Jean-Michel Picod

@jmichel_p

Incident response, malware analysis, reverse engineering, electronics, software defined radio & creator of DPAPIck

Switzerland
Vrijeme pridruživanja: srpanj 2012.

Tweetovi

Blokirali ste korisnika/cu @jmichel_p

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jmichel_p

  1. 30. sij

    Today I'm very happy to announce that we released , an open-source security key implementation written on , based on OS and powered by a dongle dev kit! Learn more at: We're even releasing a custom 3D-printable enclosure!

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Say hello to OpenSK: a fully open-source security key implementation: Posted by Elie Bursztein, Security & Anti-abuse Research Lead, and Jean-Michel Picod, Software Engineer, Google  Today, FIDO security keys are reshaping the way online accounts are…

    Poništi
  3. proslijedio/la je Tweet

    New open source project from Google: OpenSK. A FIDO U2F and FIDO2 implementation for Nordic nRF52840 board. I'm not an expert but it looks like a but with an open source firmware and 5 times cheaper... and great STL files to 3D print the case ;)

    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Poništi
  5. 3. ruj 2019.

    Thanks all for your help. I managed to model this piece and then print it. The unit is functional again :)

    Prikaži ovu nit
    Poništi
  6. 23. kol 2019.

    Need help. Is there anybody that could 3d print me this piece in ABS? Bought on eBay a very rare old gear but the second piece is missing, making the whole unit useless! Preferrably around Zürich as I would need to use it quickly :) Please RT

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    9. kol 2019.

    A Hacker Guide To Deep Learning Based Side Channel Attacks - slides from our talk ⁦⁩ ⁦

    Poništi
  8. proslijedio/la je Tweet
    8. kol 2019.

    Anyone interested in side-channel power analysis, , and don't miss this talk at 2PM tomorrow, which is getting towards the dream of ultra-simple side-channel on *any* target!

    Tweet je nedostupan.
    Poništi
  9. 3. svi 2019.

    Nice article! And thanks for the shout-out :) Hope that I'll find a good candidate to write about more complex NAND reconstruction scenarios (FTL, BCH, scrambling, etc.).

    Poništi
  10. proslijedio/la je Tweet
    3. svi 2019.
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    21. ožu 2019.

    *** is still open*** Submit your research paper and present it to the hardware security community at Conference in The Hague, Netherlands.

    Poništi
  12. 8. sij 2019.

    My team in Zürich is hiring experienced reverse engineers Feel free to RT or contact me if you need more information about the role.

    Poništi
  13. proslijedio/la je Tweet
    28. stu 2018.
    Poništi
  14. proslijedio/la je Tweet
    15. ožu 2018.
    Poništi
  15. 13. ožu 2018.

    Sent a message in French to support team through their webportal about a fake account in Spanish which used my email address to register. They replied in German. Should I reply back in English? :)

    Poništi
  16. proslijedio/la je Tweet
    10. ožu 2018.

    I started with the goal to make knowledge of DPA/glitching easily accessible to *all* engineers. This took a huge leap forward today thanks to .

    Poništi
  17. 21. velj 2018.
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    5. srp 2016.

    pushed my thesis documentation about understanding the ndis 6 stack to my github:

    Poništi
  20. 16. sij 2018.

    Want to learn more about how we attacked keys for 2017? I wrote an article about some unpublished technical details:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·