Presentation Reflection
by AMINE IMAZZI
Figure1: Privacy and security graphic
It was a great opportunity to search for all the ins and outs of privacy and security. we couldn't cover it all as this is a huge topic and exist in any technology. But generally, we have come across the different forms of malware and all possible threats to us as individuals. Any attacker is a black hat hacker who only aims to destroy, corrupt, or even spy to retrieve confidential information. It was a pleasure to team with Hashed and Al-baraa, as their work was very outstanding and they tried their best to cover as much as they can and present life example use cases.
Figure 2: Recording of The whole