
Manfred Paul
@_manfp
Security but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]
ID: 1212738812838699008
02-01-2020 14:14:24
82 Tweet
4,4K Followers
309 Following


Happy to have my write-up on Trend Zero Day Initiative's blog again - after so many fights with some kind of range analysis, a bug that just directly gives every type confusion you want felt quite fun


This years Google CTF Qualification is over. Congratulations to Kalmarunionen, kijitora and Zer0RocketWrecks! The top 8 teams qualified for Hackceler8 2024 in Málaga. More details at goo.gle/ctf. ¡Vamos!

chrisrohlf Michael Coppola Keeping open a bug to support a government operation is isomorphic to opening a backdoor to support a government. I'm pretty sure you wouldn't want Google to keep a bug open for the benefit of China, Chris. alecmuffett.com/article/109963

theguardian.com/world/2022/feb… Is this the "counterterrorism operation" by a U.S.-allied Western government that's being referenced? If saying the country and "terrorist" group involved paints a flattering picture of these exploit tools, why aren't they saying which ones are involved?




ECSC2024 MITAmalta MITAmalta, this is not how you build up a cybersecurity community in your country. It was great to see a lot of ECSC players show their support people like Michael Debono who faced both disqualification and legal action. As the vulnerability research community, we should do the same.

