eShard (@eshard) 's Twitter Profile
eShard

@eshard

Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing

infosec.exchange/@eshard
bsky.app/profile/eshard…

ID: 3293298475

linkhttp://www.eshard.com calendar_today25-07-2015 17:44:30

818 Tweet

1,1K Followers

332 Following

eShard (@eshard) 's Twitter Profile Photo

We’ll trace what really happens inside Telegram when you send or receive a message. 📨 Learn how to capture clean execution traces for Time Travel Analysis, step by step. Register here: eshard.eventbrite.fr 👈 #android #cybersecurity #mobileapp #telegram

We’ll trace what really happens inside Telegram when you send or receive a message. 📨
Learn how to capture clean execution traces for Time Travel Analysis, step by step. Register here: eshard.eventbrite.fr 👈
#android #cybersecurity #mobileapp #telegram
eShard (@eshard) 's Twitter Profile Photo

Learn how to trace Telegram on #Android, from setup to execution to analysis. Full-system vs lightweight tracing, real use cases, and Time Travel Analysis in action. Register here 👉 eshard.eventbrite.fr #AndroidSecurity #ReverseEngineering #Telegram

Learn how to trace Telegram on #Android, from setup to execution to analysis.

Full-system vs lightweight tracing, real use cases, and Time Travel Analysis in action.

Register here 👉 eshard.eventbrite.fr
#AndroidSecurity #ReverseEngineering #Telegram
eShard (@eshard) 's Twitter Profile Photo

Our work is a continuation of Aleph Research, Trung Nguyen and ChefKiss (Visual Ehrmanntraut). The current state of ChefKiss allows you to have the iOS UI if you apply binary patches on the OS. We will publish binary patches later as open source.

eShard (@eshard) 's Twitter Profile Photo

WinDBG vs esReverse: Same concept (time travel debugging), very different scope. We break down the differences in our blog: eshard.com/posts/differen… #windows #cybersecurity

WinDBG vs esReverse:
Same concept (time travel debugging), very different scope.

We break down the differences in our blog: eshard.com/posts/differen… #windows #cybersecurity
eShard (@eshard) 's Twitter Profile Photo

We put together summaries of some of the talks we attended at this year’s hardwear.io USA 🇺🇸 👉eshard.com/posts/a-look-b… #hw_ioUSA2025

We put together summaries of some of the talks we attended at this year’s <a href="/hardwear_io/">hardwear.io</a> USA 🇺🇸 👉eshard.com/posts/a-look-b… #hw_ioUSA2025
eShard (@eshard) 's Twitter Profile Photo

To most users, it’s just a tap. To us, it’s a trace filled with memory operations, encryption, and system calls. We’ll show you how to capture it, and everything behind it, using #Telegram as our target. 👉 Register to our webinar: eshard.eventbrite.fr 📆 June 18th & 19th

PQShield (@pqshield) 's Twitter Profile Photo

🔔 This July 10th, uncover the critical truth about physical attacks on post-quantum schemes. eShard & PQShield will show you how. ✅ 10am GMT: hubs.li/Q03tjny70 ✅ 5pm BST: hubs.li/Q03tjmQH0

🔔 This July 10th, uncover the critical truth about physical attacks on post-quantum schemes. <a href="/eshard/">eShard</a> &amp; PQShield will show you how.
✅ 10am GMT: hubs.li/Q03tjny70
✅ 5pm BST: hubs.li/Q03tjmQH0
eShard (@eshard) 's Twitter Profile Photo

Live with PQShield on July 10th to see how side-channel and fault injection break ML-KEM and what you can do to stop them. Register now: 🔵 11am CEST: pqshield.zoom.us/webinar/regist… 🔵 6pm CEST: pqshield.zoom.us/webinar/regist…

Live with <a href="/PqShield/">PQShield</a> on July 10th to see how side-channel and fault injection break ML-KEM and what you can do to stop them.

Register now:
🔵 11am CEST: pqshield.zoom.us/webinar/regist…
🔵 6pm CEST: pqshield.zoom.us/webinar/regist…
eShard (@eshard) 's Twitter Profile Photo

Post-quantum crypto resists quantum computers, not physical attacks. On July 10, we're live with PQShield to show how side-channel and fault injection techniques still break schemes like ML-KEM, and how to protect your implementations. Register now: 🔵 11am CEST:

Post-quantum crypto resists quantum computers, not physical attacks.

On July 10, we're live with <a href="/PqShield/">PQShield</a> to show how side-channel and fault injection techniques still break schemes like ML-KEM, and how to protect your implementations.

Register now:
🔵 11am CEST: