SlideShare a Scribd company logo
Jarrod Overson
Director of Engineering at Shape Security
How do they work and what does it mean for the future?
DEEPFAKES
Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
The state of deepfakes1
Beyond faceswaps2
How to detect the current generation3
The future of disinformation4
Agenda
Deepfakes - How they work and what it means for the future
Deepfakes, then:
GAN-assisted celebrity faceswaps in adult videos.
Deepfakes, now:
Believable, AI-assisted content in any format.
Faceswap
The project formed in response to the rise of deepfakes on reddit.
DeepFaceLab
#2 in open source deepfake projects
FakeApp
Once popular, now defunct
Zao
Chinese mobile app that went from release to #1 in two days.
Step 1
Collect source and destination material
Source
● Images with the target's face.
Destination
● The video you are looking to modify
Step 2
Extract faces
Histogram of Ordered Gradients
● Reduce every image to greyscale
● Calculate direction of gradient for every
pixel
Step 3
Detect features
● Identify features that anchor a
face
● Look for videos and sources with
minimally obstructed faces.
Step 4
Train your model
Generative Adversarial Networks (GANs)
Introduced by Ian J. Goodfellow in 2014
Training Data
Output
Generative Model Discriminative Model
?
?
Generative Adversarial Networks (GANs)
Let's say we want to make butterflies
How good did we do? 0% good.
Generative Model
Generative Model
How good did we do? 10% good.
Generative Model
How good did we do? 20% good.
Step 5
Convert
The state of deepfakes
Beyond faceswaps
How to detect the current generation
The future of disinformation
Agenda
1
2
3
4
Faceswaps are what go viral
but machine-generated media comes in many forms.
Generative Artwork https://www.youtube.com/watch?v=5jfViPdYLic
Generative Artwork
Estimated worth: $7,000 - $10,000. Actual sale price: $432,500
Generative Artwork
Generating arbitrary images
https://github.com/NVlabs/styleganNone of these people exist.
Generating arbitrary text
https://talktotransformer.com/
Generating images from text
• the flower shown has yellow anther red pistil
and bright red petals.
• this flower has petals that are yellow, white and
purple and has dark lines
• the petals on this flower are white with a yellow
center
• this flower has a lot of small round pink petals.

• this flower is orange in color, and has petals that
are ruffled and rounded.
• the flower has yellow petals and the center of it
is brown
• this flower has petals that are blue and white.

• these white flowers have petals that start white
in color and end in a white towards the tips.
https://github.com/zsdonghao/text-to-image
Voice recognition and transcription
Mozilla's Common Voice
https://voice.mozilla.org/en
Text to speech
Beyond voice fonts: TacoTron2 & Waveglow
https://devblogs.nvidia.com/generate-natural-sounding-speech-from-text-in-real-time/?linkId=100000007949356
Voice Skinning
https://modulate.ai/
Marionetting existing video
Using facial features from a source to manipulate destination video
https://www.youtube.com/watch?v=ohmajJTcpNk
Marionetting existing video
Using facial features from a source to manipulate destination video
The state of deepfakes
Beyond faceswaps
How to detect the current generation
The future of disinformation
Agenda
1
2
3
4
Resolution differences between suspect portions and rest of video.
Pay attention to shots where the face is angled or obscured.
Pay attention to shots where the face is angled or obscured.
Look at how facial features scale with the rest of the head
Ears, jawline, & hairline alignments may change in different scenes.
Look at how facial features scale with the rest of the head
Ears, jawline, & hairline alignments may change in different scenes.
Look for inconsistent skin tones/shimmering
Particularly around the borders of suspect areas.
This is all temporary though.
Detection is an arms race we will lose.
The state of deepfakes
Beyond faceswaps
How to detect the current generation
The future of disinformation
Agenda
1
2
3
4
https://firstdraftnews.org/infodisorder-definitional-toolbox/
How do we identify disinformation?
Does it look suspicious?
Do we trust the source?
Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
Fake Article that lasted on Wikipedia for over 1 year.
0 million
550 million
1,100 million
1,650 million
2,200 million
Q4 17 Q1 18 Q2 18 Q3 18 Q4 18 Q1 19
https://fbnewsroomus.files.wordpress.com/2019/05/cser-data-snapshot-052219-final-hires.png
Facebook banned 2.2 Billion fake accounts in Q1 of 2019 alone
How many accounts were caught automatically?
How many accounts were caught automatically?
99.8%
99.8%
of all fake Facebook accounts
were caught automatically.
43.8 million
accounts were not caught until
reported.
1
user is all it takes to spread
disinformation.
An internet scale problem.
Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
Deepfakes - How they work and what it means for the future
Not a real quote.
We already have a "fake" problem.
What normal traffic looks like
Traffic at a top US retailer.
Fake logins were 92% of the traffic.
Top 3 web retailer
91% fake
Top EU airline
79.5% fake
Major hotel chain
47% fake
Deepfakes - How they work and what it means for the future
BADASS is a nonprofit organization dedicated to providing support to
victims of revenge porn/image abuse.
If you find yourself victim of unauthorized photo sharing, deepfakes or
otherwise, contact https://badassarmy.org/
THANK YOU
Jarrod Overson
@jsoverson on twitter, github, and medium.

More Related Content

What's hot

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
Symeon Papadopoulos
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
spchinchole20
 
DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
sandeshsb
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
Anca Georgiana Rusu
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
Weverify
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
Symeon Papadopoulos
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
Ian McCarthy
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
Rakshit Shrestha
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
NandeeshNandhu2
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
vivatechijri
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
Edge AI and Vision Alliance
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
CSIRO National AI Centre
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
Fares Hasan
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
SuprithaRavishankar
 
What are deepfakes?
What are deepfakes?What are deepfakes?
What are deepfakes?
Dr Janet Bastiman
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Exploring Generating AI with Diffusion Models
Exploring Generating AI with Diffusion ModelsExploring Generating AI with Diffusion Models
Exploring Generating AI with Diffusion Models
KonfHubTechConferenc
 

What's hot (20)

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
What are deepfakes?
What are deepfakes?What are deepfakes?
What are deepfakes?
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Exploring Generating AI with Diffusion Models
Exploring Generating AI with Diffusion ModelsExploring Generating AI with Diffusion Models
Exploring Generating AI with Diffusion Models
 

Similar to Deepfakes - How they work and what it means for the future

Essay On Community Service Benefits. Online assignment writing service.
Essay On Community Service Benefits. Online assignment writing service.Essay On Community Service Benefits. Online assignment writing service.
Essay On Community Service Benefits. Online assignment writing service.
Nicole Charles
 
5 Steps to Tactical Social Selling
5 Steps to Tactical Social Selling5 Steps to Tactical Social Selling
5 Steps to Tactical Social Selling
InsideView
 
Software Development in a Funky Manner to meet client requirements best
Software Development in a Funky Manner to meet client requirements bestSoftware Development in a Funky Manner to meet client requirements best
Software Development in a Funky Manner to meet client requirements best
Peter Horsten
 
Intuition & Use-Cases of Embeddings in NLP & beyond
Intuition & Use-Cases of Embeddings in NLP & beyondIntuition & Use-Cases of Embeddings in NLP & beyond
Intuition & Use-Cases of Embeddings in NLP & beyond
C4Media
 
Can asia be the next silicon valley
Can asia be the next silicon valleyCan asia be the next silicon valley
Can asia be the next silicon valley
Benjamin Joffe
 
Visuals to Make Your Ideas Take Off
Visuals to Make Your Ideas Take OffVisuals to Make Your Ideas Take Off
Visuals to Make Your Ideas Take Off
MattVassar1
 
002 Example Of Descriptive Essay Essays Examples O
002 Example Of Descriptive Essay Essays Examples O002 Example Of Descriptive Essay Essays Examples O
002 Example Of Descriptive Essay Essays Examples O
April Ford
 
The 7 Secrets of Socially Successful Businesses
The 7 Secrets of Socially Successful BusinessesThe 7 Secrets of Socially Successful Businesses
The 7 Secrets of Socially Successful Businesses
F7 Social Media Accelerator Programme for Business
 
Rand Fishkin - The Invisible Giant that Mucks Up Our Marketing
Rand Fishkin - The Invisible Giant that Mucks Up Our MarketingRand Fishkin - The Invisible Giant that Mucks Up Our Marketing
Rand Fishkin - The Invisible Giant that Mucks Up Our Marketing
Marketing Festival
 
Presentation Visuals
Presentation VisualsPresentation Visuals
Presentation Visuals
bthat
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Steve Poole
 
Getting comfortable with Data
Getting comfortable with DataGetting comfortable with Data
Getting comfortable with Data
Ritvvij Parrikh
 
REALTOR on the Go: Taking Your Real Estate Business Mobile
REALTOR on the Go: Taking Your Real Estate Business MobileREALTOR on the Go: Taking Your Real Estate Business Mobile
REALTOR on the Go: Taking Your Real Estate Business Mobile
Maura Neill
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Seattle Interactive Conference
 
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextGIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
Steve Poole
 
The Future of Search: How Measuring Satisfaction Will Enhance Our Personal ...
The Future of Search:  How Measuring Satisfaction Will  Enhance Our Personal ...The Future of Search:  How Measuring Satisfaction Will  Enhance Our Personal ...
The Future of Search: How Measuring Satisfaction Will Enhance Our Personal ...
teamozlo
 
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
teamozlo
 
Groundswell Presentation for ECCF
Groundswell Presentation for ECCFGroundswell Presentation for ECCF
Groundswell Presentation for ECCF
ssjennings1
 
Microblog-genre noise and its impact on semantic annotation accuracy
Microblog-genre noise and its impact on semantic annotation accuracyMicroblog-genre noise and its impact on semantic annotation accuracy
Microblog-genre noise and its impact on semantic annotation accuracy
Leon Derczynski
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 

Similar to Deepfakes - How they work and what it means for the future (20)

Essay On Community Service Benefits. Online assignment writing service.
Essay On Community Service Benefits. Online assignment writing service.Essay On Community Service Benefits. Online assignment writing service.
Essay On Community Service Benefits. Online assignment writing service.
 
5 Steps to Tactical Social Selling
5 Steps to Tactical Social Selling5 Steps to Tactical Social Selling
5 Steps to Tactical Social Selling
 
Software Development in a Funky Manner to meet client requirements best
Software Development in a Funky Manner to meet client requirements bestSoftware Development in a Funky Manner to meet client requirements best
Software Development in a Funky Manner to meet client requirements best
 
Intuition & Use-Cases of Embeddings in NLP & beyond
Intuition & Use-Cases of Embeddings in NLP & beyondIntuition & Use-Cases of Embeddings in NLP & beyond
Intuition & Use-Cases of Embeddings in NLP & beyond
 
Can asia be the next silicon valley
Can asia be the next silicon valleyCan asia be the next silicon valley
Can asia be the next silicon valley
 
Visuals to Make Your Ideas Take Off
Visuals to Make Your Ideas Take OffVisuals to Make Your Ideas Take Off
Visuals to Make Your Ideas Take Off
 
002 Example Of Descriptive Essay Essays Examples O
002 Example Of Descriptive Essay Essays Examples O002 Example Of Descriptive Essay Essays Examples O
002 Example Of Descriptive Essay Essays Examples O
 
The 7 Secrets of Socially Successful Businesses
The 7 Secrets of Socially Successful BusinessesThe 7 Secrets of Socially Successful Businesses
The 7 Secrets of Socially Successful Businesses
 
Rand Fishkin - The Invisible Giant that Mucks Up Our Marketing
Rand Fishkin - The Invisible Giant that Mucks Up Our MarketingRand Fishkin - The Invisible Giant that Mucks Up Our Marketing
Rand Fishkin - The Invisible Giant that Mucks Up Our Marketing
 
Presentation Visuals
Presentation VisualsPresentation Visuals
Presentation Visuals
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Getting comfortable with Data
Getting comfortable with DataGetting comfortable with Data
Getting comfortable with Data
 
REALTOR on the Go: Taking Your Real Estate Business Mobile
REALTOR on the Go: Taking Your Real Estate Business MobileREALTOR on the Go: Taking Your Real Estate Business Mobile
REALTOR on the Go: Taking Your Real Estate Business Mobile
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
 
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextGIDS-2023 A New Hope for 2023? What Developers Must Learn Next
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
 
The Future of Search: How Measuring Satisfaction Will Enhance Our Personal ...
The Future of Search:  How Measuring Satisfaction Will  Enhance Our Personal ...The Future of Search:  How Measuring Satisfaction Will  Enhance Our Personal ...
The Future of Search: How Measuring Satisfaction Will Enhance Our Personal ...
 
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016
 
Groundswell Presentation for ECCF
Groundswell Presentation for ECCFGroundswell Presentation for ECCF
Groundswell Presentation for ECCF
 
Microblog-genre noise and its impact on semantic annotation accuracy
Microblog-genre noise and its impact on semantic annotation accuracyMicroblog-genre noise and its impact on semantic annotation accuracy
Microblog-genre noise and its impact on semantic annotation accuracy
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 

More from Jarrod Overson

Practical WebAssembly with Apex, wasmRS, and nanobus
Practical WebAssembly with Apex, wasmRS, and nanobusPractical WebAssembly with Apex, wasmRS, and nanobus
Practical WebAssembly with Apex, wasmRS, and nanobus
Jarrod Overson
 
AppSecCali - How Credential Stuffing is Evolving
AppSecCali - How Credential Stuffing is EvolvingAppSecCali - How Credential Stuffing is Evolving
AppSecCali - How Credential Stuffing is Evolving
Jarrod Overson
 
How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019
Jarrod Overson
 
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
Jarrod Overson
 
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Jarrod Overson
 
The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.
Jarrod Overson
 
How to Reverse Engineer Web Applications
How to Reverse Engineer Web ApplicationsHow to Reverse Engineer Web Applications
How to Reverse Engineer Web Applications
Jarrod Overson
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
Jarrod Overson
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
Jarrod Overson
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16
Jarrod Overson
 
Graphics Programming for Web Developers
Graphics Programming for Web DevelopersGraphics Programming for Web Developers
Graphics Programming for Web Developers
Jarrod Overson
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of Security
Jarrod Overson
 
JavaScript and the AST
JavaScript and the ASTJavaScript and the AST
JavaScript and the AST
Jarrod Overson
 
ES2015 workflows
ES2015 workflowsES2015 workflows
ES2015 workflows
Jarrod Overson
 
Maintainability SFJS Sept 4 2014
Maintainability SFJS Sept 4 2014 Maintainability SFJS Sept 4 2014
Maintainability SFJS Sept 4 2014
Jarrod Overson
 
Idiot proofing your code
Idiot proofing your codeIdiot proofing your code
Idiot proofing your code
Jarrod Overson
 
Riot on the web - Kenote @ QCon Sao Paulo 2014
Riot on the web - Kenote @ QCon Sao Paulo 2014Riot on the web - Kenote @ QCon Sao Paulo 2014
Riot on the web - Kenote @ QCon Sao Paulo 2014
Jarrod Overson
 
Managing JavaScript Complexity in Teams - Fluent
Managing JavaScript Complexity in Teams - FluentManaging JavaScript Complexity in Teams - Fluent
Managing JavaScript Complexity in Teams - Fluent
Jarrod Overson
 
Real World Web components
Real World Web componentsReal World Web components
Real World Web components
Jarrod Overson
 
Managing JavaScript Complexity
Managing JavaScript ComplexityManaging JavaScript Complexity
Managing JavaScript Complexity
Jarrod Overson
 

More from Jarrod Overson (20)

Practical WebAssembly with Apex, wasmRS, and nanobus
Practical WebAssembly with Apex, wasmRS, and nanobusPractical WebAssembly with Apex, wasmRS, and nanobus
Practical WebAssembly with Apex, wasmRS, and nanobus
 
AppSecCali - How Credential Stuffing is Evolving
AppSecCali - How Credential Stuffing is EvolvingAppSecCali - How Credential Stuffing is Evolving
AppSecCali - How Credential Stuffing is Evolving
 
How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019
 
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
 
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
 
The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.
 
How to Reverse Engineer Web Applications
How to Reverse Engineer Web ApplicationsHow to Reverse Engineer Web Applications
How to Reverse Engineer Web Applications
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16
 
Graphics Programming for Web Developers
Graphics Programming for Web DevelopersGraphics Programming for Web Developers
Graphics Programming for Web Developers
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of Security
 
JavaScript and the AST
JavaScript and the ASTJavaScript and the AST
JavaScript and the AST
 
ES2015 workflows
ES2015 workflowsES2015 workflows
ES2015 workflows
 
Maintainability SFJS Sept 4 2014
Maintainability SFJS Sept 4 2014 Maintainability SFJS Sept 4 2014
Maintainability SFJS Sept 4 2014
 
Idiot proofing your code
Idiot proofing your codeIdiot proofing your code
Idiot proofing your code
 
Riot on the web - Kenote @ QCon Sao Paulo 2014
Riot on the web - Kenote @ QCon Sao Paulo 2014Riot on the web - Kenote @ QCon Sao Paulo 2014
Riot on the web - Kenote @ QCon Sao Paulo 2014
 
Managing JavaScript Complexity in Teams - Fluent
Managing JavaScript Complexity in Teams - FluentManaging JavaScript Complexity in Teams - Fluent
Managing JavaScript Complexity in Teams - Fluent
 
Real World Web components
Real World Web componentsReal World Web components
Real World Web components
 
Managing JavaScript Complexity
Managing JavaScript ComplexityManaging JavaScript Complexity
Managing JavaScript Complexity
 

Recently uploaded

Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 

Recently uploaded (20)

Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 

Deepfakes - How they work and what it means for the future