SlideShare a Scribd company logo
1 of 14
Download to read offline
Your personal safeguard 
HackShanghai hardware hack 3rd place
What is Olert 
+ 
OlertBrooch 
wearable device mobile application
OlertBrooch 
Olert 
Necklace
How Does It Work
When in danger, throw away the 
wearable device. 
Your contacts will receive an alert 
message with your last tracked 
location. 
!
Passive Protection 
- No need to actively trigger the alert 
- The lost of connection between the devices would 
trigger the alert 
- Even when the victim is unconscious or constrained
What if…?
What if I accidentally 
trigger the alert? 
You can turn off tracking mode or designate safe 
locations where you won’t be tracked. If you 
accidentally trigger and alert, you can always enter 
your password to cancel it.
What if the attacker force 
me to enter password? 
You can enter a predesignated FALSE password. 
The alert will appear to be cancelled on your 
phone, yet a even more urgent alert will be sent to 
your contacts.
What if the attacker switch 
off or destroy my phone? 
The base station maintains a heartbeat 
connection with your phone, it would 
automatically send the alert when your 
phone is accidentally switched off
Protect each other 
- Add contact people directly from mobile phone contact 
list. 
- You can have a network of closest family and friends 
that would protect each other.
Olert Team 
from PKU, NTU, OsakaU

More Related Content

Similar to Olert_HackShanghai hardware hack 3rd place! (8)

Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
AMMU
AMMUAMMU
AMMU
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Womens safety Management
Womens safety Management Womens safety Management
Womens safety Management
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
Need For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyNeed For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian society
 
Lostdroid Control
Lostdroid ControlLostdroid Control
Lostdroid Control
 

Recently uploaded

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Olert_HackShanghai hardware hack 3rd place!

  • 1. Your personal safeguard HackShanghai hardware hack 3rd place
  • 2. What is Olert + OlertBrooch wearable device mobile application
  • 4. How Does It Work
  • 5. When in danger, throw away the wearable device. Your contacts will receive an alert message with your last tracked location. !
  • 6. Passive Protection - No need to actively trigger the alert - The lost of connection between the devices would trigger the alert - Even when the victim is unconscious or constrained
  • 8. What if I accidentally trigger the alert? You can turn off tracking mode or designate safe locations where you won’t be tracked. If you accidentally trigger and alert, you can always enter your password to cancel it.
  • 9.
  • 10. What if the attacker force me to enter password? You can enter a predesignated FALSE password. The alert will appear to be cancelled on your phone, yet a even more urgent alert will be sent to your contacts.
  • 11. What if the attacker switch off or destroy my phone? The base station maintains a heartbeat connection with your phone, it would automatically send the alert when your phone is accidentally switched off
  • 12. Protect each other - Add contact people directly from mobile phone contact list. - You can have a network of closest family and friends that would protect each other.
  • 13.
  • 14. Olert Team from PKU, NTU, OsakaU