
Manfred Paul
@_manfp
Security but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]
ID: 1212738812838699008
02-01-2020 14:14:24
82 Tweet
4,4K Takipçi
309 Takip Edilen


Happy to have my write-up on Trend Zero Day Initiative's blog again - after so many fights with some kind of range analysis, a bug that just directly gives every type confusion you want felt quite fun


This years Google CTF Qualification is over. Congratulations to Kalmarunionen, kijitora and Zer0RocketWrecks! The top 8 teams qualified for Hackceler8 2024 in Málaga. More details at goo.gle/ctf. ¡Vamos!

chrisrohlf Michael Coppola Keeping open a bug to support a government operation is isomorphic to opening a backdoor to support a government. I'm pretty sure you wouldn't want Google to keep a bug open for the benefit of China, Chris. alecmuffett.com/article/109963





ECSC2024 MITAmalta MITAmalta, this is not how you build up a cybersecurity community in your country. It was great to see a lot of ECSC players show their support people like Michael Debono who faced both disqualification and legal action. As the vulnerability research community, we should do the same.

