New: enable viewer-created translations and captions on your YouTube channel!
Use the following code to embed this video. See our usage guide for more details on embedding.
Paste this in your document somewhere (closest to the closing body tag is preferable):
Paste this inside your HTML body, where you want to include the widget:
<div class="amara-embed" data-url="http://www.youtube.com/watch?v=ccbwtrrB4lk" data-team="null"></div>
On Fitbit Firmware Modifications and Data Extraction
Security architectures for wearables are challenging. We take a deeper look into the widely-used Fitbit fitness trackers. The Fitbit ecosystem is interesting to analyze, because Fitbit employs security measures such as end-to-end encryption and authentication to protect user data (and the Fitbit business model). Even though this goes beyond security mechanisms offered by other fitness tracker vendors, reverse-engineering the trackers enables us to launch practical attacks against Fitbit. In our talk, we demonstrate new attacks including wireless malware flashing on trackers as well as “unlocking” the trackers to work independent from the Fitbit cloud.