Difference between revisions of "Christopher Tarnovsky"

From RECESSIM, A Reverse Engineering Community
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
=== Social Media ===
+
===Social Media===
 
Christopher has no known social media accounts but he does have a Wikipedia page.
 
Christopher has no known social media accounts but he does have a Wikipedia page.
  
 
https://en.wikipedia.org/wiki/Christopher_Tarnovsky
 
https://en.wikipedia.org/wiki/Christopher_Tarnovsky
  
==='''Biography'''===
+
===Biography===
Christopher has some early 2000's videos on youtube from Black Hat and DEFCON and then disappears until about 2019 when some newer video's appeared. His work reverse engineering and working with bare silicon is worth watching for anyone interested in this level of security analysis.
+
Christopher has some early 2000's videos on youtube from Black Hat and DEFCON and then disappears until about 2019 when some newer video's appeared. His work reverse engineering and working with bare silicon is worth watching for anyone interested in this level of reverse engineering.
  
 
He seems to be most well known for his work with DirecTV and NDS which led to legal troubles. This could be the reason he disappeared from the public for so long. Below is a connection of videos and articles.
 
He seems to be most well known for his work with DirecTV and NDS which led to legal troubles. This could be the reason he disappeared from the public for so long. Below is a connection of videos and articles.
  
==='''Links and Videos'''===
+
===Links and Videos===
  
===='''Inducing Momentary Faults Within Secure Smartcards / Microcontrollers'''====
+
====Inducing Momentary Faults Within Secure Smartcards / Microcontrollers====
 
Add Video
 
Add Video
  
 
This February 2008 Blackhat talk seems to be the first public talk given about the methods Christopher uses to reverse engineer IC's.  
 
This February 2008 Blackhat talk seems to be the first public talk given about the methods Christopher uses to reverse engineer IC's.  
  
===='''How to Reverse-Engineer a Satellite TV Smart Card'''====
+
====How to Reverse-Engineer a Satellite TV Smart Card====
 
<youtube width="320" height="240">tnY7UVyaFiQ</youtube>
 
<youtube width="320" height="240">tnY7UVyaFiQ</youtube>
  

Latest revision as of 15:17, 13 September 2020

Social Media

Christopher has no known social media accounts but he does have a Wikipedia page.

https://en.wikipedia.org/wiki/Christopher_Tarnovsky

Biography

Christopher has some early 2000's videos on youtube from Black Hat and DEFCON and then disappears until about 2019 when some newer video's appeared. His work reverse engineering and working with bare silicon is worth watching for anyone interested in this level of reverse engineering.

He seems to be most well known for his work with DirecTV and NDS which led to legal troubles. This could be the reason he disappeared from the public for so long. Below is a connection of videos and articles.

Links and Videos

Inducing Momentary Faults Within Secure Smartcards / Microcontrollers

Add Video

This February 2008 Blackhat talk seems to be the first public talk given about the methods Christopher uses to reverse engineer IC's.

How to Reverse-Engineer a Satellite TV Smart Card

This June 2008 Wired.com video and article is a brief look into Christophers lab and a very high level look at what he does to gain access to the silicon wafer.