DEFCON 19: Introduction to Tamper Evident Devices
datagram Lockwiki.com
Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest, where contestants were given a box sealed with a variety of tamper evident devices, many of which purport to be "tamper proof." All of these devices were defeated, even by those with little experience and a limited toolkit. Like the computer world, many of these devices are overmarketed and it is difficult for the average person to compare different tamper evident technologies.
This talk covers the design and uses of tamper evident devices used in the commercial and government sectors. We'll dig into the nitty gritty of how many of these devices work, the methods by which they can be defeated, and live demonstrations of defeats against common tamper evident devices. Be advised: this talk is for only the stealthiest of ninjas; pirates need not apply.
For more information visit: http://bit.ly/defcon19_information
To download the video visit: http://bit.ly/defcon19_videos
Playlist Defcon 19: http://bit.ly/defcon19_playlist
Видео DEFCON 19: Introduction to Tamper Evident Devices канала Christiaan008
Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest, where contestants were given a box sealed with a variety of tamper evident devices, many of which purport to be "tamper proof." All of these devices were defeated, even by those with little experience and a limited toolkit. Like the computer world, many of these devices are overmarketed and it is difficult for the average person to compare different tamper evident technologies.
This talk covers the design and uses of tamper evident devices used in the commercial and government sectors. We'll dig into the nitty gritty of how many of these devices work, the methods by which they can be defeated, and live demonstrations of defeats against common tamper evident devices. Be advised: this talk is for only the stealthiest of ninjas; pirates need not apply.
For more information visit: http://bit.ly/defcon19_information
To download the video visit: http://bit.ly/defcon19_videos
Playlist Defcon 19: http://bit.ly/defcon19_playlist
Видео DEFCON 19: Introduction to Tamper Evident Devices канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Defcon 19: DIY Non-Destructive-Entry](https://i.ytimg.com/vi/ChbyaXBKNY8/default.jpg)
![Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev](https://i.ytimg.com/vi/6Chp12sEnWk/default.jpg)
![Deviant Ollam | The Four Types of Locks | SOURCE Conference Boston 2010](https://i.ytimg.com/vi/vxXryID5F7M/default.jpg)
![Defcon 21 - The Secret Life of SIM Cards](https://i.ytimg.com/vi/31D94QOo2gY/default.jpg)
![SirenJack: Cracking a 'Secure' Emergency Warning Siren System](https://i.ytimg.com/vi/49KoUmiJuts/default.jpg)
![The Silver Tongue vs The Iron Fist - Deviant Ollam](https://i.ytimg.com/vi/dVTcifBspRc/default.jpg)
![Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker](https://i.ytimg.com/vi/B8DjTcANBx0/default.jpg)
![You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]](https://i.ytimg.com/vi/mj2iSdBw4-0/default.jpg)
![I'll Let Myself In: Tactics of Physical Pen Testers](https://i.ytimg.com/vi/rnmcRTnTNC8/default.jpg)
![Tamper Evident Seal Bypass - EnaTail 2 Fixed Length Seal](https://i.ytimg.com/vi/X-8LdewGnOQ/default.jpg)
![DEF CON 19 - datagram - Introduction to Tamper Evident Devices](https://i.ytimg.com/vi/cQzyWXPyn3A/default.jpg)
![How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017](https://i.ytimg.com/vi/qg-zK2zv4ng/default.jpg)
![DEFCON 20: Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data](https://i.ytimg.com/vi/NjuhdKUH6U4/default.jpg)
![Induction Foil Sealing - Ways To Make Your Product Tamper Evident](https://i.ytimg.com/vi/klLvz4ZvjoM/default.jpg)
![Deviant Ollam "Mastering Master Keys" [HOPE Number 9]](https://i.ytimg.com/vi/aVPSaKLKHd4/default.jpg)
![Defcon 21 - Stalking a City for Fun and Frivolity](https://i.ytimg.com/vi/ubjuWqUE9wQ/default.jpg)
![NolaCon 2019 D 07 Breaking Into Your Building A Hackers Guide to Unauthorized Physical Access Brent](https://i.ytimg.com/vi/eft8PElmQZM/default.jpg)
![Copying Keys from Photos, Molds & More](https://i.ytimg.com/vi/AayXf5aRFTI/default.jpg)
![DEFCON 16: Toying with Barcodes](https://i.ytimg.com/vi/qT_gwl1drhc/default.jpg)
![Lecture 8: IoT Security](https://i.ytimg.com/vi/4YAsAdCa9sU/default.jpg)