From the course: Threat Modeling: Spoofing In Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Attacking where you are

Attacking where you are

From the course: Threat Modeling: Spoofing In Depth

Start my 1-month free trial

Attacking where you are

- The channel someone is using to communicate authentication information makes it easier or harder to engage in fakery. If someone is physically in front of me, I'm in control of my senses and probably the sensors I use to get information. It's difficult to use voice cloning, deep fakes, or other technology to impersonate. A criminal will have a harder time looking up secrets without me knowing. That said, I've been at my bank and looked up passwords and other things in front of a trained bank employee without trouble. Criminals are at higher risk of capture or arrest if their impersonation goes poorly. Where you are is also how devices like the Apple Watch unlocks a computer, with nanosecond timings to check proximity and resist relay attacks. It's useful to know that light moves about a foot per nanosecond, and os if your authentication calculation takes 20 nanoseconds to run and you accept an answer for 40 nanoseconds, then you have to be within 10 feet, right? Wrong-o. The…

Contents