ashar

joined 2 years ago
MODERATOR OF
 

Security at high speed - How Vipps secures their APIs

Nora Tomas & Kenneth Wang Pedersen

From an outside perspective, login systems can seem very simple. In the Vipps app, for example, you just use biometrics (or a PIN code), and you’re in with a blink of an eye! How much work goes into creating such a system? What would happens if someone stole your Vipps PIN code? Why doesn’t Vipps simply have a “log in with Facebook” button?

Our login system, Vinx, gives an answer to these questions. Vinx is the authentication system for the Vipps app. With over 1,2 billion transactions per year Vinx needs to be both fast and secure. We will give a technical deep-dive into how Vinx authenticates users and what security-mechanisms the system has in place. You will learn about how Zero Knowledge Proofs are used in practice, the token mechanisms we have in place, how we cryptographically link an authentication to a payment, and much more! You will also learn about how speed and security don’t have to be mutually exclusive, but rather work in synergy.

After this presentation, the next time you log in to the Vipps app, you’ll know what’s happening in the background!

Nora Tomas & Kenneth Wang Pedersen Nora Tomas & Kenneth Wang Pedersen

Nora is a developer at Vipps MobilePay. She is engaged in the security community by taking part in organising the Security Festival, and speaking at various events. She is especially interested in how to develop secure authentication systems, and loves breaking down complicated topics in a simple way.

Kenneth is an Engineering Manager and developer at Vipps MobilePay. He has over 20 years of experience in software development. The last years Kenneth has focused on building authentication systems. He has played a key role in building the main login system to the Vipps app, ensuring that millions of users can log in quickly and safely.

#PSD2 #paymentsystems

 

Software Supply Chain Attacks with Mackenzie Jackson from GitGuardian : Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson (@advocatemack) from @GitGuardian about the benefits of using Honeytokens, which organisations can benefit from them and whats involved in deploying them and next steps once they are triggered.

5
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

In the Fall, 2016, Uber experienced a data breach, and the CISO faced the possibility of prison time for felony obstruction and misprision for failure to report the 2016 breach. He was sentenced in May, 2023 to 3 years’ probation. Join the former CISO of Uber as we discuss the events which led to the prosecution case, the results of the trial and aftermath, and the implications for CISOs and what is needed to move the cybersecurity industry forward.

 

Security BSides St. John's is a community-organized cybersecurity conference, held in St. John's, Newfoundland and Labrador, Canada. We're the longest consecutively-running BSides event in Canada, and one of the longest globally.

This event was held on 20 September 2023.

Livestream video

Schedule from the conference website

3
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

SEC-T is an affordable, non-profit, English speaking, two days [actually 3 days. ed] , single track information security/hacking conference taking place in late summer every year in Stockholm, Sweden. At SEC-T we focus on providing our audience with high-quality talks and in-depth “QnA” with speakers. SEC-T is a conference where you can feel safe from sales pitches and marketing presentations as we have a large focus on our speakers’ research and first-person accounts.

Talk description on the SEC-T website

view more: ‹ prev next ›