Peekaboo-Build

BUILD PROCESS Design: Riverside Build: (Cabinet, Coin-op hardware, Controller): Riverside/Son Software: Austin Art: Riverside PC & OS: Warlord Material/Tools: table saw, ruler, jig saw, router, drill, drill press, hole saw, clamps, wire (various gauge),...

Peek-A-Boo FAQ

How many coins did you collect at Defcon 2010? Despite our poor advertising, almost 300 coins were collected. We announced that 50% of all proceeds would be donated to the EFF, however, in the end we gave them all the dirty coins. 🙂 I want to see the Peek-a-boo...

Peek-A-Boo Booth

The world’s first coin operated network sniffer! We feel there is a lot of value in seeing what data is leaking from an environment/device.  As part of our research over the last ten years, we found that the most effective way of showing risk is through visual...

Poster 1 You found a Music Code!!!   50A6B99D195CA35513C9BC5DC39DA7B267EC82E8A15557FC81D912AD2F1FEE4B   Download exclusive DJ Mix from Helios:...

WARNING! Our Mission Our mission is to raise security awareness! Computer crime and identity theft loom large in most people’s unconscious fears because they do not know: How they are at risk, and The steps they can take to protect themselves. Since you already...

NFC Security Awareness Project

Warning Messasge http://www.wallofsheep.com/pages/05c28a34e2eeeefaeeca2e6796a06ae572f4814e3c5c592652468da5a9c2a55e The invariable problem with new technologies is the potential for new attack vectors. Near Field Communication (NFC) is gaining momentum as an added...

Juice Jacking

Concepts – USB as a charge port The concept is simple, leading smart phones on the market have been designed to utilize the same port for charging the phone as data transfer. This opens the opportunity to trick a user in need of a charge to expose their...

Understanding & Bypassing Tamper Evident Devices

For those of you that are or have ever been interested in bypassing tamper evident and tamper proof technologies, we have assembled a few resources to get you started.  Introduction to Tamper Evident Devices by: Datagram  (52 Minute Talk from Defcon 19) How to hack a...