The Less Hacked Path

92
The Less Hacked Path Samy Kamkar

Transcript of The Less Hacked Path

Page 1: The Less Hacked Path

The Less Hacked PathSamy Kamkar

Page 2: The Less Hacked Path

1

Page 3: The Less Hacked Path
Page 4: The Less Hacked Path
Page 5: The Less Hacked Path
Page 6: The Less Hacked Path
Page 7: The Less Hacked Path
Page 8: The Less Hacked Path
Page 9: The Less Hacked Path
Page 10: The Less Hacked Path
Page 11: The Less Hacked Path
Page 12: The Less Hacked Path
Page 13: The Less Hacked Path
Page 14: The Less Hacked Path
Page 15: The Less Hacked Path
Page 16: The Less Hacked Path
Page 17: The Less Hacked Path
Page 18: The Less Hacked Path
Page 19: The Less Hacked Path
Page 20: The Less Hacked Path
Page 21: The Less Hacked Path
Page 22: The Less Hacked Path
Page 23: The Less Hacked Path
Page 24: The Less Hacked Path
Page 25: The Less Hacked Path
Page 26: The Less Hacked Path
Page 27: The Less Hacked Path
Page 28: The Less Hacked Path
Page 29: The Less Hacked Path
Page 30: The Less Hacked Path
Page 31: The Less Hacked Path
Page 32: The Less Hacked Path
Page 33: The Less Hacked Path
Page 34: The Less Hacked Path
Page 35: The Less Hacked Path
Page 36: The Less Hacked Path
Page 37: The Less Hacked Path
Page 38: The Less Hacked Path
Page 39: The Less Hacked Path

720 HOURS

Page 40: The Less Hacked Path
Page 41: The Less Hacked Path
Page 42: The Less Hacked Path
Page 43: The Less Hacked Path
Page 44: The Less Hacked Path
Page 45: The Less Hacked Path
Page 46: The Less Hacked Path
Page 47: The Less Hacked Path
Page 48: The Less Hacked Path
Page 49: The Less Hacked Path
Page 50: The Less Hacked Path
Page 51: The Less Hacked Path
Page 52: The Less Hacked Path
Page 53: The Less Hacked Path
Page 54: The Less Hacked Path
Page 55: The Less Hacked Path
Page 56: The Less Hacked Path
Page 57: The Less Hacked Path
Page 58: The Less Hacked Path
Page 59: The Less Hacked Path
Page 60: The Less Hacked Path
Page 61: The Less Hacked Path
Page 62: The Less Hacked Path
Page 63: The Less Hacked Path
Page 64: The Less Hacked Path

“In my experience, once data becomes invisible, something magical happens: they forget about security”

- Adam "Major Malfunction" Laurie

Ref: http://adamsblog.aperturelabs.com/2013_03_01_archive.html

Page 65: The Less Hacked Path

TEMPEST

Page 66: The Less Hacked Path
Page 67: The Less Hacked Path

Ref: http://dev.inversepath.com/download/tempest/tempest_2009.pdf

Page 68: The Less Hacked Path
Page 69: The Less Hacked Path
Page 70: The Less Hacked Path

http://samy.pl/magspoof

Page 71: The Less Hacked Path

http://samy.pl/magspoofhttp://samy.pl/magspoof

Page 72: The Less Hacked Path

http://samy.pl/magspoof

Page 73: The Less Hacked Path
Page 74: The Less Hacked Path
Page 75: The Less Hacked Path

Ref: http://www.cs.tau.ac.il/~tromer/acoustic/

Page 76: The Less Hacked Path
Page 77: The Less Hacked Path

Ref: http://newsoffice.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804

Page 78: The Less Hacked Path

https://www.dropbox.com/s/2js7jjchvm7uzs7/Screenshot%202014-11-22%2021.31.55.png?dl=0

Ref: http://www.theguardian.com/technology/2014/nov/21/e-cigarettes-malware-computers

Page 79: The Less Hacked Path

Ref: http://proxclone.com/pdfs/HID_bioCLASS-Enhanced_Security_or_Costly_Placebo.pdf

Page 80: The Less Hacked Path
Page 81: The Less Hacked Path

http://samy.pl/combobreaker

Page 82: The Less Hacked Path

http://samy.pl/combobreaker

Page 83: The Less Hacked Path

http://samy.pl/keysweeper

Page 84: The Less Hacked Path

84http://samy.pl/keysweeper

Page 85: The Less Hacked Path

Ref: http://sdrsharp.com/

Page 86: The Less Hacked Path
Page 87: The Less Hacked Path

Ref: http://ossmann.blogspot.fi/2010/03/16-pocket-spectrum-analyzer.html

Page 88: The Less Hacked Path
Page 89: The Less Hacked Path
Page 90: The Less Hacked Path

Ref: http://dev.inversepath.com/download/tempest/tempest_2009.pdf

Page 91: The Less Hacked Path
Page 92: The Less Hacked Path

Thank you!

You can reach me at:

@SamyKamkar https://samy.pl