KP Singh

@__kpsingh

Works at Google on Linux Kernel + Security (he/him). Views are my own.

Zurich, Switzerland
Vrijeme pridruživanja: prosinac 2012.

Tweetovi

Blokirali ste korisnika/cu @__kpsingh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__kpsingh

  1. proslijedio/la je Tweet
    3. velj
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Ran into some of the KRSI team at Fosdem, looks like we may soon have an eBPF LSM in the kernel, its been a long journey

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    [$] KRSI and proprietary BPF programs

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    My third presentation at was about the Unix wars and how strong free software licenses encourage cooperation and collaboration in building systems.

    Poništi
  5. proslijedio/la je Tweet
    17. sij

    My demo was remote attestation over Bluetooth, which means you can gain the security benefits of remote attestation without needing to pass data or identity to a third party. Code is at

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. ožu 2019.

    More and more people are experimenting with (great!), but it seems that not everyone knows how bpftool can help manage BPF objects. I'm starting a series of tweets to help spread the awareness. Expect about one tweet a day.

    Prikaži ovu nit
    Poništi
  7. 15. sij

    I am happy with my Cherry MX brown switches :)

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    Spooky dev environment hack: add 127.0.0.1 xn--9q8h to /etc/hosts and then all your dev servers can be accessed at http://👻 It's localghost!

    Poništi
  9. proslijedio/la je Tweet
    1. sij

    2019 Technology of the year: Linux eBPF + BTF. Massive respect and thanks to the folks making the bpf-next branch flourish!

    Poništi
  10. proslijedio/la je Tweet
    1. sij

    Back in September was an initial "request for comments" by on some work they are doing with Kernel Runtime Security Instrumentation (KRSI). Learn more about Google's work with KRSI - something to look forward to in 2020 - in a great article:

    Poništi
  11. proslijedio/la je Tweet
    31. pro 2019.

    's Kernel Runtime Instrumentation (KRSI) Is Something To Look Forward To In 2020 for mainline

    Poništi
  12. proslijedio/la je Tweet

    Google's Kernel Runtime Security Instrumentation (KRSI) Is Something To Look Forward To In 2020 via

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.

    [$] KRSI — the other BPF security module

    Poništi
  14. proslijedio/la je Tweet
    29. pro 2019.

    Baby Yoda implies the existence of a Sporty Yoda, Scary Yoda, Ginger Yoda, and Posh Yoda

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.

    The KRSI patchset on LKML. I'm excited that the review is kicked off!

    Poništi
  16. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    31. lis 2019.

    Oh tech talks on About tracing vs security

    Poništi
  19. proslijedio/la je Tweet
    31. lis 2019.

    An anonymous selfie

    Poništi
  20. proslijedio/la je Tweet
    10. lis 2019.

    you think you test in prod, but do you test in prod like Boeing used to?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·