Satellite Communication without Privacy
نویسنده
چکیده
In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly income facts, mail content etc.) as well as to hijack the user’s web identities (e.g., online auction accounts). Many users do not seem to know or to care that broadcasted data can be easily intercepted; moreover even commercial users let high confidential customer related data (e.g. tender calculation details, negotiations with military customers) be sent unsecured via broadcast channels.
منابع مشابه
Satellite Communication without Privacy - Attacker's Paradise
In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly inco...
متن کاملRadio Frequency Identification (RFID): Privacy and Security
Despite its long history, Radio Frequency Identification (RFID) is considered as one of the most promising wireless technology in future ubiquitous computing environments. However, it’s a very different form of technology than today’s other wireless dominants such as cellular, satellite, and wireless computer networks. In short, RFID is a contactless, automatic, ultra-light, super-cheap, and ex...
متن کاملEavesdropping on Satellite Telecommunication Systems
While communication infrastructures rapidly intertwine with our daily lives, public understanding of underlying technologies and privacy implications is often limited by their closed-source nature. Lacking the funding and resources of corporations and the intelligence community, developing and expanding this understanding is a sometimes tedious, but nonetheless important process. In this sense,...
متن کاملCED2: Communication Efficient Disjointness Decision
Enforcing security often requires the two legitimate parties of a communication to determine whether they share a secret, without disclosing information (e.g. the shared secret itself, or just the existence of such a secret) to third parties—or even to the other party, if it is not the legitimate party but an adversary pretending to impersonate the legitimate one. In this paper, we propose CED ...
متن کاملSMS Advertising and Consumer Privacy: Analysis of Factors Affecting Consumer Willingness to send and Receive Information in Permission and Data based SMS advertising
The increasing penetration rate of mobile phone, with specific characteristics of this medium, such as almost everywhere with the audience, has attracted companies' attention to it as an advertising channel. Mobile devices facilitate highly customized marketing communication in terms of person, time location and context so numbers of companies that use this medium for communicating with their c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006