Kees Cook

@kees_cook

Free Software Hacker he/him

Portland, OR, USA
Joined February 2010

Tweets

You blocked @kees_cook

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @kees_cook

  1. Pinned Tweet
    14 Nov 2019

    You may already be running Linux v5.3! I'm excited about heap auto-initialization, pidfd_open(), global -Wimplicit-fallthrough, x86 CR4 & CR0 pinning, more kfree() sanity checks, arm64 default KASLR, and hardware security embargo documentation:

    Undo
  2. Jan 23

    Fixing warnings from "make htmldocs" is very needed. I've done tiny pieces of it and we recently had some big cleanups in security docs, but there is much more to be done. Getting there is important because then it's easier to maintain a 0-warnings build (as done for the code)

    Undo
  3. Retweeted
    Jan 16

    My third presentation at was about the Unix wars and how strong free software licenses encourage cooperation and collaboration in building systems.

    Undo
  4. Retweeted
    Jan 16
    Undo
  5. Jan 15

    If nothing else, at least watch the rant starting around l͎͕̹ͥẻ̜̀ͪ͂̄̒t͙̭̾̏̐͑̀'̪̝͍̟͌ͥ̒̇ś͔̈͛ͩ ̗ͮ̄̐͂͊ͯ̏h̠̗̍ͧä̬̖͎̲̊v̫̭̠͒͌e̜ͭ͒ͧ ͕͌̚a̪̔͌̊̀͊ ̭̓̈ͤ͋c͖͎̏ͣ̂h̑̍ͤ͂ͦͦ̄a̫̭̩ͦ̃͆̃ͨͭ̉tͩ̑̽͌̋̃ ͖̭ͅa̹̹͍b̤̝̗̎͊́͌ö̥̱́̾u̮̪̮̗ͯt͕̲͈̟͌̍͐̈ ͚̻p̟rͣ̊ͥ̎̃ͨͨọ̬͐̊͌̚cͬ̓̈́̓̌͒f͇̠̣̃͌s̟̹̥̉̆̌ͮͪ̄̐

    Undo
  6. Retweeted
    Jan 15

    Snekboard is up on crowd supply! Come join in the fun!

    Undo
  7. Retweeted
    Jan 7

    Come to the kernel miniconf to learn 's heretical opinions on dev tooling

    Undo
  8. Retweeted
    Jan 7

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Undo
  9. Retweeted

    Live video of the red team when the shell connect

    Show this thread
    Undo
  10. Retweeted

    Ok, this is AMAZING. Take a minute and look at this, wow.

    Show this thread
    Undo
  11. Retweeted
    Undo
  12. Retweeted
    5 Dec 2019

    Pls RT: I'm looking for a paid contractor to help with Code of Conduct enforcement at Looking for candidates who are experienced at enforcing a CoC at events or in an online space. Must be available April 16 to 19 for travel to Pittsburgh, PA USA

    Show this thread
    Undo
  13. Retweeted

    Kudos to , , thousands of app developers, and especially who has relentlessly pushed for all network traffic to be encrypted, and provided developers with the tools they need to succeed. 3/3

    Show this thread
    Undo
  14. Retweeted
    3 Dec 2019

    Since some people asked, we also now have openings in Mountain View and San Diego. Especially interested in filesystem/block hackers!

    Undo
  15. Retweeted
    Show this thread
    Undo
  16. 22 Nov 2019

    Yet another reminder to always build your kernels with CONFIG_DEBUG_LIST. :)

    Undo
  17. 20 Nov 2019

    If anyone wants to follow along with booting a Clang-built CFI-enabled x86 kernel, I've written up the instructions to build the latest LLVM and 's LTO/CFI/SCS tree. Enjoy!

    Undo
  18. Retweeted
    18 Nov 2019

    [$] Some near-term arm64 hardening patches

    Undo
  19. Retweeted
    Undo
  20. 6 Nov 2019

    With all the amazing work from and many Clang and LLVM devs, I'm excited to have finally gotten x86 booted with working CFI. :) (arm64 has been working for a while...)

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·