Daniel Moghimi (@flowyroll) 's Twitter Profile
Daniel Moghimi

@flowyroll

Senior Scientist @Google. Computer and Hardware Security. Tweets are mine and not my employer's. #downfall

Previously: @UCSD @Qualcomm @WPI @TalosSecurity

ID: 4106835983

linkhttp://moghimi.org calendar_today03-11-2015 19:58:19

1,1K Tweet

2,2K Followers

346 Following

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

A friend of mine, a wonder women in her early 30s got paralyzed upon a sport injury. Still processing it after 10 days. Think about what really matters. Love the loved ones. And don't take life too seriously, people.

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Also CrowdStrike be like, we have been in the forefront of using AI to catch all the attacks, but we also have also entirely forgot about fundamental security design.

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

This was a key decision we made at the very beginning of Capsule8: we would not be a kernel module and only use kprobes/uprobes as provided by the Linux kernel so that we could never panic the kernel. Choosing safety from the beginning made us have to work harder, but was right.

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Exactly this. If you are not prioritizing a safe development interface for business reasons, fine. But stop saying there wasn't a better technical solution.

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

What would happen if one pushes out a buggy firmware that would make a chipset not to boot? Brick billions of computers, sending parts to dumpster 👿

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

If I were crowdstrike, I might have as well started monetizing on ads. Such a waste of opportunity to not show customers some ads while protecting them against other adware.

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

The Twitter/X AI overlords now recommend me more block chain content because of the crowdstrike outage. Are these things this bad?

Robert Graham (@erratarob) 's Twitter Profile Photo

Well of course CrowdStrike claims they do the same thing as Capsule8. This is how the industry works. Every time a small company creates an innovation, the big companies claim they already do it, or that are about to release something better. It's not true. This works because

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Went to see the Duel Reality by The 7 Fingers. Awed by this thrilling, psychedelic, acrobatic story telling. They are in town till August 4th. Don't miss out.

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

I am looking for a new home. As I am typing my partner's name on Google calendar, it also suggests that I should add our current landlord to the meeting :) I am guessing this is just because we have had a shared history of exchanging emails. Yeah right, AI apocalypse is near.

Michael Schwarz (@misc0110) 's Twitter Profile Photo

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com
Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

I didn't attend Usenix Security this year, but looking at the hardware security papers, only a small number solve real problems. This is unfortunate because I know that students put a lot of efforts into these papers. It looks like the gap between academia-industry is quite big.

Elie Bursztein (@elie) 's Twitter Profile Photo

[Weekend read] Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning - elie.net/publication/ge… Thrilled to finally publish our GPAM model and high-quality ECC datasets after years of intense R&D. Compared to existing approaches, the GPAM model

[Weekend read] Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning - elie.net/publication/ge…

Thrilled to finally publish our GPAM model and high-quality ECC datasets after years of intense R&D. Compared to existing approaches, the GPAM model
Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

I wrote a piece on SIGARCH blog about the state of hardware and architecture security. "Secure Computer Architecture in the Post-Meltdown World: A Long Road Ahead" sigarch.org/secure-compute…