A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device. Device fingerprints can be used to fully or partially identify individual devices even when persistent cookies (and zombie cookies) cannot be read or stored in the browser, the client IP address is hidden, or one switches to another browser on the same device.This may allow a service provider to detect and prevent identity theft and credit card fraud, but also to compile long-term records of individuals' browsing histories (and deliver targeted advertising or targeted exploits) even when they are attempting to avoid tracking – raising a major concern for internet privacy advocates. (Wikipedia).
IMT4093 Introduction to Mobile Research
Mobile security
From playlist Archive - Research in Mobile/Wearable Tech
Rigour and reproducibility.
From playlist Archive - Research in Mobile/Wearable Tech
Introduction to Geometer's Sketchpad: Measurements
This video demonstrates some of the measurement and calculation features of Geometer's Sketchpad.
From playlist Geometer's Sketchpad
GeoGebra 3D Calculator: When to Use?
GeoGebra 3D Calculator is one of the five apps in Calculator Suite. https://www.geogebra.org/calculator
From playlist GeoGebra Apps Intro: Which to USE?
Electronic measurement equipment and multimeters - Part 1
In this video series I show different measurement equipment (multimeters, etc) and why / how I use them. In later videos I'll explore different features and highlight pro's and con's. A list of my multimeters can be purchased here: http://astore.amazon.com/m0711-20?_encoding=UTF8&node=
From playlist Electronic Measurement Equipment
DEFCON 19: Fingerbank — Open DHCP Fingerprints Database
Speaker: Olivier Bilodeau Systems architect at Inverse inc. The presentation will first take a step back and offer a basic reminder of what passive fingerprinting is and, more precisely, DHCP fingerprinting. Then we will offer defensive and offensive use cases for DHCP fingerprinting. Nex
From playlist DEFCON 19
DEFCON 15: Greater than 1: Defeating "strong" Authentication in Web Applications
Speaker: Brendan O'Connor With Phishing, Fraud, and Identity Theft at peak levels, banks, credit unions, credit card companies, and other financial institutions are enhancing the security of their website authentication. This talk will cover the new methods of authentication, such as mut
From playlist DEFCON 15
25c3: RF fingerprinting of RFID
Speakers: cryptocrat, Boris Danev In the lecture portion of this workshop we will present an overview of existing and our own novel methods for hacking electronic passports and driver's licenses including novel radio frequency fingerprinting techniques. In the the hands-on section we wi
From playlist 25C3: Nothing to hide
#232 How to secure our devices using SSL (ESP8266, ESP32, Tutorial)
Most of our IOT devices are insecure and vulnerable. It’s high time to learn how to make them more secure, also because unsecured devices will no more be able to use valuable services without using the HTTPS protocol. Already now, Google services, for example, do no more accept unsecured c
From playlist ESP32
OWASP AppSec EU 2013: Web Fingerprinting: How, Who, and Why?
For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speaker: Nick Nikiforakis The web has become an essential part of our society and is currently the main medium of information delivery. Billions of use
From playlist OWASP AppSec EU 2013
GRCon21 - A New Experimental Setup for Collecting nRF2.4 and LoRa Devices Signatures for ....
A New Experimental Setup for Collecting nRF2.4 and LoRa Devices Signatures for Machine Learning based Device Authentication presented by Zheng Zeng, William Hemminger and Abdallah S Abdallah at GNU Radio Conference 2021 This poster focuses on using software-defined radio to collect devic
From playlist GRCon 2021
DEFCON 13: On the Current State of Remote Active OS Fingerprinting
Speaker: Ofir Arkin, CTO and Co-Founder, Insightix Active operating system fingerprinting is a technology, which uses stimulus (sends packets) in order to provoke a reaction from network elements. The implementations of active scanning will monitor the network for a response to be, or no
From playlist DEFCON 13
Biometric "Security" Is NOT Secure
Biometric security is strong and unique. But what happens if somebody steals your faceprint or fingerprint? You are compromised everywhere for the rest of your life. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBN
From playlist Decrypted Lies
DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Speaker: Deviant Ollam Cluebat Quartermaster Hackers like guns. Hackers like locks. Hackers like to tinker with guns and locks. And, most of the time, hackers protect their guns with high-quality locks. However, while it's one thing to own a nice gun safe protected by a high security dial
From playlist DEFCON 19
How To Create Audio Recognition System Using AcrCloud C# SDK | Session 04 | #C | #programming
Don’t forget to subscribe! In this project series, you will learn to create an audio recognition system using ACRCloud. We will cover the details of interacting with the Acrcloud C# SDK for creating an audio recognition system. This project covers the details necessary to create an audio
From playlist Create Audio Recognition System Using AcrCloud C# SDK