Faux Disk Encryption - Realities of Secure Storage on Mobile Devices
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Introduction
Outline
What makes mobile special
Why is that a problem
We need data on the device
We have to reconcile the two concepts
Theres no such thing as absolute security
Remote attackers
Coffee shop attacker
Casual thief
Targeted attacks
Casual thieves
Mobile data security
Mobile device encryption
iOS security features
How we implement encryption
Secure Enclave
iOS File Encryption
File System Key
Class Keys
iOS RS Keychain
Why We Need All These Different Classes
Data Needs To Be Accessible
Other Credentials
Touch ID
User Presence
Security Threats
Android Adoption
Why is this important
Device Encryption
Key Encryption Key
Lock Screen
Full Disk Encryption
Android Credential Storage
Boot Security
Odin Mode
Little Kernel
Laugh
Faux Disk Encryption
Making The Kernel
Testing The Bootloader
Drew Soapbox
App Container
Data On Device
Android
Outlook
Takeaways
References
Taught by
Black Hat
Related Courses
Windows 10 Features for a Mobile Workforce: Configuring Additional ResourcesedX Computing, Storage and Security with Google Cloud Platform
Google via Coursera Deep Dive into Amazon Elastic Block Store (EBS)
Amazon via Independent これだけは知っておきたい公衆無線LANセキュリティ対策 (pt23)
gacco Security Best Practices in Google Cloud
Google Cloud via Coursera