Introduction
Introduction Statistics Contact Development Disclaimer Help
Posts by [email protected]
Post #AwPyNsubCMGTTL3RRo by [email protected]
0 likes, 1 repeats
@aparrish great read, thanks for sharing! @kenshirriff and @david_chisnall woul…
Post #AwQ8tHI3bpgRbCdQzg by [email protected]
0 likes, 0 repeats
Could we please stop pretending that putting milk in coffee is normal?It’s al…
Post #AwQAf8h2yXeMn3i436 by [email protected]
0 likes, 1 repeats
@david_chisnall spot on. Or, alternatively, rm -rf, and obtain a better coffee.…
Post #AwSr2UYmQVdzeya4Ei by [email protected]
0 likes, 1 repeats
@madcoder @joe because it's an insane concept with so many downsides and co…
Post #Awf71ctXskh4NsQDdg by [email protected]
0 likes, 1 repeats
@david_chisnall Exciting!
Post #Awot89pyWON13euHVQ by [email protected]
0 likes, 1 repeats
It’s significantly more fun than playing the game, 100%https://infosec.exchan…
Post #AwrG3fG4xRzWK3rZ3o by [email protected]
0 likes, 1 repeats
I’m touched that folks still ping me from time to time to thank me for my old…
Post #Ax1j7tdrd3bg6uPBr6 by [email protected]
0 likes, 1 repeats
You know, why use numbers to indicate levels of things?
Post #Ax82pYGnVzHce4uDU8 by [email protected]
0 likes, 1 repeats
@madcoder wow this is a very mean trap.
Post #AxBzeqFWnwvTzaLx9k by [email protected]
0 likes, 1 repeats
@david_chisnall yup. I feel “spatial” and “temporal” are being used way…
Post #AxBzoINFbjIJpETOYC by [email protected]
0 likes, 1 repeats
@david_chisnall yup. For example, I feel “spatial” and “temporal” are b…
Post #AxEe69nTHIkJy4hBZo by [email protected]
0 likes, 1 repeats
This is so cute https://computerengineeringforbabies.com/
Post #AxEfP13Q6j8mJDiCum by [email protected]
0 likes, 1 repeats
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa…
Post #AxEjHaVon75XmQhzOq by [email protected]
0 likes, 1 repeats
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa…
Post #AxFnHfL7R8yhj7xMrQ by [email protected]
0 likes, 1 repeats
@david_chisnall thank you! I was looking for this paper :)
Post #AxFrr87IprgSvhezqa by [email protected]
0 likes, 1 repeats
@david_chisnall and following the concept of secret-less models in the paper, i…
Post #AxFw2aKyeUdrSLm3SS by [email protected]
0 likes, 1 repeats
@david_chisnall 100%. The threat model and security boundaries here are so prob…
Post #AxFx1DH3121xahqUiG by [email protected]
0 likes, 1 repeats
@david_chisnall yup, that’s why type-2 VMMs are not a defensible boundary for…
Post #AxFzD68rYeTGr3oQ8e by [email protected]
0 likes, 1 repeats
@david_chisnall concrete example from 2020: https://github.com/microsoft/MSRC-S…
Post #AxICZj84yJclrZUCUi by [email protected]
0 likes, 1 repeats
In case you missed it, have fun https://e-mail.wtf
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.