Trust in Apple's Secret Garden - Exploring and Reversing Apple's Continuity Protocol
Offered By: Black Hat via YouTube
Course Description
Overview
Explore and reverse engineer Apple's Continuity protocol in this 40-minute Black Hat conference talk. Delve into the privacy and security implications of popular features like AirDrop, iMessage, and wireless hotspot sharing. Examine the assumptions users make about Apple's protection of their data. Learn how these seamless sharing protocols function behind the scenes and consider potential vulnerabilities. Gain insights from speaker Ta-Lun Yen's research into Apple's "secret garden" of interconnected services. Discover the technical details and potential risks of the protocols that enable effortless sharing of messages, browser tabs, and clipboards across Apple devices.
Syllabus
Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol
Taught by
Black Hat
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam