Marcin

5.7K posts

Marcin banner
Marcin

Marcin

@marcinw

because tweeting and blogging is a full time job

New York, NY 参加日 Temmuz 2008
325 フォロー中1.6K フォロワー
Marcin がリツイート
Kyle Vogt
Kyle Vogt@kvogt·
Well folks, we did it. I have been waiting for this day for almost 10 years. I am proud to announce @Cruise is now running 24/7 across all of San Francisco! This is a pivotal moment for our business. Let me tell you why 👇(1/6)
English
166
375
3.3K
1.3M
Marcin がリツイート
Chris Wysopal
Chris Wysopal@WeldPond·
You'd be hard pressed to find someone in the hacker community that you could have deep tech conversations with & also turn everything they touch into fun. @aloria is a legend that I am privileged to call a friend. We will remember! Photo from 15th anniversary of "Hackers" party.
Chris Wysopal tweet media
Gabriella "Biella" Coleman@BiellaColeman

When speaking with @aloria my spirits would lift. Her wit and brilliance were stuff of legend and she would often make me smile and think at the same time. You will be missed and this is how I will remember you:

English
0
14
48
10.3K
Marcin がリツイート
Ryan Hurst
Ryan Hurst@rmhrisk·
“Code signing” as sold by CAs is a Microsoft only offering. It doesn’t really belong in CA/Browser Forum at all. Doing so just shunts Microsoft’s responsibility to evolve its own code signing practices to commercial CAs. This is problematic for several reasons.
DigiCert@digicert

The Code Signing Working Group recently improved requirements for code signing. Effective Nov. 15, 2022, key protection requirements for OV code signing certificates are harmonized to be the same as EV code signing certificates. digicert.com/blog/improved-…

English
2
9
28
0
Scott Piper
Scott Piper@0xdabbad00·
My general guidance for AWS has been to trust AWS is securing their side of the shared responsibility model (ex. don't spend much time worrying about the possibility of guest-to-host-escapes, CPU side channels, etc from other customers). That is not my belief for Azure. 🧵
English
6
84
329
0
Marcin がリツイート
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
Where else in our lives do we actively create and promote the infrastructure that allows malicious actors scalable and frictionless destruction? Why run AD, which enables scalable ransomware? So that we can automatically deploy EDR to maybe detect (but not stop) that ransomware?
English
0
2
5
0
Marcin
Marcin@marcinw·
@drraid Clear violation of the site ToS.
English
0
0
1
0
Brandon Edwards
Brandon Edwards@drraid·
Is there an IDA plugin for decoding HTML? I’m having a hard time keeping up with all these hacking techniques
English
6
4
49
0
Marcin
Marcin@marcinw·
@mattifestation @j3ffr3y1974 How does behave when you have an expired (but not revoked) signing certificate with a valid RFC3161 timestamp?
English
0
0
0
0
Marcin がリツイート
Dan Guido
Dan Guido@dguido·
My scooter was stolen last week. Unknown to the thief, I hid two Airtags inside it. I was able to use the Apple Find My network and UWB direction finding to recover the scooter today. Here’s how it all went down:
English
227
2.6K
12.3K
0
Brandon Edwards
Brandon Edwards@drraid·
This. This all day long. Between iOS and IntelME it’s as if vendors spite us with the lack of visibility. I’ll always favor a system with visibility and the purported “less security” over an opaque box claiming to be a fortress
Halvar Flake@halvarflake

People may disagree with me on this, but allowing users to dtrace-log the hell out of their phones would at least help at-risk users collect better forensic evidence... iOS still has all the dtrace infra, android has all the eBPF infra. Allow users to add o11y to their phones.

English
0
6
37
0
Marcin がリツイート
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
There's a focus that comes with protecting cryptocurrency. Security theater doesn't play at all, there are real direct consequences for breaches, and you can't keep them a secret. There is real useful innovation happening and the rest of infosec ignores it to their own detriment.
Dominic White 👾@singe

For years I’ve avoided anything to do with cryptocoins. Initially it was because people assumed being in security meant I knew about it & kept pestering me. Later it was because I saw the greed derail a couple of good hackers careers. Then it was some of the unpleasant community.

English
4
10
48
0
Marcin がリツイート
Tyler Winklevoss
Tyler Winklevoss@tyler·
Big congratulations to @brian_armstrong, @FEhrsam and the entire @coinbase team on a monster debut today! Huge moment for crypto. To the moon! 👍🏻🚀🍾🥂🥳🎉🎈🎊
English
58
211
3.4K
0
Marcin がリツイート
Cem Paya
Cem Paya@randomoracle·
Windows crypto API makes it easy to use keys on hardware eg HSMs Example: ADFS with SAML signing key on AWS CloudHSM v2 (Marvel Nitrox née Cavium) Sometimes showing the key is on an HSM is the hard part 🤷‍♂️ Key container → CSP → certificate → ADFS settings
Cem Paya tweet media
English
1
1
1
0
Marcin がリツイート
Cem Paya
Cem Paya@randomoracle·
Common pattern in infosec: 1. Fail at threat modeling (In this case: conflate risks of non-constant time comparison of HMACs vs password hashes) 2. Attempt at "fix" for said "problem" 3. Introduce a more serious & real vulnerability 🤦‍♂️
English
0
1
1
0
Marcin がリツイート
Cem Paya
Cem Paya@randomoracle·
Alternative view: given that enterprise IT is a market for lemons, it is the buyer responsibility to manage that risk by making sure untrusted vendor code (read: all except a handful such as MSFT/Google/AWS…) is properly sandboxed & contained assuming it *will* fail
English
0
1
0
0
Marcin がリツイート
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
My take: if you have the team on-staff to invent ALTS, use that. Otherwise, use mTLS for your service-to-service communication. You should still use other authn/authz mechanisms that are closer to end-to-end, though.
English
5
4
15
0
Marcin がリツイート
Jesse D'Aguanno
Jesse D'Aguanno@0x30n·
I grew up on software exploitation, but always thought crypto was beyond me. In the ~5 yrs since finding Cryptopals, I’ve found & exploited critical crypto bugs in products like secure messengers, and helped design secure protocols. Thanks @tqbf @spdevlin @marcinw @iamalexalright
Jesse D'Aguanno@0x30n

Periodic reminder that you should check out cryptopals.com if you’re involved in making or breaking software that uses cryptography

English
1
14
69
0
Marcin がリツイート
Cem Paya
Cem Paya@randomoracle·
This is why using credentials bound to hardware— smart-cards, USB tokens, TPMs— is crucial You can not paste them into Slack or share with another colleague even if you wanted to 🤷‍♂️ 1/2
Cem Paya tweet media
English
1
3
10
0