Explore the world of telephony security in this 21-minute conference talk that introduces SHAKEN/STIR, a technology aimed at combating the global surge in robocalls and spam calls. Delve into the current vulnerabilities of telephony systems, allowing anyone to spoof calls or texts from any number. Learn about the STIR (Secure Telephone Identity Revisited) and SHAKEN (Signature-based Handling of Asserted information using toKENs) standards, which employ public key cryptography to validate caller identification. Examine the challenges of industry-wide implementation, potential limitations of this technology, and interim strategies to mitigate call spam and fraud. Gain insights from Kelley Robinson, an expert from Twilio's Account Security team, as she breaks down complex security concepts for new audiences and discusses the path towards more secure telephony systems.
Overview
Syllabus
Intro
Telephony Security
The Problem
The Trace Act
Limitations
Taught by
0xdade