Pinboard (jabley)
https://pinboard.in/u:jabley/public/
recent bookmarks from jableyUnpatchable vulnerability in Apple chip leaks secret encryption keys | Ars Technica2024-03-25T10:38:08+00:00
https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/
jableycryptography encryption apple security vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:799612dcabac/Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch – John Stawinski IV2024-01-21T19:11:26+00:00
https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/
jableyhacking packaging security github supply-chain infosec cybersecurityhttps://pinboard.in/https://pinboard.in/u:jabley/b:a16d731c7fce/Worse than SolarWinds: Three Steps to Hack Blockchains, GitHub, and ML through GitHub Actions – John Stawinski IV2024-01-10T22:04:53+00:00
https://johnstawinski.com/2024/01/05/worse-than-solarwinds-three-steps-to-hack-blockchains-github-and-ml-through-github-actions/
jableyhacking security cybersecurity vulnerability githubhttps://pinboard.in/https://pinboard.in/u:jabley/b:f1dfe272ed0d/Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking | CloudSEK2024-01-02T11:18:38+00:00
https://www.cloudsek.com/blog/compromising-google-accounts-malwares-exploiting-undocumented-oauth2-functionality-for-session-hijacking
jableygoogle oauth security hack vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:444ad98e5455/Source Code Management Platform Configuration Best Practices | OpenSSF Best Practices Working Group2023-11-21T13:30:06+00:00
https://best.openssf.org/SCM-BestPractices/
jableyopen-source best-practices security versioncontrolhttps://pinboard.in/https://pinboard.in/u:jabley/b:e0c675afddab/The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story | WIRED2023-11-15T20:16:01+00:00
https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/
jableywired tech hacking botnets security cybersecurity historyhttps://pinboard.in/https://pinboard.in/u:jabley/b:da2a546364b9/Blog - Advancing iMessage security: iMessage Contact Key Verification - Apple Security Research2023-10-29T21:39:08+00:00
https://security.apple.com/blog/imessage-contact-key-verification
jableyapple messaging securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:069d210552b4/How Kaspersky obtained all stages of Operation Triangulation | Securelist2023-10-29T21:24:22+00:00
https://securelist.com/operation-triangulation-catching-wild-triangle/110916/
jableysecurity cybersecurity ios encryptionhttps://pinboard.in/https://pinboard.in/u:jabley/b:08db212ac511/MacOS "DirtyNIB" Vulnerability - XPN InfoSec Blog2023-10-06T10:04:00+00:00
https://blog.xpnsec.com/dirtynib/
jableymacos vulnerability security researchhttps://pinboard.in/https://pinboard.in/u:jabley/b:21d1d4edd08b/[untitled]2023-09-20T14:53:58+00:00
https://hardsec.com/
jableyhardware security fpga rusthttps://pinboard.in/https://pinboard.in/u:jabley/b:4100207db1e0/Police CyberAlarm: Abysmal security, yet again.2023-08-24T11:20:34+00:00
https://paul.reviews/police-cyberalarm-abysmal-security-yet-again/
jableycybersecurity security infosec uk policehttps://pinboard.in/https://pinboard.in/u:jabley/b:52a58ec5bcf4/Smashing the state machine: the true potential of web race conditions | PortSwigger Research2023-08-14T15:30:49+00:00
https://portswigger.net/research/smashing-the-state-machine
jableysecurity http web concurrency vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:60ab265eb817/On my resignation as regulator of the Dutch intelligence and security services - Bert Hubert's writings2022-10-25T08:21:33+00:00
https://berthub.eu/articles/posts/resignation-as-intelligence-regulator/
jableynetherlands privacy government securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:c3ee8e59d5f8/We built network isolation for 1,500 services to make Monzo more secure2022-10-24T11:55:10+00:00
https://monzo.com/blog/we-built-network-isolation-for-1-500-services
jableymicroservices security kubernetes monzo networkinghttps://pinboard.in/https://pinboard.in/u:jabley/b:779befb01437/Latacora - The SOC2 Starting Seven2022-07-25T09:11:13+00:00
https://latacora.micro.blog/2020/03/12/the-soc-starting.html
jableyadvice security startup compliance soc2https://pinboard.in/https://pinboard.in/u:jabley/b:5f9d8ab69e6c/SOC2: The Screenshots Will Continue Until Security Improves · Fly2022-07-15T23:45:12+00:00
https://fly.io/blog/soc2-the-screenshots-will-continue-until-security-improves/
jableysecurity advice compliance saas infosec audithttps://pinboard.in/https://pinboard.in/u:jabley/b:a84ab25850e6/(400) https://twitter.com/P_Ensarguet/status/1529336644477796354/photo/12022-05-25T05:40:44+00:00
https://twitter.com/P_Ensarguet/status/1529336644477796354/photo/1
jableyeBPF security networking observabilityhttps://twitter.com/https://pinboard.in/u:jabley/b:ada992dc3365/CVE-2022-21449: Psychic Signatures in Java – Neil Madden2022-04-20T07:12:59+00:00
https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
jableyvulnerability Java Securityhttps://twitter.com/https://pinboard.in/u:jabley/b:652b72e22856/How Democracies Spy on Their Citizens | The New Yorker2022-04-18T18:56:53+00:00
https://www.newyorker.com/magazine/2022/04/25/how-democracies-spy-on-their-citizens
jableynewyorker spying cyber security Pegasushttps://pinboard.in/https://pinboard.in/u:jabley/b:d505edc94ea3/Core scheduling lands in 5.14 [LWN.net]2021-11-02T22:56:07+00:00
https://lwn.net/Articles/861251/
jableylinux security cpu scheduling smt spectre hardwarehttps://pinboard.in/https://pinboard.in/u:jabley/b:3563198f3f08/stong/how-to-exploit-a-double-free: How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'2021-10-26T21:15:36+00:00
https://github.com/stong/how-to-exploit-a-double-free
jableyheap infosec security hacking memory glibc vulnerability ctfhttps://pinboard.in/https://pinboard.in/u:jabley/b:d80004a4549a/Harm reduction for cryptographic backdoors — Martin Kleppmann’s talks2021-07-26T11:41:16+00:00
https://martin.kleppmann.com/2021/07/16/cryptographic-backdoors-hotpets.html
jableyprivacy encryption messaging security cryptographyhttps://pinboard.in/https://pinboard.in/u:jabley/b:43245547da63/Lawsuit: eBay tried to “terrorize, stalk, and silence” couple that ran news site | Ars Technica2021-07-26T10:20:22+00:00
https://arstechnica.com/tech-policy/2021/07/lawsuit-ebay-tried-to-terrorize-stalk-and-silence-couple-that-ran-news-site/
jableyarstechnica harrassment ebay security journalismhttps://pinboard.in/https://pinboard.in/u:jabley/b:ebc400d1b3e2/Project Zero: Enter the Vault: Authentication Issues in HashiCorp Vault2021-07-10T20:39:51+00:00
https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html
jableyhashicorp vault security vulnerability project-zerohttps://pinboard.in/https://pinboard.in/u:jabley/b:e7b680d20b36/Signal >> Blog >> Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective2021-04-23T08:09:48+00:00
https://signal.org/blog/cellebrite-vulnerabilities/
jableyhacking security signal privacy vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:e8a94ffada4e/Inside the Whale: An Interview with an Anonymous Amazonian2021-02-01T21:54:02+00:00
https://logicmag.io/commons/inside-the-whale-an-interview-with-an-anonymous-amazonian/
jableycapitalism aws business amazon labour whistleblower securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:6981826e743b/Samy Kamkar - NAT Slipstreaming2020-12-28T20:34:31+00:00
https://samy.pl/slipstream/
jableynetworking nat internet security vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:0b4a5b197f20/About technical updates to NHS Covid-19 app - NCSC.GOV.UK2020-08-21T18:00:27+00:00
https://www.ncsc.gov.uk/blog-post/nhs-test-and-trace-app-security-redux
jableyncsc security privacy nhs tracing covid-19https://pinboard.in/https://pinboard.in/u:jabley/b:e87c21e4693b/Attack of the week: Voice calls in LTE – A Few Thoughts on Cryptographic Engineering2020-08-13T07:47:53+00:00
https://blog.cryptographyengineering.com/2020/08/12/attack-of-the-week-voice-calls-in-lte/
jableycrypto voice security infosec vulnerability attackhttps://pinboard.in/https://pinboard.in/u:jabley/b:a9c24058c4c0/Elite CIA hacking unit failed to protect its systems, allowing disclosure to WikiLeaks - The Washington Post2020-07-26T17:35:46+00:00
https://www.washingtonpost.com/national-security/elite-cia-unit-that-developed-hacking-tools-failed-to-secure-its-own-systems-allowing-massive-leak-an-internal-report-found/2020/06/15/502e3456-ae9d-11ea-8f56-63f38c990077_story.html
jableysecurity cia america wikileakshttps://pinboard.in/https://pinboard.in/u:jabley/b:8ec47304c71e/Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement - Microsoft Security2020-07-25T14:18:12+00:00
https://www.microsoft.com/security/blog/2020/06/10/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware/
jableymicrosoft infosec vulnerability cyber security model datasciencehttps://pinboard.in/https://pinboard.in/u:jabley/b:e3aed4709a03/A different future for telecoms in the UK - NCSC.GOV.UK2020-07-17T21:51:10+00:00
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk
jableyuk ncsc huawei 5g electronics securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:4649fc082405/VICE - How Police Secretly Took Over a Global Phone Network for Organized Crime2020-07-02T20:45:07+00:00
https://www.vice.com/en_us/article/3aza95/how-police-took-over-encrochat-hacked
jableyphones encryption crime securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:775edfa68bce/Bypassing LastPass’s “Advanced” YubiKey MFA: A MITM Phishing Attack2020-06-10T07:48:28+00:00
https://pberba.github.io/security/2020/05/28/lastpass-phishing/
jableyphishing lastpass password-manager infosec securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:6d3935320ebd/Zerodium Temporarily Stops Purchasing iOS Exploits Due to High Number of Submissions - MacRumors2020-05-22T19:48:38+00:00
https://www.macrumors.com/2020/05/14/zerodium-pauses-acquiring-ios-exploits/
jableyios security infosec vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:953b0312408e/BBC Blogs - Technology & Creativity Blog - Around the world with TLS 1.0 part 2 (Feb 2020 edition)2020-05-20T22:33:58+00:00
https://www.bbc.co.uk/blogs/internet/entries/478f0e3e-a9fe-4223-be89-4dd78ba076ec
jableysecurity bbc tlshttps://pinboard.in/https://pinboard.in/u:jabley/b:46c9830d0ff9/Troy Hunt: The Unattributable "db8151dd" Data Breach2020-05-15T09:36:00+00:00
https://www.troyhunt.com/the-unattributable-db8151dd-data-breach/
jableyprivacy infosec security breachhttps://pinboard.in/https://pinboard.in/u:jabley/b:079174b614d9/The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet | WIRED2020-05-13T21:01:47+00:00
https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/
jableyhacking security wiredhttps://pinboard.in/https://pinboard.in/u:jabley/b:e73b9362f8a5/Drawing good architecture diagrams - NCSC.GOV.UK2020-05-13T09:05:26+00:00
https://www.ncsc.gov.uk/blog-post/drawing-good-architecture-diagrams
jableyncsc uk security architecture documentationhttps://pinboard.in/https://pinboard.in/u:jabley/b:dee27f26a641/Top 10 security items to improve in your AWS account | AWS Security Blog2020-05-08T12:54:48+00:00
https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/
jableyaws cloud security bestpracticeshttps://pinboard.in/https://pinboard.in/u:jabley/b:20e4cb1a25f2/Webcam Hacking - Technical Walkthrough | Ryan Pickren2020-04-05T09:19:17+00:00
https://www.ryanpickren.com/webcam-hacking
jableybrowser ios apple web security vulnerability infosec walkthroughhttps://pinboard.in/https://pinboard.in/u:jabley/b:5c6f469378c0/Getting Serious About Open Source Security - Better Programming - Medium2020-03-29T22:18:57+00:00
https://medium.com/better-programming/getting-serious-about-open-source-security-1d15609478fa
jableysecurity supply-chain opensourcehttps://pinboard.in/https://pinboard.in/u:jabley/b:30b5aaaf4333/Cloud WAF Comparison Using Real-World Attacks - Fraktal - Medium2020-03-26T09:24:06+00:00
https://medium.com/fraktal/cloud-waf-comparison-using-real-world-attacks-acb21d37805e
jableyweb waf security comparison infosechttps://pinboard.in/https://pinboard.in/u:jabley/b:6519bb4b1e46/#737140 Mass account takeovers using HTTP Request Smuggling on https://slackb.com/ to steal session cookies2020-03-13T22:46:43+00:00
https://hackerone.com/reports/737140
jableyrequest http security slack infosec vulnerabilityhttps://pinboard.in/https://pinboard.in/u:jabley/b:09e714d8a7dd/The Beer Drinker’s Guide to SAML | Duo Security2020-03-10T09:31:38+00:00
https://duo.com/blog/the-beer-drinkers-guide-to-saml
jableysaml authentication security webhttps://pinboard.in/https://pinboard.in/u:jabley/b:4c76f5390a66/Open-source Firmware - ACM Queue2020-02-26T18:31:11+00:00
https://queue.acm.org/detail.cfm?id=3349301
jableyfirmware hardware acm computer security opensource embedded boothttps://pinboard.in/https://pinboard.in/u:jabley/b:731731319aa5/Opening up the Baseboard Management Controller - ACM Queue2020-02-26T18:30:31+00:00
https://queue.acm.org/detail.cfm?id=3378404
jableyfirmware hardware acm computer security opensourcehttps://pinboard.in/https://pinboard.in/u:jabley/b:9a5250e4cdd0/Securing Firefox with WebAssembly - Mozilla Hacks - the Web developer blog2020-02-26T18:29:53+00:00
https://hacks.mozilla.org/2020/02/securing-firefox-with-webassembly/
jableywasm firefox security sandbox lucethttps://pinboard.in/https://pinboard.in/u:jabley/b:185c606a9142/Hacking AWS Cognito Misconfigurations - NotSoSecure2020-02-24T10:37:48+00:00
https://www.notsosecure.com/hacking-aws-cognito-misconfigurations/
jableyhacking aws securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:83398e97fb9a/Lest We Remember: Cold Boot Attacks on Encryption Keys | Center for Information Technology Policy2020-02-11T10:14:11+00:00
https://citp.princeton.edu/our-work/memory/
jableysecurity paper dram memory attack encryption infosechttps://pinboard.in/https://pinboard.in/u:jabley/b:2f52c2b90307/The Man Who Cracked the Lottery - The New York Times2020-01-10T20:12:40+00:00
https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-iowa-lottery-fraud-mystery.html
jableylottery crime security infosec usa nytimeshttps://pinboard.in/https://pinboard.in/u:jabley/b:276ab6bb07a7/First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group - TrendLabs Security Intelligence Blog2020-01-06T18:03:27+00:00
https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/
jableyandroid infosec vulnerability security exploithttps://pinboard.in/https://pinboard.in/u:jabley/b:7d1dfff9d3b4/Memory management in WebAssembly: guide for C and Rust programmers2019-12-29T19:10:17+00:00
https://www.fastly.com/blog/webassembly-memory-management-guide-for-c-rust-programmers
jableywasm memory security fastlyhttps://pinboard.in/https://pinboard.in/u:jabley/b:51bb5917c639/Can we stop intercepting user traffic (aka Man-in-the-Middle) please?2019-11-26T10:23:33+00:00
https://medium.com/@joelgsamuel/can-we-stop-intercepting-user-traffic-aka-man-in-the-middle-please-2a00de208d4b
jableyinfosec security tls mitm networking httpshttps://pinboard.in/https://pinboard.in/u:jabley/b:af152dc46fb0/Bypassing GitHub’s OAuth flow | Teddy Katz’s Blog2019-11-10T21:27:14+00:00
https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
jableyoauth authentication github web security infosec vulnerability railshttps://pinboard.in/https://pinboard.in/u:jabley/b:baa00d756896/BlueKeep (CVE 2019-0708) exploitation spotted in the wild - Kryptos Logic2019-11-03T21:35:40+00:00
https://www.kryptoslogic.com/blog/2019/11/bluekeep-cve-2019-0708-exploitation-spotted-in-the-wild/
jableywindows security infosec vulnerability experiencehttps://pinboard.in/https://pinboard.in/u:jabley/b:ea602d5d31d0/Introduction to logging for security purposes - NCSC2019-10-31T15:11:56+00:00
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes
jableyguidance ncsc logging security uk governmenthttps://pinboard.in/https://pinboard.in/u:jabley/b:1c3a0539a06b/Securing the NCSC’s web platform - NCSC2019-10-20T16:29:52+00:00
https://www.ncsc.gov.uk/blog-post/securing-ncsc-platforms
jableyncsc security infosec riskhttps://pinboard.in/https://pinboard.in/u:jabley/b:3f478c18fd93/Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security2019-10-09T08:12:42+00:00
http://saschafahl.de/static/paper/stackoverflow2017.pdf
jableyfiletype:pdf paper security research infosec code reusehttps://pinboard.in/https://pinboard.in/u:jabley/b:9d1ce6135b12/Important security notice about your DoorDash account2019-09-28T16:58:00+00:00
https://blog.doordash.com/important-security-notice-about-your-doordash-account-ddd90ddf5996
jableybreach security infosechttps://pinboard.in/https://pinboard.in/u:jabley/b:5a466369a0f7/How The NSA And U.S. Cyber Command Hacked ISIS's Media Operation : NPR2019-09-28T16:57:25+00:00
https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis
jableysecurity hack history usa politics isis nsa infosec attack breachhttps://pinboard.in/https://pinboard.in/u:jabley/b:e5c0207c9b34/Breaking the lock on CSCV - Scott McGready - Medium2019-09-28T16:51:58+00:00
https://medium.com/@ScottMcGready/breaking-the-lock-on-cscv-11328733295c
jableyuk police nca crime infosec security experiencehttps://pinboard.in/https://pinboard.in/u:jabley/b:73b1b911eb8c/44Con HackerOne CTF write up - Greg - Medium2019-09-21T20:39:51+00:00
https://medium.com/@gregIT/44con-hackerone-ctf-write-up-part-one-52607e139794#id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjBiMGJmMTg2NzQzNDcxYTFlZGNhYzMwNjBkMTI1NmY5ZTQwNTBiYTgiLCJ0eXAiOiJKV1QifQ.eyJpc3MiOiJodHRwczovL2FjY291bnRzLmdvb2dsZS5jb20iLCJuYmYiOjE1NjkwOTM1NjAsImF1ZCI6IjIxNjI5NjAzNTgzNC1rMWs2cWUwNjBzMnRwMmEyamFtNGxqZGNtczAwc3R0Zy5hcHBzLmdvb2dsZXVzZXJjb250ZW50LmNvbSIsInN1YiI6IjExMDc2MjUyOTQzMzQ1MDYzMjYyMyIsImVtYWlsIjoiamFtZXMuYWJsZXlAZ21haWwuY29tIiwiZW1haWxfdmVyaWZpZWQiOnRydWUsImF6cCI6IjIxNjI5NjAzNTgzNC1rMWs2cWUwNjBzMnRwMmEyamFtNGxqZGNtczAwc3R0Zy5hcHBzLmdvb2dsZXVzZXJjb250ZW50LmNvbSIsIm5hbWUiOiJKYW1lcyBBYmxleSIsInBpY3R1cmUiOiJodHRwczovL2xoMy5nb29nbGV1c2VyY29udGVudC5jb20vYS0vQUF1RTdtQlRXNE14TFNHWElzVHpqMkZnM0l3WVcwaGpBV2pXUTY1eXNLWmo9czk2LWMiLCJnaXZlbl9uYW1lIjoiSmFtZXMiLCJmYW1pbHlfbmFtZSI6IkFibGV5IiwiaWF0IjoxNTY5MDkzODYwLCJleHAiOjE1NjkwOTc0NjAsImp0aSI6ImY5NmU5OTNkYjM5NWY4NjYyYThiMjk0ZjdjZjQ2NDRiMWE4ZjI3ZGMifQ.XiRbNPxOREaW1vUu7k1bKyA-ggN1n4vJFDKgu6scr0jp_LnRnYcAGPcEbhhlqnYKTOM5L4gFBEn--ZHvORDtpBpc1AKY3eMT0j2yFpGaAjROsUZDI7ixjPubTfxE7f2iavXIVKbdjfpRlth-HntsdZk3TSJYSCPDJwIfqw0QICe47QrY06BUaRkt2Hr1-LtYPax2KS8T1vTjozTq13SeVfi_ldAXMu4izDQDxJ0PpkchpSuO4GUr1PEzDwAEs4pgo46bxGuX9iZTGxn9ObvAkUP5KL9kTK6-4vCLj6h19HHdjdID2rJAZPVIOgbdEuBNqsjknhgR7LTLX_tYZV7BvA
jableyctf hacking security infosechttps://pinboard.in/https://pinboard.in/u:jabley/b:1dd14a9f9ad9/Secured Android Smartphone - thaddeus t. grugq - Medium2019-09-09T11:36:47+00:00
https://medium.com/@thegrugq/secured-android-smartphone-32b28ae3fbd8
jableysecurity hardware android phone infosechttps://pinboard.in/https://pinboard.in/u:jabley/b:62b54f087e69/Major breach found in biometrics system used by banks, UK police and defence firms | Technology | The Guardian2019-08-25T07:18:54+00:00
https://www.theguardian.com/technology/2019/aug/14/major-breach-found-in-biometrics-system-used-by-banks-uk-police-and-defence-firms
jableysecurity privacy biometric infosec breachhttps://pinboard.in/https://pinboard.in/u:jabley/b:f6707c7b8db7/Absolute scale corrupts absolutely - apenwarr2019-08-21T08:02:35+00:00
https://apenwarr.ca/log/20190819
jableyinternet privacy homogeneity security systems-thinkinghttps://pinboard.in/https://pinboard.in/u:jabley/b:1f92c133b688/Lessons from 3 years of crypto and blockchain security audits2019-08-20T21:04:19+00:00
https://aumasson.jp/data/talks/BH19.pdf
jableyslides presentation filetype:pdf rust crypto security infosec audithttps://pinboard.in/https://pinboard.in/u:jabley/b:093af2f10c6a/ADD / XOR / ROL: Rashomon of disclosure2019-08-19T13:50:37+00:00
https://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html
jableyinfosec security disclosure reporting ethicshttps://pinboard.in/https://pinboard.in/u:jabley/b:7db815dec046/Rust in 2019: Security, Maturity, Stability2019-08-19T08:14:43+00:00
https://tonyarcieri.com/rust-in-2019-security-maturity-stability
jableycrypto plt rust securityhttps://pinboard.in/https://pinboard.in/u:jabley/b:86419ee466cf/Project Zero: Down the Rabbit-Hole...2019-08-13T17:42:45+00:00
https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html
jableywindows infosec security vulnerability tavisohttps://pinboard.in/https://pinboard.in/u:jabley/b:c4c449170c69/