Logo

    SHA2017 Closing (SHA2017)

    August 07, 2017
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    A summary extraordinaire. #Community about this event: https://c3voc.de

    Recent Episodes from Chaos Computer Club - SHA2017: Still Hacking Anyway (mp3)

    Can quantum physics break cryptography's curse? (SHA2017)

    Can quantum physics break cryptography's curse? (SHA2017)
    The history of cryptography is a history of failures. Stronger ciphers replaced broken ones, to be in turn broken again. Quantum cryptography is offering a hope to end this replacement cycle, for its security premises on the laws of quantum physics and not on limitations of human ingenuity and computing. But, can our nascent quantum technology implement quantum cryptography securely? The talk introduces today's quantum cryptography techniques, then shows how to compromise their security by exploiting imperfections in engineering implementations. #DeviceSecurity #Science #NetworkSecurity about this event: https://c3voc.de

    Biometric ID cards by the billion (SHA2017)

    Biometric ID cards by the billion (SHA2017)
    India has rolled out a 'voluntary' biometric ID card to all of its billion-plus citizens. Which is fascinating from a social, technical and fundamental rights perspective. This talk is about both intended and unintended consequences of this grand experiment, with a focus on the (implicit) assumptions we tend to make about technology. #Society #Privacy #SurveillanceState about this event: https://c3voc.de

    Hack-a-ble (SHA2017)

    Hack-a-ble (SHA2017)
    Although IoT is already embedded in our everyday lives, our security and privacy are sometime left behind for comfort and other reasons, despite the serious impact that IoT vulnerabilities may have on our digital and physical security. Bluetooth Low Energy (BLE), also known as Bluetooth Smart is the most popular protocol used for interfacing IoT and smart devices. Broadly used in the healthcare, fitness, security, and home-entertainment industries, nowadays we encounter BLE in almost every aspect of our lives (e.g. in wearables, sensors, medical devices, security products, etc.). In this lecture I will survey key security issues in the BLE protocol, as well as presenting a possible architecture for BLE Man-in-the-Middle (MitM) attack together with the related necessary equipment. In addition, will introduce some of the available tools and how they can be used to perform penetration-testing on BLE applications and will discuss possible mitigations to secure them. #NetworkSecurity #IoT about this event: https://c3voc.de
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io