Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.