Brian Smith (@brian_____) 's Twitter Profile
Brian Smith

@brian_____

ID: 14586929

linkhttps://briansmith.org calendar_today29-04-2008 16:30:49

2,2K Tweet

3,3K Followers

509 Following

Brian Smith (@brian_____) 's Twitter Profile Photo

The best things I’ve ever read `impl Trait` and `async fn` details in Rust. (Not that it matters, but I prefer explicit capture syntax over any of the automatically-capture-too-much stuff, and I think it should be done such that TAIT is never needed.): hackmd.io/sFaSIMJOQcuwCd…

Brian Smith (@brian_____) 's Twitter Profile Photo

Just renewed my JetBrains All Products license for $173. It is not an exaggeration to say that it is one of the best purchases I make each year.

Brian Smith (@brian_____) 's Twitter Profile Photo

Great post and great conclusions, including “This bug also shows that we have an over-reliance on fuzzing for security assurance of complex parser code. Fuzzing is great, but we know that there are many serious security issues that aren't easy to fuzz.”

Feisty Duck (@feistyduck) 's Twitter Profile Photo

From the TLS newsletter: Paul Bottinelli writes on NCC Group’s blog about a subtle issue the group discovered while auditing a random number generator. buff.ly/48li9je

Brian Smith (@brian_____) 's Twitter Profile Photo

The most significant supply chain security improvement cargo (and similar systems like npm) could make is to make —locked the default for all cargo commands.

Andreas Kogler (@0xhilbert) 's Twitter Profile Photo

WebGPU allows websites to use your GPU for general-purpose computations without asking for permission in the browser. To understand which attack vectors are possible using this interface, see our AsiaCCS paper and try the PoC in your browser.

Marc Stevens (@realhashbreaker) 's Twitter Profile Photo

Here is a 72-byte alphanum MD5 collision with 1-byte difference for fun: md5("TEXTCOLLBYfGiJUETHQ4hAcKSMd5zYpgqf1YRDhkmxHkhPWptrkoyz28wnI9V0aHeAuaKnak") = md5("TEXTCOLLBYfGiJUETHQ4hEcKSMd5zYpgqf1YRDhkmxHkhPWptrkoyz28wnI9V0aHeAuaKnak")

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

Ouch. The Windows Wi-Fi driver can be exploited by an attacker that is within Wi-Fi range. It requires no interaction from the victim and no prior knowledge of the system from the attacker. Just like the movies! It affects all modern versions of Windows. Patch immediately! 👇

Brian Smith (@brian_____) 's Twitter Profile Photo

Out of all the things Entrust did to get booted, which was the *single* worst thing they did? Like, what is the bugzilla bug number of the most severe bug?