Stalking a city for fun and frivolity

Source: Internet
Author: User

Https://www.youtube.com/watch?v=ubjuWqUE9wQ

http://www.gizmag.com/wi-fi-track-smartphone-creepydol/28585/

CREEPYDOL:A Distributed sensor network that combines wireless sniffing, distributed c&c, 3D visualization, and "Grena De "encryption to does real-time personnel tracking and true-identity theft on a major urban area. It ' s stalking as a service.

I. Goals A. How is much data can extracted from passive wireless monitoring? 1. than just from a network trace---remember if not connected to a wireless network, Wi-Fi devices send out LIS TS of their known networks, asking if anyone can help them. 2. As soon as a device thinks it's connected to Wi-Fi, all its background Sync Services would kick of again---DropBox, imess Age, all the rest. So we'll immediately know that certain services would be on play. 3. Over unencrypted Wi-Fi, all the TRAFC sent by a device is exposed. Even if we can ' t see both sides of the every message, we can learn a lot from the what we did see---especially if we know how a giv En protocol operates. 4. How much better could we do if we had not one sensor, but ten? Spread out of a area? Now we have the geolocation, time and place analysis, etc. 5. If we ' re tracking over a large area, we don ' t just want to know TRAFC and Devices:we want to know people. Can we take data and find people? (I don ' t want your SSN, I want YOur name. And really, I want to know enough on you to blackmail you; Information is control.)

B. Can we do large-scale sensing without centralized communications? 1. If We centralize communications, life are simple; Everyone phones home---but a compromised node gives every attacker the location of the mothership. 2. Centralized communications decrease resistance to attack, and prevent for responding agilely to attack.

C. Can we present massive amounts of this data in a-to-be intelligible by mortals? User-friendly? Still secure? 1. Group One of the high security products:incredible technology, terrible UI. This causes low adoption, or (possibly worse) mistakes in use. Systems fail, people die. EXAMPLES:PIDGIN-OTR, or PGP/OPENPGP. 2. Group Two:concerns about technology, great UI. This causes adoption, but can cause massive problems later (if the concerns is borne out). Examples:hushmail, or the Silent Circle ZRTP issues. 3. Group Three:good Technology, great UI. This was wonderful, but the incredibly hard-to-do (because UI masters was usually not security wizards). Example:cryptocat, RedPhone. 4. We would aspire to has creepydol, and especially the underlying reticle communications technology, is in Group three, Through a variety of methods to ensure secure communication in relatively-intelligible ways. *this is a ongoing process.* our code was open source, to allow verification, and would be releAsed in the coming weeks.

Not yet written to the core. Come back at night to continue ~

[MANET]

Https://en.wikipedia.org/wiki/Mobile_ad_hoc_network

A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of Mobil e devices connected without wires. Ad hoc is Latin and means "for this purpose". [1]

Each device in a MANET are free to move independently in any direction, and would therefore change its links to other device s frequently. Each of the must forward traffic unrelated to their own use, and therefore is a router. The primary challenge in building a MANET are equipping each device to continuously maintain the information required to PR Operly Route traffic. Such networks may operate by themselves or May is connected to the larger Internet. They may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology[1].

Stalking a city for fun and frivolity

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.