Ivn

@ivRodriguezCA

[SWE ] Mobile AppSec, Cryptography &  Reverse Engineering. (opinions = own) -

/Applications
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @ivRodriguezCA

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ivRodriguezCA

  1. Prikvačeni tweet
    1. tra 2019.

    Announcing my very own free, open source and online course: "Reverse Engineer iOS Applications" 📱 My favourite personal project yet. It was a lot of fun and hard work but I hope it'll help drive more researchers to mobile security. Feedback always welcome

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati

    BREAKING: Twitter says a suspected state-sponsored actor used its API to match usernames to phone numbers - Attack took place on December 24, 2019 - Twitter said attack came from IPs in Iran, Israel, and Malaysia

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  4. 30. sij

    Twitter DM: hey Instagram DM: Hi honey, you want my nud3 pics? Email: My husband died and left $1B u want them? LinkedIn: I'm impressed with your background, you'll be the perfect fit for this company who's requirements have nothing to do with your background.

    Poništi
  5. 29. sij

    Just solved a problem I've been working on for the past 3 weeks wooop 🙌🏼 lolll I was explaining what I did to my team lead and he says "did you know the more excited you get, the more canadian you sound?" 😂

    Poništi
  6. 29. sij

    When launching the app there's only one API call to bugsnag (an analytics service) and to continue using the app I need a valid token: 5/

    Prikaži ovu nit
    Poništi
  7. 29. sij

    It also requests the location permission trying to convince the user to select "Always", which will allow the app to track location changes even if the app is in the background. 4/

    Prikaži ovu nit
    Poništi
  8. 29. sij

    The app requests access to bluetooth giving these reasons: 3/

    Prikaži ovu nit
    Poništi
  9. 29. sij

    I only analyzed the iOS app. The app uses the Gimbal Framework which indicates the school probably has Gimbal iBeacons somewhere in the classrooms to detect when the students are in the area, read more about: Gimbal: iBeacons: 2/

    Prikaži ovu nit
    Poništi
  10. 29. sij

    The original tweet is gone because the article was updated. Here's the new tweet 1/

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    21. sij

    I was going to write something about iCloud backup and encryption but I realize that I’ve written it all. So here are a bunch of old posts:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    (high-level) vulnerability details now public: ...tl;dr: issue validating ECC certificates 😱

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. sij

    Hanging out with Hackers & iOS Jailbreakers at 36c3 (Vlog) via

    Poništi
  17. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    8. sij

    This is a good talk to watch to learn more about SHA-1 and hash collision attacks. "How We Created the First SHA-1 Collision and What it Means for Hash Security" by at Slides: Video:

    Poništi
  19. proslijedio/la je Tweet

    Happy 2020 y'all 🥳 Want to learn about🍎malware infection, persistence, & payloads? Check out my latest: "The Mac Malware of 2019" ...all 74 pages! ✍️📝😅 [PDF]: [HTML]: Mahalo to supporters: , , &

    Poništi
  20. proslijedio/la je Tweet

    The only way we were able to reverse & analyze ToTok (that UAE govt. spy app that Apple approved to be in iOS App Store), was via a jailbreak (checkra1n): Rather unfortunate (though not surprising) to see Apple take this approach towards jailbreaking 😤🍎

    Poništi
  21. proslijedio/la je Tweet
    27. pro 2019.

    BREAKING: Latest update from vs. lawsuit. Apple's amended complaint was made public today. I am reading it now. PDF:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·