derrek

@derrekr6

student, security researcher, Nintendo fan | I love my 3DS :) | I like my Switch | BUGS EVERYWHERE!

Vrijeme pridruživanja: studeni 2014.

Tweetovi

Blokirali ste korisnika/cu @derrekr6

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @derrekr6

  1. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  2. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    22. pro 2019.
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi
  5. proslijedio/la je Tweet
    10. stu 2019.
    Poništi
  6. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. srp 2019.

    switchroot proudly presents LineageOS 15.1 for the Nintendo Switch. Download links are live at

    Poništi
  8. 24. srp 2019.

    still "works" on 12.4. "" because the success rate is so low 🙃

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. lip 2019.

    I managed to get kernel_task port using only CVE-2019-8605 for iOS 12.2 (tested on iPhone 6s+) :) Still needs quite a bit of work for stability. Huge thanks to for his assistance in achieving a goal I have had for over a decade...

    Poništi
  10. 23. lip 2019.

    got tfp0 on iOS 12.3.1 :DD (but the bug sucks and it's quite unreliable)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    18. lip 2019.

    I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. svi 2019.

    When I reported CVE-2019-8605 I could only repro it on macOS with root user. I've found a way to reach it from the app sandbox on iOS. Don't update to 12.3 needlessly while I continue to investigate!

    Poništi
  13. 7. tra 2019.

    Has anyone ever successfully reproduced an ARM Cortex-A erratum (hardware bug)? Not including meltdown/spectre and variants.

    Poništi
  14. 25. ožu 2019.

    A note on CVE-2019-8527: and I found this bug independently, with different approaches. Also, it's probably not terribly interesting wrt jailbreaking

    Poništi
  15. proslijedio/la je Tweet
    23. velj 2019.
    Prikaži ovu nit
    Poništi
  16. 22. sij 2019.

    released v1.1.3 What's new: CIA release, 3D rendering, huge performance improvement

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    16. sij 2019.

    New blog post from Brian Rosenberg on Qualcomm's Vulnerability Reward Program

    Poništi
  18. proslijedio/la je Tweet
    29. pro 2018.

    Video of talk: Slides are online: Boot rom glitching scripts + various SCE decryption utils: More to come!

    Poništi
  19. 23. pro 2018.

    Ported Sonic Robo Blast 2 to New3DS Release: Enjoy! :)

    Prikaži ovu nit
    Poništi
  20. 22. stu 2018.

    Viva la Vita Vida, Dissecting Broadcom Bluetooth, Attacking Chrome IPC, Jailbreaking iOS, From Zero to Zero Day, ... plenty of interesting security talks ahead, c3 is gonna be awesome!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·