A look at tricks and techniques used for mobile device and application assessments used over the past five years (from dumb phones to smart phones) and some wild speculation on where things are headed in the mobile security consulting space. From seem editing Razr phones to rooting Androids. From DUN tethering setups to secure element shims. A talk about what trends we’re likely to see repeated and tips for assessing mobile devices not yet developed.