Top Banner
1 What’s Next..? Aakar Gupte Ahmedabad Technology with Humans
12
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Whats next?

1  

What’s  Next..?    

Aakar  Gupte  Ahmedabad  

Technology  with  Humans  

Page 2: Whats next?

2  

AGENDA    

What  is  it?  

How  it  Works?  

Threats  

Data  Leaks  

Helpful  to  Society  

Page 3: Whats next?

3  

What  is  it?  

3D  Motion  Sensor  and  a  barometric  pressure  sensor  

It  relies  on  a  PAN  

ANT  protocol  is  used  for  communication  

Unique  ID,  Tracker  Public  ID  

Page 4: Whats next?

4  

How  it  works  

Data  Conversion  

The  Base  

The  Web  server  

Tracker-­‐to-­‐Base  

Page 5: Whats next?

5  

Working..  

TRACKER BASE FITBIT SERVER

SIGNAL  

Estab.  Link  Base  and  Tracker  Info  

Tracker  ID  and  Op  Code  Tracker  ID  and  Op  Code  

Tracker  ID,  proNile  and  tracker  

Fitness  Data  Write  –  Update    

Close  Sleep  (15min  for  nxt  signal)  

Page 6: Whats next?

6  

Threats  

HTTP  is  used  for  communication  

Lack  of  Encryption  

Man-­‐In-­‐Middle  Attack  

Bluetooth  Attacks  

Page 7: Whats next?

7  

Bluetooth  A=acks  

SNIFFER

UBERTOOTH

IOS ANDROID

Page 8: Whats next?

8  

DATA  LEAKS  

Page 9: Whats next?

9  

QA’s  Catch  It  !!  

No  Updates  

Reverse  Engineering  

Local  Data  Storage  

Sync  over  Bluetooth  

Page 10: Whats next?

10  

BENEFITS  

Challenges    among    friends  

Company  can  encourage  employees  

Helpful  for  Doctors  

Page 11: Whats next?

11  

FUTURE    

Animals  

Track  Humans  

Page 12: Whats next?

12  

Thank  You  

       

Let’s  Test  it  a  HEALTHY  WAY….!!!