DC212 (@defcon212) 's Twitter Profile
DC212

@defcon212

212/NYC chapter of @defcongroups , formed in the wake of @defcon 26. RTs not endorsements.

ID: 892114116009091072

linkhttp://meetup.com/defcon212 calendar_today31-07-2017 20:05:54

2,2K Tweet

654 Takipçi

1,1K Takip Edilen

Admiral Potato (@admiral_potato) 's Twitter Profile Photo

We've released the DC801 Black Mage Game PART 2! We've put a LOT of love into this one, so PLEASE give it a try! This is a FREE firmware update for all physical badges! The Web build has also been updated, and has several QoL improvements! #badgelife github.com/DC801/BM-Badge

Dan Guido (@dguido) 's Twitter Profile Photo

The DOJ is suing Georgia Tech for lying to the DOD about its security practices... after being alerted by whistleblowers from their internal security team! 👀 x.com/ericgeller/sta…

The DOJ is suing Georgia Tech for lying to the DOD about its security practices... after being alerted by whistleblowers from their internal security team! 👀
x.com/ericgeller/sta…
Matt Johansen (@mattjay) 's Twitter Profile Photo

Holy hell, security researchers figured out how to bypass TSA and potentially get into a cockpit with super basic SQL Injection. I can’t get over this one.

INSU YUN (@insu_yun) 's Twitter Profile Photo

Everyone wants to fuzz complex optimizations of WebAssembly compilers, but most approaches are simply considering grammars and types. Why can't we fuzz optimizations directly? We will share how we can do if we have systematically written optimization rules in S&P 2025 :)

Everyone wants to fuzz complex optimizations of WebAssembly compilers, but most approaches are simply considering grammars and types. Why can't we fuzz optimizations directly? We will share how we can do if we have systematically written optimization rules  in S&P 2025 :)
NYCT Subway (@nyctsubway) 's Twitter Profile Photo

4/6 trains are holding in stations in both directions while we investigate a loss of third-rail power from Spring St to Brooklyn Bridge-City Hall.

xvonfers (@xvonfers) 's Twitter Profile Photo

Wow... "We discover 119 vulnerabilities in LTE/5G core infrastructure...and some of which can be used to remotely compromise and access the cellular core..." cellularsecurity.org/ransacked nathanielbennett.com/publications/r…

Wow...
"We discover 119 vulnerabilities in LTE/5G core infrastructure...and some of which can be used to remotely compromise and access the cellular core..."
cellularsecurity.org/ransacked
nathanielbennett.com/publications/r…
Elizabeth Wharton (@lawyerliz) 's Twitter Profile Photo

Excited for a side quest - invited to join stellar SME advisors working w/ researchers + students at Penn State PILOT Lab. Building better #Privacy + Security begins w/ the research phase. Learn more Penn State PILOT lab & watch our #ShmooCon presentation - pilotlab.org/projects

prayerie (@violentseed) 's Twitter Profile Photo

You can eavesdrop on someone playing crazy taxi within like 1ft of you if you just decode the video feed from radio wave interference—SEGA DOESNT WANT YOU TO KNOW THIS🎮🕹️🛂🪷

DC212 (@defcon212) 's Twitter Profile Photo

Next meetup on Thursday the 29th at 7pm. Will have a talk on North Korean hackers social engineering their way into western dev jobs, and a talk on evading AI-based physical security detection systems. Please don't show up too early meetu.ps/e/P5c4F/Hq0dP/i

Bret Victor (@worrydream) 's Twitter Profile Photo

As Kay himself has said so many times, this question is entirely about funding. With ARPA/IPTO-style funding, you get Kays (and Engelbarts, Minskys, McCarthys, Corbatós, etc) With VC and NSF, you don't. Even Kay hasn't been able to "be Kay" since the 80s: worrydream.com/2017-12-30-ala… x.com/smdiehl/status…