Главная
Study mode:
on
1
Introduction
2
About Glenn
3
Surveillance
4
Machines
5
Devices
6
WiFi
7
geolocation
8
interacting with device
9
Snoopy framework
10
Next generation Snoopy
11
Snoopy Drone Demo
12
Nokia N900
13
Flying in London
14
Hotel
15
Trilateration
16
MultiGo
17
Snoopy Entities
18
Time Metrics
19
Transform Fetch
20
Live Demo
21
Logitech Morpheus
22
Grab
23
Riggle
24
Street View
25
Isis IDs
26
Snoopy Software
27
Lucky
28
EXIF
29
Linksys
30
Rogue Access Point
31
Apple Device
32
Multi Go
33
Morty
34
Post Employees
35
Devices observed
36
Verint
37
Drone Survival Guide
38
Quick Graph
39
Questions
Description:
Explore the world of privacy invasion through wireless signals in this Black Hat Asia 2014 conference talk. Delve into Glenn Wilkinson's journey of developing a robust, modular, and distributed tracking framework called Snoopy. Learn about the vulnerabilities of devices that emit uniquely identifiable signals, particularly mobile phones. Discover how these signals can be exploited for tracking and potentially malicious purposes. Examine the evolution of the Snoopy framework from its inception in 2012 to its advanced capabilities, including integration with quadcopter technology. Gain insights into various tracking techniques, geolocation methods, and device interactions. Witness live demonstrations showcasing the framework's abilities, including drone-based surveillance and data collection. Explore topics such as trilateration, entity tracking, time metrics, and the ethical implications of such technologies. Understand the potential threats to personal privacy and learn about countermeasures like the Drone Survival Guide. Read more

The Machines That Betrayed Their Masters

Black Hat
Add to list