12-29, 17:00–18:00 (Europe/Berlin), c-base mainhall
Trading of zero day vulnerabilities is still possible and common.
But what does that mean for their judicial admissibility? Can the analysis results of the phone's data be used in court if vulnerabilities for the device are available at Zero day vendors?
From a technical perspective the integrity of data on a device can not be trusted if 1. there are known vulnerabilities to a device and 2. an attacker is assumed that is capable of covering their tracks after gaining full system access
The more is known about the internals of a device, the easier it is to detect traces of manual changes of data and configuration on the device.
But how does that look like with smartphones? Should data extracted from there be admitted in court?
In this talk I first give some fundamentals of smartphone forensics, zero day markets and smartphone security to then analyze what this means for the admissibility of smartphones evidence in courts.
Some music with Systemabsturz, some privacy advocacy with CCC, some IT security for activists and some smartphone forensics.
Future updates on IT security for activism things will be posted here: https://chaos.social/@schluevik