Any question? Call Us +62 822 444 63562
Do you have a cellphone? Do you run apps on it? Your personal information is most probably traversing over TOR without your knowledge or consent.
As part of my research, I identified a surprising amount of unencrypted, sensitive and confidential user data originating from mobile devices traversing the TOR network, which included: GPS coordinates, WiFi BSSID, and general keys typed by the user. In some cases, I was able to build a complete user profile from physical movements to purchasing habits.
There are multiple sources, without the user’s knowledge or consent, which consistently and purposely send personal information unencrypted over TOR. These include pre-designed Mobile Original Equipment Manufacturers (OEM) specifications, approved applications by known digital distribution platforms, such as Apple Appstore or Google Play Store, and advertisements in legitimate popular applications.
At the end of the day, how comfortable are you that anyone can track you?
Speaker Bio
Milind Bhargava is the Founder of Mjolnir Security where his company specializes in Incident Management, Threat Intelligence, Dark Web analysis, PMO and SME support to client’s undergoing cyber incidents. Milind and his team have developed an embedded threat intelligence directed Incident Response processes for clients across multiple verticals and sectors to reduce mean time to detect and respond by up to 90%, working with IT and Business management as well as technical resolver teams to enhance their capability to respond to cyber-attacks.
Event Date | 11-28-2019 11:30 am |
Event End Date | 11-28-2019 1:00 pm |
Capacity | 70 |
Available place | 12 |
Individual Price | $20.00 |
Location | Fifth Avenue Place, West Tower, 420 2 St SW, +15 Conference Room, in northwest corner of the building |