logo FEDIDEVS

39c3 2025

Day 1 (508) Jared Naude (42)

The proposed solution to provide a workaround uses existing maritime systems like VDES transmitters and IALA MF Beacons. The aim to provide backup time, navigation and positioning data. This solution is aimed at detecting GNSS jamming and spoofing.

1 1 1

The team has been doing testing with Germany, Poland, Denmark, Poland, Norway, Sweden and Finland using a testbed where a jammer showed up.

1 1 1

The censorship system uses TCP resets but also relies on DNS injection which will respond with bogus IP addresses. You can send DNS requests to the great firewall outside of China to see how the system responds.

1 1 1

The researches found that the responses were dumping memory. This wallbleed query could return 124 bytes of memory. This vulnerability was patched in 2023.

0 0 1

By using wallbleed, the researchers were able to find what people were browsing. Some interesting patterns emerged and also allowed to them to see what changes were being made on the great firewall.

0 0 1

A Tale of Two Leaks: How Hackers Breached the Great Firewall of China by Jade Sheffey
🧵

7 4 1

Who cares about the Baltic Jammer? – Terrestrial Navigation in the Baltic Sea Region by Lars, Niklas and Markus 🧵

3 0 1

GPS Jamming is a common issue around eastern Europe and presents a significant issue as airplanes and ships depending on this for navigation.

1 1 1

Jamming these signals are quite easy using commonly available SDR devices. Research has shown that it is not only jamming that is happening but also GPS spoofing as well. The jamming and spoofing is happening from different devices and different origins and the interference is coming from Russia.

1 0 1

To sign or not to sign: Practical vulnerabilities in GPG & friends by 49016 & Liam 🧵

4 0 1