SlideShare a Scribd company logo
1 of 34
Download to read offline
Historical code cracking with phones: What if Pontus, the Gauls, Germans, Nervii, Egyptians and Helvetii had iphones?Over The Air 2011, Bletchley Park,[object Object],http://www.mobilephonesecurity.org,[object Object],David Rogers, Copper Horse Solutions Ltd.,[object Object],1st October 2011,[object Object]
http://www.mobilephonesecurity.org,[object Object],Some Information,[object Object],About Me,[object Object],12 years in the mobile industry,[object Object],Hardware and software background,[object Object],Head of Product Security at Panasonic Mobile,[object Object],Worked with industry and government on IMEI and SIMlock security,[object Object],Pioneered some early work in mobile phone forensics,[object Object],Brought industry together on security information sharing,[object Object],Director of External Relations at OMTP,[object Object],Programme Manager for advanced hardware security tasks,[object Object],Chair of Incident Handling task,[object Object],Head of Security and Chair of Security Group at WAC,[object Object],Owner and Director at Copper Horse Solutions,[object Object],Blog: http://blog.mobilephonesecurity.org, Twitter: @drogersuk,[object Object],About Copper Horse Solutions Ltd.,[object Object],Established in 2011,[object Object],Software and security company,[object Object],Focussed on the mobile phone industry,[object Object],Services:,[object Object],Mobile phone security consultancy,[object Object],Industry expertise,[object Object],Standards representation,[object Object],Mobile application development,[object Object],http://www.copperhorsesolutions.com,[object Object]
Histiaeous,[object Object],http://www.mobilephonesecurity.org,[object Object],In 499BC sent a trusted slave to encourage a revolt against the Persians,[object Object],Shaved the head of the slave,[object Object],Tattooed a message to his head, let the hair grow back,[object Object],Recipient shave off the slave’s hair to get the message,[object Object],This is an early form of steganography,[object Object],From: http://www.retroworks.co/scytale.htm,[object Object]
Scytale,[object Object],http://www.mobilephonesecurity.org,[object Object],Transposition cipher,[object Object],Ancient Greeks, particularly the Spartans used it for military communication (also apparently used by the Romans):,[object Object],From: http://www.retroworks.co/scytale.htm,[object Object]
CAESAR Shift,[object Object],http://www.mobilephonesecurity.org,[object Object],Supposedly used by Caesar to protect military messages – by shifting the alphabet 3 places to the left:,[object Object],Still used today (scarily!) – e.g. ROT13,[object Object],It helped that a lot of Caesar’s enemies were illiterate anyway…,[object Object],From: http://www.retroworks.co/scytale.htm,[object Object]
Phaistos Disc…,[object Object],http://www.mobilephonesecurity.org,[object Object],Still plenty of mystery text to decipher out there…,[object Object],Source: PRA,[object Object]
Code Cracking Challenge,[object Object],http://www.mobilephonesecurity.org,[object Object],After each battle I describe there will be some codes to crack in which you would be able to change the course of history. You can also get these at:,[object Object],http://blog.mobilephonesecurity.org,[object Object],From: http://www.retroworks.co/scytale.htm,[object Object]
Some Source Code to Help!,[object Object],http://www.mobilephonesecurity.org,[object Object],Hint: The codes are all Caesar ciphers but with different rotations,[object Object],https://github.com/mkoby/RotationCipher (not mine!),[object Object],and a cheat: http://textmechanic.com/ROT13-Caesar-Cipher.html,[object Object]
Julius Caesar (Briefly!),[object Object],http://www.mobilephonesecurity.org,[object Object],100BC – 44BC,[object Object],Spent 9 years campaigning in Gaul (and made a fortune),[object Object],Invaded Britain,[object Object],Was involved in a civil war with Pompey,[object Object],Defeated the Egyptians,[object Object],Assassinated on the ‘Ides of March’ in 44BC,[object Object]
http://www.mobilephonesecurity.org,[object Object]
List of Battles,[object Object],http://www.mobilephonesecurity.org,[object Object],58BC Battle of the Arar – Helvetii,[object Object],58BC Battle of Vosges - Germans,[object Object],57BC Battle of the Sabis – Nervii,[object Object],52BC Battle of Alesia - Gauls,[object Object],47BC Battle of the Nile - Egyptians,[object Object],47BC Battle of Zela - Pontus,[object Object]
Battle of the Arar,[object Object],http://www.mobilephonesecurity.org,[object Object],58BC Caesar v Helvetii, Switzerland,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Can the Helvetians defeat Caesar?,[object Object],bgxxwfhkxmbfxyhkkxbgyhkvxfxgml,[object Object]
Battle of Vosges,[object Object],http://www.mobilephonesecurity.org,[object Object],58BC Caesar v Germans, River Rhine, Alsace,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Should the Germans attack the Romans?,[object Object],bpmumvizmnqopbqvonqbemkivpwtlwcbnwzivwbpmzemms,[object Object]
Battle of the Sabis,[object Object],http://www.mobilephonesecurity.org,[object Object],57BC Caesar v Nervii, Wallonia,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Are the Nervii ready for Caesar?,[object Object],muqhuweydwjeruqjiqryiydjmetqoi,[object Object]
Battle of ALesia,[object Object],http://www.mobilephonesecurity.org,[object Object],52BC Caesar v Gauls, France,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Is there anything the Gauls do to help themselves?,[object Object],qebobfpxtbxhmlfkqfklrotxiikbxoqebqobbp,[object Object]
Battle of the NILE,[object Object],http://www.mobilephonesecurity.org,[object Object],47BC Caesar & Cleopatra v Ptoloemic forces, Alexandria, Egypt,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Are the Egyptians ready for action?,[object Object],wbssrgiddcfhhcpfsoycihobrtwuvhdhczsam,[object Object]
Battle of Zela,[object Object],http://www.mobilephonesecurity.org,[object Object],47BC Caesar v Pontus, Turkey,[object Object]
Break This Roman Code!,[object Object],http://www.mobilephonesecurity.org,[object Object],Also here: http://blog.mobilephonesecurity.org,[object Object],Save Pontus?,[object Object],sbkfsfafsfzf,[object Object]
http://www.mobilephonesecurity.org,[object Object],Mobile Phones!,[object Object],Open discussion on mobile application security,[object Object]
Don’t Use Roman Codes!,[object Object],http://www.mobilephonesecurity.org,[object Object],ROT13 and XORing / obfuscation are not adequate!!,[object Object],Modern crypto (not surprisingly) is significantly better,[object Object],However, developers don’t have access to secure hardware APIs on mobile ,[object Object]
Mobile Development,[object Object],http://www.mobilephonesecurity.org,[object Object],How are you storing keys for both symmetric and asymmetric ciphers?,[object Object],Common issue amongst developers,[object Object],Also application signing keys,[object Object]
Mobile Development,[object Object],http://www.mobilephonesecurity.org,[object Object],Think about security when designing your apps,[object Object],Are you playing fast and loose with your users’ private data?,[object Object],Have you explained to users why you used certain permissions?,[object Object],What have you (not) encrypted?,[object Object],Is your application designed badly? – gift to hackers / fraudsters?,[object Object],E.g. asking for credit card details from a QR code,[object Object]
Mobile Development,[object Object],http://www.mobilephonesecurity.org,[object Object],Do your research,[object Object],Are you using weak / insecure methods?,[object Object],Do you understand basic secure coding techniques?,[object Object],Do you understand the platform security guidelines?,[object Object]
Discussion,[object Object],http://www.mobilephonesecurity.org,[object Object],From: http://stackoverflow.com/questions/4671859/storing-api-keys-in-android-is-obfustication-enough,[object Object]
Discussion,[object Object],http://www.mobilephonesecurity.org,[object Object],“I look at KeyStore but it does not really solve my problem. It can store my keys given that I can provide a password. Then I need to find a secure place to store this password which is same as my original problem.”,[object Object]
Platform Security Guidelines,[object Object],http://www.mobilephonesecurity.org,[object Object],Apple: http://developer.apple.com/library/mac/#documentation/Security/Conceptual/SecureCodingGuide/Introduction.html,[object Object],Android:http://developer.android.com/guide/topics/security/security.html,[object Object],Blackberry: http://docs.blackberry.com/en/developers/deliverables/29302/index.jsp?name=Security+-+Development+Guide+-+BlackBerry+Java+SDK7.0&language=English&userType=21&category=Java+Development+Guides+and+API+Reference&subCategory=,[object Object],Windows Phone 7 (Nokia Guidelines): http://www.developer.nokia.com/Community/Wiki/Windows_Phone_Platform_Security,[object Object]
http://www.mobilephonesecurity.org,[object Object],Romans with iphones….,[object Object],Contact,[object Object],Email: david.rogers@copperhorses.com,[object Object],Twitter: @drogersuk,[object Object],Blog: http://blog.mobilephonesecurity.org,[object Object],http://www.flickr.com/photos/laurenthaug/4127870976/sizes/l/in/photostream/,[object Object]
http://www.mobilephonesecurity.org,[object Object],Code Solutions,[object Object],Don’t look at the next slide if you don’t want the answers!,[object Object]
Code Solutions,[object Object],http://www.mobilephonesecurity.org,[object Object],Helvetii: I need more time for reinforcements (h shift),[object Object],Germans: the men are fighting fit we can hold out for another week (s shift),[object Object],Nervii: we are going to beat sabis in two days (k shift),[object Object],Gauls: there is a weak point in our wall near the trees (d),[object Object],Egyptians: I need support to break out and fight ptolemy (m shift),[object Object],Pontus: venividivici(d shift),[object Object],The famous: I came, I saw, I conquered message,[object Object],Of course, the Pontic army could not save themselves!,[object Object]

More Related Content

What's hot

Dorking & Pentesting with Tacyt
Dorking & Pentesting with TacytDorking & Pentesting with Tacyt
Dorking & Pentesting with TacytChema Alonso
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHostway|HOSTING
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Intermediate Vocabulary on Tech
Intermediate Vocabulary on TechIntermediate Vocabulary on Tech
Intermediate Vocabulary on TechLaurie Barth
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...viaForensics
 
AndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security ReloadedAndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security ReloadedJaime Sánchez
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 

What's hot (12)

Dorking & Pentesting with Tacyt
Dorking & Pentesting with TacytDorking & Pentesting with Tacyt
Dorking & Pentesting with Tacyt
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Intermediate Vocabulary on Tech
Intermediate Vocabulary on TechIntermediate Vocabulary on Tech
Intermediate Vocabulary on Tech
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hacking final
Hacking finalHacking final
Hacking final
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
AndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security ReloadedAndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security Reloaded
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
The state of the art in iOS Forensics
The state of the art in iOS ForensicsThe state of the art in iOS Forensics
The state of the art in iOS Forensics
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 

Similar to Hacking Roman Codes with Mobile Phones

Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Thingsardiri
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesMeredith Farkas
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp
 
mLearning planning tools and qrcodes
mLearning planning tools and qrcodesmLearning planning tools and qrcodes
mLearning planning tools and qrcodesInge de Waard
 
Gsm security- a survey and evaluation of the current situation
Gsm security- a survey and evaluation of the current situationGsm security- a survey and evaluation of the current situation
Gsm security- a survey and evaluation of the current situationJamal Meselmani
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking BadNUS-ISS
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014Security Weekly
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsshehab najjar
 

Similar to Hacking Roman Codes with Mobile Phones (20)

Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for Libraries
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
 
mLearning planning tools and qrcodes
mLearning planning tools and qrcodesmLearning planning tools and qrcodes
mLearning planning tools and qrcodes
 
Gsm security- a survey and evaluation of the current situation
Gsm security- a survey and evaluation of the current situationGsm security- a survey and evaluation of the current situation
Gsm security- a survey and evaluation of the current situation
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
 
IoT-Home fails
IoT-Home failsIoT-Home fails
IoT-Home fails
 

Recently uploaded

UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 

Hacking Roman Codes with Mobile Phones

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.

Editor's Notes

  1. Picture – Julius Caesar and Divico parlay after the battle at the river SaoneThe Helvetian tribe were planning to migrate towards the west coast of Gaul, cutting off Gaul and causing a threat to Roman Spain.Mass migration of 300,000 people!Caesar had to play for time because of a lack of soldiersHelvetii were attacked during the night while crossing the riverCaesar ultimately chased down the Helvetii and they eventually surrendered after the battle of BribacteThree opportunities that the Helvetii could have seized:Discovering that Caesar had left RomeRealising that Caesar was playing for timeDiscovering Caesar’s planned night time attack for the river crossing
  2. 58BC Caesar v GermansLocation: River Rhine, AlsaceGerman tribes (Suebi and others) made a move into GaulAriovistus moved his camp onto the Roman supply lineHe delayed battle deliberately to starve and weaken the Roman soldiersRomans charged down on the Germans who formed a Phalanx with their shields – roman soldiers jumped onto the shields and wrenched them away, stabbing down onto the soldiersOn learning that the Germans believed in a prophecy that they should lose the battle if they fought before the new moon, Caesar forced a battle upon them immediately.Their leader Ariovistus escaped but was defeated. Caesar had forced the Germans out of GaulAriovistus could have realised that Caesar’s men were not starving and delayed the battle further, therefore defeating him once his men were truly weakened
  3. Caesar was surprised and nearly defeatedThey would not “partake of alcoholic beverages or other such imported Roman luxuries” – wine was banned by decree by the NerviiThe Nervii caught javelins in flight and hurled them back at legionnaires!Nervii used typical Gallic warfare tactics which could be defeated with missilesNervii used mounds of the fallen as ramparts by the end of the battleCaesar lost all of his standards and most of his centuriansNervii could have discovered how swiftly Caesar was travelling and ambushed before they reached the SabisResult was Caesar gained control of what is now Belgium
  4. Vercingetorix and Julius CaesarSeige around a hill fortThe last major engagement between the Gauls and the RomansMarks the end of Celtic dominance80,000 fighting men were under seigeCaesar constructed a second wall around him, in case he was attacked after some cavalry managed to break out of the seigeCaesar would not allow the women and children out of the seige, so they were left to starve in no-mans land.The relief force arrivedRomans were also beginning to starve as they were being beseigedLots of skirmishes and combined attacks from without and withinGauls discovered a weakness in the walls that was hidden (this is a point that could have been exploited earlier if the Gauls had known)The Roman cavalry defended this and nearly collapsed, Caesar sent a force of 6000 cavalry to relieve them and defeated the 60,000 attackersSeeing the defeat of the relief force, Vercingetorix surrendered to Caesar
  5. (after civil war with Pompey)Roman ‘peacekeeping’ between King Ptolemy and Cleopatra (his sister) in the Egyptian civil warCaesar was relatively cut off in Alexandria but sent a message for allied supportPtolemy died when his ship capsized while escapingCaesar installed Cleopatra on the throne of EgyptCaesar could have been defeated had the Egyptians been able to cut him off from his ally, Mithridates
  6. After the battle of the Nile, Caesar travelled up to fight Pharnaces after he had defeated a roman army and committeed atrocities against prisoners and civiliansCaesar refused appeals for peace as he approachedAs Caesar’s troops were setting up their camp on a nearby hilltop, the Pontic army attacked from their own safe strategic hilltop postionAlthough initially successful, the romans recovered and drove the Pontics back fown the hill, routing themPharnaces escaped only to be later killed by one of his ownThe whole campaign lasted only 5 days.After the battle, Caesar sent his famous message, Veni, vidi, vici – I came, I saw, I conquered ***