Noise Security Bit

@N0iSeBit

нерегулярный подкаст о жизни ресечеров по обе стороны океана

into the noise
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @N0iSeBit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @N0iSeBit

  1. Prikvačeni tweet
    13. ožu 2019.

    0x23 в эфире! Обсудили c конференцию . А так же затронули тему популизации эвентов нацеленных на офенсив ресеч и все большую актуальность небольших конференций в целом

    Poništi
  2. proslijedio/la je Tweet
    20. sij

    I'm thrilled to announce, I will be a keynote speaker for ! Stay tuned for more details ;-)

    Poništi
  3. proslijedio/la je Tweet
    3. sij

    It was a pleasure to open conference last year. We really need to rethink the meaning of HW/FW security in the realities of modern threat landscape! We trust blindly anything which is signed and come from "trusted source" (Integrity != TRUST).

    Poništi
  4. proslijedio/la je Tweet
    23. pro 2019.

    The video of "Hardware Security is Hard: how hardware boundaries define platform security" on YouTube

    Poništi
  5. proslijedio/la je Tweet
    17. pro 2019.

    Fun fact regarding our class, all labs recreating a real-world environment. We bring real x86 hardware (Intel and AMD) to break during the class. We promise your laptops gonna be safe after all :-)

    Poništi
  6. proslijedio/la je Tweet
    12. pro 2019.

    Our talk recording "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" is up! EC issue we found has a bigger impact from what we expected in the beginning

    Poništi
  7. proslijedio/la je Tweet
    12. stu 2019.

    I will be broadcasting my keynote on at 11AM MSK (UTC+3) Here is the link: Thanks again for the tips!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    5. stu 2019.

    I’m thrilled to announce we are growing our offensive security research team. I want to welcome and to Nvidia!!

    Poništi
  9. 14. lis 2019.

    Теперь нас можно слушать на сервисе Яндекс.Музыка 🤘

    Poništi
  10. proslijedio/la je Tweet
    26. ruj 2019.

    Thank you ! It was a honor to open with my talk.

    Poništi
  11. proslijedio/la je Tweet
    24. ruj 2019.

    I am very excited myself - partially because I will have achieved peak keynote: Keynoting about offensive security more than a year after not doing it any more :-)

    Poništi
  12. proslijedio/la je Tweet
    25. ruj 2019.

    NoiseBitPodcast is a media partner of 2019. It’s an irregular podcast about the life of researchers from both sides of the ocean!

    Poništi
  13. proslijedio/la je Tweet
    19. ruj 2019.

    next week, I will be presenting two talks at . The first keynote from and second REsearch from . It's a right stage to talk about Computrace where in 2009 and already raised attention to Lojack suspicious behavioral.

    Poništi
  14. proslijedio/la je Tweet
    17. ruj 2019.

    2019 first keynote is Alex ! Alex will give a talk "Hardware Security is Hard: how hardware boundaries define platform security"

    Poništi
  15. proslijedio/la je Tweet
    6. ruj 2019.

    CfP is now open! You know what to do :)

    Poništi
  16. proslijedio/la je Tweet
    17. kol 2019.

    I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries

    Poništi
  17. proslijedio/la je Tweet
    8. kol 2019.

    and co-conspirators keep pushing edges on microarchitecture security research

    Poništi
  18. proslijedio/la je Tweet
    8. kol 2019.

    Slides for our talk "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" by Alex Gazet and at

    Poništi
  19. proslijedio/la je Tweet
    2. kol 2019.

    2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! Please RT!

    Poništi
  20. proslijedio/la je Tweet
    2. kol 2019.

    A lot of cool stuff coming in our talk "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" at Include interesting relations between EC and BIOS Guard. Also BG script interpreter located inside ACM module

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·