HOME

TheInfoList



OR:

Serafina Brocious (born Cody Brocious) is an American software engineer best known for her work on PyMusique and her demonstration of Onity HT lock system vulnerabilities in 2012.


Notable projects


PyMusique

Brocious first saw recognition as founder of the PyMusique project, where she worked with
Jon Lech Johansen Jon Lech Johansen (born November 18, 1983 in Harstad, Norway), also known as DVD Jon, is a Norwegian programmer who has worked on reverse engineering data formats. He wrote the DeCSS software, which decodes the Content Scramble System used for ...
of
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as BSD and Linux) could not play encrypted video DVDs. ...
fame. PyMusique allowed
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
users to purchase music from the iTunes music store without the standard
FairPlay FairPlay is a digital rights management (DRM) technology developed by Apple Inc. It is built into the MP4 multimedia file format as an encrypted AAC audio layer, and was used until April 2009 by the company to protect copyrighted works sold thr ...
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement militai ...
implementation in place.


Falling Leaf Systems

During her employment with MP3Tunes, Brocious also joined forces with
Brian Thomason Brian (sometimes spelled Bryan in English) is a male given name of Irish and Breton origin, as well as a surname of Occitan origin. It is common in the English-speaking world. It is possible that the name is derived from an Old Celtic word mean ...
, then an employee of another Michael Robertson company,
Linspire Linspire (formerly Lindows) is a commercial operating system based on Debian and Ubuntu and currently owned by PC/OpenSystems LLC. It had been owned by Linspire. Inc. from 2001 to 2008, and then by Xandros from 2008 to 2017. On July 1, 2008, Li ...
Inc., to form
Falling Leaf Systems Falling or fallin' may refer to: * Falling (physics), movement due to gravity * Falling (accident) *Falling (execution) * Falling (sensation) People *Christine Falling (born 1963), American serial killer who murdered six children Books * ''Fa ...
LLC. Falling Leaf Systems attempted to commercialize the Alky Project, which was started by Brocious to enable Microsoft Windows games to run on other platforms. Falling Leaf Systems sold access to a membership site dubbed the Sapling Program, whereby users could access a build of Alky allowing them to demo the game
Prey Predation is a biological interaction where one organism, the predator, kills and eats another organism, its prey. It is one of a family of common feeding behaviours that includes parasitism and micropredation (which usually do not kill the ...
on either Linux or
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
. Despite attempts to expand their stack by also supporting applications on disparate platforms, Falling Leaf Systems officially closed its doors in early 2008.


Emokit

In 2010, Brocious reverse-engineered the protocol used by the Emotiv EPOC EEG headset, publishing the AES key used for encrypting the sensor data.


The Hardware Hacker Manifesto

The Hardware Hacker Manifesto was published on 21 September 2010. It gives some insight of the
psychology Psychology is the scientific study of mind and behavior. Psychology includes the study of conscious and unconscious phenomena, including feelings and thoughts. It is an academic discipline of immense scope, crossing the boundaries betwe ...
of hardware hackers. Serafina Brocious goes into an explanation of why it is important for owners to have the right to utilize hardware the way they wish to use it.


Onity lock systems

At the 2012
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together ...
, Brocious presented several vulnerabilities about the Onity HT lock system, a lock used by the majority of U.S. hotels. The security hole can be exploited using about worth of hardware, and it potentially affects millions of hotel rooms. forbes.com – Hacker will expose potential security flaw in more than four million hotel room keycard locks
2012-07-23
extremetech.com – Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontroller
2012-07-25
The device was eventually optimized down to the size of a
marker The term Marker may refer to: Common uses * Marker (linguistics), a morpheme that indicates some grammatical function * Marker (telecommunications), a special-purpose computer * Boundary marker, an object that identifies a land boundary * Marke ...
, and was eventually used to perform burglaries. Onity started rolling out safeguards for the problem in late 2012, which was considered a slow reaction. However, in 2013 it was still reported that some hotels continued to be vulnerable, likely due to the cost of the security upgrade.


References

{{DEFAULTSORT:Brocious, Serafina 1988 births Living people People from Waukegan, Illinois American software engineers Demosceners People from Chambersburg, Pennsylvania Engineers from Pennsylvania Engineers from Illinois