Hardened-GNU/Linux

@hardenedlinux

We are "patient" zero, so we hardened ourselves!

Kaer Morhen
Vrijeme pridruživanja: svibanj 2015.

Tweetovi

Blokirali ste korisnika/cu @hardenedlinux

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hardenedlinux

  1. Poništi
  2. proslijedio/la je Tweet
    23. sij

    New blog post: The Life of a Bad Security Fix: We'll do more shorter-form blogs like this rather than just tweet into the void over several months about the journeys of bad fixes:

    Poništi
  3. 21. sij

    2000 stickers and 1000 fridge magnets are arrived. Hope we can bring it to ;-)

    Poništi
  4. 15. sij

    s/bridge/fridge/g

    Prikaži ovu nit
    Poništi
  5. 15. sij

    Thanks to our donors! We printed a few thousands of stickers and bridge magnets for "Public Money? Public Code!" promotion!

    Prikaži ovu nit
    Poništi
  6. 27. pro 2019.
    Poništi
  7. 23. pro 2019.
    Poništi
  8. 6. pro 2019.

    We gave out one ticket as a gift for a libre software/firmware/hardware contributor already, as we did previously. Hope all attendees will enjoy the journey in Leipzig. See you guys at the Congress!

    Poništi
  9. 30. stu 2019.
    Poništi
  10. 26. stu 2019.

    We split different resources( based on “resource centric” in syzkaller ) by collecting different states triggered by them to generate( stack-based) new program. That's what we call state based fuzzer:

    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    Check out our new blog post about Open Source Firmware and its impact.

    Poništi
  12. 22. stu 2019.

    Good example of off-the-shelf defense-in-depth introduction

    Poništi
  13. 22. stu 2019.
    Poništi
  14. 21. stu 2019.
    Poništi
  15. 21. stu 2019.

    Awesome work! Another milestone for security/transparency on x86 server!

    Poništi
  16. 20. stu 2019.
    Poništi
  17. 19. stu 2019.
    Poništi
  18. 14. stu 2019.

    Exploiting Intel’s Management Engine – Part 1: Understanding PT’s TXE PoC (INTEL-SA-00086) Exploiting Intel’s Management Engine – Part 2: Enabling Red JTAG Unlock on Intel ME 11.x (INTEL-SA-00086) MFSUtil:

    Poništi
  19. 10. stu 2019.
    Poništi
  20. 6. stu 2019.

    Nighthawk: Transparent System Introspection from Ring -3

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·