Video Spotlight: Defcon 32 Talk on Using OCR to Find Stolen & Prototype Devices For Sale

AI Summary Below:

ONE SENTENCE SUMMARY:
Researcher reveals how sensitive corporate hardware like prototypes and employee devices frequently end up on secondary markets with recoverable data.

MAIN POINTS:

  1. Built automated system to scan eBay and Chinese marketplace Xianyu for rogue hardware listings
  2. Used iPhone OCR array to scan 250+ million images for identifying markers
  3. Bypassed marketplace rate limits using Cloudflare workers and IPv6 address space
  4. Recovered sensitive Apple data from “destroyed” Foxconn hard drive bought for $28
  5. Found prototype iPhones with special debug capabilities selling as “broken” devices
  6. Employee laptops frequently appear unlocked with sensitive corporate data intact
  7. Retrieved Apple Time Capsule containing internal credentials and confidential documents
  8. E-waste recycling centers often resell devices instead of destroying them
  9. Sellers sometimes unknowingly list valuable prototypes as broken regular devices
  10. Research revealed major hardware supply chain security issues across companies

TAKEAWAYS:

  1. Corporate hardware frequently leaks sensitive data through secondary markets
  2. Standard security measures often fail with custom/specialized hardware
  3. Physical destruction methods aren’t always effective at protecting data
  4. Supply chain complexity makes hardware security extremely challenging
  5. E-waste management requires better oversight to prevent unauthorized resale