DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue

Поделиться
HTML-код
  • Опубликовано: 22 дек 2024
  • НаукаНаука

Комментарии • 10

  • @lo2740
    @lo2740 Год назад +16

    the audio is really ridiculous, why can't these big conventions hire at least one sound technician capable of setting up a noise gate properly, and make sure the audio capture is at least decent?

  • @bmitch3020
    @bmitch3020 Год назад +5

    Okay, who's the wise guy hacking the AV equipment?

  • @BenjiNotknown
    @BenjiNotknown Год назад +3

    Deliberate firmware backdoor or a coding whoops moment by the etsi firmware devs? Did they simply forget about AT commands?

  • @thewhitefalcon8539
    @thewhitefalcon8539 2 месяца назад

    The TEA3 quirk might be meant to leak the keys slowly. If there's only a tiny statistical irregularity it means an attacker has to gather a lot of data to determine anything. It's known that some military algorithms are designed to slowly leak keys so that if they're captured by the enemy (who doesn't have the infrastructure for periodic re-keying) they can read enemy communications

  • @shemmo
    @shemmo 2 дня назад

    Next, try breaking Tetrapol

  • @MlokKarel
    @MlokKarel Год назад +18

    Why can't events like this have at least a mediocre microphone that would make the presentation just barely listenable... 😢

    • @jean-francoiscaron5706
      @jean-francoiscaron5706 Год назад

      This C3 talk covers the same topic, might have better audio: ruclips.net/video/MXPBkWvlN8c/видео.html

    • @altebander2767
      @altebander2767 Год назад

      Well typically "fail" is a big part of the charm of hacker conferences. Apparently now even the commercial ones try to copy it.

  • @brashcrab
    @brashcrab 9 месяцев назад

    883 0:19