axi0mX@infosec.exchange (@axi0mx) 's Twitter Profile

Bootrom exploit philanthropist. Apple silicon hacker. iOS jailbreaker. Join us as we dance madly on the lip of the volcano.

ID: 3888772694

linkhttp://checkra.in calendar_today14-10-2015 06:20:07

7,7K Tweet

61,61K Takipçi

2,2K Takip Edilen

Ken Shirriff (@kenshirriff) 's Twitter Profile Photo

The Intel 8086 was released in 1978, starting the x86 line that still dominates computing. I'm reverse-engineering the chip by studying the silicon die, and I think I've spotted a bug fix in the silicon. They didn't have microcode updates then so they patched the silicon. 🧵

The Intel 8086 was released in 1978, starting the x86 line that still dominates computing. I'm reverse-engineering the chip by studying the silicon die, and I think I've spotted a bug fix in the silicon. They didn't have microcode updates then so they patched the silicon. 🧵
Sam Curry (@samwcyo) 's Twitter Profile Photo

We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012. To explain how it worked and how we found it, we have ꙅɿɘƚɔɘqꙅ as our mock car thief:

We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012.

To explain how it worked and how we found it, we have <a href="/_specters_/">ꙅɿɘƚɔɘqꙅ</a> as our mock car thief:
Riley Goodside (@goodside) 's Twitter Profile Photo

OpenAI's new ChatGPT explains the worst-case time complexity of the bubble sort algorithm, with Python code examples, in the style of a fast-talkin' wise guy from a 1940's gangster movie:

OpenAI's new ChatGPT explains the worst-case time complexity of the bubble sort algorithm, with Python code examples, in the style of a fast-talkin' wise guy from a 1940's gangster movie:
Samuel Groß (@5aelo) 's Twitter Profile Photo

Here are some slides about the V8 Sandboxing project that I prepared for an internal talk but figured I could also share more widely: docs.google.com/presentation/d…

Riley Goodside (@goodside) 's Twitter Profile Photo

POV: You're a Senior Data Engineer at Twitter. Elon asks what you've done this week. You've done nothing. Frantically, you open ChatGPT.

POV: You're a Senior Data Engineer at Twitter. Elon asks what you've done this week. You've done nothing.

Frantically, you open ChatGPT.
Hank Green (@hankgreen) 's Twitter Profile Photo

Someone suggested that I ask MidJourney to show me a cat but to keep adding “A”s until it wasn’t a cat anymore. Here is “cat.”

Someone suggested that I ask MidJourney to show me a cat but to keep adding “A”s until it wasn’t a cat anymore. Here is “cat.”
axi0mX@infosec.exchange (@axi0mx) 's Twitter Profile Photo

14” MacBook Pro with Apple M2 Max (T6021 chip) in DFU Mode: SDOM:01 CPID:6021 CPRV:11 CPFM:03 SCEP:01 BDID:04 ECID:XXXXXXXXXXXXXXXX IBFL:3C SRTG:[iBoot-7168.0.0.300.12]

Xeno Kovah (@xenokovah) 's Twitter Profile Photo

🎉We passed 10k folks registered on p.ost2.fyi a little while back, and I can see we’re coming up on 11k!🥳 Thanks to everyone who spreads the word about #OST2!

axi0mX@infosec.exchange (@axi0mx) 's Twitter Profile Photo

One more year of #checkm8! iPadOS 17 A10 iPad (6th generation) A10 iPad (7th generation) A10X 10.5-inch iPad Pro A10X 12.9-inch iPad Pro (2nd generation) tvOS 17 A8 Apple TV HD A10X Apple TV 4K

LaurieWired (@lauriewired) 's Twitter Profile Photo

The optimal path to exploit development is: 1. Software engineering 2. Reverse engineering 3. Exploit development And each of these areas build on and improve the others. Being a software engineer part of an enormous monolithic project requires skills in reverse engineering to

Boris Larin (@oct0xor) 's Twitter Profile Photo

The recording of our (me, Leonid Bezvershenko, Georgy Kucherin) #37c3 talk “Operation Triangulation: What You Get When Attack iPhones of Researchers” was published! media.ccc.de/v/37c3-11859-o…

Boris Larin (@oct0xor) 's Twitter Profile Photo

Thanks to marcan (social.treehouse.systems/@marcan/111655…) and Zhuowei Zhang (x.com/zhuowei/status…) now we know the original purpose for this unknown hardware feature. Its MMIO debug registers for GPU L2 cache. I am really excited that we are very close to solving this mystery!

Phrack Zine (@phrack) 's Twitter Profile Photo

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…