The Fastest Way to Become a Backend Developer Online
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore new applications for cryptographic secret handshakes between mobile devices using Bluetooth Low-Energy (LE) in this 33-minute Black Hat conference talk. Discover how secret handshakes enable mutual authentication between unfamiliar parties associated with virtual secret groups or communities. Learn about messaging applications, secret communities, properties of secret handshakes, and pairing methods. Delve into tracking prevention techniques, Bluetooth LE advertisements, and implementation details. Evaluate the functionality of these innovative mobile applications for secure communication and authentication.
Syllabus
Intro
Motivation
Messaging Applications
Secret communities
Properties of a Secret Handshake
Secret handshake from pairings
Tracking prevention
Pairing methods
Bluetooth LE Advertisements
Implementation
Evaluation: Functionality
Taught by
Black Hat