Couple other feature highlights:pic.twitter.com/1KC805pMJC
U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više
If your curious about what this means. It means for enlightened apps, if someone has full DMA access to a locked machine (assign they are bypassing dma-r) sensitive files would remain encrypted
Shared details about security differences between 10 S and desktop current and future. I use 10 S on all my devices. If you need win32 on 10 S there are also plenty of options: private store, VM, WVD, sandbox, sideloading is coming. Little bit of friction for a lot of security.pic.twitter.com/tBGEWFjxnb
Great presentation and amazing work in there. Thanks! The slides mention “casual physical access”, is that more formally defined somewhere?
Yeah we have a def that something likes: 10 mins alone, an exposed port, less than 1k in parts. I’d like to scope in cheap logic analyzer attacks and SPI/lpc but that’s going to take some effort
Thanks
, I now had a change to read. Was the session recorded and will it be published?
I think it was recorded but I’m not sure @msftsecresponse
RIP Campcom for token grafting attacks. Good stuff with on KDP and xFG
Most effective way to block capcom is to enable hvci
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.