Keegan Ryan (@inf_0_) 's Twitter Profile
Keegan Ryan

@inf_0_

I like breaking things.

🔑🔫

Into cryptography, embedded systems, and side channel attacks.

ID: 765805162120220673

calendar_today17-08-2016 06:59:13

72 Tweet

1,1K Takipçi

156 Takip Edilen

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Patch Tuesday surprise: Intel Security updated the MDS advisory to include 10th Gen Processor Family (Ice Lake). It was previously claimed to be resistant against MDS, but apparently the mitigation were disabled in the hardware. intel.ly/32gOO9X

Patch Tuesday surprise: <a href="/IntelSecurity/">Intel Security</a> updated the MDS advisory to include 10th Gen Processor Family (Ice Lake). It was previously claimed to be resistant against MDS, but apparently the mitigation were disabled in the hardware.  intel.ly/32gOO9X
Jeremy Boone (@uffeux) 's Twitter Profile Photo

Today we publish the details of a fault injection vulnerability affecting the MediaTek BootROM. We achieved code execution in the context of the Preloader, fully circumventing secure boot. Unpatchable. There’s a hole in your SoC: research.nccgroup.com/2020/10/15/the…

Bug Bounty Reports Explained (@gregxsunday) 's Twitter Profile Photo

Time for the next episode of Bug Bounty Report Explained. Today we take a look at SQLi in Zoom application found by Keegan Ryan that allowed the attacker to take a peek into victim's camera. UTF8 was abused to bypass protections. Enjoy! youtu.be/5CCaQ9OK2vU

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Join me on August 15, 2021 for the 4th IACR Workshop on Attacks on Cryptography (WAC4): crypto.iacr.org/2021/wac.php Lots of exciting talks by @ic0nz1 Daniel De Almeida Braga Mathy Vanhoef #JuliaLen Elie Bursztein Luca Wilke @PPessl Omer Shlomovits Victor LOMNE IACR #CryptoNews

Join me on August 15, 2021 for the 4th IACR Workshop on Attacks on Cryptography (WAC4): crypto.iacr.org/2021/wac.php

Lots of exciting talks by @ic0nz1 <a href="/faulst/">Daniel De Almeida Braga</a>
<a href="/vanhoefm/">Mathy Vanhoef</a> #JuliaLen <a href="/elie/">Elie Bursztein</a> <a href="/lucawilkeUzL/">Luca Wilke</a> @PPessl <a href="/OmerShlomovits/">Omer Shlomovits</a> <a href="/victorlomne/">Victor LOMNE</a> 

<a href="/IACR_News/">IACR</a> #CryptoNews
hanno (@hanno) 's Twitter Profile Photo

Cryptography-Twitter, here's a riddle (I don't know the answer): What happened to this modulus and can you factor it? crt.sh/?id=822860928

Thomas H. Ptacek (@tqbf) 's Twitter Profile Photo

So Mark Schultz wrote a whole series of posts explaining LWE (the PQC crypto constructions) from the ground up, with simplified but sane models in Python, and it’s great. mark-schultz.github.io/nist-standard-…

Keegan Ryan (@inf_0_) 's Twitter Profile Photo

Our improved attack on MEGA's cryptography means that a substantial fraction of users were at higher risk than previously believed. The patches released last month for the original attack are effective here, so make sure you're updated!

MEGA (@megaprivacy) 's Twitter Profile Photo

If you have not updated your MEGA app or browser extension since 22 June, please do so now: New UCSD research [eprint.iacr.org/2022/914] lowers the minimum number of logins required to exploit older versions from 512 to just six. Additional information at blog.mega.io/mega-security-…

Ariana Mirian (@amirian@infosec.exchange) (@arimirian) 's Twitter Profile Photo

I was relying on this app to publicize that I am defending in April! And looking for 2023 jobs! Guess I'll used...LinkedIn...now? TL;DR If you want to understand/improve security processes using data and research science methods, shoot me a note. I'll post more later if I can

Keegan Ryan (@inf_0_) 's Twitter Profile Photo

How many SSH servers were vulnerable to the xz backdoor? According to our measurements, there were thousands. More here: infosec.exchange/@keeganryan/11…