Cellebrite was proud to provide sponsorship for the amazing @pb_ctf that took place a few weeks back. We also took upon the challenge of judging "best write-up" for an extra cash award. There were some great write-up finalists this year, and we absolutely enjoyed reading them 🤓
I am delighted to announce the winning write-up by @hgarrereyn for the awesome complexity-theory "Not Password" challenge ctf.harrisongreen.me/2021/pbctf/not…
100% educational, complete with annotated background, appropriate meme usage, interesting storyline and cool visuals 🔥 Read it now 👇
It is far from a surprise that Harrison's team @dicegangctf also took won the competition this year. our best congrats to the organizers and the participating teams for a great event. 👏
These inspiring community-organized events are truly behind growing the next generation of security engineers and researchers, and I hold the highest respect to those involved and the efforts invested.
If you are looking for a place to grow, and deeply care about the use case for the technology you create, you are welcome to check out our opportunities here cellebrite.com/en/about/caree… or just DM ❤️

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Shahar Tal

Shahar Tal Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jifa

24 Dec 20
*Mixed Signals*
I don't care much to revisit the Signal fiasco which mainly revolves around unfortunately misguided reporting; mistakes were made with wording and clarity and we need to own them.
however I need to vent out a couple of comments before signing off:
Some have dismissed the article's content as "embarrassing", and let me be clear - I disagree. I am proud of the technical merit in the article when taken in context, which is an educational write-up targeted at forensic examiners, providing transparency about the tools they use.
Cellebrite is not all about code execs, LPEs, trustzone pwnage and crypto flaws. We also reverse engineer file systems and applications and decode their data to make forensic work accessible and defensible, and we do it efficiently and consistently for hundreds of apps.
Read 9 tweets
18 Jan 20
Story time –
I’m hanging out at Schönefeld Airport waiting for the flight back from CCC. Wife calls, we chat for a few mins and the call disconnects.
I dismiss it with a “oh well, crazy cell tower.”

3 mins later, wife calls frantically: “ARE YOU OKAY?!” 🤔
- “uhh, yeah, what’s wrong?”
- “ok, I just thought you were kidnapped or in some distress. You started repeating your answers very calmly and I was sure you were trying to signal me something”
- “oh wow, that’s pretty crazy!” 😯
We both realize that while I got disconnected, she got a replay using a perfect recording of my side of the call.
We talk about what it could mean and how this can’t be a normal cell network behavior, and we get cut off again. 🤨
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(