BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.cccv.de//congress/2024/fahrplan//CF83N8
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-38c3-7C8KRZ@cfp.cccv.de
DTSTART;TZID=CET:20241229T135000
DTEND;TZID=CET:20241229T143000
DESCRIPTION:Auracast\, the new Bluetooth LE Broadcast Audio feature has gai
 ned some publicity in the last few months. The Bluetooth SIG has been work
 ing on the specification of this feature set in the past few years and ven
 dors are only now starting to implement it. Auracast enables broadcasting 
 audio to multiple devices. These broadcasts can also be encrypted. Unfortu
 nately\, the security properties of the protocol are vague and insufficien
 t. It has already been shown that these broadcasts can be hijacked by anyo
 ne when unencrypted.\n\nWe explain the state of (in)security of the protoc
 ol and add to it by showing that even when encrypted\, broadcasts can ofte
 n be cracked easily. We also show that once equipped with the passcode\, a
 ttackers can eavesdrop and hijack even encrypted broadcasts. Alongside the
  talk\, we will release our toolkit to brute-force authentication codes\, 
 decrypt dumped Auracast streams\, and hijack encrypted broadcasts.
DTSTAMP:20241227T122009Z
LOCATION:Saal ZIGZAG
SUMMARY:Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves - 
 Frieder Steinmetz\, Dennis Heinze
URL:https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7C8KRZ/
END:VEVENT
END:VCALENDAR
