Not sure if I posted in the right place; the one that seemed right seemed more reserved for present and past while this one is more "future". So I apologize if I posted in the wrong place.
Anyway, I'm interested in being a speaker at Defcon 19. My material will be around the Security and Vulnerabilities of the current 3g/4g CDMA network as well as a brief history/getting up to speed/laymans presentation of cellular technology and the main company that makes it all possible (Qualcomm).
I shall be going over how CDMA works, and how it has been deployed in the past decade and half. Many people don't know how old CDMA technology actually is (dates to military applications), but the first modern usage for cellular communications was accepted in 1995 via IS-95 and then again expanded in 2000 as IS-2000, etc etc more History
Then I'd be going over the 2g to 3G conversions where smartphones first emerged. Those old windows mobile/palm treo devices were 2g-3g devices.
As well as the now ongoing 4g conversion/wimax.
A brief history on the major CDMA carirers, Sprint/Verizon/MetroPCS/Cricket/Alltel, etc and some of the current vulnerabilities that were posisible and some that still are. (e.g. phreaking/cloning---yes its still possible)
And then the emergence of mobile phone platforms we know today as: Android OS, iOS/iphone, palm, Windows mobile and RIM/Blackberry. focusing on their parent company market penetration, misc statistics and of course platform vulnerabilities/openness.
There are a number of security vulnerabilities that have never seen the sight of day except on misc obscure boards on the Internet and to a few tinkerers that basically allow cell phones to do a majority of things and in todays worlds where a cell phone is more closer to a computer having dedicated mobile operating systems/software and support from large vendors. It really is a new age in the world of computers because a "smartphone" today is equal to a late late 90's/early 00's desktop computer in computing power, access and storage.
Of course theres also the issue of how deep into information I can get into, because when we're talking about CDMA technology we're talking about Qualcomm's main marketable item as well as several cell phone carriers. While I may not think this could be privileged information/possible DMCA violations they could so: bam deep water.
But, before the last issue I'm just curious to know if this would be a popular topic that would be accepted as presentation at defcon. I've been overlooking the entry form but before I put the work into creating a presentation that would be an hour long+ I'm just wanting to test the waters; so to say.
Also, inb4 troll. This years defcon matches my age. ;) Not all of us are ignorant... or perhaps my perception is flawed.
Anyway, I'm interested in being a speaker at Defcon 19. My material will be around the Security and Vulnerabilities of the current 3g/4g CDMA network as well as a brief history/getting up to speed/laymans presentation of cellular technology and the main company that makes it all possible (Qualcomm).
I shall be going over how CDMA works, and how it has been deployed in the past decade and half. Many people don't know how old CDMA technology actually is (dates to military applications), but the first modern usage for cellular communications was accepted in 1995 via IS-95 and then again expanded in 2000 as IS-2000, etc etc more History
Then I'd be going over the 2g to 3G conversions where smartphones first emerged. Those old windows mobile/palm treo devices were 2g-3g devices.
As well as the now ongoing 4g conversion/wimax.
A brief history on the major CDMA carirers, Sprint/Verizon/MetroPCS/Cricket/Alltel, etc and some of the current vulnerabilities that were posisible and some that still are. (e.g. phreaking/cloning---yes its still possible)
And then the emergence of mobile phone platforms we know today as: Android OS, iOS/iphone, palm, Windows mobile and RIM/Blackberry. focusing on their parent company market penetration, misc statistics and of course platform vulnerabilities/openness.
There are a number of security vulnerabilities that have never seen the sight of day except on misc obscure boards on the Internet and to a few tinkerers that basically allow cell phones to do a majority of things and in todays worlds where a cell phone is more closer to a computer having dedicated mobile operating systems/software and support from large vendors. It really is a new age in the world of computers because a "smartphone" today is equal to a late late 90's/early 00's desktop computer in computing power, access and storage.
Of course theres also the issue of how deep into information I can get into, because when we're talking about CDMA technology we're talking about Qualcomm's main marketable item as well as several cell phone carriers. While I may not think this could be privileged information/possible DMCA violations they could so: bam deep water.
But, before the last issue I'm just curious to know if this would be a popular topic that would be accepted as presentation at defcon. I've been overlooking the entry form but before I put the work into creating a presentation that would be an hour long+ I'm just wanting to test the waters; so to say.
Also, inb4 troll. This years defcon matches my age. ;) Not all of us are ignorant... or perhaps my perception is flawed.
Comment