back to agenda
on this page
Morse Codes threats: How hackers can gain access to confidential data through morse codes
- 15:00
- Wed
- 15 Nov
Stage:
Briefing Stage 1
Format:
Session
Presenter:
In this session, I'll be presenting the history of Morse Codes for a better understanding of how it works, its inventions, use, pros, and cons. Then, I'll be demonstrating how hackers can take advantage of a person using Morse Codes for communication to gain overall access to his/her confidential data or systems. This will be important and essential for people with modern technologies who still use morse codes for encryption and also used in ATIS (Automatic Transmitter Identification Systems) for analog satellites.
Presenter: