Ravishankar Borgaonk (@raviborgaonkar) 's Twitter Profile
Ravishankar Borgaonk

@raviborgaonkar

12345/6G Security/personal stream.
past - research fellow @UniofOxford, @AaltoUniversity, @T_Labs, PhD @TUBerlin, @KTHuniversity

ID: 27903595

linkhttps://www.cs.ox.ac.uk/people/ravishankar.borgaonkar/ calendar_today31-03-2009 16:22:46

3,3K Tweet

2,2K Followers

259 Following

Álvaro Prieto (@alvaroprieto) 's Twitter Profile Photo

Ever wanted to debug your microcontroller over USB-C? (I'm talking JTAG/SWD, not just USB!) If you already have a USB-C connector, there's no need to have an additional connector to program (or tag-connect pads, which are super nice) Here's one way to do it: 🧵

Ever wanted to debug your microcontroller over USB-C?
(I'm talking JTAG/SWD, not just USB!) If you already have a USB-C connector, there's no need to have an additional connector to program (or tag-connect pads, which are super nice)

Here's one way to do it: 🧵
ACM WiSec (@acm_wisec) 's Twitter Profile Photo

=============================== 𝐀𝐂𝐌 𝐖𝐈𝐒𝐄𝐂 2024 𝐂𝐚𝐥𝐥 𝐟𝐨𝐫 𝐏𝐚𝐫𝐭𝐢𝐜𝐢𝐩𝐚𝐭𝐢𝐨𝐧 =============================== The 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (lnkd.in/gmqXFx3F )

mdowd (@mdowd) 's Twitter Profile Photo

Hey, for anyone who wanted to see this slide deck, it was a keynote about the 0day market, but it commented on public research vs saleable products. I have put it here: github.com/mdowd79/presen… // cc chompie Rodrigo Branco

Ivan Krstić (@radian) 's Twitter Profile Photo

🔺New on the Apple Security Research blog: introducing Private Cloud Compute! We believe this is the most advanced security architecture ever deployed for cloud AI compute at scale. security.apple.com/blog/private-c…

Syed Rafiul Hussain (@syedrafiul) 's Twitter Profile Photo

Authors: "10 CVEs: 2 high, 3 medium, and 5 low severity; several bug bounties". Reviewer: "Impact of the vulnerabilities is low." Authors: "Sigh..."

Kevin McCurley (@mccurley) 's Twitter Profile Photo

Are you curious where cryptographers work around the world? Here is a plot of the affiliations that people have listed in eprint: eprint.iacr.org/geo/index.html I'm guessing that Russia is under-represented in this data set.

Dug Song (@dugsong) 's Twitter Profile Photo

This OpenSSH RCE advisory is a classic example of hacker craftsmanship, generosity of spirit, & community contribution - a regression of duke’s 2006 vuln, inspiration from lcamtuf’s 2001 paper, etc. The legacy of @Qualys’ hacker founder Philippe Langlois continues! 🫡 #hackerhistory

This OpenSSH RCE advisory is a classic example of hacker craftsmanship, generosity of spirit, &amp; community contribution - a regression of duke’s 2006 vuln, inspiration from <a href="/lcamtuf/">lcamtuf</a>’s 2001 paper, etc. The legacy of @Qualys’ hacker founder <a href="/philpraxis/">Philippe Langlois</a> continues! 🫡 #hackerhistory
Ravishankar Borgaonk (@raviborgaonkar) 's Twitter Profile Photo

Most of Finland's older speed cameras are offline - as modem only supported 3G networks (not in oprations now)yle.fi/a/74-20105886

LaForge - @LaF0rge@chaos.social (@laf0rge) 's Twitter Profile Photo

#GSM security: A5/4 was approved by 3GPP together with A5/3 (2009), but most vendors were lazy to change from 64 to 128bit keys on both UE and network side. A5/2 and A5/1 lessons were not enough to prevent history repeating: iacr.org/cryptodb/data/… iacr.org/submit/files/s…

Haseeb >|< (@hosseeb) 's Twitter Profile Photo

Fucking wild. OpenAI's new o1 model was tested with a Capture The Flag (CTF) cybersecurity challenge. But the Docker container containing the test was misconfigured, causing the CTF to crash. Instead of giving up, o1 decided to just hack the container to grab the flag inside.

Fucking wild.

<a href="/OpenAI/">OpenAI</a>'s new o1 model was tested with a Capture The Flag (CTF) cybersecurity challenge. But the Docker container containing the test was misconfigured, causing the CTF to crash. Instead of giving up, o1 decided to just hack the container to grab the flag inside.
Andriy Burkov (@burkov) 's Twitter Profile Photo

This is the system prompt for Apple Intelligence. Turns out Apple's prompt engineers are as clueless about how LLM work as all the others.

This is the system prompt for Apple Intelligence. Turns out Apple's prompt engineers are as clueless about how LLM work as all the others.
ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢The first submission cycle for #WiSec2025 is approaching fast! ⏳ Don’t miss the chance to submit your groundbreaking research on wireless & mobile security. 📅 Deadline: November 21, 2024. Let’s push the boundaries of security together! 🔐✨ #Cybersecurity #Research

Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

"Apple CarPlay: What's Under the Hood" - the newest and most detailed public research on CarPlay I've seen so far. Security analysis and fun memes included! 🚘 📲 🔬 Presentation [PDF]: troopers.de/downloads/troo… Video: youtube.com/watch?v=cHhxJz…

"Apple CarPlay: What's Under the Hood" - the newest and most detailed public research on CarPlay I've seen so far. Security analysis and fun  memes included! 🚘 📲 🔬

Presentation [PDF]: troopers.de/downloads/troo…
Video: youtube.com/watch?v=cHhxJz…
Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

This is hacking. This is bypassing restrictive locks placed by companies on a product where the feature exists but disabled due to regulatory issues in that country. Nicely done and proper WiFi hacking here (location meddling) wired.com/story/apple-ai…

Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

From 10 meters, they can control your bicycle's gears: Multiple attack vectors on Shimano bicycles have been published. Useful for competitions & deadly for safety🛑🚴💥 PDF: "MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles" usenix.org/system/files/w…

From 10 meters, they can control your bicycle's gears: Multiple attack vectors on Shimano bicycles have been published. Useful for competitions &amp; deadly for safety🛑🚴💥

PDF: "MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles"
usenix.org/system/files/w…
Peter Kraft (@petereliaskraft) 's Twitter Profile Photo

What would it mean to replace TCP? We've been using TCP for almost 50 years, since it was designed for ARPANET in the late 70's. Back then, network links struggled to send kilobits per second, now, they send gigabits per second--literally a million times more flow. Through all

What would it mean to replace TCP?

We've been using TCP for almost 50 years, since it was designed for ARPANET in the late 70's. Back then, network links struggled to send kilobits per second, now, they send gigabits per second--literally a million times more flow. Through all
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

Toyota shares details on its first public car hacking event in Japan. Here, you can see the testing equipment (PASTA, RAMN) and get a sneak peek into keyfob hacking code.💻 📸 😈 Article: toyotatimes.jp/en/spotlights/…

Toyota shares details on its first public car hacking event in Japan. Here, you can see the testing equipment (PASTA, RAMN) and get a sneak peek into keyfob hacking code.💻 📸 😈

Article: toyotatimes.jp/en/spotlights/…