Posts by [email protected] | |
Post #AwPyNsubCMGTTL3RRo by [email protected] | |
0 likes, 1 repeats | |
@aparrish great read, thanks for sharing! @kenshirriff and @david_chisnall woul… | |
Post #AwQ8tHI3bpgRbCdQzg by [email protected] | |
0 likes, 0 repeats | |
Could we please stop pretending that putting milk in coffee is normal?It’s al… | |
Post #AwQAf8h2yXeMn3i436 by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall spot on. Or, alternatively, rm -rf, and obtain a better coffee.… | |
Post #AwSr2UYmQVdzeya4Ei by [email protected] | |
0 likes, 1 repeats | |
@madcoder @joe because it's an insane concept with so many downsides and co… | |
Post #Awf71ctXskh4NsQDdg by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall Exciting! | |
Post #Awot89pyWON13euHVQ by [email protected] | |
0 likes, 1 repeats | |
It’s significantly more fun than playing the game, 100%https://infosec.exchan… | |
Post #AwrG3fG4xRzWK3rZ3o by [email protected] | |
0 likes, 1 repeats | |
I’m touched that folks still ping me from time to time to thank me for my old… | |
Post #Ax1j7tdrd3bg6uPBr6 by [email protected] | |
0 likes, 1 repeats | |
You know, why use numbers to indicate levels of things? | |
Post #Ax82pYGnVzHce4uDU8 by [email protected] | |
0 likes, 1 repeats | |
@madcoder wow this is a very mean trap. | |
Post #AxBzeqFWnwvTzaLx9k by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall yup. I feel “spatial” and “temporal” are being used way… | |
Post #AxBzoINFbjIJpETOYC by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall yup. For example, I feel “spatial” and “temporal” are b… | |
Post #AxEe69nTHIkJy4hBZo by [email protected] | |
0 likes, 1 repeats | |
This is so cute https://computerengineeringforbabies.com/ | |
Post #AxEfP13Q6j8mJDiCum by [email protected] | |
0 likes, 1 repeats | |
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa… | |
Post #AxEjHaVon75XmQhzOq by [email protected] | |
0 likes, 1 repeats | |
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa… | |
Post #AxFnHfL7R8yhj7xMrQ by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall thank you! I was looking for this paper :) | |
Post #AxFrr87IprgSvhezqa by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall and following the concept of secret-less models in the paper, i… | |
Post #AxFw2aKyeUdrSLm3SS by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall 100%. The threat model and security boundaries here are so prob… | |
Post #AxFx1DH3121xahqUiG by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall yup, that’s why type-2 VMMs are not a defensible boundary for… | |
Post #AxFzD68rYeTGr3oQ8e by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall concrete example from 2020: https://github.com/microsoft/MSRC-S… | |
Post #AxICZj84yJclrZUCUi by [email protected] | |
0 likes, 1 repeats | |
In case you missed it, have fun https://e-mail.wtf |