SlideShare a Scribd company logo
1
WebAuthn and security
keys = unlocking the key
to authentication
Christiaan Brand
Product Manager, Google
2
It’s no secret -
passwords aren't enough
123456
Most popular
password in 2015
password
2nd most popular
password in 2015
*Verizon data breach report, 2015
123456789
Most popular
password in 2018
qwerty
2nd most popular
password in 2018
*techviral.net
success rate for
a well designed
password phishing
page
of account vulnerabilities
were due to weak or
stolen passwords
*Verizon data breach report, 2017
43% 81%
*Google study
3.3B+
credentials leaked
in dumps
67M
accounts proactively
re-secured
17%
minimum password
reuse rate
* * * *
Data breaches, phishing, or malware? Understanding the risks of stolen
credentials (Thomas et al.) https://ai.google/research/pubs/pub46437
999.
SMS usability
Coverage issues,
delay, user cost
Device usability
One per site,
expensive, fragile
User experience
Users find it hard
Phishable
OTPs are increasingly phished
?
Any second factor improves user security,
but...
9
Password
Server
https://www.google.com
Web authentication
10
https://www.goggle.com
https://www.goggle.com
Phishing attack | Step 1
11
https://www.goggle.com
Phishing attack | Step 2
12
Password Password
google.comgoggle.com
https://www.goggle.com
Phishing attack | Step 3
13
At Google,
on our journey to replacing
the password, we started by
making the password safer
14
Introducing security key
Your password
Security key
Account data
15
Based on
asymmetric
cryptography
● User’s device mints new key pair,
gives public key to server
● Server asks user’s device to sign
data to verify user
● One device, many services, “bring
your own device” enabled
Core idea - standard public key cryptography
16
How security key works
“I promise a user is here”,
“the server challenge was: 337423”,
“the origin was: google.com”
Server
Password
https://www.google.com
17
Security key defeats phishing
Password
goggle.com
Password
“I promise a user is here”,
“the server challenge was: 337423”,
“the origin was: goggle.com”
Server
https://www.goggle.com
18
Google’s
experience
19
Deployment at Google
Enterprise use case
● Mandated for Google employees
● Corporate SSO (web)
● SSH
● Forms basis of all authentication
Consumer use case
● Available as opt-in for Google consumers
● Adopted by other relying parties too:
Dropbox, Github
20
Use cases at Google
Bootstrapping
● It’s only used when employee signs in on a new device the first time.
● It protects against phishing.
● Removable security key is carried as part of the badge.
Hardware credential binding
● Once signed into a device, long-lived tokens (cookies, etc) are usually issued.
● Occasionally, a local security key touch is required, which is presented in
combination with this local token.
● This is to ensure the token is still being presented from a machine we trust.
21
Time to
authenticate
OTP via SMS
OTP via app
Security Keys
OTP
Security Keys
50
40
30
20
10
0
Timetoauthenticate(s)
50
40
30
20
10
0
Timetopresent2ndfactor(s)
Google employees Consumer users
22
Time to
authenticate
OTP via SMS
OTP via app
Security Keys
OTP
Security Keys
50
40
30
20
10
0
Timetoauthenticate(s)
50
40
30
20
10
0
Timetopresent2ndfactor(s)
Google employees Consumer users
"If you've been reading your e-mail" takeaway:
Security keys are faster
to use than OTPs
23
Second factor
support
incidents
Supportincidentsperuserpermonth
PercentofusersusingSecurityKeys
100
80
60
40
20
0Jul2014
Sep
2014
N
ov
2014
Jan
2014
M
ar2014
M
ay
2014
Jul2014
Sep
2014
N
ov
2014
OTP
Security Key
Active Security Key users
24
Second factor
support
incidents
Supportincidentsperuserpermonth
PercentofusersusingSecurityKeys
100
80
60
40
20
0Jul2014
Sep
2014
N
ov
2014
Jan
2014
M
ar2014
M
ay
2014
Jul2014
Sep
2014
N
ov
2014
OTP
Security Key
Active Security Key users
"If you've been reading your e-mail" takeaway:
Security keys cause fewer
support incidents than OTPs
25
We’re not
quite done
26
We made the password a lot safer with U2F,
but we want to go one step further: we want
to remove the password from the equation
That’s where FIDO2 and WebAuthn come in
27
What is WebAuthn? How does it relate to FIDO2?
W3C WebAuthnFIDO CTAP
FIDO2
Client
(Computer, phone)
Built-in authenticator
(fingerprint)
Remote server
(Website)
Removable authenticator
(Phone, security key)
28
WebAuthn
enables user
journeys
that are:
Simple
Very intuitive and
easy for user
Secure
Resistant to phishing
WebAuthn / What is WebAuthn?
29
Authentication has two core user journeys
WebAuthn / FIDO2 enables multiple use cases
BootstrapRe-authentication
30
Meet
Elisa
31
Elisa wants to sign in to her bank
She starts on her mobile browser and
enrolls in fingerprint after sign-in
Registering and using built-in authenticator for re-auth (mobile web)
32
1. Registering built-in authenticator for re-auth (mobile web)
Request
UV=true
X-Plat=false
Result
credential
(internal,caBLE)
Elisa opens
launches her
mobile browser,
Chrome, and goes
to Tri-Bank
33
1. Registering built-in authenticator for re-auth (mobile web)
She signs in with
her username and
password
34
1. Registering built-in authenticator for re-auth (mobile web)
Tri-Bank shows a promo
asking Elisa if she wants
to opt in to fingerprint to
sign in
She opts in and
continues to her account
35
Elisa comes back to
Tri-Bank in another session
2a. Using built-in authenticator for re-auth (mobile web)
36
2a. Using built-in authenticator for re-auth (mobile web)
The next time Elisa
opens Tri-Bank on
mobile browser,
she gets a
fingerprint dialog
Request
credentialId
(internal)
Since the user already signed in on this device, the credential ID is encoded in the
cookie and the RP requests the “internal” transport only (since they don’t want the user
to see prompts about external authenticators).
37
2a. Using built-in authenticator for re-auth (mobile web)
Using only her
fingerprint, she’s
able to sign in
without using her
username + password
on mobile web
Request
credentialId
(internal)
38
Elisa downloads Tri-Bank
from the Play Store
She launches the app for the first time
to sign in to check her funds
2b. Using built-in authenticator for re-auth (native mobile app)
39
Request
UV=true
X-Plat=false
Result
credential
(internal,caBLE)
Request
credentialId
(internal)
Request
(Alternative)
{empty
credentialId}
Will result in
prompt to insert
removable SK
2b. Using built-in authenticator for re-auth (native mobile app)
She installs
Tri-Bank from
Google Play Store
and opens the app
40
2b. Using built-in authenticator for re-auth (native mobile app)
Elisa chooses
“Sign In” and also
chooses an
account
Request
credentialId
(internal)
41
Elisa is now asked
to authenticate
with the
fingerprint dialog
2b. Using built-in authenticator for re-auth (native mobile app)
42
Elisa wants to sign in to
her bank on her
desktop computer
3. Cross-platform bootstrap
43
Elisa chooses to
sign in on her
desktop browser
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
3. Cross-platform bootstrap
44
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Elisa enters her
account username
and chooses to
proceed “next”
3. Cross-platform bootstrap
45
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
She’s asked to verify
the new device using
her Pixel 2 phone’s
fingerprint that she’s
been using to sign in
to Tri-Bank
3. Cross-platform bootstrap
46
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Because Elisa has a
Macbook with Touch
ID, Tri-bank asks her
if she wants to use
local fingerprint on
the device
3. Cross-platform bootstrap
47
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Elisa gets
prompted to
try using the
local fingerprint
on the device
3. Cross-platform bootstrap
48
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
She opts-in and
continues to her
account
3. Cross-platform bootstrap
49
When Elisa comes back to
Tri-Bank on the Macbook Pro
50
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
4. Using built-in authenticator for re-auth
Elisa comes back
to sign in on her
desktop browser
51
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
4. Using built-in authenticator for re-auth
A fingerprint
dialog appears
above the sign-in
page and Elisa
touches the sensor
52
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
4. Using built-in authenticator for re-auth
Elisa’s identity is
accepted and
she’s signed in
53
Note that we’re
inheriting the strength
of the credentials from
the initial bootstrap
If in Step 1 we only ask the
user for a username +
password, the strength of
all the derived credentials
are only as good as a
username + password.
If in Step 1 we ask for a
stronger credential (2nd
factor security key), all of
the derived credentials
would inherit those
stronger attributes too.
54
Now let’s
meet Jim
55
Jim has a
fingerprint-enabled
security key
and is signing into his
desktop computer
5. Typeless bootstrap flow
56
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
5a. Typeless bootstrap flow (registration)
Jim comes to
sign in with his
desktop computer
57
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Jim enters his
account username
and chooses to
proceed “next”
5a. Typeless bootstrap flow (registration)
58
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Jim enters his
account password
5a. Typeless bootstrap flow (registration)
59
Jim is asked to
verify with a 2nd
verification step
5a. Typeless bootstrap flow (registration)
60
He gets a
promotion for
typeless
verification,
and enrolls
5a. Typeless bootstrap flow (registration)
61
5a. Typeless bootstrap flow (registration)
Jim inserts
Security Key and
taps the sensor
on the key
62
Jim’s Security Key
is enrolled and
ready to be used
5a. Typeless bootstrap flow (registration)
63
Jim uses a new device with
his registered security key
64
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Jim decides to
use his friend’s
Windows computer
to sign-in
5b. Typeless bootstrap flow (log in)
65
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
Jim inserts
Security Key and
taps on the sensor
5b. Typeless bootstrap flow (log in)
66
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
He chooses account
he wants amongst
the other accounts
that are registered
on the SK
5b. Typeless bootstrap flow (log in)
67
Request
credentialId
(internal)
Request (Alternative)
{empty credentialId}
Will result in prompt to insert removable SK
He signed in
without username
or password
5b. Typeless bootstrap flow (log in)
68
How can I
get started?
Desktop/laptop
● WebAuthn support was
launched in Chrome 67.
● The initial release
supports only
external tokens.
● Support for built-in
modalities is coming
later in the fall.
Android
● FIDO2 APIs on Android
are available in
pre-release mode.
● Support for FIDO2 on
the web (to built-in
fingerprint sensor) will
come later in the fall.
Visit webauthndemo.appspot.com to try it out
69
Questions?
70
That’s a wrap

More Related Content

What's hot (19)

PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
PDF
An introduction to blockchain and hyperledger v ru
LennartF
 
PPTX
FIDO Workshop-Demo Breakdown.pptx
FIDO Alliance
 
PPTX
Haemorrhagic sapticemia in Livestock
DrMdMushtaqWadud
 
PPTX
Infertility in bitch
Anya Goc
 
PDF
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
PDF
Securing a Web App with Passwordless Web Authentication
FIDO Alliance
 
PPTX
What is corda
Celine George
 
PPT
Treatment for mange in dogs
John Reynolds
 
ODP
Overview of Decentralized Identity
Jim Flynn
 
PPTX
Equine viral arteritis
Rajat Sagare
 
PDF
سلسلة الدعم الفنى للأطباء البيطريين ا.د حامد عطيه
hamed attia
 
PDF
Animal welfare during pandemics and natural disasters
Harm Kiezebrink
 
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
PDF
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
PDF
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
PPTX
WebAuthn - The End of the Password As We Know It?
Thomas Konrad
 
PPTX
Domestic Rabbits Pasteurellosis.pptx
BhoopendraMishra7
 
PDF
FIDO2 Specifications Overview
FIDO Alliance
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
An introduction to blockchain and hyperledger v ru
LennartF
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Alliance
 
Haemorrhagic sapticemia in Livestock
DrMdMushtaqWadud
 
Infertility in bitch
Anya Goc
 
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
Securing a Web App with Passwordless Web Authentication
FIDO Alliance
 
What is corda
Celine George
 
Treatment for mange in dogs
John Reynolds
 
Overview of Decentralized Identity
Jim Flynn
 
Equine viral arteritis
Rajat Sagare
 
سلسلة الدعم الفنى للأطباء البيطريين ا.د حامد عطيه
hamed attia
 
Animal welfare during pandemics and natural disasters
Harm Kiezebrink
 
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
WebAuthn - The End of the Password As We Know It?
Thomas Konrad
 
Domestic Rabbits Pasteurellosis.pptx
BhoopendraMishra7
 
FIDO2 Specifications Overview
FIDO Alliance
 

Similar to Web Authn & Security Keys: Unlocking the Key to Authentication (20)

PDF
WebAuthn and Security Keys
FIDO Alliance
 
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Michael Furman
 
PDF
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
PDF
Google FIDO Authentication Case Study
FIDO Alliance
 
PDF
Chrome Dev Summit 2020 Extended: Improve Your Web Authentication Security
Yu-Shuan Hsieh
 
PDF
Web Authentication: a Future Without Passwords?
Natasha Rooney
 
PDF
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
FIDO Alliance
 
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit
 
PDF
Google & FIDO Authentication
FIDO Alliance
 
PDF
WebAuthn
Kelley Robinson
 
PDF
CNIT 129: 6. Attacking Authentication
Sam Bowne
 
PPTX
Getting Started With WebAuthn
FIDO Alliance
 
PDF
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
PPTX
Identiverse 2019 Security Key Lifecycle
derekhanson13
 
PDF
2020-08_The_Evolution_of_Authentication.pdf
FerriantoSuryanto
 
PDF
Two Factor Authentication and You
Chris Stone
 
PPTX
Digital authentication
allanh0526
 
PDF
The state of passwordless auth on the web
Phil Nash
 
PPTX
Leaving Passwords Behind (Software Design & Development 2019)
Scott Brady
 
PDF
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
OKsystem
 
WebAuthn and Security Keys
FIDO Alliance
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Michael Furman
 
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
Google FIDO Authentication Case Study
FIDO Alliance
 
Chrome Dev Summit 2020 Extended: Improve Your Web Authentication Security
Yu-Shuan Hsieh
 
Web Authentication: a Future Without Passwords?
Natasha Rooney
 
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
FIDO Alliance
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit
 
Google & FIDO Authentication
FIDO Alliance
 
WebAuthn
Kelley Robinson
 
CNIT 129: 6. Attacking Authentication
Sam Bowne
 
Getting Started With WebAuthn
FIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
Identiverse 2019 Security Key Lifecycle
derekhanson13
 
2020-08_The_Evolution_of_Authentication.pdf
FerriantoSuryanto
 
Two Factor Authentication and You
Chris Stone
 
Digital authentication
allanh0526
 
The state of passwordless auth on the web
Phil Nash
 
Leaving Passwords Behind (Software Design & Development 2019)
Scott Brady
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
OKsystem
 
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Ad

Recently uploaded (20)

PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PPTX
ipv6 very very very very vvoverview.pptx
eyala75
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PDF
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
PPTX
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PPTX
Internet_of_Things_Presentation_KaifRahaman.pptx
kaifrahaman27593
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
ipv6 very very very very vvoverview.pptx
eyala75
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
英国学位证(RCM毕业证书)皇家音乐学院毕业证书如何办理
Taqyea
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
Internet_of_Things_Presentation_KaifRahaman.pptx
kaifrahaman27593
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 

Web Authn & Security Keys: Unlocking the Key to Authentication