DEFCON 19: Introduction to Tamper Evident Devices
datagram Lockwiki.com
Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest, where contestants were given a box sealed with a variety of tamper evident devices, many of which purport to be "tamper proof." All of these devices were defeated, even by those with little experience and a limited toolkit. Like the computer world, many of these devices are overmarketed and it is difficult for the average person to compare different tamper evident technologies.
This talk covers the design and uses of tamper evident devices used in the commercial and government sectors. We'll dig into the nitty gritty of how many of these devices work, the methods by which they can be defeated, and live demonstrations of defeats against common tamper evident devices. Be advised: this talk is for only the stealthiest of ninjas; pirates need not apply.
For more information visit: http://bit.ly/defcon19_information
To download the video visit: http://bit.ly/defcon19_videos
Playlist Defcon 19: http://bit.ly/defcon19_playlist
Видео DEFCON 19: Introduction to Tamper Evident Devices канала Christiaan008
Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest, where contestants were given a box sealed with a variety of tamper evident devices, many of which purport to be "tamper proof." All of these devices were defeated, even by those with little experience and a limited toolkit. Like the computer world, many of these devices are overmarketed and it is difficult for the average person to compare different tamper evident technologies.
This talk covers the design and uses of tamper evident devices used in the commercial and government sectors. We'll dig into the nitty gritty of how many of these devices work, the methods by which they can be defeated, and live demonstrations of defeats against common tamper evident devices. Be advised: this talk is for only the stealthiest of ninjas; pirates need not apply.
For more information visit: http://bit.ly/defcon19_information
To download the video visit: http://bit.ly/defcon19_videos
Playlist Defcon 19: http://bit.ly/defcon19_playlist
Видео DEFCON 19: Introduction to Tamper Evident Devices канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Defcon 19: DIY Non-Destructive-EntryOchko123 - How the Feds Caught Russian Mega-Carder Roman SeleznevDeviant Ollam | The Four Types of Locks | SOURCE Conference Boston 2010Defcon 21 - The Secret Life of SIM CardsSirenJack: Cracking a 'Secure' Emergency Warning Siren SystemThe Silver Tongue vs The Iron Fist - Deviant OllamBlack Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood HackerYou’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]I'll Let Myself In: Tactics of Physical Pen TestersTamper Evident Seal Bypass - EnaTail 2 Fixed Length SealDEF CON 19 - datagram - Introduction to Tamper Evident DevicesHow Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017DEFCON 20: Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location DataInduction Foil Sealing - Ways To Make Your Product Tamper EvidentDeviant Ollam "Mastering Master Keys" [HOPE Number 9]Defcon 21 - Stalking a City for Fun and FrivolityNolaCon 2019 D 07 Breaking Into Your Building A Hackers Guide to Unauthorized Physical Access BrentCopying Keys from Photos, Molds & MoreDEFCON 16: Toying with BarcodesLecture 8: IoT Security