Ivan Nardi (@i_nardi) 's Twitter Profile
Ivan Nardi

@i_nardi

ID: 2245483343

calendar_today26-12-2013 22:08:24

244 Tweet

141 Followers

142 Following

gfw.report (@gfw_report) 's Twitter Profile Photo

🚨We discovered Wallbleed, a vulnerability in the Great Firewall of China, allowing anyone leaks its memory. Since 2021, we reverse-engineered its logic, evaluated impact, and monitored patches. Wallbleed reveals censorship devices’ global privacy risks: gfw.report/publications/n…

🚨We discovered Wallbleed, a vulnerability in the Great Firewall of China, allowing anyone leaks its memory. Since 2021, we reverse-engineered its logic, evaluated impact, and monitored patches. Wallbleed reveals censorship devices’ global privacy risks: gfw.report/publications/n…
Ivan Nardi (@i_nardi) 's Twitter Profile Photo

What can go wrong when a UE tries to attach to a LTE/NB-IoT network? A technical deep dive: "The Miserable State of Modems and Mobile Network Operators" blog.golioth.io/the-miserable-… #3GPP

Ivan Nardi (@i_nardi) 's Twitter Profile Photo

On May 5, Microsoft’s Skype will shut down for good. “Fu vera gloria?, Ai posteri l'ardua sentenza” arstechnica.com/gadgets/2025/0…

Ivan Nardi (@i_nardi) 's Twitter Profile Photo

"Advancing Obfuscation Strategies to Counter China’s Great Firewall: A Technical and Policy Perspective" arxiv.org/pdf/2503.02018 #DeepPacketInspection

"Advancing Obfuscation Strategies to Counter China’s Great Firewall: A Technical and Policy Perspective"

arxiv.org/pdf/2503.02018

#DeepPacketInspection
Ivan Nardi (@i_nardi) 's Twitter Profile Photo

"A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges" arxiv.org/pdf/2502.14945 #DeepPacketInspection

Niklas Niere/JonSnowWhite (@jonsnowwhite2) 's Twitter Profile Photo

China advanced its QUIC censorship. The GFW now decrypts QUIC Initial packets and extracts the hostname from the SNI extension—similar to its censorship of TLS over TCP. My colleague details our findings in our new blog post: upb-syssec.github.io/blog/2025/quic…

Ivan Nardi (@i_nardi) 's Twitter Profile Photo

"This document specifies methods for the encryption and obfuscation of IP addresses for both operational use and privacy preservation. The objective is [...] to share or analyze data while protecting sensitive address information, [...] in the face of pervasive surveillance.

ntop (@ntop_org) 's Twitter Profile Photo

Introducing #nDPI 4.14: Added QoE (Quality of Experience) and New Protocols, Several Fixes ntop.org/ndpi/introduci…

gfw.report (@gfw_report) 's Twitter Profile Photo

🚨 Our S&P’25 paper reveals rising regional censorship in China. In addition to the national Great Firewall, Henan province runs its own firewall. Though less sophisticated, it’s more volatile and aggressive—once blocking 10× more domains than the GFW. 👉 gfw.report/publications/s…

🚨 Our S&P’25 paper reveals rising regional censorship in China.
In addition to the national Great Firewall, Henan province runs its own firewall. Though less sophisticated, it’s more volatile and aggressive—once blocking 10× more domains than the GFW.
👉 gfw.report/publications/s…
NickvsNetworking (@nickvnetworking) 's Twitter Profile Photo

Pretty wild security fail in a big operator's IMS - @o2 and @mavenir allowing their debug SIP headers through the P-CSCF to the UE, exposing the cell ID, IMSI and IMEI of the B party...

Diptanshu singh (@networkporter) 's Twitter Profile Photo

Notes on Packet Classification cover theoretical and practical implementation approaches. I find this area mildly boring, but it's a hard problem space with an N-dimensional headache. dipsingh.github.io/HighSpeed-Pack…