28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Speakers | |
---|---|
Bruhns | |
FX of Phenoelit | |
greg |
Schedule | |
---|---|
Day | Day 2 - 2011-12-28 |
Room | Saal 1 |
Start time | 21:45 |
Duration | 01:00 |
Info | |
ID | 4676 |
Event type | Lecture |
Track | Hacking |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Apple vs. Google Client Platforms
How you end up being the Victim.
We will discuss the two different approaches Apple and Google take for the client platforms iPad and Chromebook, how they are similar and how they are not.
From the security architecture and integrity protection details to your account and identity that links you firmly back to the respective vendor, we will provide the big picture with occasional close-up shots. Here is what powers the vendor has over you, or what powers he gives to arbitrary unwashed attackers at conferences through fails in logic, binary or HTML.