CIP Cyber

The Machines That Betrayed Their Masters

Table of Contents

Your machine (mobile phone, bluetooth device, router etc etc) may betrayed you and can be used to detect your position or even invade your privacy. They are watching you, stay alert.

The devices we carry betray us to those who want to invade our
privacy by emitting uniquely identifiable signals. The most common
example is the wireless signals emitted by your mobile phone (even
whilst tucked safely into your pocket). Such signals may be used to
track you, or be used toward more malicious intent.

This talk will discuss the process the author has gone through to
build a resilient, modular, reliable, distributed, tracking framework –
originally spawned as a PoC tool in 2012 by the name ‘Snoopy’. The dog
is back, and with more bite – looking beyond just Wi-Fi. Also, he’s now
airborne via a quadcopter.

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings