Calle Svensson

7.6K posts

Calle Svensson banner
Calle Svensson

Calle Svensson

@ZetaTwo

Security Engineer @ XTX. MSc in eng. physics & CompSci, dev & gamer. ❤️ music & long distance running. Wanna do a PhD sometime. Same U/N on all other sites

London, England Katılım Nisan 2009
721 Takip Edilen6.9K Takipçiler
Calle Svensson
Calle Svensson@ZetaTwo·
@momo5502 Thank you! Glad you liked it! :D Anytime! I'll hopefully get back to you with both questions and results once I have time to get back to this project later this year.
English
0
0
1
23
Calle Svensson
Calle Svensson@ZetaTwo·
@lauriewired It was such a good con. Nice to see you there and thanks for a great talk!
English
0
0
2
399
LaurieWired
LaurieWired@lauriewired·
RE//Verse was genuinely one of the best technical conferences I’ve attended (and I’ve been to a lot!). The caliber of the attendees was super high; one of the most technical audiences I’ve ever spoken to. It was well organized, highly caring staff, not to mention the food was really good! Giving the keynote was fun, and I really enjoyed all the other talks as well.
LaurieWired tweet mediaLaurieWired tweet media
English
11
15
466
30.1K
Calle Svensson
Calle Svensson@ZetaTwo·
Really looking forward to share my work on #AgeofEmpires with you all and to visit the conference.
RE//verse@REverseConf

Carl Svensson (@zetatwo) is bringing Age of Empires II Definitive Edition to RE//verse 2026 as a playground for tooling. This talk walks through Binary Ninja automation to decrypt and deobfuscate game code and a BNIL query system for matching obfuscated instruction patterns. If you like game reversing you will want to see this talk: shop.binary.ninja/collections/re…

English
0
0
10
773
Calle Svensson
Calle Svensson@ZetaTwo·
@MelonMusk75 The concept: highly debatable, I'd lean "no". This particular implementation: ROFLMAO, not even close
English
0
0
1
16
Calle Svensson
Calle Svensson@ZetaTwo·
LOL. I got emailed by some site building "open source profiles" for hiring, scraping GitHub and adding some things on top. You can opt out in your profile and they'll delete your page. The catch? There's no auth at all. Anyone can go and delete me here: algora.io/profile/ZetaTwo
English
2
1
3
1.1K
Calle Svensson
Calle Svensson@ZetaTwo·
I'm proud of you all. My page disappeared within an hour of posting this.
English
0
0
2
437
Calle Svensson
Calle Svensson@ZetaTwo·
@T90Official Love you Tristan but those glasses and that 'stache combo is probably the douchiest look I've seen in quite a while. :'D
English
1
0
0
221
T90Official
T90Official@T90Official·
My first thought was “i’d rather die than put these things on” but my nephew thought they were cool so I had to 🤣
English
2
0
41
4.7K
T90Official
T90Official@T90Official·
Happy New Year! Took some pics this holiday. Shoutout to my nephew for the shades. 🤣
T90Official tweet mediaT90Official tweet mediaT90Official tweet mediaT90Official tweet media
English
6
0
264
12.9K
Calle Svensson
Calle Svensson@ZetaTwo·
Any friends with solid low-level skills (RE, obfuscation, etc.) around to provide feedback on my new @pagedout_zine article?
English
1
0
8
712
Farenain
Farenain@Farenain·
A few articles from the @pagedout_zine #7 that I found interesting: * Disassembling with LLVM: using LLVM API for disassembling. * Obfuscating Crypto Constants: generating crypto constants in runtime. * Turning a GCC anti-debug trick into a LCE Easy and quick to read :D
Farenain tweet mediaFarenain tweet mediaFarenain tweet media
English
7
27
125
8.6K
Calle Svensson
Calle Svensson@ZetaTwo·
@XorNinja This is great advice though the "realistic" part is very important to stress. If you assume the attacker has a RCE 0-day for all software in your system it immediately devolves into nihilism. I think this is where experience really shows: the ability to determine this level.
English
1
0
1
260
thaidn
thaidn@XorNinja·
The Principle of Maximum Privilege You've probably heard of the Principle of Least Privilege: give users only the access they need, and no more. However, when designing secure systems, you should also apply the opposite idea: the Principle of Maximum Privilege. This means that when you think about attackers, you assume the strongest realistic attacker, not the weakest one. You don't imagine a clueless script kiddie. You imagine an attacker who knows your code, understands your architecture, and may already have significant access to your network. You deliberately assume the worst case. This sets a high bar for security. If your system still holds up against a highly capable attacker, then less capable attackers are unlikely to succeed. If it only works because attackers are expected to be sloppy, unlucky, or ignorant, it isn't secure. Thinking this way shifts you from hoping attackers don't know much to designing systems that stay safe even when they do. A classic example of this idea is Kerckhoffs's principle in cryptography: a system should remain secure even if everything about it is public, except the secret key. Security should depend on secrets you can control, not on assumptions that attackers won't look closely.
English
1
1
17
2.6K
Calle Svensson
Calle Svensson@ZetaTwo·
@KenneyNL @anaisenserio I once heard a great principle on user/customer feedback. It went something like: You should almost always listen when they explain their problems but you should very rarely listen when they suggest how to solve it.
English
1
0
2
44
Kenney
Kenney@KenneyNL·
@anaisenserio Listen to the community, and ask for constructive feedback. Don't just implement anything that anyone says, but keep a list - if things are requested more often then find out if there's a chance for a good update! (in the update, mention the community help)
English
3
0
120
4.1K
michael
michael@m40282845·
Is the appeal of trams to public transit people that they're less like a private vehicle than busses? I can't determine why on earth you'd prefer them over a comprehensive fleet of busses.
English
1
0
0
176