If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
The tablet PC contains a similar watermarking mechanism that can be used to track and prevent the distribution of unwanted media files in a more advanced and effective way. In addition, Woolim contains a remarkable hardening and jails the user to protect the integrity of the system. The tablet itself and the Apps that are preinstalled provide a rare insight into DPRK’s development in the IT sector. We will lift the fog on the internals of Woolim and provide a deep dive into the internals of the tablet PC.
Over the past years DPRK released several different tablet PCs. This talk will focus on what seems to be the latest device called Woolim (울림), which is the Korean word for „echo“. It was build in late 2015 and the device is an outstanding piece of technology designed to jail users to predefined functionality and track the user's behavior.
We will start by giving an introduction to the hardware specifications of the tablet. The device is equipped with a wide variety of applications. Users are able to read and create documents, watch movies, visit websites and play games. There are also a bunch of dictionaries on the device. We will give an introduction to the most interesting applications and features of the tablet.
The applications that come with Woolim give a rare insight into how technology is used and distributed in DPRK. All of the applications on Woolim have been touched by DPRK, even games like Angry Birds have been modified. The features implemented to jail the user and protect the integrity of the system will also be in focus for this talk.
We have published a detailed analysis of a watermarking mechanism in DPRK’s Red Star OS last year, speculating that the code in Red Star OS already contains some preparations for a far more sophisticated watermarking mechanism. We have identified such advanced mechanisms in Woolim and will give a technical insight on how they prevent distribution of unwanted media more effectively.
DPRK continues to develop surveillance technology that is hidden inside consumer hardware. It’s goal seems to be to enable total control of it’s users in terms of tracking the distribution of media files and preventing unwanted information in the DPRK ecosystem. Implementing such features into smartphones or tablet PCs like Woolim allows even more effective surveillance of DPRK citizens. Therefore, we will try to shed some light on the privacy invading features of Woolim.