Teddy Reed

@teddyreedv

Security software engineer; osquery developer; trusted computing, embedded hacking enthusiast; he/him

Vrijeme pridruživanja: rujan 2010.

Tweetovi

Blokirali ste korisnika/cu @teddyreedv

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @teddyreedv

  1. 15. pro 2019.

    Solid work, congrats to the Pysa team and those who worked quick to fix the findings! Excited to see what’s next!

    Poništi
  2. proslijedio/la je Tweet

    Do you have something crazy going on and want to present it to the community? Submit your talk until June 30, 2019. Speakers get complimentary admission to the conference. We have also scholarship funds to help you attend the conference. So just go ahead:

    Poništi
  3. 29. kol 2018.

    I have a lot of single board computers that boot using U-Boot or ATF. It seems reasonable to create a root-of-trust using MMC/SPI write-protection of this initial boot code. The root is not in the CPU, but it’s still from ROM. Assuming the flash ucode is OK, what could go wrong?

    Poništi
  4. proslijedio/la je Tweet
    24. kol 2018.

    Melanie Ensign () communications advisor with Uber, will share her insights on covering cybersecurity and data breach trends at . Register today.

    Poništi
  5. proslijedio/la je Tweet
    27. stu 2017.

    To make it a little easier for you to get started with ARM exploitation, I compiled some small buffer overflow challenges to play around with and created a quick guide. All you need to do is follow the instructions and start tinkering around. Have fun 🖤

    Poništi
  6. proslijedio/la je Tweet
    20. stu 2017.

    Just a humble reminder to everyone freaking out by INTEL-SA-00086 aka total ME takeover: ME is a core of fTPM 2.0, BootGuard, SGX, PAVP, ICC, DAL and who knows what else on modern Intel platforms, so you you want to freak out - do it harder! ;)

    Poništi
  7. proslijedio/la je Tweet
    20. stu 2017.

    RuCTFE is going to start in less than two weeks, and we are ready to present something new to you. We hope you'll like it :) Here it is, RuCTFE Cloud!

    Poništi
  8. 1. stu 2017.

    Come join engineers from Facebook’s intrusion detection team tomorrow as we walk through introductory to advanced osquery usage!

    Poništi
  9. proslijedio/la je Tweet
    19. lis 2017.

    My presentation on Intel AMT: Using and Abusing the Ghost in the Machine:

    Poništi
  10. proslijedio/la je Tweet
    25. lis 2017.

    I'm super excited about the program! Check it out at .

    Poništi
  11. proslijedio/la je Tweet
    23. lis 2017.

    rolled some beautiful trackers for our 10k!

    Poništi
  12. proslijedio/la je Tweet
    26. ruj 2017.
    Poništi
  13. proslijedio/la je Tweet
    28. kol 2017.

    Disabling Intel ME 11 via undocumented mode

    Poništi
  14. proslijedio/la je Tweet
    24. kol 2017.

    HP finally disclosed that iLO 4 2.53 includes a critical security fix. Patch NOW. Really...

    Poništi
  15. proslijedio/la je Tweet
    24. kol 2017.
    Poništi
  16. proslijedio/la je Tweet
    14. kol 2017.
    Poništi
  17. proslijedio/la je Tweet
    20. srp 2017.

    Tor has a public bug bounty program! Will pay on top of Mozilla's; for proxy bypass, NoScript bypass, fingerprinting

    Poništi
  18. proslijedio/la je Tweet
    9. velj 2017.
    Poništi
  19. proslijedio/la je Tweet
    21. ruj 2016.

    This is one of the most important uses of chipsec: static detection of vulns, especially those that vendors don't acknowledge

    Poništi
  20. proslijedio/la je Tweet
    15. ruj 2016.

    Duo + Google = CrOS Verified Access...TPM-rooted remote device attestation. This is big.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·