Tal Be'ery

@TalBeerySec

All things . Security Research Manager. Co-Founder (KZen). Formerly, VP of Research @ acquired by (.)

Israel
Vrijeme pridruživanja: travanj 2014.

Medijski sadržaj

  1. prije 5 sati

    When attackers compromise a browser they don't necessarily need to go deeper and escape the sandbox. They can stay within the sandbox and steal victims data by shutting down SOP and create UXSS. An innovative concept by

  2. prije 7 sati
  3. prije 8 sati

    "0days are expensive; mistakes are free" Excellent quote by

  4. 3. velj

    5/ and one exploit based detection rule to detect exploit of the degenerate case (private key = 1)

    Prikaži ovu nit
  5. 3. velj

    4/ Detecting rogue certificates with a trusted public key (with an idea stolen from 😋)

    Prikaži ovu nit
  6. 3. velj

    3/ Detecting non-standard base points (but standard a and b parameters)

    Prikaži ovu nit
  7. 3. velj

    2/ detecting non-standard elliptic curve params

    Prikaži ovu nit
  8. 30. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    For reference, "named curve" vs "specified curve"

  9. 30. sij
    Odgovor korisnicima
  10. 29. sij
  11. 28. sij

    Some exchanges take pretty wild fees on staking (source: ) Caveat emptor!

  12. 28. sij
    Odgovor korisnicima i sljedećem broju korisnika:
  13. 28. sij
    Odgovor korisnicima

    In theory, rewards should be paid to you even if you switch bakers, but you need to ask Coinbase about their policy. FYI: according to Coinbase takes 25% of your staking rewards, compared to 8% used by .

  14. 24. sij
    Odgovor korisniku/ci

    Seems like purchase is with and not with TRC-20 of ? @PhPremOfficial ?

  15. 24. sij

    : although the UI doesn't show related Curve Params yet ( is working on it), you can use: tshark -r kudelski-vuln.pcapng -Y tls.handshake.certificate -O tls -ober.decode_unexpected:TRUE

  16. 23. sij
    Odgovor korisniku/ci
  17. 23. sij
    Odgovor korisniku/ci
  18. 23. sij

    Even with end to end encryption, metadata matters

    Prikaži ovu nit
  19. 21. sij
    Odgovor korisnicima

    The rule seems to assume Public Key (PK) is equal to Base Point (BP). This is very exploit specific. For example, choose BP = PK/2 (and private key is 2).

  20. 21. sij
    Odgovor korisniku/ci

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·