YoVDO

Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Digital Marketing Courses Browser Extensions Courses

Course Description

Overview

Explore the world of ultrasonic cross-device tracking in this Black Hat conference talk. Delve into the technologies marketers use to track user content across multiple devices for targeted advertising. Learn about the workflow of cross-device tracking, proximity marketing, and Google Cast. Witness demonstrations of attacks like Beacon Trap and Beacon Injection, and understand how data is obtained from providers. Examine the ecosystem surrounding these technologies, including browser extensions and Android permissions. Discover potential solutions and benefits to counter ultrasonic tracking. Gain insights into this cutting-edge marketing tool and its implications for user privacy and security.

Syllabus

Intro
CrossDevice Tracking
What is CrossDevice Tracking
How do they work
Workflow diagram
Proximity marketing
Google Cast
The moment of realization
Demonstration
Story
Demo
Beacon Trap
Beacon Injection
Fast Attack
Getting data from providers
Ecosystem
Browser Extension
Android Permission
Solution
Benefits
Summary
Conclusion
Questions
Anti ultrasound box


Taught by

Black Hat

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera