Lennert (@lennertwo) 's Twitter Profile
Lennert

@lennertwo

PhD Researcher @CosicBe | Hardware Security
@[email protected]

ID: 322560263

calendar_today23-06-2011 11:16:07

426 Tweet

3,3K Takipçi

1,1K Takip Edilen

Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

Security researchers found flaws in Saflok hotel keycard locks, used on 3 million doors in 13,000 properties worldwide, that can be used to open them in seconds. The lockmaker Dormakaba has been working on a fix but told them only 36% of locks are updated. wired.com/story/saflok-h…

stacksmashing (@ghidraninja) 's Twitter Profile Photo

Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF. I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁

Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF.

I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁
WIRED (@wired) 's Twitter Profile Photo

A team of security researchers have revealed to WIRED's Andy Greenberg (@agreenberg at the other places) a lock hacking technique that impacts millions of locks in thousands of hotel properties across 131 countries. They call his hack Unsaflok. Read the full story here: wired.com/story/saflok-h…

Sam Curry (@samwcyo) 's Twitter Profile Photo

New writeup: "Hacking Millions of Modems (and Investigating Who Hacked My Modem)" samcurry.net/hacking-millio… Thanks for reading! Huge thanks to veritas, Brett Buerhaus, shubs, d0nut 🦀, Ian Carroll, and everyone who reviewed the post beforehand.

Antoon Purnal (@purnaltoon) 's Twitter Profile Photo

I recently found an exploitable timing leak in the reference implementation of Kyber (ML-KEM), the soon-to-be NIST standard for post-quantum key encapsulation. Let’s see if you can spot it in the source code - msg is secret:

I recently found an exploitable timing leak in the reference implementation of Kyber (ML-KEM), the soon-to-be NIST standard for post-quantum key encapsulation.

Let’s see if you can spot it in the source code - msg is secret:
Ian Carroll (@iangcarroll) 's Twitter Profile Photo

Our talk was accepted at DEF CON this summer! Come watch Lennert and I give a talk about the Unsaflok vulnerability in hotel locks and the technical details behind it. unsaflok.com

Our talk was accepted at <a href="/defcon/">DEF CON</a> this summer! Come watch <a href="/LennertWo/">Lennert</a> and I give a talk about the Unsaflok vulnerability in hotel locks and the technical details behind it. 

unsaflok.com
hextree.io (@hextreeio) 's Twitter Profile Photo

We teamed up with Raspberry Pi to bring some unique hardware security challenges to DEF CON! Get ready for some awesome low-level hardware hacking at our booths at EmbeddedSystemsVillage.

We teamed up with <a href="/Raspberry_Pi/">Raspberry Pi</a> to bring some unique hardware security challenges to <a href="/defcon/">DEF CON</a>!

Get ready for some awesome low-level hardware hacking at our booths at <a href="/EmbeddedVillage/">EmbeddedSystemsVillage</a>.
hextree.io (@hextreeio) 's Twitter Profile Photo

The new Raspberry Pi RP2350 is here - and it comes with a ton of security features. We teamed up with Raspberry Pi to create the RP2350 Hacking Challenge: A microcontroller bug-bounty. Bypass secure-boot on the RP2350 and win $10,000. hextree.io/rp2350-hacking…

The new <a href="/Raspberry_Pi/">Raspberry Pi</a>  RP2350 is here - and it comes with a ton of security features.

We teamed up with <a href="/Raspberry_Pi/">Raspberry Pi</a> to create the RP2350 Hacking Challenge: A microcontroller bug-bounty.

Bypass secure-boot on the RP2350 and win $10,000.

hextree.io/rp2350-hacking…
Ian Carroll (@iangcarroll) 's Twitter Profile Photo

In April, Sam Curry and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa

NinjaLab (@ninjalabfr) 's Twitter Profile Photo

We are very excited to share our last research work: 𝐄𝐔𝐂𝐋𝐄𝐀𝐊, authored by Thomas Roche. An electromagnetic Side-Channel Vulnerability in the ECDSA implementation of all Infineon security microcontrollers, notably impacting all YubiKey 5 Series. ninjalab.io/eucleak/

Raspberry Pi (@raspberry_pi) 's Twitter Profile Photo

Challenge… extended? At this year’s #DEFCON, we got to work with the brilliant teams over at DEF CON and hextree.io to create 30,000 gaming badges using our brand new chip, RP2350. Still in the gaming spirit, we challenged anyone with an RP2350 to try and hack around our

Challenge… extended?

At this year’s #DEFCON, we got to work with the brilliant teams over at <a href="/defcon/">DEF CON</a>  and <a href="/hextreeio/">hextree.io</a>  to create 30,000 gaming badges using our brand new chip, RP2350.

Still in the gaming spirit, we challenged anyone with an RP2350 to try and hack around our
Sam Curry (@samwcyo) 's Twitter Profile Photo

New writeup from ꙅɿɘƚɔɘqꙅ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia

hardwear.io (@hardwear_io) 's Twitter Profile Photo

😃 Already counting down the days to host our amazing #hardwarecommunity at #hw_ioUSA2025! ✍️💡 If you’re passionate about hardware security, don’t miss your chance to speak—CFP (Call For Papers) is OPEN! YouTube Link: youtu.be/mkTp016QidU?si… #hardwaresecurity #CFP

Raspberry Pi (@raspberry_pi) 's Twitter Profile Photo

Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…

Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. 

Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…