aurelsec
@aurelsec.bsky.social
310 followers 630 following 18 posts
Hackademic at S3@eurecom
Posts Media Videos Starter Packs
Reposted by aurelsec
suzannesmalley.bsky.social
Signal to leave EU rather than comply w/ Chat Control, which would scan all messages sent over end-to-end encrypted platforms. Vote on Chat Control's future Oct 14. Germany is the swing vote. Officials there opposed the measure in past but new govt silent re position
therecord.media/signal-calls...
Signal calls on Germany to vote against ‘Chat Control,’ saying it would leave EU market
The head of the Signal Foundation raised concerns around Germany now refusing to say whether it will support Chat Control in an upcoming vote.
therecord.media
aurelsec.bsky.social
Source: American Cryptology During the Cold War, 1945-1989 Book III: Retrenchment and Reform, 1972-1980 (declassified)
archive.org/details/cold...
Which I found thanks to this nice article by @hashbreather.bsky.social
blog.cr.yp.to/20251004-wea...
cr.yp.to: 2025.10.04: NSA and IETF
blog.cr.yp.to
aurelsec.bsky.social
Interesting story how DES 56 became a 56-bit key algorithm (while having a 64-bit block size):
"NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately, they compromised on a 56-bit key."
Reposted by aurelsec
natanael.bsky.social
"Bad news: The proposal is going forward to be voted on on October 14th, and there's still no blocking minority achieved, as Germany reverted its position to undecided.

Good news: There is still time to fight back!"

Shut this monstrosity down NOW
The battle to stop Chat Control continues, act now!
Unfortunately, the battle against Chat Control continues this month. For human rights, for civil liberties, for safety, and for democracy, this privacy-wrecking proposal must be stopped. We need your ...
www.privacyguides.org
Reposted by aurelsec
phrack.org
At long last - Phrack 72 has been released online for your reading pleasure!

Check it out: phrack.org
The table of contents for Phrack 72 from phrack.org
Reposted by aurelsec
hcoyote.bsky.social
Phrack 72 released today. phrack.org/issues/72/1

It got me thinking. I first read Phrack back in the 90's as I started hanging out on IRC (maybe '93 or '94?), as I was learning about FreeBSD and later, Linux. It must have been Phrack 43-45 where I started.

What a wild ride on the Internet.
.:: Phrack Magazine ::.
Phrack staff website.
phrack.org
Reposted by aurelsec
pinkflawd.bsky.social
I reverse engineered Lockbit's Linux ESXi variant, also explaining how I did some of the steps! For the fun of it, cause reverse engineering is lots of fun. Enjoy!
hackandcheese.com/posts/blog1_...
Reposted by aurelsec
pinkflawd.bsky.social
@blackhoodie.bsky.social will be at @sec-t.bsky.social on September 10th with a training on Linux Malware Reverse Engineering, for women by women! We have very few seats left 😁 blackhoodie.re/SecT2025/
Reposted by aurelsec
wootsecurity.bsky.social
Discounted early bird registration for WOOT '25 is still open until Monday - www.usenix.org/conference/w... - join us in Seattle on Aug 11/12 (right before USENIX Security) for talks and discussions on great cutting-edge offensive security research. Full program at www.usenix.org/conference/w...
WOOT '25 Technical Sessions
www.usenix.org
Reposted by aurelsec
vanhoefm.bsky.social
Our research on open tunneling servers got nominated for the Most Innovative Research award :)

The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security

Brief summary and code: github.com/vanhoefm/tun...
Paper: papers.mathyvanhoef.com/usenix2025-t...
Reposted by aurelsec
henrymance.ft.com
Huge implications from this: Microsoft cut off the email of the chief prosecutor of the International Criminal Court, because of his work on Israel www.nytimes.com/2025/06/20/t...
Reposted by aurelsec
wootsecurity.bsky.social
Two winners of the RP2350 Hacking Challenge will present their results at WOOT!

Muench et al. break its secure boot guarantees through voltage, electromagnetic, and laser fault injection 💥 techniques: www.usenix.org/conference/w...
Security through Transparency: Tales from the RP2350 Hacking Challenge | USENIXusenix_logo_notag_white
www.usenix.org
Reposted by aurelsec
dklischies.bsky.social
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: youtu.be/zoAITq7jUM8. It has been a pleasure; awesome conference, brilliant people. Slides and paper: www.danielklischies.net/research/bas...
OffensiveCon25 - Daniel Klischies and David Hirsch
YouTube video by OffensiveCon
youtu.be
Reposted by aurelsec
arstechnica.com
Since mid-2024, Google has refused to reinstate the access Nextcloud needs for uploading and syncing other file types to its host-your-own cloud platform.
“Google wanted that”: Nextcloud decries Android permissions as “gatekeeping”
Without full file access, it’s kind of hard to use your own cloud.
arstechnica.com
Reposted by aurelsec
bloody-tangerine.bsky.social
Haven't seen this on Bluesky yet: S&P 2027 will take place in Montreal, Canada!
Reposted by aurelsec
dklischies.bsky.social
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. Dyon will present at IEEE S&P on Monday 3pm, while David and I will be on stage at @offensivecon.bsky.social on Saturday 11am with even more details! 1/6