link
Training and procedures
TR
U
ST
Turn your chain into a
mesh
Image by ineverfinishanyth released under CC BY-NC-SA 2.5
Common Mistakes
Weakening
Compromising encryption or hashing is
about reducing time to crack
Implementation
A bad implementation helps reduce the time
to crack
Authentication
2 Factor Authentication
composer require pragmarx/google2fa
OAuth2
composer require league/oauth2-client
Sessions
Image by Wouter van Emmerik released under CC BY-SA 3.0
Never roll your own
if (strstr($_SERVER['QUERY_STRING'],'session_to_unset') != false)
{
parse_str($_SERVER['QUERY_STRING']);
session_write_close();
session_id($session_to_unset);
session_start();
$_SESSION = array();
session_write_close();
session_destroy();
exit;
}
Mistakes
Deep understanding of the language
C
O
D
E
SAM
PLE
Reference: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2505
if (strstr($_SERVER['QUERY_STRING'],'session_to_unset') != false)
{
parse_str($_SERVER['QUERY_STRING']);
session_write_close();
session_id($session_to_unset);
session_start();
$_SESSION = array();
session_write_close();
session_destroy();
exit;
}
Mistakes
Deep understanding of the language
C
O
D
E
SAM
PLE
Reference: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2505
Writes $_SESSION to
disk
if (strstr($_SERVER['QUERY_STRING'],'session_to_unset') != false)
{
parse_str($_SERVER['QUERY_STRING']);
session_write_close();
session_id($session_to_unset);
session_start();
$_SESSION = array();
session_write_close();
session_destroy();
exit;
}
Mistakes
Deep understanding of the language
C
O
D
E
SAM
PLE
Extracts URL parameters into
the namespace.
session_to_unset=a becomes
$session_to_unset = “a”;
Reference: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2505
Encryption
Image by Wouter van Emmerik released under CC BY-SA 3.0
Never roll your own
Security Theatre - PHP UK Conference
Avoid old tutorials on
encryption
https://gist.github.com/paragonie-
scott/e9319254c8ecbad4f227
Failed: Error Number: 60. Reason: SSL certificate problem, verify that
the CA cert is OK. Details: error:14090086:SSL routines:
SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
// Many old tutorials and posts suggest disabling peer verifications
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
// Thankfully PHP 5.6+ handles CA certificate location automatically
// now thanks to https://wiki.php.net/rfc/improved-tls-defaults and
// Daniel Lowrey
Avoid advice like this
Weakening security for convenience
C
O
D
E
SAM
PLE
Hashing
Image by Wouter van Emmerik released under CC BY-SA 3.0
Never roll your own
One way encoding
Comparisons / Integrity Checks
278,362,281
Number of accounts publicly leaked
Reference: https://haveibeenpwned.com/
Weak hash functions
+/- 690GB rainbow tables
$password = 'rasmuslerdorf';
$hash = '$2y$10$.vGA1O9wmRjrwAVXD98HNOgsNpDczlqm3Jq7KnEd1rVAGv3Fykk1a';
// Is this call safe?
if (crypt($password, $hash) === $hash) {
echo 'Password is correct';
}
// What about this one?
if (password_verify($password, $hash)) {
echo 'Password is correct';
}
Bad implementation
Where is the weakness?
C
O
D
E
SAM
PLE
Timing Attacks
Brute forcing cryptographic functions via
time taken to execute
$string1 = 'abcd';
$string2 = 'abce';
$string3 = 'acde';
for ($i=0; $i<10000; $i++) { ($string1 === $string2); }
// Time taken: 0.008344
for ($i=0; $i<10000; $i++) { ($string1 === $string3); }
// Time taken: 0.006923
Timing Attacks
How it works
C
O
D
E
SAM
PLE
Timing attacks can be used to
work out if an account exists [...].
@troyhunt, haveibeenpwned.com
Reference: https://t.co/5WkQ48suj7
Well actually
Amount of randomness matters
Reference: http://blog.ircmaxell.com/2012/12/seven-ways-to-screw-up-bcrypt.html
$password = 'rasmuslerdorf';
$hash = '$2y$10$.vGA1O9wmRjrwAVXD98HNOgsNpDczlqm3Jq7KnEd1rVAGv3Fykk1a';
// Check the password
if (password_verify($password, $hash)) {
echo 'Password is correct';
if (password_needs_rehash($hash, PASSWORD_DEFAULT)) {
// Rehash and store in database
$new_password = password_hash($password, PASSWORD_DEFAULT);
}
}
Rehash
Build it into your flow
C
O
D
E
SAM
PLE
Randomness
Image by Wouter van Emmerik released under CC BY-SA 3.0
Never roll your own
Non-deterministic randomness
is critical in encryption
Used for key generation and nonces
Non-deterministic randomness
is hard
Dual_EC_DRBG was in use for 7 years
// NOT cryptographically secure
rand();
// Cryptographically secure (uses OS-specific source)
random_int();
// Cryptographically secure (uses OS-specific source)
random_bytes();
// Cryptographically secure (uses OpenSSL library)
openssl_random_pseudo_bytes();
Random in code
Know the source
C
O
D
E
SAM
PLE
Information Disclosure
HEAD http://example.com/index.php
200 OK
Connection: close
Date: Sat, 26 Dec 2015 13:52:01 GMT
Server: Apache
Content-Type: text/html; charset=UTF-8
Client-Date: Sat, 26 Dec 2015 13:52:01 GMT
Client-Peer: 192.168.0.101:80
Client-Response-Num: 1
X-Powered-By: PHP/5.5.11
Information Disclosure
Every piece of information can be leveraged
LO
G
SAM
PLE
HEAD http://example.com/index.php
200 OK
Connection: close
Date: Sat, 26 Dec 2015 13:52:01 GMT
Server: Apache
Content-Type: text/html; charset=UTF-8
Client-Date: Sat, 26 Dec 2015 13:52:01 GMT
Client-Peer: 192.168.0.101:80
Client-Response-Num: 1
X-Powered-By: PHP/5.5.11
Information Disclosure
Every piece of information can be leveraged
LO
G
SAM
PLE
Warning: require(assets/includes/footer.php) [function.require]: failed
to open stream: No such file or directory in
/home/user/path/to/assets/includes/operations.php on line 38
Fatal error: require() [function.require]: Failed opening required
'assets/includes/footer.php' (include_path='.:/usr/lib/php:
/usr/local/lib/php') in /home/user/path/to/assets/includes/operations.
php on line 38
Information Disclosure
Every piece of information can be leveraged
LO
G
SAM
PLE
Social Engineering
Weak password reset
processes
Can you Google the answer?
How do you handle customer support reset?
Customer support
training
Convenience vs Security
@N’s (Naoki Hiroshima) Story
How do you mitigate against this?
Dip your
toes in the
Sea of
Security
James Titcumb
14:40
New Relic
Track
Hope
Image by Jenny released under CC BY-NC-ND 2.0
Holistic
A.B.C.
Always Be C Patching
Patching Strategy
If a dependency prevents updating, resolve it
now
Version properly
Major.Minor.Patch. How hard is that?
Don’t become
comfortable
Comfort breeds contempt
Read
Know about new threats and best practice
changes
Training Strategy
Have a process for dealing with account
locks and resets
Compromise Strategy
Have a plan before you need it
Information
Only store what you really need
Mistakes will be made
Learn from them
Rate limit
Built it now, or you’ll have to build it while an
incident is underway
Monitor everything
You’re more likely to be alerted by a graph
spiking than your IDS
Decouple roles
Databases, servers, domains, roles, ...
Composer everything
There is no excuse anymore
Decouple
plugins/templates
Updates should be simple
Get behind PSR-9 & 10
http://www.php-fig.org/psr/
Group
Performance
Image by Matt McGee released under CC BY-ND 2.0
Thank you
https://joind.in/talk/172ca
@thomas_shone

More Related Content

PDF
Security Theatre - Benelux
PDF
Security Theatre (PHP Leuven)
PDF
Security Theatre - AmsterdamPHP
PDF
Security theatre (Scotland php)
PPTX
Wireless Pentesting: It's more than cracking WEP
PDF
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
PDF
Why Web Security Matters!
PDF
Hackers tools (816 4816-10)
Security Theatre - Benelux
Security Theatre (PHP Leuven)
Security Theatre - AmsterdamPHP
Security theatre (Scotland php)
Wireless Pentesting: It's more than cracking WEP
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Why Web Security Matters!
Hackers tools (816 4816-10)

What's hot (20)

PDF
WPSecurity best practices of securing a word press website
PDF
2013 april-screen
PDF
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
PDF
Hhs en05 system_identification
ODP
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
PDF
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
PDF
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
PDF
13. Neville Varnham - PeopleSoft Cyber Security
PPT
Ethical Hacking
PPTX
Holland safenet livehack hid usb pineapple_cain_oph_with_video
PDF
CloudFlare vs Incapsula: Round 2
PPTX
Top 13 best security practices
PPTX
ExpertsLiveEurope The New Era Of Endpoint Security
PPT
Owasp universal-http-do s
PDF
Eat Your Vegetables - Data Security for Data Scientists
PDF
Hhs toc glossary
PPTX
Adversary tactics config mgmt-&amp;-logs-oh-my
PDF
Stop expecting magic fairy dust: Make apps secure by design
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPTX
Hardening Enterprise Apache
WPSecurity best practices of securing a word press website
2013 april-screen
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
Hhs en05 system_identification
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
13. Neville Varnham - PeopleSoft Cyber Security
Ethical Hacking
Holland safenet livehack hid usb pineapple_cain_oph_with_video
CloudFlare vs Incapsula: Round 2
Top 13 best security practices
ExpertsLiveEurope The New Era Of Endpoint Security
Owasp universal-http-do s
Eat Your Vegetables - Data Security for Data Scientists
Hhs toc glossary
Adversary tactics config mgmt-&amp;-logs-oh-my
Stop expecting magic fairy dust: Make apps secure by design
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Hardening Enterprise Apache
Ad

Viewers also liked (20)

PDF
Dip Your Toes in the Sea of Security (PHP UK 2016)
PDF
Ростислав Михайлив "Zend Framework 3 - evolution or revolution"
PPTX
Magento done right - PHP UK 2016
PPTX
Hacking Your Way To Better Security - Dutch PHP Conference 2016
PPTX
Crafting beautiful software
PDF
Deploy to azure in less then 15 minutes
PPTX
Programming in hack
PPTX
Debugging Effectively
PDF
From Doctor to Coder: A Whole New World?
PPTX
Scaling your website
PDF
Your own recommendation engine with neo4j and reco4php - DPC16
PDF
DPC 2016 - 53 Minutes or Less - Architecting For Failure
PDF
Feature Flags Are Flawed: Let's Make Them Better - DPC
ODP
The treacherous road to microservices
PDF
Driving Design through Examples
PDF
Como programar melhor jogando game boy
PDF
Elasticsearch, the story so far
PDF
Being functional in PHP (DPC 2016)
PDF
OOP: Princípios e Padroes
PDF
Introducing Eager Design
Dip Your Toes in the Sea of Security (PHP UK 2016)
Ростислав Михайлив "Zend Framework 3 - evolution or revolution"
Magento done right - PHP UK 2016
Hacking Your Way To Better Security - Dutch PHP Conference 2016
Crafting beautiful software
Deploy to azure in less then 15 minutes
Programming in hack
Debugging Effectively
From Doctor to Coder: A Whole New World?
Scaling your website
Your own recommendation engine with neo4j and reco4php - DPC16
DPC 2016 - 53 Minutes or Less - Architecting For Failure
Feature Flags Are Flawed: Let's Make Them Better - DPC
The treacherous road to microservices
Driving Design through Examples
Como programar melhor jogando game boy
Elasticsearch, the story so far
Being functional in PHP (DPC 2016)
OOP: Princípios e Padroes
Introducing Eager Design
Ad

Similar to Security Theatre - PHP UK Conference (20)

PDF
Security Theatre - Confoo
PDF
Web security 101
PDF
PPT
Dmk bo2 k8_ccc
PPTX
Secure Software: Action, Comedy or Drama? (2017 edition)
PDF
Cybersecurity State of the Union
PDF
Basic Security for Digital Companies - #MarketersUnbound (2014)
PPTX
Vulnerabilities on Various Data Processing Levels
PPTX
Security is not a feature
PDF
blobargasa hahahaha foooolz gold xd lol bla
PDF
2013 - Mark story - Avoiding the Owasp
ODP
PLMCE - Security and why you need to review yours
PPTX
Vulnerabilities in data processing levels
PPTX
The path of secure software by Katy Anton
PPTX
Confidence web
PDF
Computer & Data Security
PDF
Web Security
PDF
How not to suck at Cyber Security
PDF
Watch How The Giants Fall: Learning from Bug Bounty Results
PPTX
Web Vulnerabilities - Building Basic Security Awareness
Security Theatre - Confoo
Web security 101
Dmk bo2 k8_ccc
Secure Software: Action, Comedy or Drama? (2017 edition)
Cybersecurity State of the Union
Basic Security for Digital Companies - #MarketersUnbound (2014)
Vulnerabilities on Various Data Processing Levels
Security is not a feature
blobargasa hahahaha foooolz gold xd lol bla
2013 - Mark story - Avoiding the Owasp
PLMCE - Security and why you need to review yours
Vulnerabilities in data processing levels
The path of secure software by Katy Anton
Confidence web
Computer & Data Security
Web Security
How not to suck at Cyber Security
Watch How The Giants Fall: Learning from Bug Bounty Results
Web Vulnerabilities - Building Basic Security Awareness

More from xsist10 (6)

PDF
I put on my mink and wizard behat - Confoo Canada
PDF
I put on my mink and wizard behat (talk)
PDF
I put on my mink and wizard behat (tutorial)
PDF
I put on my mink and wizard behat
PDF
PHP SA 2014 - Releasing Your Open Source Project
PPT
PHP SA 2013 - The weak points in our PHP projects
I put on my mink and wizard behat - Confoo Canada
I put on my mink and wizard behat (talk)
I put on my mink and wizard behat (tutorial)
I put on my mink and wizard behat
PHP SA 2014 - Releasing Your Open Source Project
PHP SA 2013 - The weak points in our PHP projects

Recently uploaded (20)

PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
SaaS reusability assessment using machine learning techniques
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Auditboard EB SOX Playbook 2023 edition.
Improvisation in detection of pomegranate leaf disease using transfer learni...
Data Virtualization in Action: Scaling APIs and Apps with FME
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Co-training pseudo-labeling for text classification with support vector machi...
SaaS reusability assessment using machine learning techniques
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Module 1 Introduction to Web Programming .pptx
giants, standing on the shoulders of - by Daniel Stenberg
Convolutional neural network based encoder-decoder for efficient real-time ob...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Comparative analysis of machine learning models for fake news detection in so...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf

Security Theatre - PHP UK Conference