-
Published the slides & exploit for my
#35C3 talk, enjoy :) https://github.com/j0nathanj/Publications/tree/master/35C3_From_Zero_to_Zero_Day … -
for people who are interested in disk encryption and especially SSDs with built-in encryption watch this talk https://media.ccc.de/v/35c3-9671-self-encrypting_deception … by Carlo Meijer at
#35c3 ... most drives he looked at he popped, Samsung seems to be only ones that didn't f***up everything -
If you have no idea what I'm talking about, please watch this video from
@martin_vigo https://media.ccc.de/v/35c3-9383-compromising_online_accounts_by_cracking_voicemail_systems …#35c3Show this thread -
ahead of my talk at
@defcon on evil#eBPF, i'd like to leave you all with a PoC of a vanilla cap_sys_admin dockerized process (ie w/ vanilla apparmor/seccomp) that stomps pid 1 memory. this is a generic escape btw. like i said at#35c3, docker's sysfs restrictions are not enough pic.twitter.com/ZVikbhmyvjShow this thread -
The
@kernlbob LED cube meets it’s parents from@squarewavedot :)#35C3 pic.twitter.com/4P56NNfYKO -
Here's what Hackaday did at
#35c3 https://wp.me/pk3lN-1qug -
Our recorded
#35c3 videos are now online at https://media.freifunk.net/c/35c3oio Have fun and enjoy watching them! -
seriously magical , , ,,,
#35c3 i wanna go baack

pic.twitter.com/xwCJRuquIq
-
We released the engelsystem version that powered the
#35c3 as v3.0.0 at https://github.com/engelsystem/engelsystem/releases/tag/v3.0.0 … -
All security issues found in Keybase during
#35C3 ctf have been disclosed on@Hacker0x01. I am so surprised that there are actually more attack vectors than code signature validation bypass. Thanks@KeybaseIO for the quick response!pic.twitter.com/n5EPtO9xUb
Show this thread -
at
#35C3 we were Refreshing our Memories and found the surveillance tapes of the last 3 minutes before there was flip-flop in the Asimov-constant which will have led to the time-warp and crash of the terraforming spacestation c-base. https://vimeo.com/309632677 -
#35c3 data transfer with a wifi enabled (esp32) laser module and#opticspy from@joegrand as the receiver side to control the air gapped systempic.twitter.com/sDEImjuKtT
-
1/ Web-based cryptojacking in the wild: when your browser is mining coins for other people. We caught this talk at
#35c3 and thought of sharing it with you. So, yeah, this is not great. https://media.ccc.de/v/35c3-9483-web-based_cryptojacking_in_the_wild …Show this thread -
Exploiting "Arraymaster" from
#35c3 Junior CTF: from integer overflow to command execution#hacking#pwnhttp://youtu.be/km6Doio6U5Q?a -
Congress aftermath, CCC listed as on of the top threat actors by
@RecordedFuture#35C3 pic.twitter.com/KtSR8Trtop
-
German
#subtitles released for "Freude ist nur ein Mangel an Information" on: https://mirror.selfnet.de/c3subtitles/congress/35c3 …#35c3 -
Ok, we are doing this. Look what happens when you have crazy ideas at
#35c3 I invite you to watch our 1st ed. of "pwny race" (name pending). Tune in to our stream: https://www.youtube.com/watch?v=L_ZqbkCQs1s … on Feb 9 to see some#CTF pwnable racing with 4 excellent players and my co-host @picklepwnspic.twitter.com/KE0jNTOICf
-
At
#35c3, we ended up with one huge sticker table, which resulted in long queues. This is centralization. We don't like that. So we decided to make sure that this year, we'll have many sticker boxes, at different places, which will all have great stickers. Yes, we have a plan.Show this thread -
This week our client team is together in Stuttgart working on
#endtoend#encryption in#nextcloud - want to learn what that is all about? See our Chaos Communication Congress#35C3 talk from last December online now! https://media.freifunk.net/v/35c3oio-68-end-to-end-encryption-for-secure-zero-knowledge-file-sync-share …pic.twitter.com/lFAIfkwPTI
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.