"Snoop on to them, as they snoop on to us." “nullagent" , “Rekcahdam” , "5@\/@g3"

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    "Snoop on to them, as they snoop on to us." “nullagent" , “Rekcahdam” , "5@\/@g3"


    Snoop on to them, as they snoop on to us.
    “nullagent", Member, Dataparty, He/Him/They/Them
    “Rekcahdam”, Hacker, He/Him
    "5@\/@g3" , ,
    Demo, Tool, Exploit
    45



    BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of BLE devices that have a fixed address? With the rise of IoT we're also seeing a rise in government and corporate BLE surveillance systems. We'll look at tools that normal people can use to find out if their favorite IoT gear is easily trackable. If headphones and GoPro's use fixed addresses, what about stun guns and bodycams? We'll take a look at IoT gear used by authorities and how it may be detectedable over long durations, just like an AirTag.



    Nullagent is a robotics hacker. He built his first internet connected robot in 2004 and since then he's been hooked on embedded hacking. He's building a hacker collective that fuses artistic expression to bring cyber security tools to a broader audience.

    @nullagent



    @rekcahdam

    https://www.rekcahdam.com


    5@\/@g3 is Michaud Savage, Apprentice at Dataparty



    REFERENCES:

    Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol
    Freqy DEFCON 29 RF Village - "Basics of Breaking BLE"
    Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol
    DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices
    Mike Spicer - I Know What U Did Last Summer 3 Yrs Wireless Monitoring DEFCON - DEF CON 27 Conference
    Last edited by number6; August 3, 2023, 14:35.
Working...