Build your own NSA (33c3)
https://media.ccc.de/v/33c3-8034-build_your_own_nsa
How private companies leak your personal data into the public domain, and how you can buy it.
When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source. We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession.
['Andreas Dewes', '@sveckert']
Видео Build your own NSA (33c3) канала media.ccc.de
How private companies leak your personal data into the public domain, and how you can buy it.
When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source. We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession.
['Andreas Dewes', '@sveckert']
Видео Build your own NSA (33c3) канала media.ccc.de
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
34C3 - Antipatterns und Missverständnisse in der Softwareentwicklung35C3 - Inside the Fake Science Factories (german)Bootstraping a slightly more secure laptop (33c3)34C3 - Die Lauschprogramme der GeheimdienstePhilipp Winter: How the Great Firewall discovers hidden circumvention servers34C3 - Everything you want to know about x86 microcode, but might have been afraid to askurs: Wie baut man eigentlich Raumschiffe36C3 - Finfisher verklagen34C3 - Hacker Jeopardy36C3 - BahnMining - Pünktlichkeit ist eine ZierDavid Kriesel: Traue keinem Scan, den du nicht selbst gefälscht hast34C3 - Der PC-Wahl-HackMachine Dreams (33c3)34C3 - Relativitätstheorie für blutige Anfänger36C3 - Energiespeicher von heute für die Energie von morgenOn Smart Cities, Smart Energy, And Dumb Security (33c3)35C3 - The Ghost in the MachineMathias Dalheimer: Wie man einen Blackout verursacht34C3 - All Computers Are BeschlagnahmtSpiegelMining – Reverse Engineering von Spiegel-Online (33c3)