Completed
Key Encryption Key
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Faux Disk Encryption - Realities of Secure Storage on Mobile Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Outline
- 3 What makes mobile special
- 4 Why is that a problem
- 5 We need data on the device
- 6 We have to reconcile the two concepts
- 7 Theres no such thing as absolute security
- 8 Remote attackers
- 9 Coffee shop attacker
- 10 Casual thief
- 11 Targeted attacks
- 12 Casual thieves
- 13 Mobile data security
- 14 Mobile device encryption
- 15 iOS security features
- 16 How we implement encryption
- 17 Secure Enclave
- 18 iOS File Encryption
- 19 File System Key
- 20 Class Keys
- 21 iOS RS Keychain
- 22 Why We Need All These Different Classes
- 23 Data Needs To Be Accessible
- 24 Other Credentials
- 25 Touch ID
- 26 User Presence
- 27 Security Threats
- 28 Android Adoption
- 29 Why is this important
- 30 Device Encryption
- 31 Key Encryption Key
- 32 Lock Screen
- 33 Full Disk Encryption
- 34 Android Credential Storage
- 35 Boot Security
- 36 Odin Mode
- 37 Little Kernel
- 38 Laugh
- 39 Faux Disk Encryption
- 40 Making The Kernel
- 41 Testing The Bootloader
- 42 Drew Soapbox
- 43 App Container
- 44 Data On Device
- 45 Android
- 46 Outlook
- 47 Takeaways
- 48 References