Trust in Apple's Secret Garden - Exploring and Reversing Apple's Continuity Protocol
Offered By: Black Hat via YouTube
Course Description
Overview
Explore and reverse engineer Apple's Continuity protocol in this 40-minute Black Hat conference talk. Delve into the privacy and security implications of popular features like AirDrop, iMessage, and wireless hotspot sharing. Examine the assumptions users make about Apple's protection of their data. Learn how these seamless sharing protocols function behind the scenes and consider potential vulnerabilities. Gain insights from speaker Ta-Lun Yen's research into Apple's "secret garden" of interconnected services. Discover the technical details and potential risks of the protocols that enable effortless sharing of messages, browser tabs, and clipboards across Apple devices.
Syllabus
Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol
Taught by
Black Hat
Related Courses
NeuroethicsUniversity of Pennsylvania via Coursera Fundamentals of Online Education: Planning and Application
Georgia Institute of Technology via Coursera Understanding Media by Understanding Google
Northwestern University via Coursera Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
Cornell University via edX Internet, les autres et moi
Certificat informatique et internet via France Université Numerique