Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
25c3-2639-en-attacking_nfc_mobile_phones.mp4
Infohash:
D8F9FCC99E02716367FFC012DC832B664E3E2BA9
Type:
Other
Title:
25c3-2639-en-attacking_nfc_mobile_phones.mp4
Category:
Video/Other
Uploaded:
2009-01-16 (by ccc-torrents)
Description:
Attacking NFC mobile phones
First look at the security of NFC mobile phones
Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.
The presentation will provide this first look at the security of NFC mobile phones. We will show some known theoretical attacks and how they may work in the field. Further we will present results from analyzing a specific NFC mobile phone, here we will reveal some security issues and methods to exploit them. Also we will provide a small survey of NFC applications in the field. Finally we will release a small set of tools to do further analysis on NFC mobile phones and applications.
If you have an NFC mobile phone I kindly ask you to bring it to the congress and come to me before or after my talk and show it to me, thanks!
Tags:
Files count:
1
Size:
629.79 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969