Serafina Brocious

Serafina Brocious is an American software engineer best known for her work on PyMusique and her demonstration of Onity HT lock system vulnerabilities in 2012.[3][4][5]

Serafina Brocious
OccupationSoftware engineer
EmployerOptiv[1][2]
Known forPyMusique, Alky Project, The Hardware Hacker Manifesto, Onity Lock Hack

Notable projects

PyMusique

Brocious first saw recognition as founder of the PyMusique project, where she worked with Jon Lech Johansen of DeCSS fame. PyMusique allowed Linux users to purchase music from the iTunes music store without the standard FairPlay DRM implementation in place.[6]

Falling Leaf Systems

During her employment with MP3Tunes, Brocious also joined forces with Brian Thomason, then an employee of another Michael Robertson company, Linspire Inc., to form Falling Leaf Systems LLC.[7][8] Falling Leaf Systems attempted to commercialize the Alky Project, which was started by Brocious to enable Microsoft Windows games to run on other platforms.

Falling Leaf Systems sold access to a membership site dubbed the Sapling Program, whereby users could access a build of Alky allowing them to demo the game Prey on either Linux or Mac OS X. Despite attempts to expand their stack by also supporting applications on disparate platforms, Falling Leaf Systems officially closed its doors in early 2008.[9][10]

Emokit

In 2010, Brocious reverse-engineered the protocol used by the Emotiv EPOC EEG headset, publishing the AES key used for encrypting the sensor data.[11]

The Hardware Hacker Manifesto

The Hardware Hacker Manifesto was published on 21 September 2010. It gives some insight of the psychology of hardware hackers. Serafina Brocious goes into an explanation of why it is important for owners to have the right to utilize hardware the way they wish to use it.[12]

Onity lock systems

At the 2012 Black Hat Briefings, Brocious presented several vulnerabilities about the Onity HT lock system, a lock used by the majority of U.S. hotels.[13] The security hole can be exploited using about US$50 worth of hardware, and it potentially affects millions of hotel rooms.[3][14] The device was eventually optimized down to the size of a marker, and was eventually used to perform burglaries.[15]

Onity started rolling out safeguards for the problem in late 2012,[16] which was considered a slow reaction.[17] However, in 2013 it was still reported that some hotels continued to be vulnerable, likely due to the cost of the security upgrade.[18]

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.