Cody Brocious
   HOME

TheInfoList



OR:

Serafina Brocious (born Cody Brocious) is an American software engineer best known for her work on
PyMusique SharpMusique was a rewrite in C# of PyMusique (written in Python), both programs were iTunes Music Store clients, allowing songs to be downloaded from the iTunes Music Store without DRM. PyMusique PyMusique was written by Travis Watkins, Cody B ...
and her demonstration of Onity HT lock system vulnerabilities in 2012.


Notable projects


PyMusique

Brocious first saw recognition as founder of the
PyMusique SharpMusique was a rewrite in C# of PyMusique (written in Python), both programs were iTunes Music Store clients, allowing songs to be downloaded from the iTunes Music Store without DRM. PyMusique PyMusique was written by Travis Watkins, Cody B ...
project, where she worked with
Jon Lech Johansen Jon Lech Johansen (born November 18, 1983 in Harstad, Norway), also known as DVD Jon, is a Norwegian programmer who has worked on reverse engineering data formats. He wrote the DeCSS software, which decodes the Content Scramble System used for ...
of
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
fame. PyMusique allowed
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
users to purchase music from the
iTunes iTunes () is a software program that acts as a media player, media library, mobile device management utility, and the client app for the iTunes Store. Developed by Apple Inc., it is used to purchase, play, download, and organize digital mul ...
music store without the standard
FairPlay FairPlay is a digital rights management (DRM) technology developed by Apple Inc. It is built into the MPEG-4 Part 14, MP4 multimedia file format as an encrypted Advanced Audio Coding, AAC audio layer, and was used until April 2009 by the company ...
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement militai ...
implementation in place.


Falling Leaf Systems

During her employment with MP3Tunes, Brocious also joined forces with Brian Thomason, then an employee of another Michael Robertson company,
Linspire Linspire (formerly Lindows) is a commercial operating system based on Debian and Ubuntu and currently owned by PC/OpenSystems LLC. It had been owned by Linspire. Inc. from 2001 to 2008, and then by Xandros from 2008 to 2017. On July 1, 2008, Li ...
Inc., to form Falling Leaf Systems LLC. Falling Leaf Systems attempted to commercialize the Alky Project, which was started by Brocious to enable
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
games to run on other platforms. Falling Leaf Systems sold access to a membership site dubbed the Sapling Program, whereby users could access a build of Alky allowing them to demo the game
Prey Predation is a biological interaction where one organism, the predator, kills and eats another organism, its prey. It is one of a family of common feeding behaviours that includes parasitism and micropredation (which usually do not kill the ...
on either Linux or
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
. Despite attempts to expand their stack by also supporting applications on disparate platforms, Falling Leaf Systems officially closed its doors in early 2008.


Emokit

In 2010, Brocious reverse-engineered the protocol used by the
Emotiv EPOC Emotiv Systems is an Australian electronics innovation company developing technologies to evolve human computer interaction incorporating non-conscious cues into the human-computer dialog to emulate human to human interaction. Developing brainâ ...
EEG headset, publishing the AES key used for encrypting the sensor data.


The Hardware Hacker Manifesto

The Hardware Hacker Manifesto was published on 21 September 2010. It gives some insight of the
psychology Psychology is the scientific study of mind and behavior. Psychology includes the study of conscious and unconscious phenomena, including feelings and thoughts. It is an academic discipline of immense scope, crossing the boundaries betwe ...
of
hardware hacker The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to a ...
s. Serafina Brocious goes into an explanation of why it is important for owners to have the right to utilize hardware the way they wish to use it.


Onity lock systems

At the 2012
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a ...
, Brocious presented several vulnerabilities about the Onity HT lock system, a lock used by the majority of U.S. hotels. The security hole can be exploited using about worth of hardware, and it potentially affects millions of hotel rooms. forbes.com – Hacker will expose potential security flaw in more than four million hotel room keycard locks
2012-07-23
extremetech.com – Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontroller
2012-07-25
The device was eventually optimized down to the size of a marker, and was eventually used to perform burglaries. Onity started rolling out safeguards for the problem in late 2012, which was considered a slow reaction. However, in 2013 it was still reported that some hotels continued to be vulnerable, likely due to the cost of the security upgrade.


References

{{DEFAULTSORT:Brocious, Serafina 1988 births Living people People from Waukegan, Illinois American software engineers Demosceners People from Chambersburg, Pennsylvania Engineers from Pennsylvania Engineers from Illinois