Kyle

@switchp0rt

program analysis, compilers, reverse engineering, functional programming, bayesian

127.0.0.1
Vrijeme pridruživanja: prosinac 2012.

Tweetovi

Blokirali ste korisnika/cu @switchp0rt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @switchp0rt

  1. proslijedio/la je Tweet
    31. sij

    What unreleased FSD Autopilot sees. Straight from Tesla Autopilot recruiting website.

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    🧵Before building or evaluating a tool, it's worth asking (paraphrasing Perl's Larry Wall): "Is this tool meant to make easy things easy, or hard things possible?"

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    20. pro 2019.

    The reason that bogus cyber security advice grates on me is that in increases fear and superstition. In reality, computing today is massively safer than a decade ago. Remember when drive-by downloads were a common thing and they would install adware, etc? Not so much anymore.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. stu 2019.

    I saw a guy building a company today. No burnout. No all-nighters. No overnight success. He just sat there. Delivering value and charging a fair price for it. Like a psychopath.

    Poništi
  5. proslijedio/la je Tweet
    17. stu 2019.
    Odgovor korisnicima

    Because Microsoft already has a mature static analysis capability, our bugs are predominantly from fuzzing. A minority are from manual code review. Anecdotally, the majority of bounty-eligible external cases in Windows are from fuzzing.

    Poništi
  6. proslijedio/la je Tweet

    New: Infamous hacker Phineas Fisher offers $100,000 as a “Hacktivist Bug Hunting Program” for hacks against spyware companies like NSO, banks, or oil companies.

    Poništi
  7. proslijedio/la je Tweet
    17. stu 2019.

    Great talk! And super cool project written in Go.

    Poništi
  8. proslijedio/la je Tweet
    16. stu 2019.

    Chrome, Edge, Safari hacked at Tianfu Cup, China's elite hacking competition - (old) Edge hacked 3 times - Chrome twice - Safari once - Office 365 hacked in 16 seconds - 32 sessions announced: 13 successful, 7 failed, 12 abandoned

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    10. stu 2019.

    Crucial new paper from Jordan Jueckstock and : “VisibleV8: In-browser Monitoring of JavaScript in the Wild” Patching Chrome V8 jit to allow monitoring and introspection on JS, “VV8 provides a JS analog to the classic Linux strace utility” 😍

    Poništi
  10. proslijedio/la je Tweet

    Cracking presentation from , standout quote: 'The only thing that ever yielded real security gains was controlling complexity.'

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. stu 2018.

    Xcode, all you ever tell me is WARNINGS and ERRORS, it’s always problems and bad things with you, that’s so toxic would it kill you to say nice things about my code every once in a while?

    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    A history lesson for people who think that history doesn't matter: What's the big deal about railroad tracks? The US standard railroad gauge (distance between the rails) is 4 feet, 8.5 inches. That's an exceedingly odd number. Why was that gauge used? Well, because that's the way

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    26. ruj 2019.

    "When we raise money it’s AI, when we hire it's machine learning, and when we do the work it's logistic regression." (I'm not sure who came up with this but it's a gem 💎)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. ruj 2019.

    That North Korea uses cyberattacks for financial theft as a source of state funds is one of the weirdest parts of our increasingly dystopian cyberpunk sci-fi timeline.

    Poništi
  15. proslijedio/la je Tweet
    12. ruj 2019.

    nice!!! paper is "SATURN: Software Deobfuscation Framework Based on LLVM"

    Poništi
  16. proslijedio/la je Tweet
    9. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    27. kol 2019.

    the calls are coming from inside the typedef!

    Poništi
  18. proslijedio/la je Tweet
    17. kol 2019.

    Quick proof of concept. Do you need an entire Bluetooth module just to wirelessly trigger 2 static payloads on a dinky ATTiny chip? Nope! I took a DemonSeed build kit, added just 1 resistor & some patch wires. Now it has wireless control of as many payloads as you want!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. kol 2019.

    Hey - what about T-shirts or Hoodies with these QR codes on them. One says "DO NOT TAKE PHOTOS AT DEF CON" the other says "I DO NOT CONSENT TO THIS PHOTO OR VIDEO". Which due to the camera apps auto reading QR codes should pop up this message if you happen to be in-frame.

    DO NOT TAKE PHOTOS AT DEF CON
    I DO NOT CONSENT TO THIS PHOTO OR VIDEO
    Poništi
  20. proslijedio/la je Tweet
    12. kol 2019.

    There are 5985 AWS privileges. 2505 (42%) have no condition restrictions possible (other than the global conditions) and can only use a resource of *. ec2 is the "worst" service with 259/338 (76%) privileges that cannot be restricted beyond * access. :(

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·