Home / Video / Hacking / Defcon 21

Defcon 21

Defcon 21 – Privacy In DSRC Connected Vehicles

Description: To date, remote vehicle communications such as OnStar have provided little in the way of privacy. The planned DSRC system will become the first large-scale nationwide direct public participation network outside of the internet. Much information and misinformation has been spread on what the upcoming DSRC system is and can …

Read More »

Defcon 21 – Phantom Network Surveillance UAV / Drone

Description: DARPA, 2011, sponsored a contest named UAVForge which challenged teams to build a prototype unmanned aerial vehicle (UAV). Mission: “UAV must be small enough to fit in a soldier’s rucksack and able to fly to, perch & stare from useful locations for several hours near targets of interest to provide …

Read More »

Defcon 21 – Safety of Tor Network Look at Network Diversity, Relay Operators & Malicious Relays

Description: Rumor has it that the Tor network is a CIA honeypot, that all relays are malicious, and that only bad people use Tor to do bad things online. How much of this is true? How much can we say about the safety of the network? The safety of the Tor …

Read More »

Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It

Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little progress on developing countermeasures and implementing defenses in the disk encryption technologies already in wide use. Furthermore, many users of full disk encryption have physical security habits that fall outside the …

Read More »

Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot

Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living rooms. Unfortunately, content providers began to block streaming access to popular content from the Google TV platform which hindered its reach. Furthermore, the first generation of Google TV hardware used an …

Read More »

Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust

Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based service use for secret projects. General Alexander, head of the NSA, recently spoke of using smartphones as ID cards on classified networks. And yet, mobile devices have a poor security …

Read More »

Defcon 21 – ACL Steganography – Permissions to Hide Your Porn

Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of steganography itself – the art of hiding things in plain sight. Most people know you can hide a text file inside a photograph, or embed a photograph inside an MP3. …

Read More »

Defcon 21 – Backdoors, Government Hacking and The Next Crypto Wars

Description: The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs …

Read More »

Defcon 21 – From Nukes to Cyber— Alternative Approaches for Proactive Defense and Mission Assurance

Description: In typical military operations, the advantage goes to the offense because the initiator controls the timing and is able to concentrate forces. A good defense is designed to undermine the advantage of the offense. Proactive defense approaches include: masking (obfuscation), maneuvering, and hardening of critical capabilities. The other alternative, …

Read More »

Defcon 21 – The Politics of Privacy and Technology: Fighting an Uphill Battle

Description: In the past few decades the world has been dramatically transformed by technology. People have significantly evolved in how they interact with each other and the world; a side effect of this evolution is the drastic change in personal privacy. Private citizens, corporations, and governments all have different ideas …

Read More »