Luis Grangeia

@lgrangeia

90's hacker, phrack author. Security Researcher This is a personal account.

.pt
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @lgrangeia

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lgrangeia

  1. proslijedio/la je Tweet
    16. sij

    A testing site for by (has some availability issues) Results for Chrome on an unpatched win10 vs non-vuln Mac (when you boldly move past warning messages)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    These Amazon writing tips are fantastic. 👏

    Poništi
  3. proslijedio/la je Tweet

    For the 30th anniversary of The Cuckoo’s Egg, I interviewed Cliff Stoll and tried to capture the immense, unlikely influence this polymath planetary astronomer has had on the field of cybersecurity:

    Prikaži ovu nit
    Poništi
  4. 7. pro 2019.
    Poništi
  5. proslijedio/la je Tweet

    New: Chronicle, the Google moonshot cybersecurity startup that was supposed to completely change the industry, is imploding. Current and former employees told us how the promising startup was "killed" by Google.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    7. stu 2019.

    It's finally out! Crafting an EFI Emulator and Interactive Debugger -> . Enjoy :-)

    Poništi
  7. proslijedio/la je Tweet

    A final note. This isn’t about free expression. This is about paying for reach. And paying to increase the reach of political speech has significant ramifications that today’s democratic infrastructure may not be prepared to handle. It’s worth stepping back in order to address.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    12. lis 2019.

    «No information contained on any server located w/in China will be exempted […] No communication from/to China will be exempted. [N]o secrets. No VPNs. No private or encrypted messages. No anonymous online accounts. No trade secrets. No confidential data»

    Poništi
  9. proslijedio/la je Tweet

    A year after Bloomberg's questionable spy chip story, a researcher has shown how those hardware implants aren't just possible, but potentially cheap: With $200 in gear, he hid a tiny chip in a Cisco firewall that gives him remote access. Would you spot it?

    Poništi
  10. 8. lis 2019.

    Dear Twitter, does anyone know if the code for the iOS exploit chains recently analysed by Project Zero was publicly released in any way? /cc

    Poništi
  11. proslijedio/la je Tweet
    30. ruj 2019.
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    When we watch TV, our TVs watch us back and track our habits. This practice has exploded recently since it hasn’t faced much public scrutiny. But in the last few days, not one but *three* papers have dropped that uncover the extent of tracking on TVs. Let me tell you about them.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    23. ruj 2019.

    When data contradicts security: and I challenge security field common beliefs: *SMS Challenge works *Password complexity doesn’t work *Security products can make it worse *You can measure security *”Always update”, needs updating

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    20. ruj 2019.

    RSA factoring recap since shady people are making dumb claims right now. Caveat: They used to use decimal digits for RSA key lengths, so "RSA-100" was 330 bits. 1. 256-bit RSA keys were factorable in the 1980s.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    u can’t touch this - mc hammer

    Poništi
  16. proslijedio/la je Tweet

    The first time a chess grandmaster told me they lose around 10-20 pounds during the course of a *single* tournament, my jaw was on the floor. I spent a year embedded in the bizarre world of weight loss in chess. Here is what I found:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. ruj 2019.

    "Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    6. ruj 2019.

    Today we released a community-developed exploit module PR for (CVE-2019-0708). We expect to continue refining the exploit over time in collaboration with contributors. Some important notes on exploitation and detection from :

    Prikaži ovu nit
    Poništi
  19. 5. ruj 2019.

    Schneier, our infosec Chuck Norris, obliges with the much needed roundhouse kick to the face of Crown Sterling to finish them off. Fatality!

    Poništi
  20. proslijedio/la je Tweet
    26. kol 2019.

    Very interesting work done by CITL and on binary hardening techniques. Data Shows IoT Security is Moving Backward

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·