@Straiker. Ex-Microsoft. Ex-Meta RedTeam, Ex-Endgame, Ex Fireeye. malwareunicorn.org
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
【DΞCOMPILΞ NΣVΞR】
Android Red Team @google
Fuzzing @aflplusplus.bsky.social
CTF @enoflag
(opinions my own)
Firmware/OS/Cellular Security Research @ruhr-uni-bochum.de
InfoSec Faculty @ #CISPA. Side-channel attacks. Exploiting microarchitectures. Discovering CPU vulnerabilities.
Computer history. Reverse-engineering old chips. Restored Apollo Guidance Computer, Alto. Ex-Google, Sun, Msft. So-called boffin.
Product Security @Qualcomm. Ex PhD @VUsec
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
Binary Security Researcher & Trainer
Website: https://synthesis.to
Security research architect for Microsoft Defender for cross-platform.
Linux, Windows, Android, MacOS, iOS, ChromeOS, baremetal.
https://jonathanbaror.com
Lord of Loaders at Volexity
Author of books and tools for reverse engineering. Studebaker driver, but an awful mechanic. Home chip decapsulation.
Currently writing a new assembler, to be released in February.
Technical Research Lead at @TrendMicro | President and co-founder @nohatcon | Co-founder @signalcapture | @embyte@infosec.exchange | Tweets are my own
Full of sound and fury
Signifying nothing
Aka @lavados #InfoSec University Professor @ #TUGraz. #meltdown, #spectre, #rowhammer, cache attacks, sustainable security. Produced a side channel security sitcom. https://gruss.cc https://x.com/lavados https://infosec.exchange/@lavados
RC F'13, F2'17
Cryptogopher / Go cryptography maintainer
Professional open source maintainer
https://filippo.io / https://github.com/FiloSottile
https://mkcert.dev / https://age-encryption.org
https://sunlight.dev / https://filippo.io/newsletter