Devices Are Attacking - PSW #886
Security Weekly Podcast Network (Video)
00:00
MeshTastic and Data Exfiltration Techniques
This chapter explores the rise of MeshTastic technology within the hacker community, particularly as it relates to securing event badges. It also discusses innovative methods for data transmission through spurious emissions from HDMI and VGA cables, highlighting how image manipulation can facilitate wireless communication. Furthermore, the speakers touch on the potential for using crafted images for data exfiltration, connecting contemporary challenges in cybersecurity with historical practices.
Transcript
Play full episode


