ZukOvjeren akaunt

@ihackbanme

Security Researcher | Founder & CEO 🐊 | Founder | Him who controls the registers, controls the universe! | My thoughts. ✌️

San Francisco, Planet Earth
Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @ihackbanme

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ihackbanme

  1. Prikvačeni tweet
    1. pro 2017.
    Poništi
  2. proslijedio/la je Tweet

    Channeling my frustration at Apple's lack of open sources for Darwin 19 more productively, by bug fixing sources which are out - specifically, the little known but handy (and buggy) lsmp utility:

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    31. sij
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    also checkra1n patchfinder has been ported to a pongoOS module

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Linux on T8010 via PongoOS :) /cc

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    Brilliant article by and on the recent Bezos’ iPhone hack, mentioning DFIR technology and initiative:

    Poništi
  8. proslijedio/la je Tweet
    29. sij

    is on . Google and Apple in response: no comment. That's what we thought. Check it out:

    Poništi
  9. 28. sij

    You can read more about and sign the petition at

    Prikaži ovu nit
    Poništi
  10. 28. sij

    Similar to how Android enables Developer mode (click X times on Build number) - just for analysis purposes.

    Prikaži ovu nit
    Poništi
  11. 28. sij

    is not about removing sandbox policy from apps. is about providing device owners the capabilities, should they need/want it, to analyze their own devices without hacking into it first. The access can be revoked after a reboot.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    🍎: Leave the kernel and please write macOS security tools that leverage our new Endpoint *Security* Framework (ESF). Hackers: Yes, please do! 🤣 PSA: If you're writing security tools leveraging the ESF, don't trust the reported code-signing information! 😭😭😭😭😭😭😭😭😭🤬

    Poništi
  13. 27. sij
    Poništi
  14. 27. sij

    Now that FTI should be able to decrypt the media file that was the main theory behind the Bezos iOS analysis: 1. Was there an exploit? 2. If not, lmk, happy to examine other, non PII information, that was extracted during the investigation (cc: )

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  17. proslijedio/la je Tweet
    24. sij
    Poništi
  18. proslijedio/la je Tweet
    24. sij
    Poništi
  19. proslijedio/la je Tweet
    23. sij
    Odgovor korisniku/ci

    Hey , you may want to check this out!

    Poništi
  20. 23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  21. proslijedio/la je Tweet
    23. sij

    I agree with . The report is missing analysis of various logs including OS, baseband, WiFi, mounts, faults, etc. Checking hashes without additional analysis is not meaningful. Willing to offer free inspection, maybe there's still something there...

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·