SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Security                                    eBooks




      Client
   Anatomy and
   Identification
    Security Inside the Client –
               Part 1



Steven Davis
                                   steve@free2secure.com
Games, iGaming, and Gambling             +1.650.278.7416
Security                                  eBooks



                               Most Useless
                                 Security
                                 Axiom:



                               You Can’t Secure
                                  the Client


                                 steve@free2secure.com
Games, iGaming, and Gambling           +1.650.278.7416
Security                                eBooks



  … but you need the
Client to be part of your
        security…



                                   so, how do
                                   you build a
                                       secure
                                  system with
                                    unsecure
                                components?

                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                 eBooks

                               • Security
                                 decisions are
                                 built on different
                                 forms of identity
                                  –   Service account
                                  –   Person
                                  –   Platform
                                  –   Payment account
                                  –   Email




   Uniqueness and Identity

                                steve@free2secure.com
Games, iGaming, and Gambling          +1.650.278.7416
Security                                eBooks


  REMEMBER: People are not Accounts




                Neither are
                Computers

                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                           eBooks


                       Identity and Uniqueness are
                              Tenuous Online




       •     Online Identity is simply pieces of data presented over a
             network
       •     The connection between the data and the underlying entity is
             weak
       •     Bits are bits

                                                          steve@free2secure.com
Games, iGaming, and Gambling                                    +1.650.278.7416
Security                                        eBooks

                   Client Components
  • Computer (tablet, cell
    phone)
     – Hardware Components
  • (Game) Application
     – Program
     – Persistent Data
     – State & Session Information
  • Operating System
  • Other Programs
  • Other Data


                                       steve@free2secure.com
Games, iGaming, and Gambling                 +1.650.278.7416
Security                                                            eBooks

                                Device Fingerprinting

                                                                              ord
                                                                        g   aw
                                                                   tr on
                                                                 os
                                                         a   r to
                                                g is f
                                         n   tin
                                    r pri
                                  ge
                               Fin
   • Collection of a large number of hardware and software
     identities to create a “fingerprint”
   • getXXXXID() is just a program that can be spoofed
   • Better as a “white list” than a “black list”… maybe
   • Questionable in a world of active adversaries
                                                     steve@free2secure.com
Games, iGaming, and Gambling                               +1.650.278.7416
Security                                                   eBooks

                       Basic Identity Toolkit

   Multiple platform identity sources
       Hardware                                 Extracted
       Platform Serial Number
       Other Applications


   Player Identity Information                  Input


   Stored Application Data                      Stored


   Registration Keys                            Input Once


   Hashes & Splits & Passwords                  Tools


                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                                        eBooks


        Registering a Platform
   1.   Collect Platform ID
        information                                            License Key
                               Local IDs         Local Data
   2.   Server Seed or Local
        Seed (optional)
   3.   Hash (optional)                                       Seed (optional)
   4.   Split (optional)
   5.   Build Platform ID
   6.   Build Platform             Platform ID
        Authentication Data
   7.   Store Locally
                               Platform Authentication Data
   8.   Exchange with Server
                                                                    Local
                                                                    Split



                                                      steve@free2secure.com
Games, iGaming, and Gambling                                +1.650.278.7416
Security                                               eBooks

     Essential Platform Identification & Authentication



   • Retrieve Platform ID
   • Reconstruct or Retrieve Platform Authentication Data
   • Verify (Locally or Remotely)


               Verification can be bypassed,
             spoofed, etc., of course, as can IDs
                  and authentication data
                                              steve@free2secure.com
Games, iGaming, and Gambling                        +1.650.278.7416
Security                                          eBooks

 Security Tokens




• Can be effective
• Identify themselves, not
  people                       • Need to be linked with
                                 platform identity
• Only as strong as
  registration process         • PART of a security
                                 solution – a Node of trust,
                                 not a trusted system

                                         steve@free2secure.com
Games, iGaming, and Gambling                   +1.650.278.7416
Security                                                          eBooks

   Platform Identity is “Polite” Identity
                               •   Useful, if you understand its
                                   limitations
                               •   Can be used for basic fraud detection
                                   and white listing
                               •   Black listing limited by virtualization
                                   and effort of foes
                               •   Challenge – Design Your System
                                   using weak identity
                               •   Do you need identity at all?
                                    – Gratuitous Strong Passwords
                               •   Use external channels for positive
                                   identification



                                                         steve@free2secure.com
Games, iGaming, and Gambling                                   +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
       – I have worked on everything from
         online games and satellite TV to
         Nuclear Command and Control and
         military communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”

  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/
       – Join me there, ask questions, challenge assumptions, let’s make things
         better

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

Weitere ähnliche Inhalte

Ähnlich wie Protect Your Client Software and Identification Security

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)Siddick Elaheebocus
 
Fight Game Cheating the Easy Way
Fight Game Cheating the Easy WayFight Game Cheating the Easy Way
Fight Game Cheating the Easy WaySteven Davis
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationOKsystem
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?ESET
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 

Ähnlich wie Protect Your Client Software and Identification Security (20)

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
 
Fight Game Cheating the Easy Way
Fight Game Cheating the Easy WayFight Game Cheating the Easy Way
Fight Game Cheating the Easy Way
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
IriScript biocryptoverifier
IriScript biocryptoverifierIriScript biocryptoverifier
IriScript biocryptoverifier
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 

Kürzlich hochgeladen

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Kürzlich hochgeladen (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Protect Your Client Software and Identification Security

  • 1. Security eBooks Client Anatomy and Identification Security Inside the Client – Part 1 Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Most Useless Security Axiom: You Can’t Secure the Client steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks … but you need the Client to be part of your security… so, how do you build a secure system with unsecure components? steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks • Security decisions are built on different forms of identity – Service account – Person – Platform – Payment account – Email Uniqueness and Identity steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks REMEMBER: People are not Accounts Neither are Computers steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks Identity and Uniqueness are Tenuous Online • Online Identity is simply pieces of data presented over a network • The connection between the data and the underlying entity is weak • Bits are bits steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Client Components • Computer (tablet, cell phone) – Hardware Components • (Game) Application – Program – Persistent Data – State & Session Information • Operating System • Other Programs • Other Data steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Device Fingerprinting ord g aw tr on os a r to g is f n tin r pri ge Fin • Collection of a large number of hardware and software identities to create a “fingerprint” • getXXXXID() is just a program that can be spoofed • Better as a “white list” than a “black list”… maybe • Questionable in a world of active adversaries steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Basic Identity Toolkit Multiple platform identity sources Hardware Extracted Platform Serial Number Other Applications Player Identity Information Input Stored Application Data Stored Registration Keys Input Once Hashes & Splits & Passwords Tools steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Registering a Platform 1. Collect Platform ID information License Key Local IDs Local Data 2. Server Seed or Local Seed (optional) 3. Hash (optional) Seed (optional) 4. Split (optional) 5. Build Platform ID 6. Build Platform Platform ID Authentication Data 7. Store Locally Platform Authentication Data 8. Exchange with Server Local Split steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks Essential Platform Identification & Authentication • Retrieve Platform ID • Reconstruct or Retrieve Platform Authentication Data • Verify (Locally or Remotely) Verification can be bypassed, spoofed, etc., of course, as can IDs and authentication data steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks Security Tokens • Can be effective • Identify themselves, not people • Need to be linked with platform identity • Only as strong as registration process • PART of a security solution – a Node of trust, not a trusted system steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 13. Security eBooks Platform Identity is “Polite” Identity • Useful, if you understand its limitations • Can be used for basic fraud detection and white listing • Black listing limited by virtualization and effort of foes • Challenge – Design Your System using weak identity • Do you need identity at all? – Gratuitous Strong Passwords • Use external channels for positive identification steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 14. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 15. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise – I have worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ – Join me there, ask questions, challenge assumptions, let’s make things better steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Hinweis der Redaktion

  1. http://www.mdgadvertising.com/blog/wp-content/uploads/2011/03/blog-device_fingerprinting.jpg http://docs.oracle.com/cd/E12057_01/doc.1014/e12054/img/fngrprt.gif
  2. http://upload.wikimedia.org/wikipedia/commons/thumb/d/db/SecurityTokens.CryptoCard.agr.jpg/800px-SecurityTokens.CryptoCard.agr.jpg