the audio is really ridiculous, why can't these big conventions hire at least one sound technician capable of setting up a noise gate properly, and make sure the audio capture is at least decent?
The TEA3 quirk might be meant to leak the keys slowly. If there's only a tiny statistical irregularity it means an attacker has to gather a lot of data to determine anything. It's known that some military algorithms are designed to slowly leak keys so that if they're captured by the enemy (who doesn't have the infrastructure for periodic re-keying) they can read enemy communications
the audio is really ridiculous, why can't these big conventions hire at least one sound technician capable of setting up a noise gate properly, and make sure the audio capture is at least decent?
Okay, who's the wise guy hacking the AV equipment?
Deliberate firmware backdoor or a coding whoops moment by the etsi firmware devs? Did they simply forget about AT commands?
The TEA3 quirk might be meant to leak the keys slowly. If there's only a tiny statistical irregularity it means an attacker has to gather a lot of data to determine anything. It's known that some military algorithms are designed to slowly leak keys so that if they're captured by the enemy (who doesn't have the infrastructure for periodic re-keying) they can read enemy communications
Next, try breaking Tetrapol
Why can't events like this have at least a mediocre microphone that would make the presentation just barely listenable... 😢
This C3 talk covers the same topic, might have better audio: ruclips.net/video/MXPBkWvlN8c/видео.html
Well typically "fail" is a big part of the charm of hacker conferences. Apparently now even the commercial ones try to copy it.
883 0:19