Overview
Explore a conference talk from DefCamp 2014 that delves into the world of tracking and cybersecurity. Learn about the vulnerabilities of smartphones, the risks associated with SSIDs and iOS, and the potential dangers of open data. Discover the intricacies of Evil Twin Attacks, including their architecture and potential consequences. Watch a live demonstration showcasing real-world tracking techniques and gain insights into protecting yourself in an increasingly connected world. This presentation, part of the prestigious DefCamp conference series on Hacking & Information Security, offers valuable knowledge for security specialists, decision makers, and anyone concerned about digital privacy.
Syllabus
Introduction
Smartphones
SSIDs
iOS
Open Data
Evil Twin Attack
Evil Twin Attack Architecture
What I can do
Demo
Taught by
DefCamp