Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking the Mirror - Security Analysis of Apple's iPhone Remote Control Feature

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 30-minute conference talk from the 38th Chaos Communication Congress (38C3) that delves into the security implications of Apple's iPhone Mirroring feature and the iOS ecosystem's threat model. Learn about the intricate Continuity framework that enables seamless device integration across Apple products, allowing functions like using iPhones as webcams and iPads as second screens. Understand how local wireless protocols like Bluetooth and Wi-Fi facilitate communication between devices, creating complex security considerations. Discover detailed demonstrations and explanations of security bypasses found in iOS 18 beta versions, examining whether the implemented security and privacy checks adequately protect users. Gain insights into the practical implications of these security measures compared to real-world iOS device usage patterns, presented by security researcher Aaron Schlitt.

Syllabus

38C3 - Breaking the Mirror – A Look at Apple’s New iPhone Remote Control Feature

Taught by

media.ccc.de

Reviews

Start your review of Breaking the Mirror - Security Analysis of Apple's iPhone Remote Control Feature

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.