Changes

Jump to navigation Jump to search
275 bytes added ,  15:17, 13 September 2020
===Social Media===
Christopher has no known social media accounts but he does have a Wikipedia page.
https://en.wikipedia.org/wiki/Christopher_Tarnovsky
'''===Biography===Christopher has some early 2000's videos on youtube from Black Hat and DEFCON and then disappears until about 2019 when some newer video''s appeared. His work reverse engineering and working with bare silicon is worth watching for anyone interested in this level of reverse engineering.
Christopher has some early 2000's videos on youtube He seems to be most well known for his work with DirecTV and NDS which led to legal troubles. This could be the reason he disappeared from Black Hat and DEFCON and then disappears until about 2019 when some newer video's appearedthe public for so long. His work reverse engineering and working with bare silicon Below is worth watching for anyone interested in this level a connection of security analysisvideos and articles.
He seems to be most well known for his work with DirecTV ===Links and NDS which led to legal troubles. This could be the reason he disappeared from the public for so long. Below is a connection of videos and articles.Videos=== ====Inducing Momentary Faults Within Secure Smartcards / Microcontrollers====Add Video
This February 2008 Blackhat talk seems to be the first public talk given about the methods Christopher uses to reverse engineer IC'''Links'''s.
====How to Reverse-Engineer a Satellite TV Smart Card====
<youtube width="320" height="240">tnY7UVyaFiQ</youtube>
How to Reverse-Engineer a Satellite TV Smart Card - This June 2008 Wired.com video and [https://www.wired.com/2008/05/tarnovsky/ article] is a brief look into Christophers lab and a very high level look at what he does to gain access to the silicon wafer.  
<br />

Navigation menu