by Doc | May 19, 2023 | Pages
BUILD PROCESS Design: Riverside Build: (Cabinet, Coin-op hardware, Controller): Riverside/Son Software: Austin Art: Riverside PC & OS: Warlord Material/Tools: table saw, ruler, jig saw, router, drill, drill press, hole saw, clamps, wire (various gauge),...
by Doc | May 19, 2023 | Pages
How many coins did you collect at Defcon 2010? Despite our poor advertising, almost 300 coins were collected. We announced that 50% of all proceeds would be donated to the EFF, however, in the end we gave them all the dirty coins. 🙂 I want to see the Peek-a-boo...
by Doc | May 19, 2023 | Pages
The world’s first coin operated network sniffer! We feel there is a lot of value in seeing what data is leaking from an environment/device. As part of our research over the last ten years, we found that the most effective way of showing risk is through visual...
by Doc | May 19, 2023 | Pages
You have been NFC Rick...
by Doc | May 19, 2023 | Pages
Poster 1 You found a Music Code!!! 50A6B99D195CA35513C9BC5DC39DA7B267EC82E8A15557FC81D912AD2F1FEE4B Download exclusive DJ Mix from Helios:...
by Doc | May 19, 2023 | Uncategorized
WARNING! Our Mission Our mission is to raise security awareness! Computer crime and identity theft loom large in most people’s unconscious fears because they do not know: How they are at risk, and The steps they can take to protect themselves. Since you already...
by Doc | May 19, 2023 | Pages
Warning Messasge http://www.wallofsheep.com/pages/05c28a34e2eeeefaeeca2e6796a06ae572f4814e3c5c592652468da5a9c2a55e The invariable problem with new technologies is the potential for new attack vectors. Near Field Communication (NFC) is gaining momentum as an added...
by Doc | May 19, 2023 | Pages
Concepts – USB as a charge port The concept is simple, leading smart phones on the market have been designed to utilize the same port for charging the phone as data transfer. This opens the opportunity to trick a user in need of a charge to expose their...
by Doc | May 19, 2023 | Pages
by Doc | May 19, 2023 | Pages
For those of you that are or have ever been interested in bypassing tamper evident and tamper proof technologies, we have assembled a few resources to get you started. Introduction to Tamper Evident Devices by: Datagram (52 Minute Talk from Defcon 19) How to hack a...