grsecurity

@grsecurity

Official grsecurity news feed

Geregistreerd in oktober 2012

@grsecurity is geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @grsecurity wordt niet gedeblokkeerd door Tweets te bekijken.

  1. randomization is not the way today. Stop the attack at the origin (prevent the first non authorized return)

  2. New test patch up with improved protection against irrelevant infosec anklebiters

  3. Grsecurity is choosing 4.4 as its next stable kernel tree and will continue to support 3.14 through the end of 2017

  4. New patches uploaded for 3.14.67 and 4.4.8

  5. attackers are always like: "I really hope this vector is Turing complete!". Worst formalization possible.

  6. Sent a mail out with some good/exciting news to existing customers, let me know if you didn't receive it

  7. I think I should include a back to basics on effective security design and critical thinking in my keynote

  8. But do keep wasting time on KASLR and tweaks to it, it'll only ensure grsec will remain that much further ahead of everyone else :)

  9. It hasn't and won't stop exploits, but everyone else is doing it, so we should do it too. There you have it folks!

  10. New patches up for 3.14.66 and 4.4.7

  11. "Research was published showing" that KASLR is useless too, where's the fix for that?

  12. Probably at least 100 or so patches floating around on LKML now related to KASLR on various archs, what a complete waste of effort

  13. Honored to be invited to keynote SSTIC 2016!

  14. Maybe that's the problem with bad security ideas -- people see they're not being done and think there's some gap to fill by doing them

  15. How else can you explain both the inclusion of KASLR as well as all of the obvious bypasses?

  16. Pretty sure all available evidence points to upstream not looking at the small details and also completely missing the big picture

  17. Linus: "[security people] look at the small details, and are completely missing the big picture"

  18. Call for Papers 13th Edition! - Oldest hacking conference in LATAM.

  19. People always forget in this Jurassic age of client-sides that web hacking + Linux locals still rule the world.

  20. talking about how PaX ASLR entropy counts are no better than vanilla, coming from a kernel config with PaX completely disabled! (2/2)

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of het ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·