

Charlie Miller on hacking iPhones, Macbooks, Jeep and Self-Driving Cars
4 snips Oct 18, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Introduction
00:00 • 2min
The Legitimate Vulnerability Market
01:36 • 2min
Exploit Creation
03:30 • 2min
Exploit Sales - Are You Surprised?
05:17 • 2min
You Can't Hack a Mac Book, Right?
07:23 • 2min
How to Hack Into a Mac Book - I'm Not Going to Turn It Down
09:04 • 2min
Can a Computer Get Hacked at Pondo?
10:50 • 2min
Do You Think We've Moved in the Right Direction?
12:37 • 2min
Lockdown Mode
14:50 • 2min
The MacBook and the iPhone - What's the Difference?
16:54 • 2min
What's the Difference Between Android and iOS?
18:31 • 2min
App Store Review
20:04 • 4min
What Makes You Good at Finding Bugs?
23:36 • 2min
Exploit Writing - What Does It Feel Like?
26:03 • 2min
How Did You Pick Your Targets?
27:58 • 2min
The Exploit in Second Life
29:56 • 2min
No More Free Bugs
32:05 • 2min
Bug Bounties - I Defense Very Sign
34:20 • 2min
You Pivoted the Cars, 2000?
36:29 • 2min
Car Hacking - How Did You Get Started?
38:00 • 2min
Car Hacking Research
40:23 • 2min
The Jeep Research Was Incredible
42:18 • 2min
Car Security - Was the Live Demo Responsible?
44:13 • 3min
Do You Worry That This Cost Has Limited the Ability of Researchers?
47:05 • 2min
Does Your Security Philosophy Change as You Go to Automobiles?
48:40 • 2min
Using Software Updates to Update a Car?
50:45 • 2min
Automotive Security in 2022
53:06 • 2min
Automotive Security Research
55:29 • 3min