-
Концепт-арт к фильму Чужой: Завет (Alien: Covenant) /
#ЧужойЗавет#Чужой#AlienCovenant#Alien#РидлиСкотт#Ridl.. https://vk.cc/6FWGaX -
3 ожидаемых airdrop для держателей
#EOS – https://goo.gl/jBgFvd#eosDAC#IQ#RIDL#bitcoin#blockchain#деньги#финтех#криптовалюта#стартапыpic.twitter.com/hZj6jS1PP5
-
@Get_Scatter reinventing themselves once again with#Scatter 11#Meteoric
A major UI / UX overhaul and a TON of new features + #RIDL network integration. You most likely already have scatter, just don’t forget to UPDATE -> https://get-scatter.com/


https://twitter.com/ramijames/status/1144311319614480384 … -
-
Our Director, Dr. Tom Verhelst enjoying a few of the 100 simultaneous events during
#NanjingTechWeek. The event is focused on building a smarter future through collaborative innovation a goal well aligned with#RIDL .#techweek#nanjing#innovation#Collaborationpic.twitter.com/2tBQw1OJKB
-
NEW Scatter release is AMAZING!
#RIDL Token is showing its real POWER!#eos#bitcoin#tron#eth$eos#scatter#blockchain#reputation pic.twitter.com/DoEbAY2M51
-
I think
@Get_Scatter ‘s#RIDL token may play a large role in security and reputation in the coming years. -
Pour le moment 3 scénarios d'attaques ont été identifiés : -
#Fallout (exploitant la CVE-2018-12126)wxcv -#RIDL (exploitant la CVE-2018-12127, CVE-2018-12130 et CVE-2019-11091) -#ZombieLoad (exploitant la CVE-2018-12130) pic.twitter.com/eMafvO9gW9
-
Now at
@offzone_moscow:@themadstephan &@sirmc from@vu5ec talking about#RIDL and speculative execution vulnerabilities on#intel cpus.pic.twitter.com/S2RtQlkJFd
-
Our first year
#Defcon group was a wonderful experience! Had the pleasure to conclude the year with a talk on my understanding on why#MDS attacks work. For the interested, check my slides on#RIDL and#ZombieLoad here :) And join us next year for great talks and amazing people!https://twitter.com/defcon11396/status/1136223424802635776 …
Показать эту ветку -
Now online
@themadstephan’s great talk at@IEEESSP about the#RIDL attack: Rogue In-Flight Data Load. Cc@vu5echttps://youtu.be/1Y0h4JyK3fs -
Many of you asked about the
#ridl /#mds disclosure process and independent finders. It has been confusing, also to us. We tried to piece this together. Check out the updated timeline on http://mdsattacks.com for all the details!#sp19@IEEESSP -
@vu5ec's@themadstephan presents#RIDL, the#mds vulnerability in Intel CPUs that allows unprivileged attackers to leak sensitive information across *any* security boundary. Even from javascript.pic.twitter.com/ctOBiCDVe7
-
Cross VMs string leaks are now super fast when adding the byte masking techniques described on both
#ZombieLoad and#RIDL paper
https://github.com/pietroborrello/RIDL-and-ZombieLoad/tree/master/attacker/variant1d_fast_string_linux …
cc @vu5ec@tugraz pic.twitter.com/j19Sw2jGS6Показать эту ветку -
"hardware is the new software except it is much harder to fix"
@kavehrazavi describing the#MDS /#ridl side-channel attack at AMSSEC pic.twitter.com/nm4VBTzSNU
-
Very nice interactive diagram at https://mdsattacks.com/ Perhaps most telling is how many uncolored parts remain to be explored..
#ZombieLoad#Fallout#RIDL#MDShttps://twitter.com/r00tkillah/status/1128503526613635073 …
-
Como era de esperar, después de Meltdown, Spectre y L1TF, tenemos nuevos ataques explotando vulnerabilidades en la microarquitectura de los procesadores. Voy a explicar un poco en qué consisten
#MDS#ZombieLoad#RIDL#FalloutПоказать эту ветку -
Also everyone on the other (non
#ridl) attacks: super cool work! Probably forgetting some (apologies in advance), but here goes:@lavados@misc0110@mlqxyz @danielmgmi@jovanbulck@bsdaemon@epakskape@yuvalyarom -
Here's a longer technical deep dive explainer of
#MDS (Microarchitectural Data Sampling): https://youtu.be/Xn-wY6Ir1hw#RIDL#Fallout#ZombieLoad -
Wanna know about
#RIDL and#MDS class of vulnerabilities? Come to the AMSec workshop in Amsterdam tomorrow and learn about how your Intel CPUs shout out your deepest secrets.https://twitter.com/qrs/status/1128218734420746242 …
Загрузка может занять некоторое время.
Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.