Tracking Down Mobile Trackers #734
Labels
[Format] Learning Forum
To develop and implement ideas for improvement, exchange or review
OL6 Applicant
OL6
Accepted to OL6
Stipend requested
Requires travel stipend to attend MozFest
Milestone
[ UUID ] 4db0ab77-d8f6-48a2-87e3-a4a04b9dc8c5
[ Session Name ] Tracking Down Mobile Trackers
[ Primary Space ] Privacy and Security
[ Secondary Space ] Openness
[ Submitter's Name ] Sean O'Brien
[ Submitter's Affiliated Organisation ] Yale Privacy Lab
[ Submitter's GitHub ] @seandiggity
What will happen in your session?
Mobile trackers have permeated the ecosystems of Android and iOS. At Yale Privacy Lab, we have detected and categorized a variety of these mobile trackers, from simple crash reporters to analytics platforms to ultrasonic beacons. We will explore methods of detecting these trackers on Android via the Exodus Privacy scanner and static analysis, as well as network analysis via a Raspberry Pi "PiRogue" device. PilferShush, a mobile app for detecting and jamming ultrasonic trackers, will also be demonstrated.
What is the goal or outcome of your session?
The goal is increased privacy and security awareness, as well as discussion around surveillance (especially where it relates to mobile devices). We will expose mobile trackers that may be unknown to the audience and reveal Free and Open-Source Software methods of detection, analysis, and blocking.
If your session requires additional materials or electronic equipment, please outline your needs.
Projector or screen, ethernet, access to wireless network.
Time needed
60 mins
The text was updated successfully, but these errors were encountered: