Главная
Study mode:
on
1
Introduction
2
What triggered this talk
3
Why would the CIA want this
4
Technical Analysis
5
Security Analysis
6
Attack Surface
7
Code Guard
8
GPS
9
GPS Jamming
10
Spoofing
11
countermeasures
12
conclusion
13
Questions
Description:
Explore a 36-minute conference talk that delves into the 'Vault 7' Protego documents, challenging the initial assumptions about their purpose. Analyze the CIA's covert virtual fencing solution, examining system block diagrams, build instructions, and related news items. Investigate the potential weaknesses of lockdown systems used in various applications, from theft prevention to firearms control. Gain insights into the technical aspects, security analysis, and attack surfaces of such systems, including GPS vulnerabilities and countermeasures. Discover how seemingly unrelated information can be pieced together to reveal intriguing details about covert technologies and their implications.

Harry Potter and the Not-So-Smart Proxy War

media.ccc.de
Add to list