dstadulis (@dstadulis) 's Twitter Profile
dstadulis

@dstadulis

Markets Engineer. Solving Problems. Epistemology inquirist. Stoic cypherpunk. Cryptanarchist. #bitcoin

ID: 3851512092

calendar_today10-10-2015 21:38:27

15,15K Tweet

1,1K Followers

1,1K Following

Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

Today we've published Intel Microcode decryptor! It gives you an amazing opportunity for researching x86 platforms. You can understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies! Enjoy it! github.com/chip-red-pill/…

Today we've published Intel Microcode decryptor! It gives you an amazing opportunity for researching x86 platforms. You can understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies! Enjoy it! github.com/chip-red-pill/…
dstadulis (@dstadulis) 's Twitter Profile Photo

Shamir’s paper "A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance" is indelibly fascinating. If your background is topology but you haven’t investigated how the influence of manifolds in neural networks, it’s a fast forward extraordinaire.

Olivier THOMAS (@reivilo_t) 's Twitter Profile Photo

🔥 training alert 🔥 When giving a training, I'm curious to know what ICs are of interest for attendees If you come to REcon to Texplained 's IC RE & Data Extraction training, bring chips! I will image them for you Do you have targets in mind? recon.cx/2025/trainingI…

🔥 training alert 🔥 
When giving a training, I'm curious to know what ICs are of interest for attendees
If you come to <a href="/reconmtl/">REcon</a>  to <a href="/Texplained_RE/">Texplained</a> 's IC RE &amp; Data Extraction training, bring chips! I will image them for you 
Do you have targets in mind?
recon.cx/2025/trainingI…
Nikolaj Schlej (@nikolajschlej) 's Twitter Profile Photo

The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today. English writeup: coderush.me/hydroph0bia-pa…

dstadulis (@dstadulis) 's Twitter Profile Photo

heard about “training solo” attack? CPU mfgs had to issue a microcode update. >attackers can speculatively hijack control flow within the same domain (e.g., kernel) and leak secrets across privilege boundaries, re-enabling classic Spectre-v2 scenarios vusec.net/projects/train…

Chelsea Komlo (@chelseakomlo) 's Twitter Profile Photo

Happy to announce that we have (finally) proven the adaptive security of FROST! See our recent publication "On the Adaptive Security of FROST" which was accepted to CRYPTO '25. eprint.iacr.org/2025/1061

Happy to announce that we have (finally) proven the adaptive security of FROST! See our recent publication "On the Adaptive Security of FROST" which was accepted to CRYPTO '25.

eprint.iacr.org/2025/1061
LaurieWired (@lauriewired) 's Twitter Profile Photo

Known as a Chinese wall, this was the setup: One team read the proprietary IBM Tech Reference Manual; writing extremely detailed (but not plagiarized) specifications. A lone engineer, never exposed to IBM source, then wrote compatible APIs to meet the technical spec.

Known as a Chinese wall, this was the setup:

One team read the proprietary IBM Tech Reference Manual; writing extremely detailed (but not plagiarized) specifications.

A lone engineer, never exposed to IBM source, then wrote compatible APIs to meet the technical spec.
dstadulis (@dstadulis) 's Twitter Profile Photo

28nm Maximalist Club At Teardown 2025 bunnie presents a cogent argument about why there will be a paradigm shift in chip silicon manufacturing to a more FOSS compatible stack. Not solely based on engineering ethos of FOSS but also pure business motivations.

28nm Maximalist Club

At Teardown 2025 bunnie presents a cogent argument about why there will be a paradigm shift in chip silicon manufacturing to a more FOSS compatible stack.  Not solely based on engineering ethos of FOSS but also pure business motivations.
dstadulis (@dstadulis) 's Twitter Profile Photo

> To prepare for Pertsev’s appeal, the defense wants to know what funds flowed where and when, noting that so far it has only been presented with spreadsheets that lack critical information, such as transaction hashes.

Bryan Bishop (@kanzure) 's Twitter Profile Photo

Are you really, really into Formal Verification techniques? What about bitcoin? Calling for grant applications pertaining to (1) formal verification and (2) bitcoin's reference implementation. Apply here: docs.google.com/forms/d/e/1FAI… All submissions welcome, including from less

Schmidty (@bitschmidty) 's Twitter Profile Photo

Bitcoin core 28.2 is out! Build #31407 guix: Notarize MacOS app bundle and codesign all MacOS and Windows binaries #31500 depends: Fix compiling libevent package on NetBSD #31627 depends: Fix spacing issue #32070 build: use make < 3.82 syntax for define directive #32439 guix:

OpenHW Foundation (@openhwfdn) 's Twitter Profile Photo

The 5th RISC-V Summit China will take place in Shanghai on 16-19 July. The OpenHW Foundation is proud to sponsor the event, and be present with a community booth. 📍 Visit us at booth C34-07 to learn about our open source hardware initiatives: hubs.la/Q03vPjFk0

The 5th RISC-V Summit China will take place in Shanghai on 16-19 July. The OpenHW Foundation is proud to sponsor the event, and be present with a community booth.

 📍 Visit us at booth C34-07 to learn about our open source hardware initiatives: hubs.la/Q03vPjFk0
Calvin (@kcalvinalvinn) 's Twitter Profile Photo

1주일도 안돼서 얼리버드 50% 다 팔렸습니다! 20% 할인된 티켓 구매 하시려면 서둘러 주세요!

Michael Ford (@fanquake) 's Twitter Profile Photo

In this case, you get a single instruction difference in the binary, depending on whether the architecture of the machine the build was running on was X86-64 or AArch64: github.com/bitcoin/bitcoi….