Power BI Fundamentals - Create visualizations and dashboards from scratch
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore new applications for cryptographic secret handshakes between mobile devices using Bluetooth Low-Energy (LE) in this 33-minute Black Hat conference talk. Discover how secret handshakes enable mutual authentication between unfamiliar parties associated with virtual secret groups or communities. Learn about messaging applications, secret communities, properties of secret handshakes, and pairing methods. Delve into tracking prevention techniques, Bluetooth LE advertisements, and implementation details. Evaluate the functionality of these innovative mobile applications for secure communication and authentication.
Syllabus
Intro
Motivation
Messaging Applications
Secret communities
Properties of a Secret Handshake
Secret handshake from pairings
Tracking prevention
Pairing methods
Bluetooth LE Advertisements
Implementation
Evaluation: Functionality
Taught by
Black Hat