SlideShare a Scribd company logo
MOBILE THREATS & TRENDS CHANGING
MOBILE APP SECURITY
September 18, 2018
RECENT TRENDS
© 2018 OneSpan North America Inc. 2
#1: MOBILE FRAUD IN GENERAL IS INCREASING
of fraud transactions
came from mobile apps &
browsers in Q2 2018
(↑ 9% over Q1 & ↑ 16%YOY)
71%
https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
#2 REPACKAGED OR FORGED/ROGUE MOBILE APPS ON THE RISE
>9K rogue apps in Q2 2018
• >25% of fraud in Q2 2018
• 13% increase over Q1 2018
Repackaging attacks
1. Attacker downloads app from
official stores
2. Reverse-engineers the app
3. Adds malicious functionality
4. Distributes tainted copy to
unsuspecting users
© 2018 OneSpan North America Inc. 4
https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
#3: MOBILE BANKING TROJANS & OVERLAY ATTACKS ESCALATING
3.2Xmore mobile
banking Trojan
installation packages
in Q2 2018 over Q1
https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/
#4: NON-TRADITIONAL DISTRIBUTION MODELS (“SIDELOADING”)
© 2018 OneSpan North America Inc. 6
https://www.kaspersky.com/blog/fortnite-security/23685/
• Users essentially have to compromise their device’s security
• Devices that download apps from sources other than Google
Play are 9X more likely to download malware
• 15 million downloads & 23 million players (21 days after beta)
• Fortnite was vulnerable to “man-in-the-disk attacks”
WHY ARE MOBILE THREATS ON THE RISE?
ATTACKERS FOCUS ON THE MONEY & SHIFT W/ CONSUMERS
2B
Mobile banking users
forecasted for 2018
200M
Estimated increase in
mobile users over 2017
50%Of global banked
population are mobile
banking users
Futureproofing Digital Banking 2018,by Juniper Research published March 2018
…AND IT’S NOT JUST BANKING
$86Bspent in app stores in 2017
2Xgrowth in two years
https://www.appannie.com/en/insights/market-data/app-annie-2017-retrospective/#download
MOBILE APP COMPETITION IS FIERCE
>3.1MApps on the
Google Play Store
>1.9MApps on the
Apple App Store
Priority becomes differentiating (adding/improving functionality) more quickly…
MOBILE APP DEVELOPMENT AND SECURITY CHALLENGES
• Balancing revenue-generating/retaining activities (e.g., new features) with security
• Lack of security expertise
• Mobile threats constantly evolve
© 2018 OneSpan North America Inc.
11
of developers know it’s
important but say they
don’t have enough time
to spend on security48% https://info.signalsciences.com/devsecops-community-survey-2018
DIVING DEEPER INTO MOBILE APP ATTACKS
© 2018 OneSpan North America Inc. 12
MOBILE MALWARE DELIVERY EXAMPLE
© 2018 OneSpan North America Inc. 13
OVERLAY ATTACK
EXPLAINED
© 2018 OneSpan North America Inc.14
Example of legitimate screen Example of malicious overlay screen
CODE INJECTION ATTACK EXPLAINED
• ~3 min
© 2018 OneSpan North America Inc. 15
Bad Guy
1
2
3
4
WHAT IS DUE CARE WHEN IT COMES
TO MOBILE APP SECURITY?
© 2018 OneSpan North America Inc. 16
YOU CAN’T COUNT ON THE PLATFORMS ALONE FOR SECURITY
• Apple/Google constantly working to
improve the situation
• Security is a journey, not a destination
• Known/unknown vulnerabilities in the OS &
resulting periods of exposure
• Incentives for Android/iOS vulnerabilities
• Bad apps still make it onto the stores
• APIs must be implemented correctly
• Defense-in-depth requires going beyond
what’s offered by Android and iOS
© 2018 OneSpan North America Inc. 17
18
Differing levels of security based on the app in question
L1: Baseline for mobile app security
L2: Defense-in-depth measures for more sensitive apps
R: Protection against client-side attacks (reverse-engineering)
OWASP MOBILE APP SECURITYVERIFICATION STANDARD (MASVS)
“The MASVS is a community effort to establish a framework of security requirements
needed to design, develop and test secure mobile apps on iOS and Android.
https://github.com/OWASP/owasp-masvs/releases/download/1.0/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf
19
It all starts with answering questions including but not limited to:
• Can attackers monetize data handled by your app?
• Is data handled by your app regulated?
• Does your app handle financial transactions?
• Are there motivated adversaries interested in your source code?
WHAT LEVEL OF SECURITY DOESYOUR APP NEED?
Verification Level Examples
MASVS-L1 Basic security for any mobile app that doesn’t qualify for any of the higher levels
MASVS-L2
• Fitness/Health Care: PII, PHI, regulations (HIPAA, etc.)
• Financial: PII, payment card info, regulations (PCI DSS, FFIEC, etc.)
MASVS-L1+R
• Gaming: prevent cheating/modification
• IP needs protection
MASVS-L2+R
• Financial: L2 requirements plus resilience against tampering and malware
• Apps that store data on device, but support a wide range of devices and OS versions
?
Fewest vulnerabilities possible
• Strong authentication mechanism
• Connect over HTTPS
• Proper verification of the certificate of the server
• Sensitive data stored securely on device
• Use of strong cryptography (e.g., NOT ECB mode, SHA1, MD5, etc.)
How can this be achieved?
• Including security & approved methods in product requirements
• Secure code training for developers
• Automated security testing throughout the SDLC
• Penetration testing prior to release
WHAT MAKES A MOBILE APP SECURE?
INTERNAL PERSPECTIVE
Hardened against external threats
• Fortified against reverse engineering
• Resistant to runtime tampering
• Resistant to repackaging
• Can defend against client-side attacks
• Overlay attacks
• Rogue keyboards
How can this be achieved?
Mobile app shielding and runtime protection
—also called mobile runtime application self protection or (RASP)
WHAT MAKES A MOBILE APP SECURE
EXTERNAL PERSPECTIVE
SUMMARY
22
KEY TAKEAWAYS
© 2018 OneSpan North America Inc. 23
MOBILETHREATS
ARE INCREASING
INTHE WILD
DEPENDING ONTHE
PLATFORMS ALONE WILL
LEAVEYOU EXPOSED
PROTECTINGYOUR APP IN
UNTRUSTED ENVIRONMENTS
IS ESSENTIAL
1 2 3
A KEY SOLUTION WITHIN A COMPLETE APP SECURITY PORTFOLIO
© 2018 OneSpan North America Inc. 24
APP SHIELDING AND
RUNTIME PROTECTION
JAILBREAK AND
ROOT DETECTION
DEVICE IDENTIFICATION
DEVICE BINDING
SECURE STORAGE
SECURE CHANNEL
PUSH NOTIFICATION
QR CODE SUPPORT
GEOLOCATION
BEHAVIORAL BIOMETRICS
AUTHENTICATION
FACE AUTHENTICATION
FINGERPRINT
AUTHENTICATION
RISK-BASED
AUTHENTICATION
CRONTO
AUTHENTICATION
TRANSACTION SIGNING
E-SIGNATURES
®
MOBILE APP SHIELDING & RUNTIME PROTECTION
1 2 3
SHIELD IT TEST IT TRUST IT
SEE FORYOURSELF RUNTIME ATTACK DEFENSEEASY INTEGRATION
Q&A

More Related Content

PPTX
Mobile application security
PDF
Mobile Application Security
PPTX
Web and Mobile Application Security
ODP
Mobile Apps Security Testing -1
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
ODP
Mobile App Security Testing -2
PDF
Security Testing Mobile Applications
PDF
Challenges in Testing Mobile App Security
Mobile application security
Mobile Application Security
Web and Mobile Application Security
Mobile Apps Security Testing -1
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile App Security Testing -2
Security Testing Mobile Applications
Challenges in Testing Mobile App Security

What's hot (20)

ODP
Mobile Apps Security Testing -3
PDF
Mobile application security – effective methodology, efficient testing! hem...
PPTX
Security testing of mobile applications
PDF
Mobile Application Security
PPTX
Android Security
PDF
Mobile Application Pentest [Fast-Track]
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
PPTX
Pentesting Android Applications
PPTX
Penetrating Android Aapplications
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PDF
Mobile_app_security
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PPTX
Secure Android Apps- nVisium Security
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PPTX
Android sandbox
PDF
Android security - an enterprise perspective
PPTX
Android security
PDF
VSEC Sourcecode Review Service Profile
PPTX
Android security
Mobile Apps Security Testing -3
Mobile application security – effective methodology, efficient testing! hem...
Security testing of mobile applications
Mobile Application Security
Android Security
Mobile Application Pentest [Fast-Track]
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Android Applications
Penetrating Android Aapplications
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Mobile_app_security
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Secure Android Apps- nVisium Security
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Android sandbox
Android security - an enterprise perspective
Android security
VSEC Sourcecode Review Service Profile
Android security
Ad

Similar to Mobile Threats and Trends Changing Mobile App Security (20)

PDF
Unicom Conference - Mobile Application Security
PDF
Jump-Start The MASVS
PDF
OWASP Day - OWASP Day - Lets secure!
PDF
Securing Mobile Apps - Appfest Version
PDF
Securing 3-Mode Mobile Banking
PPTX
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
Owasp Mobile Top 10 – 2014
PDF
DataMindsConnect2018_SECDEVOPS
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Why You'll Care More About Mobile Security in 2020
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PDF
State of Application Security Vol. 4
PDF
State of Application Security: State of Piracy
PDF
Mobile security chess board - attacks & defense
PPTX
Appsecurity, win or loose
PDF
Owasp masvs spain 17
PDF
CNIT 128 8: Mobile development security
PPTX
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
Unicom Conference - Mobile Application Security
Jump-Start The MASVS
OWASP Day - OWASP Day - Lets secure!
Securing Mobile Apps - Appfest Version
Securing 3-Mode Mobile Banking
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
Owasp Mobile Top 10 – 2014
DataMindsConnect2018_SECDEVOPS
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You'll Care More About Mobile Security in 2020
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
State of Application Security Vol. 4
State of Application Security: State of Piracy
Mobile security chess board - attacks & defense
Appsecurity, win or loose
Owasp masvs spain 17
CNIT 128 8: Mobile development security
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Unlocking AI with Model Context Protocol (MCP)
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Mobile Threats and Trends Changing Mobile App Security

  • 1. MOBILE THREATS & TRENDS CHANGING MOBILE APP SECURITY September 18, 2018
  • 2. RECENT TRENDS © 2018 OneSpan North America Inc. 2
  • 3. #1: MOBILE FRAUD IN GENERAL IS INCREASING of fraud transactions came from mobile apps & browsers in Q2 2018 (↑ 9% over Q1 & ↑ 16%YOY) 71% https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
  • 4. #2 REPACKAGED OR FORGED/ROGUE MOBILE APPS ON THE RISE >9K rogue apps in Q2 2018 • >25% of fraud in Q2 2018 • 13% increase over Q1 2018 Repackaging attacks 1. Attacker downloads app from official stores 2. Reverse-engineers the app 3. Adds malicious functionality 4. Distributes tainted copy to unsuspecting users © 2018 OneSpan North America Inc. 4 https://www.rsa.com/en-us/offers/rsa-fraud-report-q218
  • 5. #3: MOBILE BANKING TROJANS & OVERLAY ATTACKS ESCALATING 3.2Xmore mobile banking Trojan installation packages in Q2 2018 over Q1 https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/
  • 6. #4: NON-TRADITIONAL DISTRIBUTION MODELS (“SIDELOADING”) © 2018 OneSpan North America Inc. 6 https://www.kaspersky.com/blog/fortnite-security/23685/ • Users essentially have to compromise their device’s security • Devices that download apps from sources other than Google Play are 9X more likely to download malware • 15 million downloads & 23 million players (21 days after beta) • Fortnite was vulnerable to “man-in-the-disk attacks”
  • 7. WHY ARE MOBILE THREATS ON THE RISE?
  • 8. ATTACKERS FOCUS ON THE MONEY & SHIFT W/ CONSUMERS 2B Mobile banking users forecasted for 2018 200M Estimated increase in mobile users over 2017 50%Of global banked population are mobile banking users Futureproofing Digital Banking 2018,by Juniper Research published March 2018
  • 9. …AND IT’S NOT JUST BANKING $86Bspent in app stores in 2017 2Xgrowth in two years https://www.appannie.com/en/insights/market-data/app-annie-2017-retrospective/#download
  • 10. MOBILE APP COMPETITION IS FIERCE >3.1MApps on the Google Play Store >1.9MApps on the Apple App Store Priority becomes differentiating (adding/improving functionality) more quickly…
  • 11. MOBILE APP DEVELOPMENT AND SECURITY CHALLENGES • Balancing revenue-generating/retaining activities (e.g., new features) with security • Lack of security expertise • Mobile threats constantly evolve © 2018 OneSpan North America Inc. 11 of developers know it’s important but say they don’t have enough time to spend on security48% https://info.signalsciences.com/devsecops-community-survey-2018
  • 12. DIVING DEEPER INTO MOBILE APP ATTACKS © 2018 OneSpan North America Inc. 12
  • 13. MOBILE MALWARE DELIVERY EXAMPLE © 2018 OneSpan North America Inc. 13
  • 14. OVERLAY ATTACK EXPLAINED © 2018 OneSpan North America Inc.14 Example of legitimate screen Example of malicious overlay screen
  • 15. CODE INJECTION ATTACK EXPLAINED • ~3 min © 2018 OneSpan North America Inc. 15 Bad Guy 1 2 3 4
  • 16. WHAT IS DUE CARE WHEN IT COMES TO MOBILE APP SECURITY? © 2018 OneSpan North America Inc. 16
  • 17. YOU CAN’T COUNT ON THE PLATFORMS ALONE FOR SECURITY • Apple/Google constantly working to improve the situation • Security is a journey, not a destination • Known/unknown vulnerabilities in the OS & resulting periods of exposure • Incentives for Android/iOS vulnerabilities • Bad apps still make it onto the stores • APIs must be implemented correctly • Defense-in-depth requires going beyond what’s offered by Android and iOS © 2018 OneSpan North America Inc. 17
  • 18. 18 Differing levels of security based on the app in question L1: Baseline for mobile app security L2: Defense-in-depth measures for more sensitive apps R: Protection against client-side attacks (reverse-engineering) OWASP MOBILE APP SECURITYVERIFICATION STANDARD (MASVS) “The MASVS is a community effort to establish a framework of security requirements needed to design, develop and test secure mobile apps on iOS and Android. https://github.com/OWASP/owasp-masvs/releases/download/1.0/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf
  • 19. 19 It all starts with answering questions including but not limited to: • Can attackers monetize data handled by your app? • Is data handled by your app regulated? • Does your app handle financial transactions? • Are there motivated adversaries interested in your source code? WHAT LEVEL OF SECURITY DOESYOUR APP NEED? Verification Level Examples MASVS-L1 Basic security for any mobile app that doesn’t qualify for any of the higher levels MASVS-L2 • Fitness/Health Care: PII, PHI, regulations (HIPAA, etc.) • Financial: PII, payment card info, regulations (PCI DSS, FFIEC, etc.) MASVS-L1+R • Gaming: prevent cheating/modification • IP needs protection MASVS-L2+R • Financial: L2 requirements plus resilience against tampering and malware • Apps that store data on device, but support a wide range of devices and OS versions ?
  • 20. Fewest vulnerabilities possible • Strong authentication mechanism • Connect over HTTPS • Proper verification of the certificate of the server • Sensitive data stored securely on device • Use of strong cryptography (e.g., NOT ECB mode, SHA1, MD5, etc.) How can this be achieved? • Including security & approved methods in product requirements • Secure code training for developers • Automated security testing throughout the SDLC • Penetration testing prior to release WHAT MAKES A MOBILE APP SECURE? INTERNAL PERSPECTIVE
  • 21. Hardened against external threats • Fortified against reverse engineering • Resistant to runtime tampering • Resistant to repackaging • Can defend against client-side attacks • Overlay attacks • Rogue keyboards How can this be achieved? Mobile app shielding and runtime protection —also called mobile runtime application self protection or (RASP) WHAT MAKES A MOBILE APP SECURE EXTERNAL PERSPECTIVE
  • 23. KEY TAKEAWAYS © 2018 OneSpan North America Inc. 23 MOBILETHREATS ARE INCREASING INTHE WILD DEPENDING ONTHE PLATFORMS ALONE WILL LEAVEYOU EXPOSED PROTECTINGYOUR APP IN UNTRUSTED ENVIRONMENTS IS ESSENTIAL 1 2 3
  • 24. A KEY SOLUTION WITHIN A COMPLETE APP SECURITY PORTFOLIO © 2018 OneSpan North America Inc. 24 APP SHIELDING AND RUNTIME PROTECTION JAILBREAK AND ROOT DETECTION DEVICE IDENTIFICATION DEVICE BINDING SECURE STORAGE SECURE CHANNEL PUSH NOTIFICATION QR CODE SUPPORT GEOLOCATION BEHAVIORAL BIOMETRICS AUTHENTICATION FACE AUTHENTICATION FINGERPRINT AUTHENTICATION RISK-BASED AUTHENTICATION CRONTO AUTHENTICATION TRANSACTION SIGNING E-SIGNATURES ®
  • 25. MOBILE APP SHIELDING & RUNTIME PROTECTION 1 2 3 SHIELD IT TEST IT TRUST IT SEE FORYOURSELF RUNTIME ATTACK DEFENSEEASY INTEGRATION
  • 26. Q&A