The document discusses location tracking APIs available on iOS devices, including Significant Location Changes and Region Monitoring. Significant Location Changes allows detecting location changes of 300-500 meters on iPhone 3GS and later, while Region Monitoring allows monitoring when a device enters or exits user-defined areas and is available on iPhone 4 and later. Examples are given of how to implement these APIs through a location manager delegate.
iBeacons for Everyone, from iOS to Android - James Montemagno | FalafelCON 2014FalafelSoftware
iBeacons are taking the world by storm allowing developers to leverage Bluetooth Low Energy to give their apps location support that can work just about anywhere including indoors. This give you the ability to enable any number of scenarios based upon device proximity that were never before possible. From retail stores to even sports including the Super Bowl and MLB, you will soon be finding iBeacons just about everywhere. Introduced as a core feature of iOS 7 iBeacon support has now found it's way to Android. You will learn what an iBeacon is, how they work, how you would want to use them, and how to get started making apps in both Android and iOS. All demonstrations will be coded in C#, but will be applicable to any iOS or Android developer in any language.
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.
Tom Eston is a Senior Security Consultant for SecureState. Tom focuses his research on the security of social media. Tom is also the founder of SocialMediaSecurity.com and co-host of the Security Justice and Social Media Security podcasts. Kevin Johnson is a security researcher with Secure Ideas. He has many years of experience performing security services for Fortune 100 companies, and leads a large number of open source security projects including BASE and SamuraiWTF. Kevin is also an instructor for SANS.
Presented at Notacon 8 in Cleveland Ohio.
iBeacons for Everyone, from iOS to Android - James Montemagno | FalafelCON 2014FalafelSoftware
iBeacons are taking the world by storm allowing developers to leverage Bluetooth Low Energy to give their apps location support that can work just about anywhere including indoors. This give you the ability to enable any number of scenarios based upon device proximity that were never before possible. From retail stores to even sports including the Super Bowl and MLB, you will soon be finding iBeacons just about everywhere. Introduced as a core feature of iOS 7 iBeacon support has now found it's way to Android. You will learn what an iBeacon is, how they work, how you would want to use them, and how to get started making apps in both Android and iOS. All demonstrations will be coded in C#, but will be applicable to any iOS or Android developer in any language.
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.
Tom Eston is a Senior Security Consultant for SecureState. Tom focuses his research on the security of social media. Tom is also the founder of SocialMediaSecurity.com and co-host of the Security Justice and Social Media Security podcasts. Kevin Johnson is a security researcher with Secure Ideas. He has many years of experience performing security services for Fortune 100 companies, and leads a large number of open source security projects including BASE and SamuraiWTF. Kevin is also an instructor for SANS.
Presented at Notacon 8 in Cleveland Ohio.