Harry Potter and the Not-So-Smart Proxy War
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore a 36-minute conference talk that delves into the 'Vault 7' Protego documents, challenging the initial assumptions about their purpose. Analyze the CIA's covert virtual fencing solution, examining system block diagrams, build instructions, and related news items. Investigate the potential weaknesses of lockdown systems used in various applications, from theft prevention to firearms control. Gain insights into the technical aspects, security analysis, and attack surfaces of such systems, including GPS vulnerabilities and countermeasures. Discover how seemingly unrelated information can be pieced together to reveal intriguing details about covert technologies and their implications.
Syllabus
Introduction
What triggered this talk
Why would the CIA want this
Technical Analysis
Security Analysis
Attack Surface
Code Guard
GPS
GPS Jamming
Spoofing
countermeasures
conclusion
Questions
Taught by
media.ccc.de
Related Courses
Computational Investing, Part IGeorgia Institute of Technology via Coursera Инфраструктура рынка, методы и технологии инвестирования
Higher School of Economics via Coursera Maps and the Geospatial Revolution
Pennsylvania State University via FutureLearn Introduction to Investments
Indian Institute of Management Bangalore via Swayam Preparing for the Google Cloud Professional Cloud Architect Exam en Español
Google Cloud via Coursera