NSDepression (@3ziwib4x8s89088) 's Twitter Profile
NSDepression

@3ziwib4x8s89088

ID: 1827867560680800258

calendar_today26-08-2024 00:36:13

146 Tweet

9 Followers

313 Following

Nassim Nicholas Taleb (@nntaleb) 's Twitter Profile Photo

No, I don't want to "learn fast", in any subject. I don't want shortcuts. If I don't enjoy the subject, I don't want to learn it; and if I enjoy it, I want to prolong the pleasure. I avoid what exam-takers do: I trade speed for depth.

Mykola Grymalyuk (@khronokernel) 's Twitter Profile Photo

In preparation for macOS Sequoia on Monday, we're proud to announce OpenCore Legacy Patcher 2.0.0! And with it, all 83 Macs we supported in Sonoma are supported in Sequoia! github.com/dortania/OpenC…

In preparation for macOS Sequoia on Monday, we're proud to announce OpenCore Legacy Patcher 2.0.0!

And with it, all 83 Macs we supported in Sonoma are supported in Sequoia!
github.com/dortania/OpenC…
hasherezade (@hasherezade) 's Twitter Profile Photo

New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies 😊! Check it out: github.com/hasherezade/pe…

New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies 😊! Check it out: github.com/hasherezade/pe…
Marcel Böhme👨‍🔬 (@mboehme_) 's Twitter Profile Photo

OpenSSH CRC32 compensation CVE-2001-0144. Michal Zalewski (!) piped random data into OpenSSL for fun and found a crash. Probably the only remotely exploitable OpenSSL bug found via fuzzing.

Marcel Böhme👨‍🔬 (@mboehme_) 's Twitter Profile Photo

But maybe we need to be faster rather than smarter? Let's look at fuzzer performance bottlenecks. Let's look at dedicated hardware.

Lukas Arnold (@lukasarnld) 's Twitter Profile Photo

Our paper about the initial research conducted with CellGuard, iOS tooling for Qualcomm basebands, and Apple Location Services has been accpeted for RAID Conference. Read a preprint at lukasarnold.de/posts/raid24-p… x.com/RAID_Conferenc…

Jiska (@naehrdine) 's Twitter Profile Photo

CellGuard goes public! 📶 Check if your iPhone was close to potentially malicious cellular base stations, even on non-jailbroken devices.

CellGuard goes public! 📶 Check if your iPhone was close to potentially malicious cellular base stations, even on non-jailbroken devices.
john (@nyan_satan) 's Twitter Profile Photo

Yet another cursed internal device from Apple Inc. A144bAP - PCIe card, seemingly network, with… Apple T2 SoC! Unfortunately, I don’t have anything to put it into for now, but AFAIK it runs iBoot at the very least and has SDOM 02

Yet another cursed internal device from Apple Inc.

A144bAP - PCIe card, seemingly network, with… Apple T2 SoC!

Unfortunately, I don’t have anything to put it into for now, but AFAIK it runs iBoot at the very least and has SDOM 02
xvonfers (@xvonfers) 's Twitter Profile Photo

Apple security updates: support.apple.com/en-us/121234 support.apple.com/en-us/121247 support.apple.com/en-us/121246 support.apple.com/en-us/121241 support.apple.com/en-us/121238 support.apple.com/en-us/121250

GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

GHSL-2024-095: Type confusion leading to RCE in the Chrome renderer sandbox - CVE-2024-5830 securitylab.github.com/advisories/GHS…

Paul Chaignon (@pchaigno) 's Twitter Profile Photo

Juan Jose Lopez Jaimez (Google) presented Buzzer at #LinuxPlumbers, an #eBPF-specific fuzzer for the verifier. He explained the two CVEs they found and what they learned from it. Slides: lpc.events/event/18/contr… Recording: youtube.com/live/mfMbtQYas…

Juan Jose Lopez Jaimez (Google) presented Buzzer at #LinuxPlumbers, an #eBPF-specific fuzzer for the verifier. He explained the two CVEs they found and what they learned from it.

Slides: lpc.events/event/18/contr…
Recording: youtube.com/live/mfMbtQYas…
Eugene Rodionov (@vxradius) 's Twitter Profile Photo

Continuing the series on exploiting Android Binder with Binder internals blog androidoffsec.withgoogle.com/posts/binder-i… Deep dive into Binder driver by abcSup and Gulshan. We also release github.com/androidoffsec/… -- tiny lib featuring how to do IPC via Binder driver. Happy Binder hacking!