TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked

322,865
0
2011-12-01に共有
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a book on his experiences since this event.

コメント (21)
  • Very interesting talk. Most enjoyable, informative, witty and humorous. I loved it and learned quite a bit about digital literacy and know I am NOT digitally literate.
  • Interesting talk. I wish that even more decision makers / managers would watch this, get someone to explain it to them and then actually deal with it instead of only thinking about reducing short term costs and time-to-market.
  • The key to security is free and open source software. Proprietary developers use security by obscurity because it's cheap, but as this talk shows, reverse-engineering is easy. Free software does not keep secrets from anyone, so vulnerabilities can't be hidden and swept under the rug. And to remain secure, they must have features that actively works to keep the system secure, which is much harder to break than common security by obscurity.
  • Actually, we need to start teaching engineering as a high school subject. Engineering teaches the brain how to think different, like a hacker does. Also, benefits society as we need engineers.
  • My lord, I think the most horrible and unbelievable thing is that the hackers use the accelerameter to read what we are typing!!!!!
  • @andreweye1
    Great talk Avi. Very well done. Congratulations.
  • @foxbat296
    dis helps a lot..we r in world where our lives can easily be dictated by others..
  • That's some interesting stuff! Security is always lacking in early implementations of new technology!
  • @MaxTperson
    Could be handy to have local "everything is done manually" day, few times per year, so that skills and capacity to keep things working exists if and when needed. Powerplants operated manually, traffic guided manually, utilities manually, (um... phone lines switched manually ? how does one do that with cellphones ?)
  • Quite often, these attacks are only possible under lab conditions. I have worked with many vendors that have shown in practice, the devices were not as exposed as they were in these researchers' labs. BUT, the firmware should definitely be fixed anyway!
  • @2minutestomammoth What do you think computer defense people do? Why do you think they're able to put out the protection they do?
  • @MrSayier
    One thing that is kind of ignored during scare talks like this is there is little motivation for it. Hackers have a lot of schooling and/or years of experience put into what they do and at the end of the day they are looking to make a profit. There is not exactly a whole lot of profit to be made by stopping someones pace maker or disabling someones breaks. I'm not saying that these types of things shouldn't be looked into but it's not exactly a threat that has end of the world possibilities.
  • What makes you think any of these attacks have not ALREADY BEEN USED to make an assassination look like an accident?
  • we know how hacking works. the problem is, it's extremely hard for security professionals to convince business execs to invest in proper security and teach network/software designers how to code with security in mind.
  • did anyone notice the lack of blackberry (rim) presence in the video?