ac

@Andreas_Ch_

we can not solve our problems with the same thinking we use when we created them.

127.0.0.1
Vrijeme pridruživanja: listopad 2012.

Tweetovi

Blokirali ste korisnika/cu @Andreas_Ch_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Andreas_Ch_

  1. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    What I'm thinking reading this sad story of crit remote vuln introduced into all LTS kernels and still unfixed (now in your kernel)- this "forgot to release lock" is mostly solved problem today with static analysis. Kernel absolutely needs it as part of the dev process 1/n

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. sij
    Poništi
  4. proslijedio/la je Tweet
    27. sij

    macOS/iOS: ImageIO: heap corruption when processing malformed TIFF image

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Linux is the first OS to support MPTCP v1, please give me that twitter dopamine. Lots...

    Poništi
  7. proslijedio/la je Tweet
    23. sij

    New blog post: The Life of a Bad Security Fix: We'll do more shorter-form blogs like this rather than just tweet into the void over several months about the journeys of bad fixes:

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  11. proslijedio/la je Tweet
    16. sij

    I'll make my tech report and poc public soon. It was a fun bug affecting most major distributions. one exploit to rule them all w/ all kernel expl mitigation bypasses - no rop chains / hardcoded crap

    Poništi
  12. proslijedio/la je Tweet
    13. sij
    Poništi
  13. proslijedio/la je Tweet
    10. sij

    [$] configfd() and shifting bind mounts

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    Proof-of-concept code published for Citrix bug as attacks intensify * Not one, but two PoCs have been published for CVE-2019-19781 (also known as Shitrix now) * PoC 1: * PoC 2:

    Poništi
  15. proslijedio/la je Tweet
    11. sij
    Poništi
  16. proslijedio/la je Tweet
    9. sij
    Poništi
  17. proslijedio/la je Tweet
    10. sij

    Android: ashmem readonly bypasses via remap_file_pages() and ASHMEM_UNPIN

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    [$] Grabbing file descriptors with pidfd_getfd()

    Poništi
  19. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  20. proslijedio/la je Tweet
    9. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·