Quick Overview: With billions of users worldwide, mobile messaging apps like WhatsApp and Signal have become critical for personal and ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... When Liberty Safe was found to have provided safe unlock codes to authorities, it made us wonder; how was it even possible for ...

Def Con 33 Exploiting Security - Detailed Overview & Context

With billions of users worldwide, mobile messaging apps like WhatsApp and Signal have become critical for personal and ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... When Liberty Safe was found to have provided safe unlock codes to authorities, it made us wonder; how was it even possible for ... Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national ... Nick and Kit team up to explain a story of fraud and scam as often reported in the news. A method of deceit with a unique financial ...

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ... With the commoditization of IoT surveillance technology, private and public entities alike have been rushing to put every facet of ... Welcome to the “fun” world of IoT, where As we know, spacecraft will become prime targets in the modern cyber threat landscape, as they perform critical functions like ... What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ... Extended Berkeley Packet Filter (eBPF) has revolutionized Linux kernel programmability, but its complex verification and JIT ...

In this session, Tobias Diehl will demonstrate a critical vulnerability in Microsoft's CoPilot AI, exposing how data voids can be ... Explore the basics of what CIP is, how it is used in industry, and how to get started "How NOT to Perform a Covert Entry Assessment" is a no B.S. discussion that covers what not to do during covert entry ... For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ...

Photo Gallery

DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber,  M Gunther
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh
DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James Rowley
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro
DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas
DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine
DEF CON 33 - The Anatomy of a Crypto Scam - Nick Percoco & Kitboga
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis
DEF CON 33 - Unmasking the Snitch Puck: IoT surveillance tech in the school bathroom - Reynaldo, nyx
DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan "zh4ck" Balazs
DEF CON 33 - Hacking Space to Defend It: Generating IoBs with SPARTA - Brandon Bailey
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored