Danny Fullerton

@dfullerto

A delinquent with judgement - Defensive Security Researcher & CoFounder at Mantor Organization. aka northox

Montréal, Canada
Vrijeme pridruživanja: rujan 2010.

Tweetovi

Blokirali ste korisnika/cu @dfullerto

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dfullerto

  1. proslijedio/la je Tweet
    31. pro 2019.

    If you are a C or C++ programmer somehow still on the fence about whether or not you should take seriously, consider this piece from Cliff Biffle an absolute must-read:

    Poništi
  2. proslijedio/la je Tweet
    23. pro 2019.

    running authoritative DNS servers as unikernels, with dynamic updates, let's encrypt certificates, and persisting to a git remote - -- if you want to try yourself, that is meant as a tutorial; feedback appreciated :D

    Poništi
  3. proslijedio/la je Tweet
    8. stu 2019.

    When I say that infosec is a social science with a small technical component, this is exactly what I mean.

    Poništi
  4. 31. lis 2019.

    Hello Québec city! and I are all set for the . Can't wait to see you all my friends.

    Poništi
  5. proslijedio/la je Tweet

    The reason I’m so passionate about integrated security is because security touches everything. Yes, servers and backend code and encryption and networks, but also... UI/UX is security. QA is security. Customer support is security. Security is a holistic issue. Always has been.

    Poništi
  6. proslijedio/la je Tweet
    25. ruj 2019.

    USB armory Mk II is a full featured computer (900 MHz ARM® processor, 512 MB RAM, Bluetooth, USB-C) in a tiny form-factor, designed from the ground up with information security applications in mind. Now funding:

    Poništi
  7. 5. ruj 2019.
    Poništi
  8. 8. kol 2019.
    Poništi
  9. proslijedio/la je Tweet
    16. srp 2019.

    Very excited to announce that the Microsoft Security Response Center has been investigating as a safe alternative for systems programming and is recommending the entire software industry take a serious look into it. Stay tuned for more blog posts in the coming days!

    Poništi
  10. proslijedio/la je Tweet

    Defenders must invest ~100x of what Attackers in order to counteract them. The most useful InfoSec innovations are designed to close that financial gap. Decrease the amount Defenders must spend, increase the Attackers must spend, or both — by an order of magnitude.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. tra 2019.

    Slides "Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software" from and released! Lenovo keeps manufacturing mode Boot Guard "backdoor" to unlock DXE volume for arbitrary modifications. It fully breaks Secure Boot!

    Poništi
  12. proslijedio/la je Tweet
    26. velj 2019.

    “Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals”, (one of the authors is Peter G. Neumann at SRI!)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    6. velj 2019.
    Poništi
  14. 3. sij 2019.

    Beautiful! Also a great reminder why QubesOS' NetVM approach is of importance.

    Poništi
  15. 2. sij 2019.
    Poništi
  16. proslijedio/la je Tweet
    31. pro 2018.

    Video of Todd Mortimer Removing ROP gadgets from OpenBSD

    Poništi
  17. proslijedio/la je Tweet
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi
  18. proslijedio/la je Tweet
    22. pro 2018.

    Modern Platform Controller Hub (PCH) and CPU contain a full-fledged logic signal analyzer, which allows monitoring the state of internal lines and buses in real time—a gold mine for researchers. Briefing by &

    Poništi
  19. proslijedio/la je Tweet

    Intel's new MKTME technology, combined with proper trusted boot (e.g. TXT+STM) *and* a well written hypervisor, might finally allow for reasonably "trustless" cloud IaaS offerings. It seems not plagued by lots of SGX-specific problems: memory limitations, ring3-only.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. pro 2018.

    I never tire of looking at videos of Chinese click farms. It's just so surreal to see hundreds of phones playing the same video for the purposes of fake engagment.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·