Description: Blackhat 2012 EUROPE - Apple vs. Google Client Platforms
We will discuss the two different approaches Apple and Google take for the client platforms iPad and Chromebook, how they are similar and how they are not.
From the security architecture and integrity protection details to your account and identity that links you firmly back to the respective vendor, we will provide the big picture with occasional close-up shots. Here is what powers the vendor has over you, or what powers he gives to arbitrary attackers at expensive coffee shops with free WiFi through fails in logic, binary or HTML.
Tags: securitytube , conference , hacking , hackers , information security , convention , computer security , blackhat12 , blackhat-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.