The call for proposals form is down even though my understanding is it closed at midnight tonight EST, so I submitted this to github. If I can still submit, I would like to propose this:
[ UUID ]
[ Session Name ] Tracking Down Mobile Trackers
[ Primary Space ] Privacy and Security
[ Secondary Space ] Openness
[ Submitter's Name ] Sean O'Brien
[ Submitter's Affiliated Organisation ] Yale Privacy Lab
[ Submitter's GitHub ] @YalePrivacyLab
What will happen in your session?
Mobile trackers have permeated the ecosystems of Android and iOS. At Yale Privacy Lab, we have detected and categorized a variety of these mobile trackers, from simple crash reporters to analytics platforms to ultrasonic beacons. We will explore methods of detecting these trackers on Android via the Exodus Privacy scanner and static analysis, as well as network analysis via a Raspberry Pi "PiRogue" device. We will also demo PilferShush, a mobile app for detecting and jamming ultrasonic trackers.
What is the goal or outcome of your session?
The goal is to expose mobile trackers that may be unknown to the audience and reveal Free and Open-Source Software methods of detection, analysis, and blocking.
If your session requires additional materials or electronic equipment, please outline your needs.
Projector or screen, ethernet, access to wireless network.
Time needed
The call for proposals form is down even though my understanding is it closed at midnight tonight EST, so I submitted this to github. If I can still submit, I would like to propose this:
[ UUID ]
[ Session Name ] Tracking Down Mobile Trackers [ Primary Space ] Privacy and Security [ Secondary Space ] Openness
[ Submitter's Name ] Sean O'Brien [ Submitter's Affiliated Organisation ] Yale Privacy Lab [ Submitter's GitHub ] @YalePrivacyLab What will happen in your session?
Mobile trackers have permeated the ecosystems of Android and iOS. At Yale Privacy Lab, we have detected and categorized a variety of these mobile trackers, from simple crash reporters to analytics platforms to ultrasonic beacons. We will explore methods of detecting these trackers on Android via the Exodus Privacy scanner and static analysis, as well as network analysis via a Raspberry Pi "PiRogue" device. We will also demo PilferShush, a mobile app for detecting and jamming ultrasonic trackers. What is the goal or outcome of your session?
The goal is to expose mobile trackers that may be unknown to the audience and reveal Free and Open-Source Software methods of detection, analysis, and blocking. If your session requires additional materials or electronic equipment, please outline your needs.
Projector or screen, ethernet, access to wireless network. Time needed
60 mins