The Power of Chinese Security

DEF CON 18

Presented by: Jake Appelbaum, Anthony Lai (Darkfloyd), Jon Oberheide
Date: Saturday July 31, 2010
Time: 13:00 - 13:50
Location: Royale 1
Track: Track 2

If you visit China, I am sure you would like the Great Wall, however, if you surf the Internet in China, I am sure you hate the Great FireWall (GFW). How a firewall could "serve" over 3.8 billion Internet users in China is a readily interesting story for the globe.

In the presentation and seminar, we will quote case studies and discussions from various forums in China about how Internet censorship impacts them. In addition, we will present technical aspects and diagnosis on how censorship could be achieved on the Internet, content filtering software and instant messenger. Moreover, some tools/software (China or non-China made) used to bypass Internet and content censorship.

This presentation is suitable to those would like to do business/tours in China.

Anthony Lai

For Anthony's technical and working experience, he likes reverse engineering, exploitation, malware analysis and penetration test as well as studying the attack, he has started BLACKHAT and DEFCON experience from 2007, Anthony starts and organized research group on reverse engineering , malware analysis and forensic in Hong Kong, connecting various security researchers and team in the globe; Anthony is one of those quite concerning about security issues and impact on our Chinese fellows in China, he believes as he comes from Hong Kong, it would be "advantageous" for him to discuss about it openly, he has presented reverse engineering dissection over Green Dam, which is a content filtering software, in Hong Kong, which is widely reported by International and China media.

Jake Appelbaum

Jake Appelbaum (aka ioerror) is an accomplished photographer, software hacker and world traveler. He works as a developer for The Tor Project and trains interested parties globally on how to effectively use and contribute to the Tor network. He is a founding member of the hacklab Noisebridge in San Francisco where he indulges his interests in magnetics, cryptography and consensus based governance. He was a driving force in the team behind the creation of the Cold Boot Attacks; winning both the Pwnie for Most Innovative Research award and the Usenix Security best student paper award in 2008. Additionally, he was part of the MD5 Collisions Inc. team that created a rogue CA certificate by using a cluster of 200 PS3s funded by the Swiss taxpayers. He is also an ethics enthusiast, a former pornographer and proud Vegan.

Jon Oberheide

Jon Oberheide is currently at Scio Security, a security startup founded by Dug Song and himself. He is also wrapping up his PhD thesis at the University of Michigan, where he previously received a BS and MS in Computer Science. Jon has a passion for all things related to security, whether physical, code, or network. In his free time, he picks locks, audits code, analyzes protocols, writes exploits, and patches holes. He believes in monkeys.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats