Marcel Winandy

@mwinandy

Computer security researcher and system security architect. Trying to make systems behave as intended. Senior cyber security architect 🇩🇪

Köln, Deutschland
Vrijeme pridruživanja: lipanj 2008.

Tweetovi

Blokirali ste korisnika/cu @mwinandy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mwinandy

  1. proslijedio/la je Tweet
    27. sij

    New cache attack against Intel CPUs:

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    Coming soon to OpenSSL: a simple, safe and performant API for primality testing. With , and with thanks to Kurt Roeckx from OpenSSL and who posed the question.

    Poništi
  3. 22. sij
    Poništi
  4. proslijedio/la je Tweet
    21. sij

    If this is true, it’s probably the dumbest opsec story I’ve ever heard.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    15. sij
    Poništi
  6. 15. sij

    Throughout last year, we have developed the methodology to bring into the development processes in and digitalization. It’s based on the diverse experience of our cyber security architecture team at

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    The next chapter of Security Engineering v 3 is on inference control. It tracks the 40-year myth that sensitive personal data can be "anonymised" well enough to turn it into industrial raw material:

    Poništi
  8. 24. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    24. pro 2019.

    Do something nice for your family this holiday season: go through their phone settings and turn on all the privacy features.

    Prikaži ovu nit
    Poništi
  10. 19. pro 2019.

    I’ve been often asked, especially from managerial roles in industry, what a security architecture is and how a security concept should look like. Here’s a nice example how Apple is doing this.

    Poništi
  11. proslijedio/la je Tweet
    19. pro 2019.

    Now live! 🔺The new Apple Security Bounty! 🔺The new Apple Platform Security guide, featuring Mac for the first time! (PDF version: ) 🔺My Black Hat 2019 talk: Happy holidays! 🎄

    Poništi
  12. proslijedio/la je Tweet
    18. pro 2019.

    My Security Engineering book chapter on smart meters, smart tachographs, curfew tags and other monitoring equipment is now online:

    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    When you tell me you are a "senior" engineer, I expect you: Read RFCs Write documents Present to your peers Know how to discuss in writing Understand tradeoffs Back arguments with data Know how to manage meetings Self manage Prove there's a problem before you implement a solution

    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    “49% of workers, when forced to update their password, reuse the same one with just a minor change” by < absolutely no surprise

    Poništi
  15. proslijedio/la je Tweet
    8. pro 2019.

    What does ’s license imply? tl;dr nothing you should have to worry about; it won’t infect your valuable IP and in most cases you shouldn’t even touch the GPLed code

    Poništi
  16. proslijedio/la je Tweet
    9. pro 2019.

    this elevator needs its SD card formatted and i think i'll be taking the stairs

    Poništi
  17. proslijedio/la je Tweet
    25. stu 2019.

    It was 1979, this lost video shows Adele Goldberg of Xeroy PARC give a demonstration of precisely what Steve Jobs saw—just a few months earlier. We see Smalltalk, the mouse, graphical user interface, windows, pop-up menus & browsers. This demonstration changed Steve—forever.

    Poništi
  18. proslijedio/la je Tweet
    29. stu 2019.

    If you bet against iOS security, you are betting against the progress of the human race. (This is the iPhone 11 compared to its closest competitor, the secured Android smartphone, which does not exist.)

    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    Plus the new Apple Security Bounty, featuring all Apple platforms and open to everyone, million dollar max payout, live later this year — and iOS Security Research Device program, an unprecedented, Apple-supported research platform for talented researchers, coming next year!

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·