Welcome to our free webinar series about the most interesting topics in cyber security that we divide into two categories:
Telefónica Cyber Security Tech Talks: Our experts, Chief Security Ambassadors, also known as CSAs, will give talks once a month on the most relevant and interesting topics within the cyber security sector.
Code Talks for Devs: Our webinars about programming for developers with the geekiest themes in which we discuss about programming languages, code, technical integrations, APIS and much more!
Don't miss them!
In this talk we show you how a Macintosh SE (1986) can connect to the Internet via a Raspberry Pi and special connections to enjoy unlimited storage via Google Photos and special encoding of image files.
In this talk we will see how it is possible to analyse static code and obtain the output on heatmaps and thus detect, at a glance, possible vulnerabilities.
In this talk we show you how to do a mini audit of BLE devices using Micro:Bit cards, with small programs made with MakeCode to explain them.
In this talk we will address the main features of HomePWN, a tool designed to audit IoT devices. In addition, we will show some use cases and explain how it is possible to create a module and provide new functionality to the framework.
Diego Espitia, Chief Security Ambassador of ElevenPaths, leads this episode in which we talk about SIEMs and our Open Source tool to analyze some events.
In this talk we tell you what is and how does DIARIO, our document malware detector that respects the privacy of the content of the files.
In this talk we show you a proof of concept web service authentication service based on the machine learning analysis of a Rubik 3x3x3 cube's movements using the cube resolution sequences that can send their rotation and positioning sequences through the BLE protocol.
First chapter of the fourth season of Code Talks for Devs, our cyber security webinars for developers. In this edition, Ioseba Palop, from Telefónica's Crazy Ideas team, is leading the webinar on our flagship tool: FOCA.
New payment methods help us in our everyday life, but pay attention, because they also involve security risks. In this special edition of our talks we will clarify everything related to new payment methods!
New technologies as Machine Learning may also be used in the field of cybersecurity. We discuss this topic and answer your questions over this talk.
Our expert Fran Ramirez, from Telefonica's CDO Crazy Ideas team, shows a practical application of Stack SMS (an internally developed architecture that allows communications via GSM network).
Medical data are really sensitive and meaningful, so protecting them becomes highly important. Over this webinar we will talk about the main challenges faced by cybersecurity in health and medical environments.
Our expert Lucas Fernández, from Telefónica's CDO Crazy Ideas team, relies on a tool presented by Hexway's security team that allows for the extraction of sensitive information and, based on new functionalities added by our team, makes this tool an effective service for raising users' awareness of the information that could be obtained from their Apple mobile device.
Leakage of sensitive documents is a major issue that all companies must consider for their security strategy. Over this webinar we will analyze the major cases occurred and provide some tips to prevent your organization from suffer them.
For this webinar we count on two very special guests, Álvaro Lancho González and Marcos Rodríguez Sánchez-Villacañas, who have developed a project called ParanoidBox from a Master's Degree Project.
It is a security box in which data can be accessed, but cannot leave, based on concepts of robust digital identity, redundancy of control systems and even a proof of life.
Are you worried about your privacy when surfing the Internet? So don’t miss this webinar where we will answer your doubts about the sensitive issue of Network data privacy.
Do you know about Car Hacking? Do you know how to connect to a car? Which are the standards? In this webinar you will find out about vulnerabilities, controls, brands, models and the future of cybersecurity on Smart Cars. Don’t miss it!
In this webinar for developers we have two top experts: Pablo Gonzalez and Ioseba Palop, part of the CDO's Crazy Ideas team from Telefónica.
Our experts present Wild Wild Wifi, an internally developed proof of concept (PoC) in which they manage to change the connection password from a router-device connection, among other things.
In this chapter, our expert from Telefónica CDO's Crazy Ideas team, Fran Ramírez, teaches how to integrate our digital latch, Latch, into the Docker environment and open source system for deployment automation as Kubernetes.
If you are interested in our tool and want to learn new tricks as a developer you can't miss this webinar.
We present the 2nd part of the webinar started on 6 June, where we focused on the different mechanisms available to ensure users’ authentication.
In this chapter, our experts from Telefónica's CDO Crazy Ideas team, Lucas Fernández and Josué Encinar, study the amount of data that can be extracted from a business card.
If you are interested in knowing more about data leaks, how our tool works and even how to include plugins in it, don't miss this webinar!
The first webinar on the importance of ensuring users’ proper authentication. Don’t miss it!
In this chapter we introduce Latch IoT, a project about hardware hacking that uses the new firmware for Sonoff developed by Itead and that, thanks to this and our tool Latch, you will be able to control the IoT devices in your home.
The person in charge of leading this chapter is our expert Álvaro Núñez-Romero, member of the Innovation and Laboratory team.
Did you know that Biohacking can change people’s life? In this webinar we talk about all this science may do to help people.
This webinar for developers will focus on the new challenges that are emerging around the increasingly important videogame industry.
Our expert Enrique Blanco will guide you step by step through different practices that, by means of Machine Learning, will allow you to learn how to train an agent so that he learns to operate in different environments generated from the OpenAI Gym framework.
Don’t miss this #11PathsTalks where our experts will deepen the importance of ensuring correct data transfer and management of Internet of Things.
Our expert Pablo González presents iBombShell, a tool developed by the Crazy Ideas department of Telefónica's CDO area with our Innovation Lab.
We will see how to do pentesting from anywhere, simply by having access to a computer with Powershell installed. In addition, you can contribute and participate in this open source project.
In this chapter of our free webinars for developers, our expert Álvaro Núñez-Romero presents the Latch tool and how to interact with it through voice assistants such as Siri, Alexa or Google Home.
Pablo González and Lucas Fernández, experts from the Crazy Ideas team at Telefónica's CDO area, use SMS as a channel to encapsulate communications with the help of an SMS stack proof of concept.
In addition, we show you the composition of the packages and formats and the access to GitHub where any user can use the SDK for Android. Hit play!
Managing mobile devices within an enterprise is tedious work for many reasons. In this webinar we are going to review different solutions that help us to perform these controls in small and large companies.
Our expert Mateo González explains this tool based on a double authentication system like Latch.
This provides an extra security layer since the access to the system, in addition to having a password, is controlled by Latch's mobile APP. The double authentication factor can be the difference between being a victim of a cybercriminal and staying protected. Don't miss this webinar!
Learn how to keep your computer safe from possible information leaks from both a technological and procedural point of view. Don't miss out!
FOCA is one of our flagship tools. We have grown with it and have completely re-engineered the tool. In addition, it has been published in an open source way so you can enjoy every line of code and improve it if you want.
In this talk, José Sperk, one of the responsible for this reengineering, tells us how to create a plugin for the tool. Let's hack!
During this #11PathsTalks, we will show you from different attacks to wifi networks, what possibilities the big manufacturers offer from the design of their architectures to protect us from the attacks of these networks. Learn with our experts!
In this talk, our expert Pablo González explains how to fortify a WordPress system, the most used CMS in the world.
The goal of the "WordPress in Paranoid Mode" tool is to protect the database from uncontrolled access. To do this, Latch is used at the trigger level of the database, having three modes of operation: Administration, Edition and Read Only.
In this webinar we are going to focus into the concept of Threat Intelligent, which tools are used, the methodology and colaborations levels, and more. If you want to be threat detection expert, don’t miss out this #11PathsTalks.
Our expert Santiago Hernandez talks about LiLaS, a tool that allows you to select the traffic that circulates through our network at a protocol level by using Latch.
In addition, we will see how we can use Latch webhooks to provide a self-initialization mechanism in which a device is listening to a network and automatically enters the protocols circulating through it in order to regulate them.
Many of our specialists have given talks, developed tools, demos and proofs of concept related to Social Engineering. In this webinar we are going to devote ourselves to these questions and to see how we can provoke the "victims".
In this talk, our expert Álvaro Núñez-Romero explains how MITM attacks, a common technique used in network attacks, work with our Evil FOCA tool. This tool is open source and you can find its code in our GitHub.
We will analyze parts of the code such as the main core and the attacks that can be performed with the application. Don't miss this webinar!
We will look into the security issues and explain through practical demonstrations what are the main controls that we must take into account, how to implement them, and with what tools we can audit them. Press play hacker!
Our expert Pablo González talks about the UAC-A-Mola tool, its architecture and how simple it is to build a module that adapts to our needs with basic programming knowledge.
In addition, we will see what a UAC bypass is and how we can use the tool to investigate, detect, exploit and mitigate this type of security flaws in the latest Windows operating systems. Put your knowledge to the test with this webinar!
Join this webinar in which we will talk about issues related to Yara Rules and market tools to keep our browsers safe. Do you want to know more? Don't miss out!
Our experts Guillermo Román and Javier Gutiérrez talk about Air Profiling, a technique that allows, through the traffic collected by probes that monitor WiFi traffic, to process this information and profile the different users.
The aim of this project is to exploit insecurities in wireless networks and the use of non-secure protocols. Want to know more? Don't miss this webinar.
In this #11PathsTalks we will approach in a practical way and with demonstrations, the foundations of the Smart Contracts. This will include the main security recommendations at the time of designing and coding them, as well as different techniques of code audit and contract verification. We will also see cases of practical and real uses where this technology is already being used successfully.
Our expert Fran Ramirez talks about the networks that exist between isolated computer equipments even separated in different subnetworks or geographical locations.
These interconnections are created by plugging USB devices in different machines within a corporate network, so it would be possible to spread malware between computers that in theory don't even have an Internet connection, like the famous case of Stuxnet. Don't miss this webinar!
Denial of service attacks continue to be a constant concern for any public entity, as well as for a business organization whose business processes are supported in the network. During this ElevenPaths Talks, we will discuss the attack techniques and defense strategies that we use. Don't miss out!
Our experts Danilo Ninabanda, Ignacio Jimenez and Lucas Fernandez explain how to implement Latch as an extra layer of security in a Coinbase portfolio.
The project aims to protect all portfolio functionality by blocking and redirecting to an error page when the Latch lock is closed.
Don't miss this webinar where our expert Alessandro Fanio explains step-by-step the easy integration of Latch security into a PHP web application.
We present the latest ElevenPaths Talks Special Edition of the third season with our CSA Manager, Rames Sarwat, and a special guest, Dr. Alfonso, a reputed cryptography expert to ask him about this and other related topics in order to clear any doubts and to understand the state-of-the-art quantum technology and its expected evolution in the coming years. We hope you find it interesting. Do not miss it!
In this talk, developer Javier Espinosa explains step by step how easy it is to integrate Latch security into JAVA web applications. Don't miss this webinar!
Our expert Ioseba Palop explains step by step the integration of Latch security in a web application generated with .NET. Don't miss this webinar!
Our expert Javier Espinosa tells how to protect a resource in an Android application by using Limited Secrets so that it can be distributed without risk.
When a scenario like the one explained above occurs, a compromised secret can allow an attacker to perform API operations that a developer does not want to happen. To avoid such cases we have created the Limited Secrets functionality in Latch.
You have probably known and used FOCA, the most popular pentesting tool of ElevenPaths. Do you know what the difference with the new Open Source FOCA? Our expert, Pablo González, tells you about the improvements of this new version, capable of automating the detection process.
Router-type network devices are the gateway to the large Internet network. For this reason, among many others, they are a critical point where threats are very present.
This solution has been carried out by Javier Alcaraz within the ElevenPaths Universities program. He proposes to integrate Latch into an OpenWRT system and provide a layer of abstraction to the complexity of network security.
Closing the third season of ElevenPaths Talks, we present a webinar about Security Forces status to fight against cybercrime. Join our CSAs Jorge Rivera and Carlos Ávila.
Learn everything you need to know about the new GDPR regulations with our experts, Francisco Oteiza and Juan Antonio Gil. Since May 2018, it will be mandatory to comply throughout the European Union.
Our CSE Carmen Torrano analyzes the use case of "Detection of anomalies in network traffic" using Isolation Forest algorithms.
She offers a practical vision of how to use the Pandas datascience and Machine Learning Scikit-Learn libraries, and resources such as transforms and pipelines, which are so useful when transferring network traffic characteristics to be analyzed by the algorithms.
In this webinar, our CSAs Gabriel Bergel and Diego Espitia, together with an special guest will analyze the Open Data concept and legal implication to those who use this public information. Don’t miss out this Talk!
Our expert Álvaro Núñez-Romero introduces MicroLatch, a way of bringing Latch to the physical world. It is a small microcontroller with Wi-Fi very common in IoT devices.
MicroLatch can be applied to any DIY project to have a little more security in our hardware and software developments.
Do we know how Mobile Security System works? Our experts Claudio Caracciolo and Rames Sarwat will talk with a special guest about common attacks to GSM, 3G, LTE, etc. Learn with our experts!
Our experts Ioseba Palop and Carlos del Prado explain how to implement a second authentication factor with TOTPs using Latch as a tool to generate the access codes.
We will start with an application NodeJS + Express and .NET + MWC that uses a conventional system of user authentication (email + password) and has a user configuration profile.
Our CSAs Pablo San Emeterio and Carlos Ávila, together with a special guest, will reveal Steganography techniques and tools to find out the hidden information in several formats even protocols. Take note!
In this talk, our experts Álvaro Núñez-Romero and Pablo González show how we have created our own DirtyTooth on a Raspberry Pi thanks to the basic installation package developed in our innovation laboratory.
If you have a Raspberry Pi and want to audit your organization's mobile devices, this webinar is for you.
Learn in this webinar with our experts Jorge Rivera and Rames Sarwat, together with a special guest, about Managed Security and the evolution to the concept of Intelligent MSSPs.
Our experts Alvaro Nuñez-Romero and Pablo Gonzalez talk about how to protect information in messages and sensitive files through bit encryption with our Latch'sApp tool.
Latch'sApp is a tool to perform Data Exfiltration through a covert channel using Latch technology. Don't miss this webinar!
This time, our CSAs Pablo San Emeterio and Diego Espitia, together with a special guest, will teach general concepts of monitoring and alert systems management, and implementation issues.
In this webinar, our expert Fran Ramirez, along with a special guest, Rafael Troncoso, explain how to create an SDK for Go, Google's programming language.
Applied to Latch, it is possible to perform operations such as paring or removing a paring and application protection by activating or deactivating the Latch lock. Want to know how it works? Hit the play button hacker!
Will Fog, Edge and Cloudlet Computing, be something that makes a difference in IoT? In this webinar, our CSAs Carlos Ávila and Claudio Caracciolo, together with a special guest, will discuss this concepts.
Our expert Javier Espinosa explains how to create, configure and use Latch webhooks from NodeJS.
The aim of this webinar is to solve problems derived from the constant polling of the API made by some integrations with Latch, such as the inefficient use of resources or the generation of constant notifications in mobile clients by the continuous querying of a Latch's status.
In this Talk, our CSAs Gabriel Bergel y Carlos Ávila, together with a special guest, showed the technologies to protect Security Industrial System. Learn with our experts!
Our experts Diego Espitia and Rames Sarwat with a special guest will talk about innovation in AI and Machine Learning applied to Security.
In this Talk our experts Claudio Caracciolo and Jorge Rivera will analyze the pros and cons of Defensive Security and Offensive Security. Enjoy the webinar!
We present a new special edition of ElevenPaths Talks, in which our experts Pablo San Emeterio and Julio García explain the privacy problems that can exist behind applications as popular as Tinder. They will also demonstrate the Drone Tinder project, explaining how it is possible to follow someone 24x7, simply through the use of this social network.
Don’t miss this special edition of ElevenPaths Talks. Our experts Victor Mundilla and Álvaro Rodríguez will explain how mASAPP works, the new platform developed by ElevenPaths for the persistent autonomous discovery and analysis of security regarding mobile applications.
What are the differences between the NOC, SOC and CyberSOC? ¿What are their functions and objectives? What to assess in a SOC and a CyberSOC? Our CSAs Pablo San Emeterio and Gabriel Bergel, together with a special guest, will solve this questions in this webinar.
What are micro payments? How does it affect the security of the payment process? Our CSAs Jorge Rivera and Pablo San Emeterio, together with a special guest, will solve your doubts.
Learn with our CSAs Gabriel Bergel and Arsen Laurent, together with a special guest, the evolutions of Phishing, Smishing, Vishing, Spear Phishing techniques, and prevent being victim of cybercrime.
In this Talk, Diego Espitia and Rames Sarwart, together with a special guest, will show types of fraud and the most common tools and solutions in the market, as well as the importance of an awareness campaign aimed at employees, suppliers and clients.
Our experts Rames Sarwat and Jorge Rivera, together with a special guest, will talk about solutions as Trusted PKI for IoT, cryptocoins and Blockchain, and the latter is being used by multiple sector for uses that we would never have imagined. Do not miss this webinar!
Join us for this webinar, when our CSAs Arsene Laurent y Gabriel Bergel will explain how to protect you against malware and exploits, as well as protection against data breach.
Learn with our experts Gabriel Bergel and Claudio Caracciolo about bugs in apps as WhatsApp, Telegram and Line, current attack techniques and possible protections, together with a special guest. Make sure you're there, sign up now!
Dont miss out ElevenPaths Talks especial edition. Our cyberexperts Pablo González and Jorge Rivera will show how it works the DirtyTooth hack, which reveals how our privacy is on risk using bluetooth with some iOS devices.
What is De-Duplication? What is its utility in Cloud Computing? Our experts Diego Espitia and Jorge Rivera with a special guest answered all your questions about this topic.
Arsene Laurent, our Chief Security Ambassador in USA, Claudio Caracciolo, our CSA in Argentina and a special guest debated on the latest DDos techniques and gave some tips and prevention techniques.
In this first webinar of the third season of ElevenPaths Talks our CSAs Pablo San Emeterio and Claudio Caracciolo with a special guest talked about the evolution, challenges and existing solutions to fight against ransomware. Watch the video now!
Want to know how to create a secure internal network for the organization? We end the second season of ElevenPaths Talks with a webcast on Network Packet Manipulation, led by Leonardo Huertas, our Chief Security Ambassador in Colombia.
One of the aims of this webinar is to take a look at Software Defined Radio and its use in hacking.
In this chapter you will find out more about iOS architecture so you will have a much better idea of how to protect yourself if you're a technical user of this technology, and of what to bear in mind if you're an app developer.
In this talk with Claudio Caracciolo, the ElevenPaths Chief Security Ambassador in Argentina, you will explore all the two-factor authentication systems and examine their pros and cons for each case or situation.
In this chapter of ElevenPaths Talks Rames Sarwat will analyze digital certificate management in the business world and point out the best implementation strategies.
In this episode of the ElevenPaths Talks series, our Chief Security Ambassador in Colombia, Diego Espitia, will tell you how to implement the HSTS encryption protocol for your webs.
Find out what our cybersecurity expert Leandro Bennaton and a special guest think about Internet Protocol version 6. Be sure not to miss this talk!
In this webcast led by Jorge Rivera, our Chief Security Ambassador (CSA) in Spain, you will discover new aspects of encryption in the world of IoT and be able to clarify any queries you have related to this subject.
According to a study by Magister Advisors, many banks have discovered the disruptive power of technology and plan to invest one billion dollars in blockchain projects in 2017. Rames Sarwat reveals all the details.
Security in industrial systems is a fascinating topic. Join this webcast and learn how to analyze protocols in this environment!
Do you think unconventional payment methods are secure? In this chapter Leandro Bennaton, the ElevenPaths Chief Security Ambassador (CSA) in Brazil, will be analyzing a curious case that proves the opposite.
Want to start practicing BioHacking? In this talk Gabriel Bergel will tell you what resources you need.
In this chapter of the ElevenPaths Talks, Leonardo Huertas, our CSA in Colombia, will discuss the issues and challenges facing Computer Security Incident Response Teams (CSIRT), the benefits of developing this type of team, and other important aspects.
If you understand Android architecture you will have a much better idea of how to protect yourself if you're a technical user of this technology, and of what to bear in mind if you're an app developer.
You might think that SIEM is simply about sending all logs to a central repository and that's that. Well, at this talk Claudio Caracciolo will explain why that's not that. He will also be discussing some of the most popular technologies and the enormous advantages to be gained from advanced event correlation.
In this webcast we will look at case studies to explore the trends and, most importantly, try and determine whether APTs now have different aims. Take note!
The fifth chapter in the series will focus on the implications of adding security code reviews to a project, the best practices, and the benefits to be gained.
This webcast will focus on the main standards and studies on security controls, as seen through the eyes of a Chief Information Security Officer (CISO) with ample experience: Leandro Bennaton.
In this webcast Gabriel Bergel, our Chief Security Ambassador (CSA) in Chile, will talk about a highly topical issue: the inherent risks of point-of-sale devices and everything they entail.
In this talk Diego Espitia, Chief Security Ambassadors often invite Leandro to a meeting to talk with different types of security analyses, including the tools used in each case and the objectives pursued.
In this first chapter of the second season of ElevenPaths Talks our CSA in Colombia, Leonardo Huertas, will explain the need for countries to implement national security policies, the roles that both private and public actors play in these policies, and the interaction that must exist between governments, citizens and law enforcement agencies.
The first season of ElevenPaths Talks is now ending. Since risk analysis is one of the key aspects of security, our CSA in Chile, Gabriel Bergel, talks about the concepts involved in risk analysis and tells you how to perform a good analysis and how to identify and apply the main methods.
Wordpress in Paranoid Mode is a code that strengthens the database engine and protects information integrity and availability. Pablo González shares a concept test carried out at ElevenPaths. Pablo is a member of the quick ideas and concept testing team within the innovation area.
In this chapter, Claudio gives you a brief overview of the development of authentication systems and their shortcomings. You will be able to see which technologies are keeping up with us from the perspective of a user and from the perspective of a security professional. Also, this chapter is full of (seemingly) unanswered questions and answers. Passwords. Yes or no? We say goodbye to passwords forever.
The world of IoT can integrate complex security solutions and cryptography modules can be used there. We suggest something different in this chapter. Are you brave enough to mix digital signature solutions applied to IoT? We will show you how to integrate a sweets dispenser, as a physical part of the Internet of Things, with our technology SealSign through biometric signature on a tablet.
Diego Samuel Espitia, CSA of ElevenPaths in Colombia, talks about the power of public information in this webcast. OSINT, Open Source INTelligence, is one of the protagonists of cyber-security. It allows you to obtain a large volume of information, cross-check, process and leverage it to achieve major results. The webcast also explains the basic concepts of OSINT and some tools that may be of use to you.
In this chapter Leonardo Huertas, CSA of ElevenPaths in Colombia, talks about the concepts of shallow and deep web and some of the main search engines for exploring the DeepWeb. He also looks at how to access this web.
Good practices through standards are a key element of information security. Better resilience, validating employee awareness and formalizing policies, procedures and standards – these are key ingredients of correct information security management. Our expert Sebastian Piecha dedicates this chapter of ElevenPaths Talks to this standard.
We have heard about onion-layer security for a long time. But what are these layers? Can they really be implemented? With our expert Claudio Caracciolo, CSA of ElevenPaths in Argentina, find out about the best way of designing a defense-in-depth strategy depending on the company's size and investment.
The title of this chapter is not a coincidence. Big Data is not a single technology; instead it is a combination of old and new technologies that help companies make decisions by making business models more dynamic. Don't miss this webcast where Leandro Bennaton, CSA of ElevenPaths in Brazil, talks about terms we have all heard about: Big Data, Security, IoT…and our specialized technologies Tacyt and Sinfonier.
The title of this chapter is not a coincidence. Big Data is not a single technology; instead it is a combination of old and new technologies that help companies make decisions by making business models more dynamic. Don't miss this webcast where Leandro Bennaton, CSA of ElevenPaths in Brazil, talks about terms we have all heard about: Big Data, Security, Internet of Things...and our specialized technologies Tacyt and Sinfonier.
Episode 6 of ElevenPaths Talks is about one of the most topical issues in security. Organizations have an increasing number of assets exposed online and a greater need to protect and secure their resources. Leonardo Huertas, CSA of ElevenPaths in Colombia, tells you how to manage corporate security.
Jorge Rivera is our expert in the Internet of Things, IoT. It is increasingly important to strengthen and secure these environments and networks since poor security management may have harmful effects. And who could be a better choice to tell you everything you can do with Latch and the physical world?
Nowadays, testing methods are necessary to ensure minimum security quality in any product. In chapter 4, Gabriel Bergel, CSA of ElevenPaths in Chile, tells us about the available methods and what they offer. Please note: poor management of security testing may lead to high long-term costs as well as damages to image and reputation.
It is increasingly important to strengthen and secure environments and networks in the industrial sector since poor security management may have harmful effects. In this chapter, Claudio Caracciolo, CSA of ElevenPaths in Argentina, talks about the attack vectors and the most common vulnerabilities. He also talks about what should be done to implement a security management system in this type of setting.
Leonardo Huertas, CSA of ElevenPaths in Colombia, describes the issues and challenges faced by Computer Security Incident Response Teams (CSIRT) and the advantages of creating this type of team with national and sectorial response capacity.
In the first episode of this series, Rames Sarwat explains how to eliminate paper in the signing of informed consent in the health sector thanks to biometric signatures. This method allows all users to create digital handwritten signatures easily and securely. The records are archived, certified and sealed in time, taking into account the calligraphic features of the signatory, speed and pressure data.