Behind the scenes of iOS and Mac Security
The Find My feature in iOS 13 and macOS Catalina enables users to receive help from other nearby Apple devices in finding their lost Macs, while rigorously protecting the privacy of all participants. We will discuss our efficient elliptic curve key diversification system that derives short non-linkable public keys from a user’s keypair, and allows users to find their offline devices without divulging sensitive information to Apple.
By Ivan Krstić
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#behind-the-scenes-of-ios-and-mac-security-17220
Видео Behind the scenes of iOS and Mac Security канала Black Hat
By Ivan Krstić
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#behind-the-scenes-of-ios-and-mac-security-17220
Видео Behind the scenes of iOS and Mac Security канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Inside the Apple T2](https://i.ytimg.com/vi/vRnyasv1qbU/default.jpg)
![Writing Bad @$$ Malware For OS X](https://i.ytimg.com/vi/fv4l9yAL2sU/default.jpg)
![CQTools: The New Ultimate Hacking Toolkit](https://i.ytimg.com/vi/MZ0nSO0WOJg/default.jpg)
![SirenJack: Cracking a 'Secure' Emergency Warning Siren System](https://i.ytimg.com/vi/49KoUmiJuts/default.jpg)
![Ghidra - Journey from Classified NSA Tool to Open Source](https://i.ytimg.com/vi/kx2xp7IQNSc/default.jpg)
![Behind the Scenes of iOS Security](https://i.ytimg.com/vi/BLGFriOKz6U/default.jpg)
![Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them](https://i.ytimg.com/vi/EuInUW77CPo/default.jpg)
![Selling 0-Days to Governments and Offensive Security Companies](https://i.ytimg.com/vi/ZDHHGZlEfsQ/default.jpg)
![Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone](https://i.ytimg.com/vi/ySxzkBSFkxQ/default.jpg)
![Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets](https://i.ytimg.com/vi/TDk2RId8LFo/default.jpg)
![Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities](https://i.ytimg.com/vi/UdTpa-n9L-g/default.jpg)
![Android vs IOS Security (The Cyber Underground)](https://i.ytimg.com/vi/TMPYlwOkdTo/default.jpg)
![48 Dirty Little Secrets Cryptographers Don’t Want You To Know](https://i.ytimg.com/vi/iZa_XKpj9X4/default.jpg)
![14 Tips To Secure Your Mac - Security & Privacy](https://i.ytimg.com/vi/Jv-K6IkrtSg/default.jpg)
![Apple Secure Enclave Processor Hack Explained](https://i.ytimg.com/vi/ei6NWGfRs2o/default.jpg)
![How Do I Crack Satellite and Cable Pay TV? (33c3)](https://i.ytimg.com/vi/lhbSD1Jba0Q/default.jpg)
![iOS Navigation Controller Tutorial | Xcode 11.4 Swift 5.2](https://i.ytimg.com/vi/LbAd2FIlnos/default.jpg)
![Demystifying the Secure Enclave Processor](https://i.ytimg.com/vi/7UNeUT_sRos/default.jpg)
![Why do people use macOS?](https://i.ytimg.com/vi/AWIXwqhPiYo/default.jpg)
![iPhones are NOT more secure than Android!](https://i.ytimg.com/vi/Nug0KlQ9kVk/default.jpg)