Главная
Study mode:
on
1
Stick a Pin in Certificate Pinning
2
The Certificate Trust Model Is Broken
3
Worries over Government Snooping
4
Lock icon on browser is deceiving
5
Users Can Bypass Security Controls
6
Linux Foundation "Let's Encrypt" Free CA for everyone • Revoking service - Domain Validation
7
How Certificate Pinning Works
8
Complexities of Certificate Pinning
9
Avoid IT Desperation
10
How to Implement Cert Pinning
11
Mobile Business Applications
12
Virtual Mobile Infrastructure (VMI)
13
Mobile App Virtualization Architecture
14
Remote Mobile App Virtualization
15
Capturing Encrypted Data
16
VMI with Trusted SSL Proxy
17
Security and User Monitoring
18
Protecting data outside managed network
19
TrustZone: Hardware-Protected Clients
Description:
Learn about certificate pinning, its complexities, and implementation in mobile security. Explore the broken certificate trust model, government surveillance concerns, and user bypasses of security controls. Discover virtual mobile infrastructure (VMI) and mobile app virtualization architecture for protecting data outside managed networks. Examine techniques for capturing encrypted data, implementing trusted SSL proxies, and leveraging hardware-protected clients with TrustZone. Gain insights into mobile business applications, security monitoring, and strategies to prevent data exfiltration in this comprehensive conference talk from BSides San Francisco 2015.

Stick a Pin in Certificate Pinning - How to Inspect Mobile Traffic and Stop Data Exfiltration

Add to list
0:00 / 0:00