Главная
Study mode:
on
1
Intro
2
CrossDevice Tracking
3
What is CrossDevice Tracking
4
How do they work
5
Workflow diagram
6
Proximity marketing
7
Google Cast
8
The moment of realization
9
Demonstration
10
Story
11
Demo
12
Beacon Trap
13
Beacon Injection
14
Fast Attack
15
Getting data from providers
16
Ecosystem
17
Browser Extension
18
Android Permission
19
Solution
20
Benefits
21
Summary
22
Conclusion
23
Questions
24
Anti ultrasound box
Description:
Explore the world of ultrasonic cross-device tracking in this Black Hat conference talk. Delve into the technologies marketers use to track user content across multiple devices for targeted advertising. Learn about the workflow of cross-device tracking, proximity marketing, and Google Cast. Witness demonstrations of attacks like Beacon Trap and Beacon Injection, and understand how data is obtained from providers. Examine the ecosystem surrounding these technologies, including browser extensions and Android permissions. Discover potential solutions and benefits to counter ultrasonic tracking. Gain insights into this cutting-edge marketing tool and its implications for user privacy and security.

Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking

Black Hat
Add to list