WOOT '25 Technical Sessions
Discounted early bird registration for WOOT '25 is still open until Monday - www.usenix.org/conference/w... - join us in Seattle on Aug 11/12 (right before USENIX Security) for talks and discussions on great cutting-edge offensive security research. Full program at www.usenix.org/conference/w...
17.07.2025 13:23 — 👍 3 🔁 5 💬 1 📌 0
Our research on open tunneling servers got nominated for the Most Innovative Research award :)
The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security
Brief summary and code: github.com/vanhoefm/tun...
Paper: papers.mathyvanhoef.com/usenix2025-t...
12.07.2025 20:17 — 👍 7 🔁 6 💬 0 📌 0
Huge implications from this: Microsoft cut off the email of the chief prosecutor of the International Criminal Court, because of his work on Israel www.nytimes.com/2025/06/20/t...
20.06.2025 18:18 — 👍 1356 🔁 718 💬 43 📌 107
Security through Transparency: Tales from the RP2350 Hacking Challenge | USENIXusenix_logo_notag_white
Two winners of the RP2350 Hacking Challenge will present their results at WOOT!
Muench et al. break its secure boot guarantees through voltage, electromagnetic, and laser fault injection 💥 techniques: www.usenix.org/conference/w...
19.06.2025 12:48 — 👍 7 🔁 3 💬 1 📌 0
YouTube video by OffensiveCon
OffensiveCon25 - Daniel Klischies and David Hirsch
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: youtu.be/zoAITq7jUM8. It has been a pleasure; awesome conference, brilliant people. Slides and paper: www.danielklischies.net/research/bas...
28.05.2025 11:21 — 👍 8 🔁 3 💬 0 📌 0
“Google wanted that”: Nextcloud decries Android permissions as “gatekeeping”
Without full file access, it’s kind of hard to use your own cloud.
Since mid-2024, Google has refused to reinstate the access Nextcloud needs for uploading and syncing other file types to its host-your-own cloud platform.
14.05.2025 18:46 — 👍 28 🔁 9 💬 0 📌 3
Haven't seen this on Bluesky yet: S&P 2027 will take place in Montreal, Canada!
14.05.2025 06:45 — 👍 29 🔁 17 💬 2 📌 3
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. Dyon will present at IEEE S&P on Monday 3pm, while David and I will be on stage at @offensivecon.bsky.social on Saturday 11am with even more details! 1/6
11.05.2025 10:23 — 👍 13 🔁 7 💬 1 📌 1
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs
Despite their misleading marketing, TeleMessage, the company that makes a modified version of Signal used by senior Trump officials, can access plaintext chat logs from its customers.
In this post I ...
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs. My findings are based on TM SGNL's source code, and they are corroborated by hacked data micahflee.com/despite-misl...
06.05.2025 20:00 — 👍 783 🔁 332 💬 23 📌 89
For the past while J-P at @newae.com has been working on a major #ChipWhisperer doc refactor - this is now live, check out chipwhisperer.readthedocs.io/en/latest/in... . It moves software, hardware, and even some tricks/tips all into once place using Jupyter Books. Huge improvement in usability!
14.03.2025 22:14 — 👍 8 🔁 6 💬 0 📌 0
Amazon product page displayed in a browser window for the book titled 'Engineering Bridges That Don’t Fall Down' by Colin O'Flynn. The book cover shows a partially collapsed steel bridge against a blue sky. The page lists the book as having 4.5 stars from 132 reviews, priced at $29.99 for paperback and $9.99 for Kindle.
Here you are @oflynn.com :)
22.04.2025 09:47 — 👍 2 🔁 0 💬 0 📌 0
Symlink backdoor on Fortinet SSL-VPN devices – Blog | Big Data for Cyber Defense
💥Detection method for #symlink #backdoor on #fortinet
"we are willing to share it, privately"
More than 18k devices compromised
Read more: blog.onyphe.io/en/symlink-b...
21.04.2025 12:49 — 👍 4 🔁 2 💬 0 📌 2
On est d'accord que...
20.04.2025 13:04 — 👍 2009 🔁 356 💬 66 📌 13
Defend the Internet Archive.
Protect the Wayback Machine.
Tell the music labels: Drop the 78s lawsuit.
Sign our open letter on change.org
📢 The Internet Archive needs your help.
At a time when information is being rewritten or erased online, a $700 million lawsuit from major record labels threatens to destroy the Wayback Machine.
Tell the labels to drop the 78s lawsuit.
👉 Sign our open letter: www.change.org/p/defend-the...
🧵⬇️
17.04.2025 16:51 — 👍 19844 🔁 15979 💬 127 📌 469
And pretty please, let's move S&P from San Francisco and NDSS from San Diego. Thanks 😘
20.03.2025 10:54 — 👍 18 🔁 4 💬 0 📌 1
YouTube video by Colin O'Flynn
Colin's Into to PCB Design Part 1 - PCBs, Traces, and More (Dalhousie 2025 ECED Lecture)
Finally finished uploading my "Intro to PCB Design" lectures from my class this semester - Part 1 at youtu.be/N544CMR8I-M and rest linked from there. Slides and example project for students to complete at github.com/colinoflynn/... if you want to reuse it! #pcb #pcbdesign #electronics #kicad
30.03.2025 19:27 — 👍 33 🔁 10 💬 1 📌 0
Screenshot of X post: https://x.com/mer__edith/status/1902383162065400296, part 1
BAT SIGNAL: A law in France that would mandate a backdoor in end to end encrypted communications is set for a vote within the next day, after some start-stop skirmishes.
The French Narcotraffic law would require encrypted communications providers—like Signal—create a backdoor by giving the government the ability to add themselves to any group or chat they like. In the name of (checks notes) fighting drug trafficking.
While those hyping this bad law have rushed to assure French politicians that the proposal isn’t’ ‘breaking encryption’ their arguments are as tedious as they are stale as they are laughable. For those catching up, let’s review the basics: end to end encryption must only have two ‘ends’—sender and recipient(s). Otherwise, it is backdoored. Whatever method is devised to add a ‘third end’ —from a perverted PRNG in a cryptographic protocol, to vendor-provided government software grafted onto the side of secure communications that allow said government to add themselves to your chats—it rips a hole in the hull of private communications and is a backdoor.
Indeed, the ghost participant proposal was roundly rebuked (humiliated, even) when it was first proposed in 2019 in the UK. The technical community was united, and it was never implemented in law or otherwise.
Screenshot of X Post, Meredith Whittaker, President of Signal https://x.com/mer__edith/status/1902383162065400296
We cannot accept any backdoor, however it’s dressed up. Communications don’t stay within jurisdictional boundaries. Which means a hole created in France becomes a vector for anyone wanting to undermine Signal’s robust privacy guarantees, anywhere. Instead of contending with unbreakable math, they only have to compromise a French government employee, or the vendor-provided software used to sideload government operatives into your private chats.
This is why, as always, Signal would exit the French market before it would comply with this law as written. At this moment especially, there is simply too much riding on Signal, on our being able to forge a future in which private communication persists, to allow such pernicious undermining.
We hope—WE HOPE—that this callow, dishonest attack will fail, and will be the last. We would love to get back to the work of maintaining and improving our core technologies, instead of fighting legislation which is distinguished in nothing as much as its refusal to listen to decades of expert consensus in its drive to imperil global cybersecurity and the human right of privacy.
"Signal would exit the French market before it would comply with this law as written"
Meredith Whittaker @meredithmeredith.bsky.social, President of Signal @signal.org
19.03.2025 19:54 — 👍 187 🔁 78 💬 6 📌 5
Tamarin book draft v0.9
Nearly finished! "Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide" (Basin, Cremers, Dreier, and Sasse) will be published by Springer in the near future.
I'm very happy to announce that a full draft of our book is now available for download at tamarin-prover.com/book/
16.03.2025 13:19 — 👍 7 🔁 2 💬 2 📌 0
Petit récap sur les amendements déposés sur la loi narcotrafic :
- réintroduction de l'article 8 ter sur les applis chiffrées par Olivier Marleix (LR) www.assemblee-nationale.fr/dyn/17/amend...
- mais aussi par Paul Midy (EPR) dans une versionTRES proche : www.assemblee-nationale.fr/dyn/17/amend...
15.03.2025 08:24 — 👍 1 🔁 2 💬 1 📌 0
Proposition de loi visant à sortir la France du piège du narcotrafic (no 1043) Amendement n°655
Pour l'heure, aucun amendement du gouvernement à la #PPLNarcotrafic discutée à partir de lundi ne rétablit feu l'article 8ter (accès aux communications chiffrées). Mais on trouve trois amendements parlementaires, peu ou prou identiques (ça alors !), qui en proposent une version remaniée.
14.03.2025 16:29 — 👍 6 🔁 5 💬 2 📌 1
Chiffrement et «portes dérobées» : sur X, la ministre du Numérique C. Chappaz plaide pour un «équilibre». Mais lequel ? Soit il y a obligation de résultat, soit il n'y en a pas. Et la situation actuelle (obligation de moyens pour les opérateurs + piratage légal) n'est-elle pas un «équilibre» ?
04.03.2025 15:05 — 👍 4 🔁 1 💬 1 📌 0
Only a week and a half left for USENIX WOOT '25 conference submissions - deadline March 11 AoE. We’re looking forward to seeing even more of your amazing offensive security papers this year! And still a few days for up-and-coming track (March 4). CfP at www.usenix.org/conference/w...
28.02.2025 20:56 — 👍 5 🔁 10 💬 0 📌 2
Site communautaire dédié aux arnaques d’internet.
🛠️ Nos services : http://bit.ly/3ZRsCkE
📢 Pour signaler une arnaque : http://bit.ly/3D5doMT
Doctorant UQAM, @RAS_NSA, Chercheur associé @FRS_org, travaille sur la culture stratégique russe...et ses déboires. Chewbaca-morphe patenté et lurker de blousks émérite
Observateur de l’extrême. 📍Paris/🇫🇷/🇪🇺/🌍
Podcast : radiofrance.fr/franceinfo/podcasts/complorama
Team : conspiracywatch.info
Me : tristan.pro
Deputy Director, Fondation pour la recherche stratégique.
Non-Resident Fellow, Institut Montaigne.
Geopolitics, strategy and stuff.
Personal account.
b.tertrais@frstrategie.org
Books: tinyurl.com/bdzbxnyx
"Luke, je suis ton pépère"
Je sers le droit et c'est ma joie - Avocat fiscaliste - Min. des aff. très étrangères à #TLB - Fait parler des drapeaux
Ecrit des trucs sur https://www.wattpad.com/user/Fenris76
Starterpack 1 : https://go.bsky.app/Hes9t2o
Waitress turned Congresswoman for the Bronx and Queens. Grassroots elected, small-dollar supported. A better world is possible.
ocasiocortez.com
Probably mostly infosec stuff, but also anything I'd love to share
Firmware/OS/Cellular Security Research @ruhr-uni-bochum.de
Member of https://lockdown.systems/ collective making @cyd.social — writing at https://micahflee.com — author of HACKS, LEAKS, AND REVELATIONS https://hacksandleaks.com — signal: micah.01
Associate Professor @ IMDEA Software Institute. Doing research on security at the hardware/software interface. Find me also at @mguarnieri@infosec.exchange
A programming language empowering everyone to build reliable and efficient software.
Website: https://rust-lang.org/
Blog: https://blog.rust-lang.org/
Mastodon: https://social.rust-lang.org/@rust
Envoyé spécial sur les internets, (data)journaliste d'investigation freelance @next.ink, formateur #factchecking, #OSINT & #OPSEC. Pour en savoir + & me contacter de façon sécurisée : https://jean-marc.manach.net
Captures flags with Tasteless. Assistant Professor at UoB and maintainer of FirmWire & avatar2.
Principal Researcher at Consensys Diligence, previously at ETH Zürich, UT Austin, Microsoft Research, and Google
Assistant Professor @ Eurecom. I'm interested in formal methods for low-level security. https://leslyann-daniel.fr
Journaliste Tech @politico.eu (Paris) | Cyber - Données - Télécoms - IA - Numérique public ...
Ex "Acteurs Publics"
Membre de l'association des journalistes pour la transparence.