Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

if AI wants to be useful, it can read the build instructions of a github readme and tell me which seventeen packages the author forgot to mention I need to install first

4
2
0
repeated

Losing my mind at this. Google says that cellsite simulators are being used to send SMS spam.

https://security.googleblog.com/2024/08/keeping-your-android-device-safe-from.html

4
3
0
repeated

We had a lot of fun handing out our first-ever Awards. If you couldn't be there, we've updated our blog with all the winners. Check it out at https://www.zerodayinitiative.com/blog/2024/8/1/introducing-the-vanguard-awards

0
3
0
repeated

Looks like we shipped Firefox 129 last week, where the address bar is defaulting to use HTTPS (and falls back to HTTP if it doesn't work). Kudos to the team for shipping! 😀 It's nice to see something happen so smoothly when on vacation

1
1
1
repeated
repeated

Huh, with the new IDAlib headless mode in @HexRaysSA IDA 9.0, can get rid of the visible second IDA instance. Need to play around with this more.

0
1
0
Wrote BASIC on original C64 and BBC Micro and felt the blessing of the Omnissiah wash over me. 😊

Tried to browse webapps on Android and felt like smashing the fucking phone into the sea.🤽
0
3
6
repeated

Step aside, devs. The Infosec Wizards are coming.

https://www.theregister.com/2024/08/09/marlinspike/

0
2
0
repeated

I very much enjoyed this talk by @thegrugq While there are many issues here worth discussing like systems' perception of the world or why is it not so easy to predict how system will fail, I particularly liked discussion on impact of policy decision.

Too often I have heard arguments how certain technical solution can overcome/solve particular issues and make them "policy-proof". In reality scope of influence available to both state and private actors, makes policy way more important factor determining outcome. You can't out-obfuscate your way out of telemetry available to major tech companies or out-encrypt government level targeted surveillance.

https://www.youtube.com/watch?v=P6PnhDfWvx0

0
2
0
repeated

excited to see my janky code being put to good use for jailbreaking flagship smartphones such as the "vtech kidizoom snap touch"

https://bird.makeup/@rdjgr/1818367871086686432

0
2
0
Time-travel Testing of Android Apps

https://mboehme.github.io/paper/ICSE20.TTT.pdf
0
0
1
Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap – BlackHat USA 2024 Whitepaper [PDF]

https://www.nccgroup.com/media/uzbp3ttw/bhus24_sonos_whitepaper.pdf
0
4
4
repeated

Interesting paper - A Verification Methodology for the Arm® Confidential Computing Architecture: From a Secure Specification to Safe Implementations https://dl.acm.org/doi/abs/10.1145/3586040

0
1
0
repeated

As a Blind person i never thought i would be on social media savoring photos. But the communal Mastodon alt text game is so strong that sweet, poetic or silly descriptions abound on my timeline. Thanks to legions of people who take time to write a meaningful description of the ephemera they post, i learn so much about insects, plants, buildings, memes — all dispatches from a dimension of the world that i otherwise wouldn't experience. If you're wondering whether anybody reads these things: YES.

9
66
3
repeated

🧵 Saturday reversing thread: I was going to wait until the full release, but since the beta seems to have become more-public-than-intended, let’s look at how the official “IDA as a library” works in IDA Pro 9.0…

1
4
0
repeated
repeated

Happy Zero Cool Day

0
9
0
repeated

One question regarding and : Can I legally make a video showing cuts of videos from multiple news sources? Like, say, I show some ~5 seconds from a video in CNN, then another one from BBC, then another one from a Chinese outlet, etc...

PS: The music & video will be free. Most likely Public Domain.

2
1
0
repeated

Yeah, all decompilers included. Very good day for the RE "community" :PPPPPPPP

Nice addition to my IDA leak collection :-)))))))))

1
1
0
Edited 11 months ago

Tech Analysis: CrowdStrike’s Kernel Access and Security Architecture

https://www.crowdstrike.com/blog/tech-analysis-kernel-access-security-architecture/

Interesting explainer about the architectural design decisions of #CrowdStrike, focusing mainly on the reasons for moving code to the kernel.

I find it curious that they talk about “User-Mode-Only Security Products” in the context of tamper protection: AV’s tend to have kernel components and if my observations at the time were correct they provided protection for user processes even before PPL. I’m not Ionescu enough to know if such protections would work with KPP&co though…

0
1
4
Show older