Completed
Uncovering a hidden peer
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Intercepting iCloud Keychain
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Secret Syncing & Recovery in the Cloud
- 3 Designed to be Highly Secure
- 4 Critical Flaws Now Fixed
- 5 Prior Work & Presentations Covering iCloud Keychain
- 6 iCloud Keychain Components
- 7 Circle Protocol Illustrated
- 8 What happens when devices are lost while traveling?
- 9 iCloud Keychain Passwords Overview
- 10 How Does A New Device Join Without Approval?
- 11 Uncovering a hidden peer
- 12 Which Backups Contain the Cloud Identity Key?
- 13 iCloud Keychain Sync Transmits Data Across Apple Services
- 14 OTR KEX Messages
- 15 Pairwise, Fanout Negotiation
- 16 OTR Flaws
- 17 CVE-2017-2448 - SecVerify Signature And Mac
- 18 CVE-2017-2448 - Goto Fail Redux
- 19 CVE-2017-2448 - Sample Trigger in 32 Bytes
- 20 Signature Bypass Attack Impact
- 21 Apple's iCloud Keychain Security Goals (without OTR fix)
- 22 Stack Overlap Attack Impact
- 23 Wrapping up
- 24 Next Steps for the Security Industry
- 25 Questions?