Breaking_into_the_iCloud_Keychain.pdf

上传者: testvaevv | 上传时间: 2021-08-07 18:00:48 | 文件大小: 6.99MB | 文件类型: PDF
議程摘要 Abstract Apple iCloud is one of the most popular cloud services (among others like Google, Microsoft, Dropbox), but it is not just the storage. It is being used for iOS devices backups, synced information from devices (from contacts to documents and media files) and much more. The most interesting part of it is the iCloud Keychain, that keeps the most valuable information such as passwords to various accounts: mail, Wi-Fi access points, online banking -- virtually all services you ever used on the iPhone. Credeit card data is there as well. The iCloud Keychain is very well protected from hackers, but there are still some ways to break into it using so-called 'recovery' and 'synced' algorithms. We will show how the scilled hacker (or forensic specialist) can do that, and how two-factor authentication can actually help them, making the iCloud Keychain a bit less secure.

文件下载

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明