67 Followers
102 Following
1,026 Posts
24 | He/him 🏳️‍🌈
Studying Cybersecurity at HPI in Potsdam
Websitehttps://aaronschlitt.de
CityPotsdam
Pronounshe/him
OH: „Das Wort Plan kenne ich nicht. Ich kenne nur noch Konzepte“
Verschraubung eines CEE-Steckers Überbesetzung ohne Kulanzleistungen
🤝
Zugentlastung

OH: "Ein Söderstream"

"Kann man damit auch Wurstwasser sprudeln"?

@pretix Es ist immer wieder schön, andere Menschen mit Eurer Software begeistern zu können.

You may remember my talk on iPhone Mirroring at #38c3. I have now published a blog post about my findings in threat modelling and researching the security of this new feature. There are also a few more details that I was able to talk about now.

https://aaronschlitt.de/threat-modelling-and-analyzing-iphone-mirroring/

Threat Modelling and Analyzing iPhone Mirroring

What looks like a pretty useful feature to users at first glance is also exciting from the perspective of a security researcher.

Aaron Schlitt
OH: "Das Vegane Bier, das ist das ohne Speckwürfel drin"
Slides and the recording are now available at https://aaronschlitt.de/breaking-the-mirror-38c3-community-talk/
Breaking the Mirror: 38C3 Community Talk

Having spent the past eight months as a research assistant at Jiska Classen's chair for Mobile Security, I had the chance to give a talk on one of the community stages at the 38 Chaos Communication Congress. iPhone MirroringSlide DownloadiPhone Mirroring_FINAL.pdf5 MBdownload-circle Talk Description The tight integration between

Aaron Schlitt

My talk on the community stages at #38c3 finally has a date, time and location: It's on Day 1 at 11:00 on the YELL stage.

I will be talking about vulnerabilities I found in Apple's iPhone Mirroring feature as well as the complicated threat model that comes with it. The information comes from research I was able to conduct at @jiska's chair over the past months.

Looking forward to seeing you there!

https://cfp.cccv.de/38c3-community-stages/talk/QUGQQC/

Breaking the Mirror – A Look at Apple’s New iPhone Remote Control Feature 38C3 Community Stages

Exploring the security of the new iPhone Mirroring feature as well as the current threat model of the iOS ecosystem

Ich fühle mich beobachtet
Hm, bei der ODEG kann man meinen korrekt aktivierten Interrail-Pass nicht scannen, obwohl der hier gültig ist.
Gut, dass ich ein SemTix hab, aber das schon eher wild.