
- #Defcon conference videos how to
- #Defcon conference videos android
- #Defcon conference videos software
#Defcon conference videos software
He said that the company’s disclosure of bugs in its operating systems and software have worked pretty well in the past few years. I met with Dave Forstrom, director, Microsoft’s Trustworthy Computing Group, for an interview. Microsoft threw a party at the cool Vanity nightclub at the Hard Rock Hotel. The former FBI computer security specialist said he believes that government and commercial entities should present a united defense against cyber warfare.
#Defcon conference videos how to
He showed another path with a project that allowed users to surf Google anonymously and make secure web calls.Ī speaker named Rain talked about how to build a lie detector for a small amount of money and then beat it by controlling your emotional and physiological responses to questions.Īfter five years of running computer security at Facebook, Max Kelly quit three weeks ago. Moxie Marlinspike, a researcher at the Institute for Disruptive Studies, was disturbed at how you have to either give up your privacy when using the web or cell phones, or just drop out of society. If a 15-year-old kid in China launches an offensive cyber war, do you hold the government of China responsible? He said that one of the tough things about cyber war is that there is often no way to tell who attacked you. “You guys make the cyber world look like the north German plain and then you bitch and moan because you got invaded,” he said. General Michael Hayden, the retired director of national security, said that the internet was not created to be defensible. Kaminsky gave talks promoting the use of DNSSEC, or security extensions to the Domain Name System (which keeps all web addresses) to improve overall web safety. His talk was one of several that showed the vulnerabilities of GSM (Global System for Mobile communications, the protocol used in 80 percent of the world’s cell phones).ĭan Kaminsky, who discovered a fundamental flaw in the internet’s address system in 2008, was entrusted as one of seven people who has a key to reboot the internet in case of a catastrophe. He said even emergency services were vulnerable. Hacker “The Grugq” showed how he could hack into the GSM phone network and bring down a cell site.

#Defcon conference videos android
They pointed to apps such as an Android wallpaper app that sent your identification information to a web site in China. John Hering (left), chief executive of mobile security firm Lookout, and Kevin MaHaffey, chief technology officer, gave a presentation on how apps often access private information on smartphones. He showed how to hack two automated teller machines on stage and got tremendous applause as the machines started spitting out “million dollar bills” that Jack had loaded into them. I hope the photos below give you a good impression of what it’s like to attend these conferences in Las Vegas.īarnaby Jack was the main attraction at Black Hat this year. Guards are called “goons” and attendees, known as humans, delight in playing “spot the fed” competitions. There are physical lock-picking contests as well as cyber hacking contests.

The press is not allowed to take pictures of the crowd (Dateline NBC once tried to sneak a reporter in she was caught and publicly embarrassed). At Defcon, you can pay for your badge in cash. Attendees are warned to stay off the wireless networks or risk being put on the Wall of Sheep, a projected image on a wall that shows usernames and partial passwords of those who have been “powned,” or hacked. Federal law enforcement agents arrested one speaker in 2001, a day after Defcon, for writing decryption software.

Speakers’ web sites are regularly hacked, and companies such as Cisco have pressured employees not to give presentations at Black Hat, which is held at the upscale Caesar’s Palace hotel in Las Vegas.ĭefcon is a different animal, held at the downscale Riviera Hotel. Somebody almost always pulls the fire alarm as part of the prankster tradition behind hacking. But under pressure from the Taiwanese government, he withdrew the talk.

This year, a Taiwanese researcher proposed a speech on hacking activities of the Chinese army. Black Hat has plenty of controversy itself.
