reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (❤️program/code analysis)🐞🔍 @adhsec on hellsite, they/them, enby, #AuDHD
roughly 1/600th of the ipv9.5 address space
all beings welcome
berlin
Interested in iOS/macOS internals/security...
I break stuff | iOS Researcher @Cellebrite
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ
🎦 youtube.com/@jiskac
📝 naehrdine.blogspot.com
🐥 twitter.com/naehrdine
🎓 hpi.de/classen
📱 reversing.training
Hacker. Ascetic. Phrack author. The most technical boy in town.
RC F'13, F2'17
Cryptogopher / Go cryptography maintainer
Professional open source maintainer
https://filippo.io / https://github.com/FiloSottile
https://mkcert.dev / https://age-encryption.org
https://sunlight.dev / https://filippo.io/newsletter
A circus artist with a visual studio license
Kernel/hypervisor engineer @awscloud EC2. Hobby @checkra1n. On Mastodon @ http://mastodon.social/@never_released.
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
Working on Project Zero, Big Sleep, and V8 Security. Personal account.
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com