1 00:00:00,660 --> 00:00:05,170 ‫Fully human trafficking and corruption toolkit by IBM, let's do this, guys. 2 00:00:05,190 --> 00:00:06,290 ‫We're going to show you the source code. 3 00:00:06,450 --> 00:00:13,710 ‫We're going to download a docker container at Docker Image that has the zip code that has all the stuff 4 00:00:13,710 --> 00:00:14,640 ‫that needs that. 5 00:00:14,760 --> 00:00:16,170 ‫We're going to compile the code. 6 00:00:16,350 --> 00:00:17,940 ‫We're going to compile the library. 7 00:00:18,120 --> 00:00:19,850 ‫We're going to show you that database. 8 00:00:19,860 --> 00:00:25,920 ‫We're going to show you how the sea is Wi-Fi, which is the database in this case, it's a fully encrypted. 9 00:00:25,920 --> 00:00:34,410 ‫And then we're going to do a search on the encrypted database, all with this beautiful IBM toolkit 10 00:00:34,410 --> 00:00:35,190 ‫that they gave us.