Teddy Reed (@teddyreedv) 's Twitter Profile
Teddy Reed

@teddyreedv

Security software engineer; osquery developer; trusted computing, embedded hacking enthusiast; he/him

ID: 194868916

linkhttps://casualhacking.io calendar_today25-09-2010 05:17:12

311 Tweet

833 Followers

277 Following

SABEW (@sabew) 's Twitter Profile Photo

Melanie Ensign (Melanie Ensign) communications advisor with Uber, will share her insights on covering cybersecurity and data breach trends at #SABEWNYC18. Register today. buff.ly/2BAm3t4

Melanie Ensign (<a href="/iMeluny/">Melanie Ensign</a>) communications advisor with Uber, will share her insights on covering cybersecurity and data breach trends at #SABEWNYC18. Register today. buff.ly/2BAm3t4
Teddy Reed (@teddyreedv) 's Twitter Profile Photo

I have a lot of single board computers that boot using U-Boot or ATF. It seems reasonable to create a root-of-trust using MMC/SPI write-protection of this initial boot code. The root is not in the CPU, but it’s still from ROM. Assuming the flash ucode is OK, what could go wrong?

Open Source Firmware Conference (@osfc_io) 's Twitter Profile Photo

Do you have something crazy going on and want to present it to the community? Submit your talk until June 30, 2019. Speakers get complimentary admission to the conference. We have also scholarship funds to help you attend the conference. So just go ahead: osfc.io/speakers

Graham Bleaney (@grahambleaney) 's Twitter Profile Photo

Registration link is up! Sign up if you're interested in attending a tutorial in DEF CON's AppSec Village on how to identify vulnerabilities in Python code using the free and open source Pysa. Click "Register" and then "Applying Pysa - Graham Bleaney": eventbrite.com/e/appsec-villa…

Teddy Reed (@teddyreedv) 's Twitter Profile Photo

These hot takes against Zero Trust just ain’t it. 0 trust = don’t trust, only verify, authentication and authorization should be your constant. It will forever be a worthwhile strategy and is hand in and with defense in depth.

Steve Weis (@sweis) 's Twitter Profile Photo

Signal previews private contact discovery running in SGX enclaves: signal.org/blog/private-c… Repo: github.com/whispersystems…

Teddy Reed (@teddyreedv) 's Twitter Profile Photo

Come join engineers from Facebook’s intrusion detection team tomorrow as we walk through introductory to advanced osquery usage! #lisa2017 x.com/osquery/status…

RuCTFE (@ructfe) 's Twitter Profile Photo

RuCTFE is going to start in less than two weeks, and we are ready to present something new to you. We hope you'll like it :) Here it is, RuCTFE Cloud! telegra.ph/RuCTFE-Cloud-2…

Azeria (@fox0x01) 's Twitter Profile Photo

To make it a little easier for you to get started with ARM exploitation, I compiled some small buffer overflow challenges to play around with and created a quick guide. All you need to do is follow the instructions and start tinkering around. Have fun 🖤 azeria-labs.com/part-3-stack-o…

To make it a little easier for you to get started with ARM exploitation, I compiled some small buffer overflow challenges to play around with and created a quick guide. All you need to do is follow the instructions and start tinkering around. Have fun 🖤 
azeria-labs.com/part-3-stack-o…