PDF Association logo

Discover pdfa.org

Key resources

Get involved

How do you find the right PDF technology vendor?
Use the Solution Agent to ask the entire PDF communuity!
The PDF Association celebrates its members’ public statements
of support
for ISO-standardized PDF technology.

Member Area


Presented at Electronic Document Conference 2019
( 2019, Jun )

Could PDF be a weapon in cyber wafare?

Excerpt: Today PDF is the format of choice for every kind of document used in all industries, governments and by all citizens. It is trusted by everyone to reliably communicate accurate information… but how can we guarantee a document and its information is truly safe, trustworthy, and authentic? Verifying the trustworthiness and provenance of the barrage of PDFs received by an organization is an exceedingly difficult task as individuals and organizations routinely engage with data shared by unauthenti … Read more
About the presenter(s)

As CEO of the PDF Association and as an ISO Project Leader, Duff coordinates industry activities, represents industry stakeholders in a variety of settings and promotes the advancement and adoption of … Read more

Peter Wyatt is the PDF Association’s CTO and an independent technology consultant with deep file format and parsing expertise. A developer and researcher working on PDF technologies for more than … Read more


Duff Johnson
PDF Association

Peter Wyatt
PDF Association

Description

Today PDF is the format of choice for every kind of document used in all industries, governments and by all citizens. It is trusted by everyone to reliably communicate accurate information… but how can we guarantee a document and its information is truly safe, trustworthy, and authentic? Verifying the trustworthiness and provenance of the barrage of PDFs received by an organization is an exceedingly difficult task as individuals and organizations routinely engage with data shared by unauthenticated and potentially compromised sources. Further, the software used to process documents is error-prone and vulnerable to exploitation through maliciously crafted data inputs, opening the technology and its underlying systems to compromise.


WordPress Cookie Notice by Real Cookie Banner