stylenerd

@stylenerd

passionate about {product|hardware|embedded|supply chain} security.

Abu Dhabi
Vrijeme pridruživanja: rujan 2008.

Tweetovi

Blokirali ste korisnika/cu @stylenerd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stylenerd

  1. 26. sij

    Santa Claus’ package got stuck in customs but finally arrived today! Me and my whole family should be happy now😊 Big up to for an excellent customer experience!

    Poništi
  2. 21. sij
    Poništi
  3. proslijedio/la je Tweet
    7. sij

    As promised a few months ago, with we computed a chosen-prefix collision for SHA-1 for much cheaper than 100k$. Application example with impersonation on PGP Web-of-trust. website: paper:

    Poništi
  4. proslijedio/la je Tweet
    17. pro 2019.

    A few years ago, I crowdfunded and published "The Essential Guide to Shenzhen". It's now out of stock, so I've decided to share the PDF. Thank you to all my supporters who made this possible!

    Poništi
  5. 12. pro 2019.

    “The edge of the internet is becoming the center” excellent talk by on the need for a radical new mesh network architecture

    Poništi
  6. 10. pro 2019.

    Conference opening talk suggests a set of simple and useful steps to curb the spread of fake news

    Poništi
  7. 10. pro 2019.
    Poništi
  8. 10. pro 2019.

    On my way to Hong Kong for a conference on fake news, disinformation, propaganda and AI, speech and face recognition. Perfect timing and location to discuss some of the most pressing challenges of our times.

    Poništi
  9. proslijedio/la je Tweet
    15. stu 2019.

    Those very expensive em probes wouldn't use a cheap pen body as a base... Right? (Thanks to Jens-Peter Kaps who first told me this, I had to check)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    13. stu 2019.

    Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    Both Intel fTPM and CC EAL 4+ certified ST TPM affected.

    Poništi
  12. proslijedio/la je Tweet
    10. stu 2019.

    - What do we say to Triple-DES? - OK, Boomer

    Poništi
  13. proslijedio/la je Tweet

    "For Google’s engineers, MINIX was an entire attack surface they didn’t know about, understand, or defend. MINIX is one of the catalysts that pushed Google to fabricate its own hardware and led to OpenTitan." nice write up by

    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    WPI is growing the cybersecurity group (again) :). Assistant Prof position available

    Poništi
  15. 28. lis 2019.

    Arrived in to give a keynote on “Practical supply chain security” at the PANDA conference.

    Poništi
  16. 16. lis 2019.

    Laser fault injection on a shoe string. Check out our 10$ demo at the booth.

    Poništi
  17. 15. lis 2019.
    Poništi
  18. 14. lis 2019.

    From photograph to net list in three steps, as simple as that 😉

    Poništi
  19. 14. lis 2019.

    My colleague Tomas Drab is starting his Talk on „Physiys of Security“. Check it out if you want to get started in chip invasive attacks and IC reverse engineering

    Poništi
  20. 13. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·