Faux Disk Encryption - Realities of Secure Storage on Mobile Devices

Faux Disk Encryption - Realities of Secure Storage on Mobile Devices

Black Hat via YouTube Direct link

Key Encryption Key

31 of 48

31 of 48

Key Encryption Key

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Faux Disk Encryption - Realities of Secure Storage on Mobile Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 What makes mobile special
  4. 4 Why is that a problem
  5. 5 We need data on the device
  6. 6 We have to reconcile the two concepts
  7. 7 Theres no such thing as absolute security
  8. 8 Remote attackers
  9. 9 Coffee shop attacker
  10. 10 Casual thief
  11. 11 Targeted attacks
  12. 12 Casual thieves
  13. 13 Mobile data security
  14. 14 Mobile device encryption
  15. 15 iOS security features
  16. 16 How we implement encryption
  17. 17 Secure Enclave
  18. 18 iOS File Encryption
  19. 19 File System Key
  20. 20 Class Keys
  21. 21 iOS RS Keychain
  22. 22 Why We Need All These Different Classes
  23. 23 Data Needs To Be Accessible
  24. 24 Other Credentials
  25. 25 Touch ID
  26. 26 User Presence
  27. 27 Security Threats
  28. 28 Android Adoption
  29. 29 Why is this important
  30. 30 Device Encryption
  31. 31 Key Encryption Key
  32. 32 Lock Screen
  33. 33 Full Disk Encryption
  34. 34 Android Credential Storage
  35. 35 Boot Security
  36. 36 Odin Mode
  37. 37 Little Kernel
  38. 38 Laugh
  39. 39 Faux Disk Encryption
  40. 40 Making The Kernel
  41. 41 Testing The Bootloader
  42. 42 Drew Soapbox
  43. 43 App Container
  44. 44 Data On Device
  45. 45 Android
  46. 46 Outlook
  47. 47 Takeaways
  48. 48 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.