phakeobj

@phakeobj

Security Researcher | Exploit Developer | 🏴‍☠️

Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @phakeobj

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @phakeobj

  1. 24. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    11. pro 2019.

    My team in Sunnyvale is looking for a Summer 2020 intern to work on fuzzing-related research. The deadline to apply (for any intern position at Google) for Bachelors/Masters is this Friday and for PhD students Feb 7.

    Poništi
  3. proslijedio/la je Tweet
    10. pro 2019.

    When you get a flag with 20 seconds left

    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.
    Odgovor korisnicima

    None. This key is only used for decrypting firmware of a single version of SEP/OS for one device. We can now audit the firmware for vulnerabilities. It is important to know that iOS security does not depend on firmware encryption, hence this key is not security-critical.

    Poništi
  5. proslijedio/la je Tweet
    10. pro 2019.

    Welp, now has started abusing DMCA copywrite claims to take down things they don't like that are not copywritten. The encryption key for the SEP in your phone is not copywritable afaik, looks like a case for to start trying to provide some assistance.

    Poništi
  6. 27. stu 2019.
    Poništi
  7. 16. stu 2019.

    Now also published in the 2nd issue of that was released just yesterday!

    Poništi
  8. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  9. proslijedio/la je Tweet
    12. stu 2019.

    Paged Out! #2 ETA: This Friday.

    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    checkra1n beta 0.9 is now available at ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi
  12. proslijedio/la je Tweet
    24. lis 2019.

    Technical analysis of the checkm8 exploit

    Poništi
  13. proslijedio/la je Tweet
    13. lis 2019.
    Poništi
  14. proslijedio/la je Tweet
    4. lis 2019.

    ... 4. Totally hate: Javascript 5. Most loved: Javascript given an ArrayBuffer with corrupted size ...

    Poništi
  15. 23. ruj 2019.

    PSA, Xcode 11 brings python 3 to LLDB. If you haven't got your modules transformed already, you can still use python 2 by setting the following default: 'defaults write com.​apple.​dt.​lldb DefaultPythonVersion 2'

    Poništi
  16. 27. kol 2019.

    a while ago I wrote a short technical overview about an exploit mitigation in WebKit. I hope you'll find it interesting.

    Poništi
  17. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    1. kol 2019.

    Remotely Stole Files Through iMessage on iOS 12.3.1 (CVE-2019-8646 by na...

    Poništi
  19. 24. srp 2019.
    Prikaži ovu nit
    Poništi
  20. 24. srp 2019.

    It seems like iOS 12.4 introduced the new structureID randomization mechanism (that was bypassed by since pushed to WebKit 5 months ago)... Good to have you here, we were waiting for you :)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·