Tag: privacy

This is the content tagged with privacy, here you can find content from the blog, projects and publications.


[CON] Digital self-defense: microphone jammers

(Only spanish version) During the pandemic there wasnt much energy to do projects and research, but JASyP 2022 has been another call to arms and getting back into the swing of things. This time, Im bringing a mic jammer.

Privacy in machine learning: a concept now more formal and tangible

(Only spanish version) Data processing involves a myriad of problems, mostly in the processing phase. In this post we will talk about the solutions offered by cryptography.

[CON] TizonaConf: Cybersecurity in industrial environments

Day by day I’m getting used to going CONS on the weekends and the ones I like the most are the ones where I can feel a friendship mood surrounding the place and where people are open to talk, hangout and share.

[CON] ¿Qué hay detrás de los mayordomos virtuales?

Last Saturday, I was invited to talk about privacy in the x1RedMásSegura congress. This event aims to teach about the dangerous part of the internet and how to prevent the risks of surfing the net.

[CON] Espías domésticos: A talk about virtual voice assistants

This weekend I went Granada to speak in JASyP (Jornadas de Anonimato, Seguridad y Privacidad) about Virtual Voice Assistants. If you are near Granada or yo are curious about security and privacy, I recommend you to contact with them.


Digital self-defense: Microphone Jammers

The more sensors around us, the less certainty of our privacy. Against spying... self-defense and against microphones... jammers. self-defense and against microphones... jammers. Would you like to know how to build a portable microphone jammer that can be worn on the wrist?

Self Sovereign Identity: Extended version

After the talk about SSID in @esLibre_, there was people asking for more. This talk doubles the slides of the last one and expand the SSID concept. Here, I talk about formative resources and the market´s momentum.

ASSAP: Anti Shoulder Surfing Attack Platform

This year I talked twice in @esLibre_. In this second talk, I exposed ASSAP (You can find it in this web´s projects section). ASSAP is an open sourced software developed to be easy to use with the objective of preventing shoulder surging attacks.

Self Sovereign Identity, identity under people´s control

This year, @inter_ferencias couldn´t celebrate its event, but the managed to stream the talks thanks to @esLibre_ congress in their own track. In this conference, I speak about SSID, a technology that gives users the possibility to store and manage their personal information in third party services.

Análisis de seguridad de asistentes virtuales

Tizona addresses the issue of cybersecurity in industrial environments. Following my usual topics, I talked about smart assistants. Right now this kind of devices are not present in this kind of places, but it isn’t uncommon thinking about a near future where people are using this type of interfaces in order to manage complex tasks in the industry.


Project Alias, privacy in virtual voice assistants

Privacy and voice assistans are not good friends. This is causing the creation of projects like Alias. This “parasites” taken control of the voice assistants helping to protect user privacy. Is this the final solution?

¿Qué hay detrás de los mayordomos virtuales?

A talk prepared to teach children about the dangers of the virtual voice assistants like Alexa or Siri and some basic concepts about privacy. This talk uses Batman`s Lego Film as metaphor.

Espías domésticos: Una charla sobre asistentes de voz virtuales

This weekend I went Granada to speak in JASyP (Jornadas de Anonimato, Seguridad y Privacidad) about Virtual Voice Assistants. If you are near Granada or yo are curious about security and privacy, I recommend you to contact with the organization behind this event, @inter_ferencias.


Introducción a los mecanismos de privacidad basados en tecnología blockchain

There are several new cryptocoins in the market. Some of them have innovative properties which could change the market. In this document, the most important alternatives has been low level analyzed.

Phreaking is alive! Abusing GSM: Covert channels using AT commands

From the '60s and '70s, the hacker community started to design tools and procedures in order to take advantage of telephone networks (such as blue boxes, phreaking, etc.). These oldschool hacking stuff is coming back with the commercialitation of cheap open hardware which establish new threats.

Desconfiando de la Autoridad, Certificate Transparency

Voice assistans are trendy and now are in our homes. These devices has a big number of possibilites and permit automatice our houses in an easy way. Althougth, it is not clear if having microphones in active listening non-stop sorounding us is worthy of it.

← All tags