We introduce a new forensic technique that allows to collect users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few hours or days.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a long battery life. Accessories allow for charging, carrying, and connecting the phone for communication needs in demanding industrial settings.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a dual-band network, large color display, Bluetooth, and integrated work functions. Accessories include additional batteries, chargers, carrying cases, and mounting accessories to provide reliable communication for workers in demanding industrial settings.
This document describes a company that has developed various wireless technologies including antennas, radios, sensors and networks. Specifically it mentions:
- Developing antenna and radio configurations for government and military applications.
- Creating a disaster recovery network for DHS and solutions for first responders.
- Implementing domestic and international wireless infrastructure projects.
- Developing wideband antennas, wireless mesh networks, camera sensors, cellular repeaters, and backhaul capabilities.
NXP Semiconductors is a global semiconductor company with a focus on identification technologies including RFID. They are a leader in various RFID markets including transportation, banking, eGovernment, and tagging. The document discusses NXP's product portfolio, the HF and UHF RFID technologies, important markets and applications, success stories with various customers, and future developments in areas like sensor interfaces and cryptographic processors.
CIVINTEC Global is leading manufacturer specialized in ISO18092 NFC market with its fully range of best-in-class NFC devices from NFC OEM Reader Module, NFC desktop reader, NFC Access Door Reader, NFC portable system to NFC Android / Linux System with Sof.
MTXM2M offers a portfolio of M2M and IoT devices and software, including cellular modems, embedded modules, gateways, and routers. Their products are designed for applications such as fleet management, smart cities, industrial telemetry, and more. Key features include support for 2G, 3G, and 4G cellular connectivity, GPS, Bluetooth, WiFi, serial interfaces, analog/digital I/O, and Linux/Java programmability. MTXM2M focuses on flexibility, customization, and technical support.
The W.E.N.S. 51-P System is a wireless emergency notification system that uses an 8x 30 watt speaker array with a 240 watt amplifier mounted on a 6m mast. It has a radio range of 6km for transmission and reception, adjustable coverage from 45 to 360 degrees, and can reach sound pressure levels of 122dB at 1w/m with audio coverage over 250m at 360 degrees. The system includes 16 channel radio communication, 4 channels for prerecorded messages, a local paging microphone, solar power with batteries, and is designed for industrial and event applications.
New solar wireless home and business security systems shop online at https://vedardalarm.com/hb-solar-beams-m-3 Easy DIY home security including outdoor garage, carp parking lot, garden, courtyard intrusion alert and app alarm. Free technical support for DIY home security, free security solution.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a long battery life. Accessories allow for charging, carrying, and connecting the phone for communication needs in demanding industrial settings.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a dual-band network, large color display, Bluetooth, and integrated work functions. Accessories include additional batteries, chargers, carrying cases, and mounting accessories to provide reliable communication for workers in demanding industrial settings.
This document describes a company that has developed various wireless technologies including antennas, radios, sensors and networks. Specifically it mentions:
- Developing antenna and radio configurations for government and military applications.
- Creating a disaster recovery network for DHS and solutions for first responders.
- Implementing domestic and international wireless infrastructure projects.
- Developing wideband antennas, wireless mesh networks, camera sensors, cellular repeaters, and backhaul capabilities.
NXP Semiconductors is a global semiconductor company with a focus on identification technologies including RFID. They are a leader in various RFID markets including transportation, banking, eGovernment, and tagging. The document discusses NXP's product portfolio, the HF and UHF RFID technologies, important markets and applications, success stories with various customers, and future developments in areas like sensor interfaces and cryptographic processors.
CIVINTEC Global is leading manufacturer specialized in ISO18092 NFC market with its fully range of best-in-class NFC devices from NFC OEM Reader Module, NFC desktop reader, NFC Access Door Reader, NFC portable system to NFC Android / Linux System with Sof.
MTXM2M offers a portfolio of M2M and IoT devices and software, including cellular modems, embedded modules, gateways, and routers. Their products are designed for applications such as fleet management, smart cities, industrial telemetry, and more. Key features include support for 2G, 3G, and 4G cellular connectivity, GPS, Bluetooth, WiFi, serial interfaces, analog/digital I/O, and Linux/Java programmability. MTXM2M focuses on flexibility, customization, and technical support.
The W.E.N.S. 51-P System is a wireless emergency notification system that uses an 8x 30 watt speaker array with a 240 watt amplifier mounted on a 6m mast. It has a radio range of 6km for transmission and reception, adjustable coverage from 45 to 360 degrees, and can reach sound pressure levels of 122dB at 1w/m with audio coverage over 250m at 360 degrees. The system includes 16 channel radio communication, 4 channels for prerecorded messages, a local paging microphone, solar power with batteries, and is designed for industrial and event applications.
New solar wireless home and business security systems shop online at https://vedardalarm.com/hb-solar-beams-m-3 Easy DIY home security including outdoor garage, carp parking lot, garden, courtyard intrusion alert and app alarm. Free technical support for DIY home security, free security solution.
This document summarizes the features of a mini travel microphone for use with multimedia PCs and notebooks. The microphone filters out background noise, attaches to notebooks or monitors, and has an adjustable boom that pivots for ideal positioning. It has a frequency range of 20-16,000Hz and plugs into devices via a 3.5mm jack.
The document defines several key networking concepts: NVT refers to a virtual device defined in RFC854 to standardize terminal interfaces; VT-100 was a common terminal emulation introduced by DEC that functioned as a video display terminal; routers are networking devices that direct and forward information between different paths on a network; and an IP address is a unique numerical identifier assigned to devices on a network using the Internet Protocol to enable communication.
This document lists two networking devices - the Tenda F3 Wireless Router+Extender+Access Point WIFI REPEATER NEW FH303, which is a 3-in-1 device that functions as a wireless router, extender, and access point, and the Mikrotik RB750r2 Routerboard, which is a standalone routerboard.
Here, an active RFID tag is used in place of voter id where the system can scan the tag and matches with the fingerprints collected in the Aadhar database.
The voter has to scan the RFID tag for the identification and further the voter has to confirm the identity with the fingerprints.
When fingerprints get matched then voters can cast their votes as the data gets matched.
A LCD is applicable in the process of displaying the corresponding information of the voter from the database, thus illegal voting or impersonating can be avoided since the finger prints is not the same for every individual
The document describes the Nanhui Datacenter located in Shanghai, China. It provides details about the infrastructure including its location, building specifications, tier 3 and 4 standards, redundant power systems, HVAC, security systems, and networking. The datacenter has over 200,000 square feet of space across three floors, with the first floor for power and the upper floors for hosting. It offers 24/7 administration and support services.
Wireless pen hidden (spy) camera(buy or rent)dplsurve
The document advertises covert surveillance equipment for sale or rent, including a wireless hidden camera pen and a portable digital video recorder. It provides details on their specifications, features, accessories, and how to contact the seller. The seller claims to offer state-of-the-art surveillance gear used by law enforcement and intelligence agencies.
The document describes a universal Software Defined Radio hardware platform consisting of PCI expansion cards with analog front ends, ADCs, FPGAs, and DSP resources. The SDR cards support multichannel and phased array applications through a programmable cross-connect switch and include high-speed converters with up to 80MHz sampling and 270MHz bandwidth. The platform is intended as a prototyping tool and can operate in slot cards or standalone with control via PCI or an on-board microcontroller.
This document provides specifications for a 720P megapixel WiFi security camera. The camera has a 720P image sensor, two-way audio, micro SD card storage, PTZ and night vision capabilities, motion detection and push notifications. It connects via WiFi and can be monitored through iOS and Android apps. Key specs include 1280x720 pixel resolution, 3.6mm lens, and support for H.264 video compression.
The Repeatit Infinity BS322 is a dual-radio, point-to-multipoint base station that supports up to 2 external antennas for short to long distance wireless connections. It has a dual radio design operating in the 5.150-5.845GHz frequency band with a combined throughput of 380Mbps, supports common encryption and authentication protocols, and has an IP67-rated weatherproof casing measuring 284 x 174 x 81mm.
The 5881ENHC RF Receiver is designed to work with 345 MHz transmitters for commercial fire and burglary systems. It features a spatial diversity system to eliminate signal "nulls" and features front and back tamper protection for installations. The receiver connects to control panels via the keypad bus and is compatible with Honeywell 5800 series wireless devices and control panels.
Sierra Wireless Developer Day 2013 - 06 - AirPrime goes multicoreThibault Cantegrel
The document describes Sierra Wireless' new AirPrime multicore wireless module. It has a quad-band 2G modem and supports future 4G migration. It also has integrated GPS, GLONASS, eCall and ERA-GLONASS. The module runs Linux and has an open application framework. It has extensive interfaces and runs on a multicore architecture with dedicated application and real-time low-power cores. Sierra Wireless introduces the world's first M2M system-on-a-chip called AirPrime AR6xx0.
Cofdm video transmitter ip mesh wifi product presentation from Shenzhen Safe ...Erin Qiu
cofdm wireless transmitter
cofdm wireless receiver
COFDM IP MESH
wireless mesh
wifi mesh
for long range tactical mobile application
such as man pack, bodyworn, UAV UGV
Digital signal processors (DSPs) are specialized microprocessors optimized for digital signal processing. The first DSP was developed by Texas Instruments in 1978. DSP technology has since advanced through several generations with improved instructions and speeds. The DSP market is large and growing due to increasing demand for electronic solutions. DSPs are used in a wide range of applications including communications, consumer electronics, healthcare, industrial, and automotive due to their ability to perform real-time signal processing.
Indoor Location - Globally and in 3D - by Combain CPS geolocation servicesCombain Mobile AB
Combain is a world leading geolocation service provider for connected devices. Combain has one of the world largest databases of cell-id and wifi that is used for accurate indoor and outdoor geopositioning of connected devices. The database includes more than 70 million cell-ids and 870 million wifis from more than 200 countries. Combain’s customers are leading mobile network operators, cyber security companies, mobile device manufacturers. The positioning service is provided as a cloud-based API, Combain CPS API, and as a cloud-based device management platform, Combain Thinxmate.
Combain is located in Lund, Sweden and Palo Alto, USA and serves customers world-wide.
This document discusses Philippe Coval, a software engineer working on digital twins and privacy by design for Samsung. It provides information on digital twins, including how they connect physical components to digital counterparts in real-time. An example is given of implementing a digital twin proof of concept with a robot arm using JavaScript on a microcontroller and exposing it through a WebThings API. Challenges discussed include scalability, persistence and supporting augmented reality.
The latest version of Android, Nougat (v7.x), was released in late 2016, and offers access to raw GNSS measurements. Google demonstrated functionality to obtain Pseudoranges, Dopplers and Carrier Phase from a phone or tablet last September at the Institute of Navigation’s conference.
This seminar will explain the current API, hardware limitations and possible future advantages of this exciting new development. We will discuss data collection, raw measurements and demo processing example in Matlab and Python.
L'iBeacon, introduit lors de la WWDC en 2013 est en cours de standardisation, grâce au projet open-source Eddystone. Associé à cette technologie, le projet "The physical Web" lancé par Google, promet lui aussi de grandes innovations dans le monde de l'IoT. En effet, il a pour but de pouvoir relier un smartphone à un beacon sans passer par une application. Ceci offre un large panel d'utilisation, pour relier des lieux physiques avec le monde virtuel. Nous ferons le point sur le projet et les technologies sous-jacentes, avant de se plonger dans les cas d'utilisation concrets, existants ou à venir.
This document introduces GNSS raw measurements that are available on Android smartphones through the android.location API. It discusses two main GNSS APIs - android.gms.location which simplifies positioning for applications but focuses on battery life, and android.location which gives access to more detailed GNSS observations at the cost of increased battery usage. Applications that could make use of raw GNSS measurements on smartphones include crowdsourcing, low-cost reference networks, and improving positioning in urban areas. Sample code is provided showing how to access raw observations and calculate a position from them.
This document provides an overview of Android application development. It defines Android as an open source operating system based on Linux and Java. It discusses the history and versions of Android, its features and architecture. It also outlines the advantages of the Android platform and application development, technical aspects of app development, use of the SDK, and types of Android applications.
Safecast developed devices and a mapping system to measure radiation and built a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload over 25 million data points to their mapping website. Safecast holds workshops to share their enthusiasm for citizen science and encourage volunteer involvement in collecting and sharing radiation readings.
This document summarizes the features of a mini travel microphone for use with multimedia PCs and notebooks. The microphone filters out background noise, attaches to notebooks or monitors, and has an adjustable boom that pivots for ideal positioning. It has a frequency range of 20-16,000Hz and plugs into devices via a 3.5mm jack.
The document defines several key networking concepts: NVT refers to a virtual device defined in RFC854 to standardize terminal interfaces; VT-100 was a common terminal emulation introduced by DEC that functioned as a video display terminal; routers are networking devices that direct and forward information between different paths on a network; and an IP address is a unique numerical identifier assigned to devices on a network using the Internet Protocol to enable communication.
This document lists two networking devices - the Tenda F3 Wireless Router+Extender+Access Point WIFI REPEATER NEW FH303, which is a 3-in-1 device that functions as a wireless router, extender, and access point, and the Mikrotik RB750r2 Routerboard, which is a standalone routerboard.
Here, an active RFID tag is used in place of voter id where the system can scan the tag and matches with the fingerprints collected in the Aadhar database.
The voter has to scan the RFID tag for the identification and further the voter has to confirm the identity with the fingerprints.
When fingerprints get matched then voters can cast their votes as the data gets matched.
A LCD is applicable in the process of displaying the corresponding information of the voter from the database, thus illegal voting or impersonating can be avoided since the finger prints is not the same for every individual
The document describes the Nanhui Datacenter located in Shanghai, China. It provides details about the infrastructure including its location, building specifications, tier 3 and 4 standards, redundant power systems, HVAC, security systems, and networking. The datacenter has over 200,000 square feet of space across three floors, with the first floor for power and the upper floors for hosting. It offers 24/7 administration and support services.
Wireless pen hidden (spy) camera(buy or rent)dplsurve
The document advertises covert surveillance equipment for sale or rent, including a wireless hidden camera pen and a portable digital video recorder. It provides details on their specifications, features, accessories, and how to contact the seller. The seller claims to offer state-of-the-art surveillance gear used by law enforcement and intelligence agencies.
The document describes a universal Software Defined Radio hardware platform consisting of PCI expansion cards with analog front ends, ADCs, FPGAs, and DSP resources. The SDR cards support multichannel and phased array applications through a programmable cross-connect switch and include high-speed converters with up to 80MHz sampling and 270MHz bandwidth. The platform is intended as a prototyping tool and can operate in slot cards or standalone with control via PCI or an on-board microcontroller.
This document provides specifications for a 720P megapixel WiFi security camera. The camera has a 720P image sensor, two-way audio, micro SD card storage, PTZ and night vision capabilities, motion detection and push notifications. It connects via WiFi and can be monitored through iOS and Android apps. Key specs include 1280x720 pixel resolution, 3.6mm lens, and support for H.264 video compression.
The Repeatit Infinity BS322 is a dual-radio, point-to-multipoint base station that supports up to 2 external antennas for short to long distance wireless connections. It has a dual radio design operating in the 5.150-5.845GHz frequency band with a combined throughput of 380Mbps, supports common encryption and authentication protocols, and has an IP67-rated weatherproof casing measuring 284 x 174 x 81mm.
The 5881ENHC RF Receiver is designed to work with 345 MHz transmitters for commercial fire and burglary systems. It features a spatial diversity system to eliminate signal "nulls" and features front and back tamper protection for installations. The receiver connects to control panels via the keypad bus and is compatible with Honeywell 5800 series wireless devices and control panels.
Sierra Wireless Developer Day 2013 - 06 - AirPrime goes multicoreThibault Cantegrel
The document describes Sierra Wireless' new AirPrime multicore wireless module. It has a quad-band 2G modem and supports future 4G migration. It also has integrated GPS, GLONASS, eCall and ERA-GLONASS. The module runs Linux and has an open application framework. It has extensive interfaces and runs on a multicore architecture with dedicated application and real-time low-power cores. Sierra Wireless introduces the world's first M2M system-on-a-chip called AirPrime AR6xx0.
Cofdm video transmitter ip mesh wifi product presentation from Shenzhen Safe ...Erin Qiu
cofdm wireless transmitter
cofdm wireless receiver
COFDM IP MESH
wireless mesh
wifi mesh
for long range tactical mobile application
such as man pack, bodyworn, UAV UGV
Digital signal processors (DSPs) are specialized microprocessors optimized for digital signal processing. The first DSP was developed by Texas Instruments in 1978. DSP technology has since advanced through several generations with improved instructions and speeds. The DSP market is large and growing due to increasing demand for electronic solutions. DSPs are used in a wide range of applications including communications, consumer electronics, healthcare, industrial, and automotive due to their ability to perform real-time signal processing.
Indoor Location - Globally and in 3D - by Combain CPS geolocation servicesCombain Mobile AB
Combain is a world leading geolocation service provider for connected devices. Combain has one of the world largest databases of cell-id and wifi that is used for accurate indoor and outdoor geopositioning of connected devices. The database includes more than 70 million cell-ids and 870 million wifis from more than 200 countries. Combain’s customers are leading mobile network operators, cyber security companies, mobile device manufacturers. The positioning service is provided as a cloud-based API, Combain CPS API, and as a cloud-based device management platform, Combain Thinxmate.
Combain is located in Lund, Sweden and Palo Alto, USA and serves customers world-wide.
This document discusses Philippe Coval, a software engineer working on digital twins and privacy by design for Samsung. It provides information on digital twins, including how they connect physical components to digital counterparts in real-time. An example is given of implementing a digital twin proof of concept with a robot arm using JavaScript on a microcontroller and exposing it through a WebThings API. Challenges discussed include scalability, persistence and supporting augmented reality.
The latest version of Android, Nougat (v7.x), was released in late 2016, and offers access to raw GNSS measurements. Google demonstrated functionality to obtain Pseudoranges, Dopplers and Carrier Phase from a phone or tablet last September at the Institute of Navigation’s conference.
This seminar will explain the current API, hardware limitations and possible future advantages of this exciting new development. We will discuss data collection, raw measurements and demo processing example in Matlab and Python.
L'iBeacon, introduit lors de la WWDC en 2013 est en cours de standardisation, grâce au projet open-source Eddystone. Associé à cette technologie, le projet "The physical Web" lancé par Google, promet lui aussi de grandes innovations dans le monde de l'IoT. En effet, il a pour but de pouvoir relier un smartphone à un beacon sans passer par une application. Ceci offre un large panel d'utilisation, pour relier des lieux physiques avec le monde virtuel. Nous ferons le point sur le projet et les technologies sous-jacentes, avant de se plonger dans les cas d'utilisation concrets, existants ou à venir.
This document introduces GNSS raw measurements that are available on Android smartphones through the android.location API. It discusses two main GNSS APIs - android.gms.location which simplifies positioning for applications but focuses on battery life, and android.location which gives access to more detailed GNSS observations at the cost of increased battery usage. Applications that could make use of raw GNSS measurements on smartphones include crowdsourcing, low-cost reference networks, and improving positioning in urban areas. Sample code is provided showing how to access raw observations and calculate a position from them.
This document provides an overview of Android application development. It defines Android as an open source operating system based on Linux and Java. It discusses the history and versions of Android, its features and architecture. It also outlines the advantages of the Android platform and application development, technical aspects of app development, use of the SDK, and types of Android applications.
Safecast developed devices and a mapping system to measure radiation and built a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload over 25 million data points to their mapping website. Safecast holds workshops to share their enthusiasm for citizen science and encourage volunteer involvement in collecting and sharing radiation readings.
Internet of Things is moving away from the hype. Low power technologies like LPWAN have the capabilities to transform the way to transform industry and logistics.
The document outlines several IT projects presented at an IT Cluster Skolkovo event. It summarizes several projects including:
Speaktoit, a voice assistant with over 6 million downloads that answers questions and performs tasks. Mobly, a service that allows roaming calls and access to communication apps using one account and number. Altergeo provides hybrid location technology that combines multiple positioning methods with accuracy of 20-30 meters.
It also briefly describes projects like Askeroid, a mobile vertical search app, iBuildApp which allows creating Android and iPhone apps in 5 minutes, Indoorgo for indoor navigation, BoardMaps for issue management, and MobiVita's video optimization solution for 4G networks.
This document introduces RAW GNSS measurements provided by the Android Nougat API. It discusses how the new API allows access to pseudoranges and carrier phase measurements directly from GNSS chips. This level of access was previously only available to GNSS experts and provides opportunities to improve positioning accuracy through sensor fusion and external corrections. The document also addresses challenges in working with the new API and limited hardware support currently from mobile chipset vendors.
This document discusses fog computing as an extension of cloud computing that processes data closer to where it is generated. Fog computing provides low-latency services through edge devices that request compute and storage resources from nearby fog nodes. This helps support applications that require real-time interaction by processing data locally instead of sending all data to distant cloud servers. The document uses Netflix and Google Maps as examples of applications that have evolved to take advantage of fog computing characteristics like geographical distribution and low latency by placing content and processing closer to end users. Architectural requirements for fog computing include handling a large and dynamic number of nodes, mobility, and diverse failure modes across heterogeneous edge devices.
This document discusses fog computing as an extension of cloud computing that processes data closer to where it is generated. Fog computing provides computing services at the edge of the network between end devices and cloud servers to enable low-latency applications. Examples where fog computing is useful include real-time applications like video streaming, gaming, augmented reality, and applications with large numbers of distributed nodes like sensor networks. The document outlines characteristics of fog computing like low latency, location awareness, mobility, and heterogeneity. It also discusses architectural drivers and provides examples of companies like Netflix that use fog computing through content delivery networks to provide fast, localized content distribution.
Safecast developed devices and a mapping system to measure radiation and build a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload data to their site, which has collected over 25 million data points. Safecast aims to share their enthusiasm for citizen science through workshops, presentations, and media to encourage more people to get involved in measuring radiation levels.
Build "Privacy by design" Webthings
With IoT.js on TizenRT and more
#MozFest, Privacy and Security track
Ravensbourne University, London UK <2018-10-27>
This document discusses 3D data management and visualization of places. It addresses the definition of realistic digital representations and the potential uses of a national 3D dataset for decision making. Key applications discussed include information management, conservation, urban planning, and public consultation. Different levels of detail are examined from block models to detailed interiors. Standards like CityGML are also summarized. The importance of 3D GIS for easier analysis and communication by users is highlighted.
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...William Liang
In this talk, we will review the evolution of the computer technologies after the PC Era, including embedded systems, smart devices and smartphones, cloud computing, IoT, AI, and then AIoT & Edge Computing that are happening today, and discuss how the trends were developed.
Presentation with Sreda Software Solutions company information and software development capabilities including Automotive electronics, telematics, V2x/C-ITS, Wireless communication, LTE Advanced Pro, Mobile applications, Back end services and data analytics
Met Geo Info at The British Cartographic Society 20100611Rollo Home
This document discusses 3D data management and visualization of places. It describes challenges in defining accuracy for 3D digital representations. It also discusses the potential benefits of a national 3D dataset for decision making through improved information management, conservation, urban planning, and public consultation. Different levels of detail are described for 3D models from block models to detailed interiors. Standards like CityGML are mentioned. Integrating 3D GIS with BIM is also briefly discussed. Quotes provide perspectives on making 3D GIS easier to use for analyzing and visualizing spatial information.
Similar to Android geolocation using GSM network (20)
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Full-RAG: A modern architecture for hyper-personalization
Android geolocation using GSM network
1. Android geolocation using
GSM network
« Where was Waldroid? »
Renaud Lifchitz
renaud.lifchitz+27c3@gmail.com
#27c3
27-30 December 2010, Berlin
2. Speaker's bio
● French computer security engineer
● Main activities:
– Penetration testing&security audits
– Security trainings
– Security research
● Main interests:
– Security of protocols (authentication,
cryptography, information leakage, zero-
knowledge proofs...)
– Number theory (integer factorization,
primality tests, elliptic curves)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 2
Renaud Lifchitz
3. Why Android?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 3
Renaud Lifchitz
4. Why Android?
● Why not?
● In just 2 years, 300,000 Android phones
activated each day
(Andy Rubin, Google, 2010/12/09)
● Android sales overtake iPhone in the
U.S. since summer
● Because hacking on Android is sooooo
cool (Linux kernel ☺)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 4
Renaud Lifchitz
5. Why Android?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 5
Renaud Lifchitz
7. GPS
● Pros:
– Very accurate
● Cons:
– Phone needs a built-in GPS
– User must switch it on
– Doesn't work inside buildings nor
underground
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 7
Renaud Lifchitz
8. Wi-Fi
● Pros:
– Works inside buildings
● Cons:
– Phone needs built-in Wi-Fi
– User must switch it on
– Less accurate than GPS
– Needs access points
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 8
Renaud Lifchitz
9. GSM location
● Pros:
– No need for built-in GPS or Wi-Fi
– Can be done from the network side
● Cons:
– Medium accuracy
– Needs GSM coverage
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 9
Renaud Lifchitz
10. Cell location resolution
● Every GSM cell (BTS) is identified
by 4 numbers:
– MCC: Mobile Country Code
– MNC: Mobile Network Code
– LAC: Location Area Code
– CID: Cell ID
(MCC: 262, MNC: 01) = T-Mobile ®
Deutschland
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 10
Renaud Lifchitz
11. Cell location resolution
● There have been several attempts
to build databases of GSM cells:
Source: Wikipedia (http://en.wikipedia.org/wiki/Cell_ID)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 11
Renaud Lifchitz
12. Cell location resolution
● Why not use Google fantastic
indexing power?
● Huge and continuously updated database
thanks to:
Google cars
Licensed under theCC Attribution-Share
Flickr photo by PhyreWorX
Alike 2.0 Generic license
&
Android phones
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 12
Renaud Lifchitz
13. Cell location resolution
● Google API? Quite confidential...
● Reverse-engineer:
– What is used when you run Android Google
Maps without GPS nor Wi-Fi
– What is used by Google Gears plugin when
you do a Google local search in your
browser
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 13
Renaud Lifchitz
14. Cell location resolution
● Android Google Maps internals:
– tcpdump ARM compilation
– Proprietary binary protocol
– HTTP POSTed to
http://www.google.com/glm/mmap
– See “Poor Man's GPS” by Dhaval Motghare
for reference:
http://www.orangeapple.org/?p=82
– Buggy...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 14
Renaud Lifchitz
15. Cell location resolution
● Google Gears internals:
– Sniff Firefox plugin network traffic
– See it's simple JSON!
– Some (confidential!) reference here:
http://code.google.com/p/gears/wiki/GeolocationAPI
– “Officially deprecated” but updated and
works a lot better than previous binary
protocol
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 15
Renaud Lifchitz
17. Cell location resolution
{"location":
{"latitude":48.886363,"longitude":2.246213,"address":
{"country":"France","country_code":"FR","region":"Ilede
France","county":"Hautsde
Seine","city":"Puteaux","street":"Rue Paul
Lafargue","street_number":"16","postal_code":"92800"},"acc
uracy":500.0},"access_token":"2:1dxrwvFk6ejLzSpv:BDHb9oizx
wm0bwsb"}
Google Gears GSM Geolocation API response body
● Interesting details:
– Latitude&longitude
– Full human-readable address (including street number,
street name, zip code, city, region and country!)
– Accuracy (in meters) → cell coverage?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 17
Renaud Lifchitz
18. Cell location resolution
● Going further: mapping the GSM network
using sniffing with a SDR (Software Defined
Radio) or an old phone (Nokia 3310)
● USRP 1 from Ettus Research LLC:
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 18
Renaud Lifchitz
19. Cell location resolution
● Use excellent AirProbe project:
https://svn.berlin.ccc.de/projects/airprobe/
1 Scan with GnuRadio
2 Demodulate with AirProbe
3 Decode with Wireshark
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 19
Renaud Lifchitz
21. Cell location resolution
● Result!:
GSM mapping 1 square kilometre of Paris from my bed ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 21
Renaud Lifchitz
22. Attack vectors
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 22
Renaud Lifchitz
23. Attack basics
● Android uses a specific logging facility
● Enabled by default
● 3 or 4 different logs
● Circular memory buffers
● Handled by character device files
● Built-in logcat tool to manipulate
the logs
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 23
Renaud Lifchitz
27. Attack basics
● Attack scenario:
– Collect history of visited GSM cells on
the victim's side (no prior access
needed)
– Send them to the attacker
– Resolve them into latitude&longitude
● Attack range:
– Local (i.e. physical attack)
– Remote (here remote means using a
local vulnerability!)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 27
Renaud Lifchitz
28. Physical attack
● Connect the victim's phone to
the attacker computer via USB
● Requires:
– Physical access to the victim's phone
for a few seconds
● Works even if the victim's phone is
locked! (using USB debugging function)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 28
Renaud Lifchitz
29. Remote attack
● Remotely spy the victim
● Malware application who abuse
either:
– User trust
– Android security model
● Requires:
– A bit of social engineering
(or not ☺)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 29
Renaud Lifchitz
30. Remote attack
● Android permissions model:
Dalvik (java) sandbox
● Permissions: android.permission.*
● What can a user fear?
– Dangerous combination of 2
permissions:
ACCESS_COARSE_LOCATION
or ACCESS_FINE_LOCATION
+ INTERNET
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 30
Renaud Lifchitz
31. Remote attack
st
●
1 attack - Use both permissions:
– Internet permission is needed for free
ad-sponsored applications
– Official geolocation permission is
needed for location-aware
applications
most users won't care!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 31
Renaud Lifchitz
32. Remote attack
● 2nd attack – Use the radio logs:
– Instead of using Android geolocation
API, read radio logs (READ_LOGS
permission) to collect Cell Ids
– Write results into the system log
(no permission needed!)
– Voluntarily crash the application when
needed (no permission needed!)
– If the user reports the crash, system log
is sent to the developer using the
integrated Google Feedback client ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 32
Renaud Lifchitz
33. Remote attack
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 33
Renaud Lifchitz
34. Remote attack
Google Feedback
client
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 34
Renaud Lifchitz
35. Remote attack
User reports
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 35
Renaud Lifchitz
36. Remote attack
rd
●
3 attack - Use Android NDK to
completely bypass permissions model:
– Native Development Kit allows
developer to call native functions
(C/C++ code) from their applications
(similar to JNI)
– Works outside the Dalvik sandbox...
● Arbitrary file access, code execution,
network access... ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 36
Renaud Lifchitz
37. La
Remote attack
st
m
ide inu
a! te
● 4th attack – Man-in-The-Middle
attack during application download
over Wi-Fi:
– The new Android Market&Android
Download Manager send application
name, description, permissions then
content in plaintext HTTP
– It should be possible to change
application description, permissions
and/or content using active MiTM and
install any malware application! ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 37
Renaud Lifchitz
38. Remote attack
GET /market/download/Download?
assetId=9177147809749553200&userId=XXXXXXXXXXXXXX&deviceId=YYYYYYYYYYYYYYYYYYY
HTTP/1.1
Cookie: MarketDA=ZZZZZZZZZZZZZZZZZZZZZZ
Host: android.clients.google.com
Connection: KeepAlive
UserAgent: AndroidDownloadManager
HTTP/1.0 200 OK
ETag: 1625044586
ContentType: application/vnd.android.packagearchive
ContentLength: 498162
ContentDisposition: inline
Date: Sun, 28 Dec 2010 17:50:13 GMT
Expires: Sun, 28 Dec 2010 17:50:13 GMT
CacheControl: private, maxage=0
XContentTypeOptions: nosniff
XFrameOptions: SAMEORIGIN
XXSSProtection: 1; mode=block
Server: GSE
XCache: MISS from proxy
Via: 1.0 proxy (proxy)
Connection: keepalive
PK.........N.<...............res/anim/animation_none.xml....].;n.1.E.q.IG."
An Android market download
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 38
Renaud Lifchitz
39. Spying users...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 39
Renaud Lifchitz
40. Getting more than location
● Much more interesting information in
the different logs:
– Phone calls (numbers&duration)
– SMS (PDU format)
● Combination of information:
– Where did phone calls take place?
– Where were SMS sent/received?
– Recovery of deleted SMS, call history...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 40
Renaud Lifchitz
41. Getting more than location
● History length?
– It depends on log filling
● If user has moved quickly: a few hours
● If not: nearly a whole day
● Logs size can be changed...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 41
Renaud Lifchitz
42. Getting more than location
Complete geolocation, calls and SMS
history tracking!
(nearly or no permission needed...)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 42
Renaud Lifchitz
43. How to protect yourself?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 43
Renaud Lifchitz
44. How to protect yourself?
● Carefully look at applications using NDK
(apk archives embedding .so files)
● Don't install any application requiring READ_LOGS
permission
● Don't submit bug reports (or at least choose not to
include system logs with submission)
● Reduce logcat buffer size
(seems tricky: logcat r / logcat n)
● Often clear your logcat
(logcat b radio c)
● Disable radio logs (seems tricky too!)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 44
Renaud Lifchitz
45. Tool demo
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 45
Renaud Lifchitz
46. Tool demo
Dumping and viewing a user's past location history
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 46
Renaud Lifchitz
47. Licensed under the CC Attribution-NonCommercial 2.5 Generic license
Comic by http://xkcd.com
That's all folks!
Hope you enjoyed the talk!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 47
Renaud Lifchitz
48. Any questions?
Many thanks for attending!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 48
Renaud Lifchitz