Ori

@cjori

iOS @ Cellebrite’s Security Research Labs

Israel
Vrijeme pridruživanja: veljača 2009.

Tweetovi

Blokirali ste korisnika/cu @cjori

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cjori

  1. proslijedio/la je Tweet
    5. velj

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  2. 5. velj
    Prikaži ovu nit
    Poništi
  3. 5. velj

    . ’s talk. Find me for OG checkra1n stickers

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Dear hive mind, where can I find Game Boys for sale in Tokyo?

    Poništi
  5. proslijedio/la je Tweet
    2. sij

    Roses are red Violets are blue soon checkra1n on Windows with signed driver, too

    Poništi
  6. proslijedio/la je Tweet
    1. sij

    Electric Cars Threaten the Heart of Germanys Economy ()

    Poništi
  7. 27. pro 2019.
    Poništi
  8. 10. stu 2019.
    Poništi
  9. proslijedio/la je Tweet
    10. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    checkra1n beta 0.9 is now available at ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:

    Prikaži ovu nit
    Poništi
  11. 27. ruj 2019.

    Ok now can anyone find a MobileGestalt key or w/e to enable the camera Night Mode on pre-iPhone 11 devices please? 😬

    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    And now you can debug your demoted iPhone over JTAG/SWD with the Bonobo Cable and OpenOCD ! !

    Prikaži ovu nit
    Poništi
  13. 27. ruj 2019.

    Now these are the *REAL* “research devices”. Only they’re available now, not next year. And you probably have one already.

    Poništi
  14. proslijedio/la je Tweet
    27. ruj 2019.

    4/ Exploit released today supports s5l8947x, s5l8950x, s5l8955x, s5l8960x, t8002, t8004, t8010, t8011, t8015. Others will be added soon. It is not perfectly reliable yet; it uses a race condition and I only tested it on my MacBook Pro.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. ruj 2019.

    5/ During iOS 12 betas in summer 2018, Apple patched a critical use-after-free vulnerability in iBoot USB code. This vulnerability can only be triggered over USB and requires physical access. It cannot be exploited remotely. I am sure many researchers have seen that patch.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  18. 8. kol 2019.
    Poništi
  19. proslijedio/la je Tweet
    8. kol 2019.

    APRR: Of Apple hardware secrets. Might include a free 0day.

    Poništi
  20. 5. kol 2019.

    Very proud to be a part of this delegation. See you there 😬

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·