2025-10-25 –, Talk 1
Webcams secretly running Linux reveal embedded system vulnerabilities, insecure firmware, and broken update mechanisms. Tracing the tech stack from distributors to chipset manufacturers exposes supply chain issues, security oversights, and risks at the hardware-software boundary. The talk includes demos and highlights the need for transparency and responsibility.
Hackers
This talk was presented at DEFCON, a link to the video is here:
https://drive.google.com/file/d/1-WCn2r5TLD2L9waDJggugB-DtkebX04Z/view?usp=sharing
Mickey has been involved in security research for over a decade, specializing in breaking down
complex concepts and identifying security vulnerabilities in unusual places. His experience spans a
variety of topics, which he has presented at security conferences worldwide. His talks have covered
areas ranging from web penetration testing to the intricacies of BIOS firmware.
Jesse is an experienced security researcher focused on vulnerability detection and mitigation
who has worked at all layers of modern computing environments from exploiting worldwide
corporate network infrastructure down to hunting vulnerabilities inside processors at the
hardware design level. His primary areas of expertise include reverse engineering embedded
firmware and exploit development. He has also presented research at DEF CON, Black Hat,
PacSec, Hackito Ergo Sum, Ekoparty, and BSides Portland.