axi0mX   

@axi0mX

Bootrom exploit philanthropist. Advanced persistent troublemaker. Infamous ghost bringing iOS jailbreaking back from the dead.

checkra.in
Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @axi0mX

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @axi0mX

  1. Prikvačeni tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    If you ever see a bug like this, with one user's stuff handed to a different user (and vice versa), the root cause is usually one of the following... 🧵🧵🧵

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 11 sati

    FWIW, I will be working on updating the unc0ver jailbreak for iOS 13.0-13.3 as soon as the new kernel exploit is available. For now, make sure that automatic software updates are disabled on your device and save blobs for iOS 13.3.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 10 sati

    checkra1n is a CRAZY life-changer for iOS security research. Now, (you rock man!) finished his talk with a port to Linux (and even a Windows video demo!)

    Poništi
  5. Poništi
  6. proslijedio/la je Tweet
    prije 10 sati

    Checkra1n command line version

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    prije 10 sati

    We’re also today releasing webra1n, a web interface for checkra1n designed for headless computers (like a raspberry pi) checkra1n 0.9.8 also introduces our brand new operating system, pongoOS for the very first time, which is now used to perform low level patches.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    prije 10 sati

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. velj

    Wow. This is simultaneously the worse idea ever and the best Defcon contest ever. Morning session- who can hack the stroller and kill the baby (sensor package) first. Afternoon session- who can hack the stroller, abduct a "baby" and successfully retrieve a bitcoin ransom.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    prije 23 sata

    Backdoor mechanism discovered (again) in HiSilicon chips —Researcher did not notify HiSilicon due to a lack of trust in the vendor to patch the issue —Backdoor was first reported in 2013, and again in 2017, but inadequately patched all this time

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Oh, look, another awful vulnerability in a HiSilicon provided BSP for DVRs:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    prije 20 sati

    I was recently the (unsuccessful) target of a very well-crafted rental phishing scam. Here is my account of the story in excessive detail including screenshots.

    Poništi
  13. proslijedio/la je Tweet
    prije 21 sat

    Okay the world's first classical chinese programming language is out (it's also v nice looking)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. velj

    went looking up shadow inc on linkedin and omg why the engineers who built it were 3 close-to-entry-level bootcamp grads (some only working a couple months, some on contract) and a senior dev with no experience in mobile? like why would you ever also: those poor bootcamp grads

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    prije 21 sat

    If you want to understand what happened with Shadow and the failure of the Iowa Caucus app you have to understand how electoral campaign tech work is done and funded. Let me tell you a story to make sense of it.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    prije 22 sata

    If you are on iOS 13.3.1 with an A12/A13 device, downgrade to iOS 13.3 ASAP.

    Poništi
  17. proslijedio/la je Tweet
    4. velj
    Poništi
  18. proslijedio/la je Tweet
    4. velj

    Hex-Rays just launched its new website design and it looks great! 🎉 Finally! Congratulations ! Announcement blog:

    Poništi
  19. proslijedio/la je Tweet
    prije 23 sata

    Hey guys, was let go from my job today 😟. If anyone has any leads, please let me know. I’ve attached my resume. References upon request!

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    prije 23 sata

    If you're interested in bootstrapping iOS kernel security research on A13, keep an iPhone 11 on iOS 13.3. I will be releasing a proof-of-concept exploit that provides kernel read/write on iPhone12,3 17C54.

    Poništi
  21. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·