Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
alex_gaynor
.
10
Sources say China used iPhone hacks to target Uyghur Muslims
ios
security
techcrunch.com
via
alex_gaynor
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
43
Introduction to Memory Unsafety for VPs of Engineering
security
alexgaynor.net
authored by
alex_gaynor
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
52 comments
52
15
Somu - open source security keys with small form factor
cryptography
hardware
security
crowdsupply.com
via
alex_gaynor
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
40
Memory Unsafety in Apple's Operating Systems
ios
mac
security
langui.sh
via
alex_gaynor
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
67 comments
67
102
Modern C++ Won't Save Us
c++
security
alexgaynor.net
authored by
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
47 comments
47
21
Chrome + Windows Exploit: Security Beyond Bugfixes
security
windows
alexgaynor.net
authored by
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
8
Building a Titan: Better security through a tiny chip
android
security
security.googleblog.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
23
Removing Old Versions of TLS
☶
browsers
networking
security
blog.mozilla.org
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
12
Google and Android have your back by protecting your backups
android
security
security.googleblog.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
3
365 Days Later: Finding and Exploiting Safari Bugs using Publicly Available Tools
browsers
ios
mac
security
googleprojectzero.blogspot.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
160
Linux 4.19-rc4 released, an apology, and a maintainership note
culture
linux
lore.kernel.org
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
108 comments
108
4
Exploiting the macOS WindowServer for root
mac
security
blog.ret2.io
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
syzbot and the tale of thousand kernel bugs
pdf
linux
security
events.linuxfoundation.org
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Vulnerability hunting with Semmle QL, part 1
c
c++
security
blogs.technet.microsoft.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
6
Blocking Compromised Passwords on PyPI
python
security
caremad.io
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Path to EL1 in iOS 11
slides
ios
security
docs.google.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
-1
NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident
security
citizenlab.ca
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
34
NetSpectre: Read Arbitrary Memory over Network
pdf
hardware
security
misc0110.net
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
49
The worst truism in information security
security
alexgaynor.net
authored by
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
11
Introducing the ASan Nightly Project
browsers
release
security
blog.mozilla.org
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
4
Weaponization of a JavaScriptCore Vulnerability
browsers
mac
security
blog.ret2.io
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Mitigating Spectre with Site Isolation in Chrome
browsers
security
security.googleblog.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Taking apart a double zero-day sample discovered in joint hunt with ESET
reversing
security
windows
cloudblogs.microsoft.com
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
Compiler fuzzing, part 1
c
c++
compilers
security
vegardno.net
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
7
pwn2own 2018: Vulnerability Discovery Against Apple Safari
browsers
mac
security
blog.ret2.io
via
alex_gaynor
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
Page 2 >>