Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @pwnallthethings
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @pwnallthethings
-
Pinned TweetThanks. Twitter will use this to make your timeline better. UndoUndo
-
Pwn All The Things Retweeted
More on
@Google's collab to secure the software supply chain. "Instead of being reactive to vulnerabilities, we should eliminate them proactively with secure languages, platforms, and frameworks that stop entire classes of bugs."https://security.googleblog.com/2021/08/updates-on-our-continued-collaboration.html …Thanks. Twitter will use this to make your timeline better. UndoUndo -
Pwn All The Things Retweeted
NEW REPORT From Pearl to Pegasus: Bahraini Government Hacks Activists with NSO Group Zero-Click iPhone Exploitshttps://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/ …
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Typical. Rain starts 2 minutes after I go out, stops 2 minutes after I come back in.
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Extremely niche tweet but my God it delivershttps://mobile.twitter.com/jckarter/status/1428093469755527168 …
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Pwn All The Things RetweetedThanks. Twitter will use this to make your timeline better. UndoUndo
-
Pwn All The Things Retweeted
The Dan Kaminsky Fellowship is now accepting applicationshttps://dankaminskyfellowship.splashthat.com/
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Pwn All The Things Retweeted
The Dan Kaminsky Fellowshiphttps://dankaminskyfellowship.splashthat.com/
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Does Apple ask other auditors for free labor after setting them up to fail? "Hi accountants, our calculation on this napkin is correct and the warehouse of receipts is subject to inspection by accountants who wish to verify it'? Of course not. Only this industry gets screwed.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
And notice the implicit assumption here in the first place. Security researchers *will* do the review, fighting over all of the obstacles intended to make actually doing the review simple. For free. Why? Why is this considered acceptable?
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Perhaps one way would be to write your own app to find unusual ways to compute the master hash and validate that it is valid, without relying on static graphical elements that hackers or Apple could surgically manipulate. But you think that app would get past AppStore review?
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
That's even before we get into the various encrypted firmwares where you can't even see the binary, or the apps on the device that are partially or fully encrypted.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Analysis of the binary itself is not even sufficient if Apple itself is in your threat model; the kernel sits underneath it, and is enormous and, you guessed it, also symbol stripped to frustrate reverse-engineering.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
How about dynamic analysis? Unless Apple is planning on giving the iCloud app the get-task-allow permission so you can attach a debugger, that would be out of the question on an vanilla iPhone. You'd need to resort to jailbreaks, or, heaven forbid, a Corellium device
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Are they going to do static analysis of the binary? Ok. But iOS binaries are intentionally stripped of non-essential symbols precisely to make this kind of analysis harder.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Might be a slightly self-indulgent thread, but how exactly does Apple suppose that security researchers will do this without running across anti-research minefields that Apple has intentionally laid down to block exactly this kind of research?pic.twitter.com/v0Q7uF7QH5
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Pwn All The Things Retweeted
I spoke to
@msftsecurity about journalism security, the opportunity to support incredibly important work, and the need for more focus on attacks against media orgs.https://www.microsoft.com/security/blog/2021/08/10/how-security-can-keep-media-and-sources-safe/ …Thanks. Twitter will use this to make your timeline better. UndoUndo -
If the evidence were real, it would be both easy, and in their interests, to show it plainly and widely. And instead we have layers of intentionally stripping context and obfuscation. Because it's fraud.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
Someone took probably an http log or wireshark, stripped it of context to obfuscate where it came from, put it in an RTF document, and then to further hide what it means, intentionally encoded it into hex to make it look scary and technical.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo -
In case you're wondering, the IP addresses are a filtered list of normal web-crawlers that just continuously scan the entire internet, (and you'll see similar logs on literally every website on the internet).
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

