-

Twitter avatar for @hardwear_io
hardwear.io @hardwear_io
Twitter avatar for @axi0mX
ax🔥🌸mX @axi0mX
Amazing work. 👏

A4 GID key was not revealed in the talk, but if you look closely at @tihmstar's t-shirt, there are 260 characters. 🧐

That is an easter egg! Remove 't1hm' and you get the A4 GID key. 🤯

e77f3e9c5e6c00086aa7b68e58994a639cc360d6027c90b53eb8b3b015f72f56

A4 GID
11100111011111110011
111010011100t0101111
00110110000000000000
01000011010101010011
11011011010001110010
11001010011001010010
10011000111001110011
000011011000h0011010
11000000010011111001
00100001011010100111
1101011100m010110011
10110000000101011111
01110010111101010110
Twitter avatar for @hardwear_io
hardwear.io @hardwear_io
⚡Breaking into iPhone's last Security Barrier

📱Tihmstar @tihmstar presented his work on attacking the iPhone's hardware AES crypto core through an EM-side-channel in order to retrieve the hardware fused GID & UID keys

🍿Enjoy the talk▶️https://t.co/o7HiFb8RqD

hw_ioNL2022

-

-

"Nearly three-quarters of the 5G network operators surveyed said they’ve experienced up to six security breaches or cyberattacks in the past year. These breaches resulted in network downtime, customer data leaks, regulatory liabilities, fraud and monetary theft.

Nearly two-thirds of the network operators surveyed said security staff spend more than 30% of their time on manual security tasks. More than 4 in 10 respondents said at least 40% of security teams’ time is spent on vulnerability and threat management tasks that could be automated."


-

NSA's Cybersecurity Speaker series talks about building in trust from the start: “Security on day one” Check out Dr. Josiah Dykstra speaking with Natalie Pittore, Enduring Security Framework chief, and Martin Goldberg, NSA’s lead for 5G standards.

-

“Looking at old #bugs is a great way to quickly find new ones.

Sometimes the patch only fixes a symptom rather than the bug.

Sometimes there can be other variants of a bug which the patch missed.

And sometimes the patch just introduces new bugs.”

— Ian Beer

-

Somebody used Twitter Blue to get a blue tick, then posted a deepfake video of the former FTX CEO for a cryptocurrency scam.

https://infosec.exchange/@gossithedog/109383573518924274

-

Just in the three and a half weeks since Musk took over Twitter on October 28, Tesla stock is down 27%, losing $190 billion in value. https://t.co/xoMQHQVbQV

-

Twitter avatar for @ashleygjovik
Ashley M. Gjøvik, J.D. @ashleygjovik@mstdn.social @ashleygjovik
Apple claims it's Bug Bounty program "serves the public interest"

Yet, a “security researcher in Apple’s Security Bug Bounty Program has had his bugs used by the Chinese government against Uyghurs, an ethnic minority group primarily living in China.”

WHAT.

Moreover, despite its claim that security research “serves the public interest only when . . . vulnerabilities . . . are reported back to the company” that can fix them, Br. 51, “Apple does not impose that requirement under its own Bug Bounty Program,” Doc. 783, pg. 32. And in at least one instance, a “security researcher in Apple’s Security Bug
58
USCA11 Case: 21-12835 Date Filed: 02/10/2022 Page: 70 of 81
Bounty Program has had his bugs used by China against Uyghurs, an ethnic minority group primarily living in China.” Ibid.
Given this, Apple’s complaints about Corellium’s vetting and monitoring practices are “puzzling, if not disingenuous.” Doc. 783, pg. 32. They are also unfounded. As the district court explained, Corellium takes significant steps to prevent misuse of its product. Ibid. It engages in meaningful vetting of potential customers, has refused licenses to those it suspects will abuse the product, prohibits illicit uses of its product in the licensing agreement, and has t

-

Twitter avatar for @_argp
@argp@chaos.social @_argp
Remember, remember the 22nd of November

-

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter: