Security

Rule #1 at Black Hat & Defcon: Mobile devices stay in your hotel room

Above: A hint for those hacking for the Wall of Sheep

Image Credit: Meghan Kelly/VentureBeat

LAS VEGAS — Rule number one at Black Hat and Defcon is simple: Mobile devices stay in your hotel room.

“My team came to me and said, ‘I’m not bringing my phone in there.’ They’re serious. You don’t want to end up on the ‘Wall of Sheep,'” said Ghostery chief executive Scott Meyer, whose executive team is at the hacker conference.

The “Wall of Sheep” is run by a group of hackers who love highlighting attendees who who don’t practice safe computing — that is, making it easy for hackers to turn your smartphones and mobile devices out and present your data for all the world, or those at the fourteenth annual hacker fest, to see.

The “Wall of Sheep” has a motto too: “Security Awareness For the Flock.” In this case, it’s advice well taken.

“My team said there’s hackers there who, all day long, are tying to embarrass you,” he said.

Andy Kahl, Ghostery’s director of transparency, is more than in agreement with his boss.

“The rule of the game is that any exploits there are for the sake of exploiting. They do it for demo purposes, bringing it to light for the sake of safety purposes,” Kahl said.

“But we prefer to be out and away from all that,” he said.

Hacker veterans will tell you not to bring mobile devices into the conference for obvious reasons. Behind the scenes, holed up in rooms on the twentieth floor, black hatters are looking for holes and flaws in your security. Those with encryption likely fair better. But you’ve been warned.

Many attendees are turning to burner flip-phones (cheap, disposable cell phones)..

Those at the conference have grown accustomed to seeing well-dressed technology executives and suspected intelligence agents, spies really, huddling in corners with their ears pressed against $20 Kyocera DuraXT flippers.

Laptops aren’t immune, either. In fact, I’m chimping out this post from the safety of Starbucks. But Meyer said that may not be safe enough. My iPhone is turned off, sleeping near the pillow of my hotel bed. I’m rolling the dice.

“My team are using burners. And they’re connecting to the net through ethernet cables or VPNs,” Meyer said.

2 comments
Nat Reader
Nat Reader

"Those at the conference have grown accustomed to seeing well-dressed technology executives and suspected intelligence agents, spies really, huddling in corners with their ears pressed against $20 Kyocera DuraXT flippers."...again another myth at least for Defcon...the conference is full of young geeks who are smart and can teach you alot and the rest.... middle aged beer belly corporate types who were at BlackHat, got free admission and who want to party for four days wearing cargo shorts thinking they blend in.......

Nat Reader
Nat Reader

Rule #1 is a myth. I have gone to Defcon for over 10 years.....Almost every attendee at Defcon has their smart phone. This article is a little paranoid. Only noobs would do a burn flip phone....