Главная
Study mode:
on
1
Introduction
2
The issue became public
3
Internal threats
4
ADUPS
5
ADUPS Website
6
ADUPS Track Record
7
Blue Device
8
PII Exfiltration
9
Internals
10
Text Message Exfiltration
11
Text Message Encryption
12
JSON Files
13
Browsing History
14
Application Code
15
Logger
16
Android Log
17
Bluetooth Snoop Log
18
Modem Log Generator
19
Summary
20
Questions
Description:
Explore a Black Hat conference talk that uncovers alarming privacy breaches in Android devices. Delve into research revealing how certain Android models contain firmware that covertly collects and transmits users' sensitive personal data to servers in China without consent or disclosure. Learn about the ADUPS firmware, its track record, and the various types of data exfiltrated, including text messages, browsing history, and application logs. Understand the internal mechanisms used for data collection and transmission, and gain insights into the broader implications of these privacy violations in the mobile device ecosystem.

All Your SMS & Contacts Belong to ADUPS & Others

Black Hat
Add to list
0:00 / 0:00