YoVDO

Secure Digital Communications for Our Modern Dystopia

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Operational Security Courses Mesh Networks Courses Amateur Radio Courses

Course Description

Overview

Explore secure digital communication strategies for hostile environments in this Black Hat conference talk. Delve into the Endrun system, which adapts NASA's Disruption-Tolerant Networking project to create a reliable, eventually-consistent communication method ideal for activists, refugees, and others operating in compromised internet landscapes. Learn about operational security, various connectivity options, and the advantages of Endrun over current proposals like encrypted transport links and mesh networks. Discover how this system leverages high-throughput physical data transfer methods and supports user-friendly encryption. Examine topics such as bundle protocols, distributed software development, payload repositories, routing mechanisms, and transport options including sneakernet. Gain insights into future developments for long-distance communication and surveillance considerations in this comprehensive exploration of secure communication in modern dystopian scenarios.

Syllabus

Intro
Operational Security
Warning
Internet Connectivity
Amateur Radio
Cellular Communication
Delay Disruption Tolerance
modifiable on the fly
previous work
Tor
AirChat
Mesh Networks
Breyer
DTN
Network Transmission Protocol
Distributed Software Development
Bundles
Salt
Libsodium
Payload
Repository
Provisioning
Sending Data
Gollum
GPG
MiniLock
Routing
Pairwise Communication
Replication Forwarding
Global Knowledge
Chain of Custody
Record
Intermediate Routing
Transport Options
USB
XP
Sneakernet
Future Work
Long Distance
Surveillance


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube