[12am] We hit the opening keynote by Cory Doctorow. He had some interesting things to say about patterns in eula agreements and the restriction of rights to enforce business models.
[Simple Nomad] followed up with his talk called ‘State of the Enemy State’ – his observations regarding government security, just how advanced real time encryption cracking probably is and predictions on some forthcoming laws and how they’ll affect the security industry. The most interesting one: encryption key escrow was enacted a couple weeks ago by Blair in the UK, and it’ll probably come to the US next.
The talk on the apple airport security flaw was canceled, so it was replaced by ‘lightning talks’. Think open mic night on the floor of a security conference. Johnny Cache opened it up with some observations about why the talk was canceled. He had to skirt around the issue to keep from getting in trouble, but he was definitely pissed.
There were a few others, but I’ll leave it there for now.
I’m waiting for my ride on the first leg of my trip to Toorcon. I’ll be there along with Eliot and Fabienne. Dan Kaminsky will be there presenting, so we’ll be having a major HAD get together. My local (tiny) airport actualy has wireless, tables and power readily available. Security will love me – I’ve got my usual tools (soldering iron, wire strippers, meter, etc) in my checked bag. (This is amusing – the security guy is doing laps through the metal detector to dial it in.)
[UPDATE: Eliot] Toorcon is my favorite conference. Have a look at some of the neat stuff we saw last year.
The Toorcon website now has all of the presentation materials posted. I’ve updated all of our Toorcon posts with the appropriate links (the WEP frag attack has code). They’ve added some more photo galleries, too.
Continue reading “Toorcon slides update”
Toorcon was a really a wonderful experience. I met lots of readers and other interesting people in a very social environment. It’s really cheap and I would encourage you too attend next year.
I’ve posted the few photos I have to Flickr. While you are over there you might as well join the Hack-A-Day photo pool. Quinn’s photos are much better than mine; I didn’t have to haul around a Canon EOS D30 though. Pictures of me: one, two. The guys from EVDO-Coverage also have a photostream. They provided EVDO to hackers in need at the conference and will probably be sending me some fun hardware to play with.
I’ll be updating the posts with slides as soon as they get posted.
Once again: I’d like to thank the organizers, speakers, and Hack-A-Day readers for making the conference such a fun time. I hope to see everyone again at REcon, Shmoocon, and Toorcon next year.
That’s it for Toorcon coverage. Back to business as usual tomorrow.
I made it into San Diego in good time and have already seen a Sony W800 and the iPod nano so TC7 is off to a great start. I’ve met some really cool people. Here are some pictures to prove it (or at least show what the backs of hacker’s heads look like).
Continue reading “Toorcon day 0 – Brain trust”
There’s been too much to do here at the Chaos Communication Camp — the Quadrennial outdoor meeting of hackers. Between talks and projects and workshops, there’s hardly been a minute to sit down and write up a summary. Nonetheless, I’ve sat in on a few talks. Here’s a quick overview of some of what happened on Day One, and a little look behind the scenes into what makes a 5,000-person hacker camp work.
Continue reading “Chaos Communication Camp 2015: Dispatch from Day One”
With a simple $35 dongle that plugs right into your TV, it’s possible to enjoy your favorite TV shows, YouTube channels, and everything else Chromecast has to offer. Being a WiFi enabled device, it’s also possible to hijack a Chromecast, forcing your neighbors to watch [Rick Astley] say he’s never going to give you up.
The rickmote, as this horrible device is called, runs on a Raspberry Pi and does a lot of WiFi shennaigans to highjack a Chromecast. First, all the wireless networks within range of the rickmote are deauthenticated. When this happens, Chromecast devices generally freak out and try to automatically reconfigure themselves and accept commands from anyone within proximity. The rickmote is more than happy to provide these commands to any Chromecast device, in the form of the hit song from 1987 and 2008.
Video demo of the rickmote below, along with a talk from ToorCon describing how the hijacking actually works.
Continue reading “Hijacking Chromecast With The Rickmote Controller”