Description: Slides - https://www.defcon.org/images/defcon-18/dc-18-presentations/Bonetti/DEFCON-18-Bonetti-Mobile-Privacy.pdf
White Paper - https://www.defcon.org/images/defcon-18/dc-18-presentations/Bonetti/DEFCON-18-Bonetti-Mobile-Privacy-WP.pdf
Mobile phones are still a proving ground for keeping the users' privacy safe. This presentation will describe the problems which are arising around the use of these technologies and how they can affect mobile users. It will propose Tor as a possible solution for some of these problems, describing its own strengths and weaknesses and the efforts developers put to implement a working port of the program on different devices, from the Chumby One to my own port for the iPhone platform. Finally, it will also describe where the development is going to protect mobile phone users privacy and let them survive their own devices.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 18 , defcon-18 , dc-18 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.