YoVDO

Secure Digital Communications for Our Modern Dystopia

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Operational Security Courses Mesh Networks Courses Amateur Radio Courses

Course Description

Overview

Explore secure digital communication strategies for hostile environments in this Black Hat conference talk. Delve into the Endrun system, which adapts NASA's Disruption-Tolerant Networking project to create a reliable, eventually-consistent communication method ideal for activists, refugees, and others operating in compromised internet landscapes. Learn about operational security, various connectivity options, and the advantages of Endrun over current proposals like encrypted transport links and mesh networks. Discover how this system leverages high-throughput physical data transfer methods and supports user-friendly encryption. Examine topics such as bundle protocols, distributed software development, payload repositories, routing mechanisms, and transport options including sneakernet. Gain insights into future developments for long-distance communication and surveillance considerations in this comprehensive exploration of secure communication in modern dystopian scenarios.

Syllabus

Intro
Operational Security
Warning
Internet Connectivity
Amateur Radio
Cellular Communication
Delay Disruption Tolerance
modifiable on the fly
previous work
Tor
AirChat
Mesh Networks
Breyer
DTN
Network Transmission Protocol
Distributed Software Development
Bundles
Salt
Libsodium
Payload
Repository
Provisioning
Sending Data
Gollum
GPG
MiniLock
Routing
Pairwise Communication
Replication Forwarding
Global Knowledge
Chain of Custody
Record
Intermediate Routing
Transport Options
USB
XP
Sneakernet
Future Work
Long Distance
Surveillance


Taught by

Black Hat

Related Courses

Coding to Enable the Tactile Internet
Open Data Science via YouTube
Digital and Social Resilience through the NYC Mesh
Strange Loop Conference via YouTube
ADS-B and AIS - Open Data Is in the Air - Skymaker, JJX
media.ccc.de via YouTube
Using Docker Containers to Begin to Solve IoT Hardware Issues
Docker via YouTube
Mesh Stalkings - Penetration Testing with Small Networked Devices
Black Hat via YouTube