We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hacking together a plush surveillance unicorn

Formal Metadata

Title
Hacking together a plush surveillance unicorn
Title of Series
Number of Parts
17
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date2016
LanguageEnglish

Content Metadata

Subject Area
Genre
Abstract
In February Team EvilCorp took home the 2nd place at the first Arctic IoT Challenge. With only three days at their disposal three people were able to put together both the hardware and the software required to track actual people based on data "leaking" from mobile phones. Using hobbyist hardware that cost less than $100. The technology required to do so is in no way groundbreaking, it is well known and has many useful applications. The big surprise for the team was how easy it was to abuse seemingly innocent data. With IoT gaining ground, these are things developers need to care about. In this short session we will take a closer look at what we managed to build during a three day hackathon.