YoVDO

Harry Potter and the Not-So-Smart Proxy War

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Technical Analysis Courses Spoofing Courses

Course Description

Overview

Explore a 36-minute conference talk that delves into the 'Vault 7' Protego documents, challenging the initial assumptions about their purpose. Analyze the CIA's covert virtual fencing solution, examining system block diagrams, build instructions, and related news items. Investigate the potential weaknesses of lockdown systems used in various applications, from theft prevention to firearms control. Gain insights into the technical aspects, security analysis, and attack surfaces of such systems, including GPS vulnerabilities and countermeasures. Discover how seemingly unrelated information can be pieced together to reveal intriguing details about covert technologies and their implications.

Syllabus

Introduction
What triggered this talk
Why would the CIA want this
Technical Analysis
Security Analysis
Attack Surface
Code Guard
GPS
GPS Jamming
Spoofing
countermeasures
conclusion
Questions


Taught by

media.ccc.de

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube