“Since the key is available to TrustZone, Qualcomm, and OEMs [Original Equipment Manufacturers] could simply create and sign a TrustZone image which extracts the KeyMaster keys and flash it to the target device,” Beniamini wrote. “This would allow law enforcement to easily brute force the FDE password off the device using the leaked keys.”
I was recently given the opportunity to visit Barcelona to attend the Splunk EMEA Partner Technical Symposium. The sessions were of really high quality and the networking / discussions with colleagues in the industry and the Splunkers themselves was great!
I was also asked to take part in the Partner Panel which was a core session and explored a number of questions to the panel across the following areas:
- Highlighting Splunk Value
- Implementation Challenges
- Gaining Support / Communicating with Splunk
- Many More!
I hope to write some follow-up posts answering some of these so they are preserved as the Q&A was really interesting and (I hope) enlightening.
A brief but interesting at how the same data sets can be used across multiple use cases.
“At a recent #Splunk4Rookies event in Paris, we invited people to think about what kind of information they could get from a single piece of raw data to address”
An awesome site which covers the history of the internet; technologies, browsers and code!
Source: The evolution of the web
“Academics have developed a framework for typo-tolerant passwords that significantly enhances usability without compromising security.”