John Aakerblom (@jaakerblom) 's Twitter Profile
John Aakerblom

@jaakerblom

RE and language enthusiast

ID: 2879687848

calendar_today16-11-2014 15:20:34

131 Tweet

3,3K Followers

122 Following

John Aakerblom (@jaakerblom) 's Twitter Profile Photo

Slides for the presentation “Tales from the iOS/macOS Kernel Trenches” that I recently held at Zer0Con 2022 are now publicly available here: github.com/potmdehex/slid…

John Aakerblom (@jaakerblom) 's Twitter Profile Photo

Apple is choosing not to pay bounties for kernel infoleaks. Being in more demand than ever after new mitigations, I expect Apple to change their stance for such bugs reported by A. Z., myself and others. Until then I recommend researchers present such bugs at 0x41con

simo (@_simo36) 's Twitter Profile Photo

My #POC2022 slides + the iOS kernel r/w exploit can be found here :) github.com/0x36/weightBuf… Thanks POC_Crew 👨‍👩‍👦‍👦 for a fantastic conference and truly honored to have been part of it.

John Aakerblom (@jaakerblom) 's Twitter Profile Photo

Slides for the presentation “More Tales from the iOS/macOS Kernel Trenches” held at Hexacon 2022 are now publicly available here: github.com/potmdehex/slid…

Muirey03 (@muirey03) 's Twitter Profile Photo

I would love to share with you all my write-up and PoC on CVE-2022-42864, a TOCTOU in IOHIDFamily: muirey03.blogspot.com/2023/01/cve-20… I hope you enjoy!

A. Z. (@antoniozekic) 's Twitter Profile Photo

Proof of concept for CVE-2022-46697, an out-of-bounds access in IOMobileFrameBuffer. Fixed in macOS Ventura 13.1. github.com/antoniozekic/P…

Ahn Ki Chan (@externalist) 's Twitter Profile Photo

Here are the slides for my keynote, 'Mobile Exploitation, the past, present, and the future' at #Zer0Con2023. Zer0con was a blast as always, thank you POC_Crew 👨‍👩‍👦‍👦!! 🚀💫 github.com/externalist/pr…

Dataflow Forensics (@df_forensics) 's Twitter Profile Photo

'tis the Season - the latest #DFF blog post unpacking insights about anticipated releases of new Apple OS versions. df-f.com/blog/tisthesea…

Dataflow Security (@dfsec_com) 's Twitter Profile Photo

We’ve been asked a lot lately if we're hiring — and the answer is yes. We’re a team of 96 and have multiple positions open. Feel free to share: dfsec.com/#careers

Ian Beer (@i41nbeer) 's Twitter Profile Photo

My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - googleprojectzero.blogspot.com/2025/03/blasti…

Bruno (@bkth_) 's Twitter Profile Photo

Another year and we're still looking for exceptional talent that are looking to join an amazing research team and contribute to the story we're writing Dataflow Security, if you're interested or just curious about it, I'll be offensivecon and available to chat :)