Full text of Top Hacker Shows Us How It’s Done by Pablos Holman at TEDxMidwest conference.
Listen to the MP3 Audio here: MP3 – Top Hacker Shows Us How It’s Done by Pablos Holman at TEDxMidwest
So this is a hotel room, kind of like the one I’m staying in. I get board sometimes. A room like this has not a lot to offer for entertainment. But for a hacker, it gets a little interesting because that television is not like the television in your home, it’s a node on a network. Right? That means I can mess with it. If I plug a little device like this into my computer, it’s an infrared transceiver, I can send the codes that the TV remote might send and some other codes.
So what? Well, I can watch movies for free. That doesn’t matter to me so much, but I can play video games too.
Hey, but what’s this? I can not only do this for my TV in my hotel room, I can control your TV in your hotel room. So I can watch you if you’re checking out with one of these, you know, TV based registration things, if you’re surfing the web on your hotel TV, I can watch you do it. Sometimes it’s interesting stuff. Funds transfer. Really big funds transfers. You never know what people might want to do while they’re surfing the web from their hotel room.
The point is I get to decide if you’re watching Disney or porn tonight. Anybody else staying at the Affinia hotel?
This is a project I worked on when we were trying to figure out the security properties of wireless networks; it’s called the Hackerbot. This is a robot we’ve built that can drive around and find Wi-Fi users, drive up to them and show them their passwords on the screen.
We just wanted to build a robot, but we didn’t know what to make it do, so — We made the pistol version of the same thing. This is called the Sniper Yagi. It’s for your long-range password sniffing action, about a mile away I can watch your wireless network.
This is a project I worked on with Ben Laurie to show passive surveillance. So what it is, is a map of the conference called Computers, Freedom and Privacy. And this conference was in a hotel, and what we did is we, you know, put a computer in each room of the conference that logged all the Bluetooth traffic. So as everybody came and went with their phones and laptops we were able to just log that, correlate it, and then I can print out a map like this for everybody at the conference.
This is Kim Cameron, the Chief Privacy Architect at Microsoft. Unbeknownst to him, I got to see everywhere he went. And I can correlate this and show who he hangs out with (phone dialing) when he got board, (phone dialing) hangs out in the lobby with somebody. Anybody here use cellphones?