Matt Hoy and David Khudaverdyan presented on consumer device security and privacy for the general public. They discussed how default settings on mobile devices and operating systems are becoming more invasive and many users are unaware. They covered privacy settings and options on iOS, Android, Windows, OS X and Ubuntu operating systems. They discussed trusting devices, cloud services, carriers and recommended apps for privacy. They noted both advances in security as well as recent fails, and concluded users should check settings regularly, restrict apps and permissions, use a VPN, and not fully trust cloud services.
This document discusses tools and frameworks for developing iPhone and iPod touch applications. It introduces the iPhone/iPod touch hardware features and describes different types of applications that can be created, including native, web, external platform, and jailbroken apps. It also outlines the steps to set up development environments on Windows and Mac systems. Finally, it provides examples of using the iUI framework to build simple web apps with iPhone interfaces.
Smartwatches are an emerging market. Sales have reached 5.1 million units between 2013 and 2014. A hackathon event was held to develop apps for the Apple Watch and Android Wear platforms. The Apple Watch launched in April 2015 starting at $349 and has limitations for developers due to restricted APIs. While smartwatches are not fully ready for the mainstream, their success will depend largely on how well the Apple Watch sells and whether it drives further adoption. Smartwatch competitors need the Apple Watch to succeed in order for the market to grow.
This document provides recommendations for various artisan food producers, delis, and markets across South Africa. It is organized by province and lists the name, location, and brief description of each food-related business. Some of the highlights mentioned include a butcher in Cape Town known for its high quality meat cuts, a bakery in KwaZulu-Natal that has developed a cult following for its bread, and a spice shop in the Western Cape that sells freshly ground spices. The document encourages supporting small, artisanal producers across the country that offer unique, high quality food products.
Susan Harrington has over 20 years of experience as a project manager in telecommunications and technology. She is PMP certified and has successfully led teams both domestically and internationally to deliver projects on time and on budget. Her skills include requirements documentation, project scheduling, software installation, process documentation, and client relations. She is proficient in various project management methodologies and tools.
This short document promotes the creation of Haiku Deck presentations on 際際滷Share by stating "Inspired?" and providing a button to "GET STARTED" making your own Haiku Deck presentation. It encourages the reader to try making presentations on the Haiku Deck platform hosted on 際際滷Share in a concise and engaging manner using just two words and a call to action.
The document provides recipes for several milk and cookie combinations:
- The ultimate vanilla cookie dough recipe which can be flavored in different ways and served with chocolate milk.
- Double cookie peanut butter biscuits made with vanilla cookie dough, peanut butter, and crushed Oreo cookies, served with vanilla and honey milk.
- Triple chocolate almond cookies containing white chocolate, chocolate chips, and almonds, served with strawberry milk.
- Oat and cranberry crunch cookies packed with nuts, seeds, and dried cranberries, served with rosewater milk.
- Ice cream sandwich cookies made by sandwiching ice cream between triple chocolate cookies and dipping in chocolate, served frozen or soft.
Bad for Enterprise: Attacking BYOD enterprise mobility security solutionsPriyanka Aash
油
"The global market for Bring Your Own Device (BYOD) and enterprise mobility is expected to quadruple in size over the next four years, hitting $284 billion by 2019. BYOD software is used by some of the largest organizations and governments around the world. Barclays, Walmart, AT&T, Vodafone, United States Department of Homeland Security, United States Army, Australian Department of Environment and numerous other organizations, big and small, all over the world. Enterprise Mobile Security (EMS) is a component of BYOD solutions that promises data, device and communications security for enterprises. Amongst others, it aims to solve Data Loss, Network Privacy and jailbreaking/rooting of devices.油
Using the Good Technology EMS suite as an example, my talk will show that EMS solutions are largely ineffective and in some cases can even expose an organization to unexpected risks. I will show attacks against EMS protected apps on jailbroken and non-jailbroken devices, putting to rest the rebuttal that CxOs and solution vendors often give penetration testers, ""We do not support jailbroken devices."" I will also introduce a groundbreaking tool, Swizzler, to help penetration testers confronted with apps wrapped into EMS protections. The tool conveniently automates a large amount of attacks that allows pen-testers to bypass each of the protections that Good and similar solutions implement. In a live demonstration of Swizzler I will show how to disable tampering detection mechanisms and application locks, intercept & decrypt encrypted data, and route ""secure"" HTTP requests through BURP into established Good VPN tunnels to attack servers on an organization's internal network. Swizzler will be released to the world along with my talk at Blackhat USA. Whether you are a CxO, administrator or user, you can't afford not to understand the risks associated with BYOD."
(Source: Black Hat USA 2016, Las Vegas)
The document discusses how a company can securely manage employee-owned mobile devices (BYOD) using MobileIron. It summarizes the company's transition from company-owned Blackberries to allowing any device. MobileIron provides centralized policy enforcement and security across all devices. It allows separating personal and work data, enforcing access controls and remote wiping lost devices. The document also discusses providing secure access to additional corporate resources beyond email and ensuring privacy and international roaming policies are followed.
This document is an introduction to mobile software testing presented by Stephen Janaway. It discusses why mobile testing is important given the huge mobile market and users' dependence on well-functioning mobile devices and applications. It also covers what types of mobile testing exist, including hardware, network protocols, applications, and more. Finally, it encourages getting involved in mobile testing as the field is growing rapidly and testing mobile applications is an easy way to break into the industry.
Presentation by Dominic White at the ITweb security summit 2010.
This presentation is about online privacy. The presentation begins with a discussion on behavioral tracking, Ways to prevent tracking such as DNT, TPL,googleSharing and opt out are discussed. The presentation ends with a series of disclussions on evercookie and nevercookie.
Piotr Nazimek TestWarez 2017
Internet of Things will have a huge impact on many areas of live like human health, home, workplace, city infrastructure or transport systems. Securing the IoT systems is essential for its reliability and sensitive data protection. Due to the nature of used hardware usually other techniques must be used than in typical systems.
In the last years several things have chaned in the world of iOS forensics, both in terms of acquisition and in terms of analysis. The objective of this presentation is to provide an overview of the state of the art in terms of acquisition techniques and overcoming of the device's protection mechanisms, in particular the access code chosen by the user. In addition, the presentation aims to highlight what information we are missing by using the techniques and tools available on the market and what are the alternative paths we can use to overcome this problem
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
油
Mobile devices and applications have taken the world by storm. Millions of consumers are using these devices for everything from conducting financial transactions, accessing health care information and sharing personal experiences over social media. Unfortunately there is still little regard or concern with how mobile platforms and major social networks collect, transmit and store personal and corporate information. This exacerbates existing privacy concerns and the need for new regulations in the age of big data. In this presentation we discuss the latest privacy concerns with this new technology. Topics will include:
All new privacy concerns with mobile application data, geolocation, address book harvesting , third party information sharing and the latest mobile technology such as NFC (Near Field Communication)
A close look at the top 20 mobile applications and how they transmit, store and reuse personal or private information
Comparison of current privacy policies of the major social networks, what they tell you and what they don't
Ramifications of international and US privacy regulations and how this impacts mobile devices, social networks, you and your business
Attacking and Defending Apple iOS DevicesTom Eston
油
IT loves to use Apple iPhones and iPads, but hates supporting them. For most environments, they represent the exception, and are not subject to standard corporate controls. The reason the exception is allowed is usually the fact that the CEO bought an iPhone and iPad the day they were released, and then quickly filled them with sensitive corporate data. With their portability and popularity, it is only a matter of time before one of these devices ends up missing. How worried should you be? This presentation will cover the latest real-world attack techniques for compromising Apples iOS devices, introduce a new assessment methodology that can be used by penetration testers, and discuss the latest defensive techniques for securely deploying iOS devices within your enterprise.
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
油
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesnt take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.
Tom Eston is a Senior Security Consultant for SecureState. Tom focuses his research on the security of social media. Tom is also the founder of SocialMediaSecurity.com and co-host of the Security Justice and Social Media Security podcasts. Kevin Johnson is a security researcher with Secure Ideas. He has many years of experience performing security services for Fortune 100 companies, and leads a large number of open source security projects including BASE and SamuraiWTF. Kevin is also an instructor for SANS.
Presented at Notacon 8 in Cleveland Ohio.
The document provides information about digital forensics workshops and tools for analyzing cellular devices. It discusses how to analyze data from iPhones using iTunes backups and the iPhone Analyzer tool. It also discusses how to perform logical acquisitions on Android devices using the AF-Logical tool in Santoku Linux by connecting the device via USB and using adb commands. The document provides tips for protecting personal data and security best practices when using public WiFi networks.
Smart Use of Smart Phone
by Chheda Sanjay Visanji
at CVOCA Association
at Dadar East CPE Study Circle of WIRC of ICAI
at KVO CA's Wives Forum
Apps for Smart Phone
Which Smart Phone to Buy
Whether to buy Single Sim or Double Sim
How to improve Phone Battery Life
What to do to avoid Phone Getting Hang
JB Nagar Study Circle
jbnagarcpe@gmail.com
Kandivali CPE Study Circle
The Internet of Things (IoT) refers to the network of physical devices embedded with electronics, software and sensors that enables them to connect, exchange and analyze data. As IoT devices continue to proliferate, collecting vast amounts of personal and behavioral data, privacy and security concerns have emerged. Due to low costs pressures, many IoT devices are designed without adequate security protections. This exposes them to hacks that could compromise personal privacy or gain control of devices. Users need to carefully research devices, change default passwords, enable automatic updates and isolate IoT networks to help secure their personal data in an increasingly connected world.
The document discusses SOTI's enterprise mobility management platform called SOTI MobiControl. It highlights key features such as rapid deployment and provisioning, identity and access management, application management, content management, and device and data security. SOTI MobiControl provides a single platform to manage mobile devices, IoT devices, and endpoints across multiple operating systems.
Presentation on the Social Media for Workers
Unison Scotland / UHI Lewes Castle College / Scottish Union Learning
Stornoway and Benbecula
November - December 2016
Enterprise Open Source Intelligence GatheringTom Eston
油
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
Data Privacy Day is observed internationally on January 28th each year to encourage awareness of privacy and protection of personal data. The document provides tips for securing personal information when using devices, applications, online banking, social media and Wi-Fi networks. Readers are encouraged to use strong and unique passwords, update software regularly, carefully consider what is shared online, and utilize privacy tools to block tracking and secure data.
Internet Safety tips for Parents of Christian Childrennickswebtsv
油
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
What are the standards for IoT? What are the requirements for different parts of your business for IoT? For your infrastructure? For your employees? For your customers? For your partners? Examples of Successful Enterprise IOT architecture patterns and use cases. What are problems like security for IoT?
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
油
Security incidents related to IoT devices
About the Android Things
Major features
Installation and Settings
Accessible network service
Security configurations
Conclusions
References
Bad for Enterprise: Attacking BYOD enterprise mobility security solutionsPriyanka Aash
油
"The global market for Bring Your Own Device (BYOD) and enterprise mobility is expected to quadruple in size over the next four years, hitting $284 billion by 2019. BYOD software is used by some of the largest organizations and governments around the world. Barclays, Walmart, AT&T, Vodafone, United States Department of Homeland Security, United States Army, Australian Department of Environment and numerous other organizations, big and small, all over the world. Enterprise Mobile Security (EMS) is a component of BYOD solutions that promises data, device and communications security for enterprises. Amongst others, it aims to solve Data Loss, Network Privacy and jailbreaking/rooting of devices.油
Using the Good Technology EMS suite as an example, my talk will show that EMS solutions are largely ineffective and in some cases can even expose an organization to unexpected risks. I will show attacks against EMS protected apps on jailbroken and non-jailbroken devices, putting to rest the rebuttal that CxOs and solution vendors often give penetration testers, ""We do not support jailbroken devices."" I will also introduce a groundbreaking tool, Swizzler, to help penetration testers confronted with apps wrapped into EMS protections. The tool conveniently automates a large amount of attacks that allows pen-testers to bypass each of the protections that Good and similar solutions implement. In a live demonstration of Swizzler I will show how to disable tampering detection mechanisms and application locks, intercept & decrypt encrypted data, and route ""secure"" HTTP requests through BURP into established Good VPN tunnels to attack servers on an organization's internal network. Swizzler will be released to the world along with my talk at Blackhat USA. Whether you are a CxO, administrator or user, you can't afford not to understand the risks associated with BYOD."
(Source: Black Hat USA 2016, Las Vegas)
The document discusses how a company can securely manage employee-owned mobile devices (BYOD) using MobileIron. It summarizes the company's transition from company-owned Blackberries to allowing any device. MobileIron provides centralized policy enforcement and security across all devices. It allows separating personal and work data, enforcing access controls and remote wiping lost devices. The document also discusses providing secure access to additional corporate resources beyond email and ensuring privacy and international roaming policies are followed.
This document is an introduction to mobile software testing presented by Stephen Janaway. It discusses why mobile testing is important given the huge mobile market and users' dependence on well-functioning mobile devices and applications. It also covers what types of mobile testing exist, including hardware, network protocols, applications, and more. Finally, it encourages getting involved in mobile testing as the field is growing rapidly and testing mobile applications is an easy way to break into the industry.
Presentation by Dominic White at the ITweb security summit 2010.
This presentation is about online privacy. The presentation begins with a discussion on behavioral tracking, Ways to prevent tracking such as DNT, TPL,googleSharing and opt out are discussed. The presentation ends with a series of disclussions on evercookie and nevercookie.
Piotr Nazimek TestWarez 2017
Internet of Things will have a huge impact on many areas of live like human health, home, workplace, city infrastructure or transport systems. Securing the IoT systems is essential for its reliability and sensitive data protection. Due to the nature of used hardware usually other techniques must be used than in typical systems.
In the last years several things have chaned in the world of iOS forensics, both in terms of acquisition and in terms of analysis. The objective of this presentation is to provide an overview of the state of the art in terms of acquisition techniques and overcoming of the device's protection mechanisms, in particular the access code chosen by the user. In addition, the presentation aims to highlight what information we are missing by using the techniques and tools available on the market and what are the alternative paths we can use to overcome this problem
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
油
Mobile devices and applications have taken the world by storm. Millions of consumers are using these devices for everything from conducting financial transactions, accessing health care information and sharing personal experiences over social media. Unfortunately there is still little regard or concern with how mobile platforms and major social networks collect, transmit and store personal and corporate information. This exacerbates existing privacy concerns and the need for new regulations in the age of big data. In this presentation we discuss the latest privacy concerns with this new technology. Topics will include:
All new privacy concerns with mobile application data, geolocation, address book harvesting , third party information sharing and the latest mobile technology such as NFC (Near Field Communication)
A close look at the top 20 mobile applications and how they transmit, store and reuse personal or private information
Comparison of current privacy policies of the major social networks, what they tell you and what they don't
Ramifications of international and US privacy regulations and how this impacts mobile devices, social networks, you and your business
Attacking and Defending Apple iOS DevicesTom Eston
油
IT loves to use Apple iPhones and iPads, but hates supporting them. For most environments, they represent the exception, and are not subject to standard corporate controls. The reason the exception is allowed is usually the fact that the CEO bought an iPhone and iPad the day they were released, and then quickly filled them with sensitive corporate data. With their portability and popularity, it is only a matter of time before one of these devices ends up missing. How worried should you be? This presentation will cover the latest real-world attack techniques for compromising Apples iOS devices, introduce a new assessment methodology that can be used by penetration testers, and discuss the latest defensive techniques for securely deploying iOS devices within your enterprise.
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
油
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesnt take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.
Tom Eston is a Senior Security Consultant for SecureState. Tom focuses his research on the security of social media. Tom is also the founder of SocialMediaSecurity.com and co-host of the Security Justice and Social Media Security podcasts. Kevin Johnson is a security researcher with Secure Ideas. He has many years of experience performing security services for Fortune 100 companies, and leads a large number of open source security projects including BASE and SamuraiWTF. Kevin is also an instructor for SANS.
Presented at Notacon 8 in Cleveland Ohio.
The document provides information about digital forensics workshops and tools for analyzing cellular devices. It discusses how to analyze data from iPhones using iTunes backups and the iPhone Analyzer tool. It also discusses how to perform logical acquisitions on Android devices using the AF-Logical tool in Santoku Linux by connecting the device via USB and using adb commands. The document provides tips for protecting personal data and security best practices when using public WiFi networks.
Smart Use of Smart Phone
by Chheda Sanjay Visanji
at CVOCA Association
at Dadar East CPE Study Circle of WIRC of ICAI
at KVO CA's Wives Forum
Apps for Smart Phone
Which Smart Phone to Buy
Whether to buy Single Sim or Double Sim
How to improve Phone Battery Life
What to do to avoid Phone Getting Hang
JB Nagar Study Circle
jbnagarcpe@gmail.com
Kandivali CPE Study Circle
The Internet of Things (IoT) refers to the network of physical devices embedded with electronics, software and sensors that enables them to connect, exchange and analyze data. As IoT devices continue to proliferate, collecting vast amounts of personal and behavioral data, privacy and security concerns have emerged. Due to low costs pressures, many IoT devices are designed without adequate security protections. This exposes them to hacks that could compromise personal privacy or gain control of devices. Users need to carefully research devices, change default passwords, enable automatic updates and isolate IoT networks to help secure their personal data in an increasingly connected world.
The document discusses SOTI's enterprise mobility management platform called SOTI MobiControl. It highlights key features such as rapid deployment and provisioning, identity and access management, application management, content management, and device and data security. SOTI MobiControl provides a single platform to manage mobile devices, IoT devices, and endpoints across multiple operating systems.
Presentation on the Social Media for Workers
Unison Scotland / UHI Lewes Castle College / Scottish Union Learning
Stornoway and Benbecula
November - December 2016
Enterprise Open Source Intelligence GatheringTom Eston
油
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
Data Privacy Day is observed internationally on January 28th each year to encourage awareness of privacy and protection of personal data. The document provides tips for securing personal information when using devices, applications, online banking, social media and Wi-Fi networks. Readers are encouraged to use strong and unique passwords, update software regularly, carefully consider what is shared online, and utilize privacy tools to block tracking and secure data.
Internet Safety tips for Parents of Christian Childrennickswebtsv
油
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
What are the standards for IoT? What are the requirements for different parts of your business for IoT? For your infrastructure? For your employees? For your customers? For your partners? Examples of Successful Enterprise IOT architecture patterns and use cases. What are problems like security for IoT?
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
油
Security incidents related to IoT devices
About the Android Things
Major features
Installation and Settings
Accessible network service
Security configurations
Conclusions
References
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
油
Consumer_Device_Privacy
1. Consumer Device Security and
Privacy for the General Public
Matt (mattrix) Hoy
David (davo) Khudaverdyan
2. About Matt (mattrix) Hoy
@mattrix_ on twitter
Has fancy security alphabet certs
Principal Consultant Security Optiv
3. About David (davo) Khudaverdyan
Twitters: @deltaflyerzero
Drinks whisky from Japan (scotch can come
too)
Wishes he was here
Has Cat pics:
4. Consumer Device Security and Privacy
for the General Public
Why?
Mobile Devices and Operating Systems are becoming more invasive by default
The general consumer has no idea that these settings exist.
Many in our own community have no idea that these settings exist as well
This is what the GENERAL PUBLIC can do about consumer security and privacy
What this covers:
Do you trust your device?
Tailored Access Operations (TAO) on iOS, Android and General computing devices
Superfish on Lenovo
Windows 10
OS X
Ubuntu
iOS vs. Android Privacy Granularity
Windows 10
OS X
Ubuntu Unity
5. Consumer Device Security and Privacy
for the General Public
What this covers (cont.)
What cloud are you on?
What carrier are you on?
What apps should you use?
Recent advances in mobile security
Recent fails in security
Invasive Operating System Defaults
Why do we willingly allow this?
6. Do you trust your device?
Shrink Wrapped Compromise
Default invasive privacy settings
Bloatware and Crapware
SIM Card Security
The Fappening
7. You got your new device, now what?
And now we clean
iOS Device Firmware Update (DFU) 3 times
Android Factory Reset Best Effort
Macintosh Computer Create Standard GUID
Partition Table
Use a Windows or Linux to format EFI partition
X86 Computer
Rip and Replace entire Hard Drive
Write Zeroes to HD
Remove and Create Standard GUID Partition with HD Tools
8. iOS Privacy Granularity
iOS has built-in granular privacy controls for:
Location Services
Contacts
Calendar
Reminders
Photos
Bluetooth Sharing
Microphone
Camera
Health
HomeKit
Motion & Fitness
Social Media
Facebook
Twitter
etc
10. iOS 9.0.2 New Settings and iPhone 6S
New to iOS 9.0.2
Spotlight Search
Disable Bing Web Results
Disable Spotlight Suggestions
New to iPhone 6S Hardware
Live Photo Mode on by Default
Video and Audio for 3 seconds when taking a
picture
Disable Live Photo Mode
Could potentially be embarrassing by hot mic
11. iOS Privacy Granularity
When does it ask you?
When the app needs access to that feature
What if you dont want to give the app access
The app just has to deal (Thanks Apple!)
What if I changed my mind?
Settings -> Privacy -> App Name, flip the switch
next to the app. Easy.
12. iOS Privacy Granularity
What about options?
For Location Privacy:
Never: It never happens
While Using the App: Only when the app is ON THE
SCREEN
Always: Even if the app is running in the background
Everything else:
Keep it simple, the app has access or it doesn't.
13. iOS Privacy Granularity
Siri and iCloud Spies on you
How They do it
Location History Apple Maps, Frequent Locations
Siri Siri, when do you track me?
Safari History
How to disable
Turn off iCloud
Limit Location use
Turn off Frequent Locations!
Change your advertising ID / Limit Ad tracking
14. iOS Services
Turn off unused services
General -> Settings -> Restrictions
Airdrop
CarPlay
Lock Screens
Why lock the screen if you are going to allow
notifications and banners?
Check your notifications settings
15. Limit Siri
Siri is always listening for invoke command
(iPhone 6s [Plus] Only)
Hey Siri
Disable Hey Siri General -> Siri
16. Android Privacy Granularity (or not)
No unless you root
If you root youre not secure!
Rebuild Manifest using Android SDK
Who has time for this?
Also this talk is for people that are not doing
infosec/IT for a living
Marshmallow (Android 6)
Has iOS-like privacy options
Effectiveness will remain to be seen
Only available on latest devices
17. Android Privacy Granularity (or not)
Google Spies on you
How they do it
Voice and Audio Activity Google Now
Search History Web Searches
You Tube History Anything you watched on You Tube
Location History
Applications Drawer
Account History > Web and App Activity > Manage History
Tap the Settings Button (looks like a gear) and delete
everything
23. Windows Privacy
Cortana spies as well
How they do it
Location
So does Bing
How to disable?
Cortana
So does the OS?
Using a Microsoft Account?
Default Privacy Settings send MS lots of PID!
24. OS X Privacy
iCloud
Limited Granular Privacy Settings (almost like iOS)
Spotlight is invasive
(Settings -> Spotlight) Turn off:
Bing Web Searches
Allow Spotlight Suggestions in Spotlight and Look up
Anything else you dont want search indexed
Privacy Defaults
(Settings -> Security & Privacy)
From the Privacy tab, in the Diagnostics and Usage
Turn off Send diagnostic & usage data to Apple
Turn off Share crash data with app developers
25. Ubuntu
Not even Linux is sacred anymore
Unity Desktop
Searches the web by default
Need to either disable Unity or use a (not built-in)
tool to disable hidden settings
The Unity Tweak Tool from the Software Center can
do this
26. What cloud are you on?
Google
Makes money from Targeted Advertising
iCloud
Takes your money but who has access?
Lacks controls
Microsoft
Microsoft is new to the space and hasnt yet gotten
too evil if you avoid using Cortana and Bing
Box
Takes your money
Pretty good actually
27. What carrier are you on?
Supercookie anyone?
AT&T: Unknown
T-mobile: Unknown
Sprint: Unknown
Verizon: Now allows opt out
28. What carrier are you on?
No longer using carriers internet
VPN
Need L2TP IPSEC VPN with Secret or Certs
Mattrixs choices so fuckin 1337 I need two
損 AceVPN Dirty and untrusted
損 Private Internet Access General Use
Davos choice fast and simple
損 VyprVPN (Golden Frog)
29. What Apps should you use?
For Enhanced Privacy
Signal
Red Phone / Secure Text
STRIP
Burner
iMessage
Google Authenticator
30. Advances in Smartphone Security
iOS Encryption (Hardware Based) with iOS 7+
iOS Full Device Encryption (Hardware Based) with iOS 8+
iOS Forced longer passcode with iOS 9 (New setup only)
Android Full Device Encryption (Included SD Card) - Jelly
Bean
Android Full Device Encryption (Whats an SD Card?)
Lollipop
Android Also forced longer passcode with Marshmallow
It must be good since there was a recent Senate Hearing on
why we should not have encryption on any Smartphone
31. Fails in Smartphone Security
Android Lollipop Encryption not enabled out of
the box
iOS Encryption but a 4 digit pin out of the box
Samsung Galaxy S5-6 Fingerprints not
encrypted and accessible by rogue apps
Android App Store 1228 Vulnerable to FREAK
iOS 8 Wifi Denial of Service
Android Complex Password Bug
Gemalto Entire SIM Card Plant compromised by
stolen encryption keys
32. This is OUR fault!
<rant>
We LET them do this!
We, the consumers. We, the professionals
We thought it would be more convenient.
Now we all use smartphones and OS that SUCK
on security >:(
How could we let this happen?
Why didnt we stop it when we had the chance?
</rant>
33. How Did We Get Here?
"Dead Kennedys - Give Me Convenience or Give Me Death cover Licensed under Fair use
34. The Informed Conclusion
Check your settings
Check your settings with each revision change
Review App Permissions
Restrict Apps if you can
Do not log into the Cloud for browser usage
Clear your cache and cookies
Use a VPN
35. The Informed Conclusion
Learn about your Operating System Settings
Never Activate the Cloud
When you set up OS X it asks you to sign up for
iCloud Dont
When you set up Ubuntu disable Unity Services
When you set up Windows 8.1 10 it asks you to
sign up for its cloud services Dont
Unplug the internet /disable wi-fi and install/setup
without connection
36. The Paranoid Conclusion
Dont Piss off a Nation State
Dont use a smartphone
Dont use a computer
Install a Faraday Cage around your house