Zuk Profile picture
3 Aug, 3 tweets, 1 min read
As part of preparing a burner for BH & DC, I chose a device that has inferior HW security (e.g. A<12) to be able to dump the FS after.

It was either that, or remaining on an outdated OS.

It is ridiculous that we need to compromise on security to get (some) visibility 😤
#FreeTheSandbox ✌️👊
Dear Friendly Threat Actors, Yes, it means that I'm accepting 0day submissions (/attacks) in the upcoming DEFCON too.

Send it my way please.

🙏 Mahalo in advance <3

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Zuk

Zuk Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ihackbanme

28 Jul
For those who think that NSO is the problem - you're missing out the bigger picture:

1. There are many vendors like NSO, not just in Israel. Also in EU, APAC, N. America, and others.

2. Even if NSO shuts down tomorrow: we still have a problem: mobile attacks are scalable.
2. (cont) Once you have created a generic attack-chain, you can infect 1B+ devices. This is too powerful to keep a single barrier for attackers which already block telemetry sharing with the vendors.
3. NSO is *EASY* to find *if* a deeper access is provided to the phones.

Which leads to the bigger problem:

Why we can opt-in to be tracked by ads but can't opt-in to choose our own security apps to run with full privileges on our own phones?
Read 5 tweets
18 Jul
[Important thread 1/N]: Let that sink in for a second: almost all respected publications were under espionage.

All the sources of journalists, were exposed. If you ever spoke to a journalist (even with "Signal"/"Whatsapp") you are exposed.

THIS IS A MAJOR THREAT TO DEMOCRACY!
[2/N] If we needed another proof that we have to fix the broken mobile security permission model, here it is.

NSO's software is actually super easy to catch, but due to the lack of permissions it becomes almost impossible at scale, and NSO only has a single vendor to avoid.
[3/N] This was easy to do for NSO: they simply blocked telemetry, communications, and updates to Apple/Google: and viola! They were set. The vendors had no visibility.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(