Overview
Syllabus
Introduction
Outline
What makes mobile special
Why is that a problem
We need data on the device
We have to reconcile the two concepts
Theres no such thing as absolute security
Remote attackers
Coffee shop attacker
Casual thief
Targeted attacks
Casual thieves
Mobile data security
Mobile device encryption
iOS security features
How we implement encryption
Secure Enclave
iOS File Encryption
File System Key
Class Keys
iOS RS Keychain
Why We Need All These Different Classes
Data Needs To Be Accessible
Other Credentials
Touch ID
User Presence
Security Threats
Android Adoption
Why is this important
Device Encryption
Key Encryption Key
Lock Screen
Full Disk Encryption
Android Credential Storage
Boot Security
Odin Mode
Little Kernel
Laugh
Faux Disk Encryption
Making The Kernel
Testing The Bootloader
Drew Soapbox
App Container
Data On Device
Android
Outlook
Takeaways
References
Taught by
Black Hat