Главная
Study mode:
on
1
Intro
2
Agenda
3
Google Live Traffic
4
Google Protocol
5
MASF Request Message
6
MASF Response Message
7
Protocol Buffers Payload (Request)
8
Protocol Buffers Payload (Response)
9
Waze Protocol
10
Google / Waze, GPS on / WiFi on
11
Authenticity / Attack
12
Network Location Provider Protocol
13
Requirements
14
Zero-Knowledge Proof of Knowledge
15
"Get Dispenser"-Protocol (simplified)
16
"Submission"-Protocol (simplified)
17
Benchmark Results
18
Discussion
19
Conclusion
Description:
Explore the security implications of real-time traffic data in navigation systems through this Black Hat EU 2013 conference talk. Delve into the potential privacy risks associated with smartphone-based floating car data used by services like Google Navigation and Waze. Examine the extent of user tracking capabilities and the global localization of wireless access points. Investigate the authenticity of traffic data and learn about practical demonstrations of hacker-controlled navigation systems. Discover a proposed protocol designed to prevent such attacks while preserving user privacy, complete with implementation details and benchmark results across various hardware platforms.

Floating Car Data from Smartphones

Black Hat
Add to list
0:00 / 0:00