Главная
Study mode:
on
1
Introduction
2
Agenda
3
Why Research
4
Applications
5
Admin UI
6
Phone Line
7
Squash
8
Squash West
9
User Interface
10
Denial of Service
11
Demo
12
Create User
13
No Security
14
What Happened
15
Network Storage Devices
16
Conclusion
17
Response
Description:
Explore the implications of surveillance technology in this 42-minute lightning talk from BSidesLV 2013. Delve into the research behind various applications, including administrative interfaces, phone lines, and user interfaces. Examine potential security vulnerabilities and denial of service risks. Watch a live demonstration of user creation and learn about the unexpected consequences. Investigate the role of network storage devices in surveillance systems. Gain valuable insights into the current state of surveillance technology and its impact on privacy and security.

You Are Being Watched

BSidesLV
Add to list