Three Buddy Problem

Charlie Miller on hacking iPhones, Macbooks, Jeep and Self-Driving Cars

4 snips
Oct 18, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The Legitimate Vulnerability Market
01:36 • 2min
3
Exploit Creation
03:30 • 2min
4
Exploit Sales - Are You Surprised?
05:17 • 2min
5
You Can't Hack a Mac Book, Right?
07:23 • 2min
6
How to Hack Into a Mac Book - I'm Not Going to Turn It Down
09:04 • 2min
7
Can a Computer Get Hacked at Pondo?
10:50 • 2min
8
Do You Think We've Moved in the Right Direction?
12:37 • 2min
9
Lockdown Mode
14:50 • 2min
10
The MacBook and the iPhone - What's the Difference?
16:54 • 2min
11
What's the Difference Between Android and iOS?
18:31 • 2min
12
App Store Review
20:04 • 4min
13
What Makes You Good at Finding Bugs?
23:36 • 2min
14
Exploit Writing - What Does It Feel Like?
26:03 • 2min
15
How Did You Pick Your Targets?
27:58 • 2min
16
The Exploit in Second Life
29:56 • 2min
17
No More Free Bugs
32:05 • 2min
18
Bug Bounties - I Defense Very Sign
34:20 • 2min
19
You Pivoted the Cars, 2000?
36:29 • 2min
20
Car Hacking - How Did You Get Started?
38:00 • 2min
21
Car Hacking Research
40:23 • 2min
22
The Jeep Research Was Incredible
42:18 • 2min
23
Car Security - Was the Live Demo Responsible?
44:13 • 3min
24
Do You Worry That This Cost Has Limited the Ability of Researchers?
47:05 • 2min
25
Does Your Security Philosophy Change as You Go to Automobiles?
48:40 • 2min
26
Using Software Updates to Update a Car?
50:45 • 2min
27
Automotive Security in 2022
53:06 • 2min
28
Automotive Security Research
55:29 • 3min