Ben Lincoln
blincoln.bsky.social
Ben Lincoln
@blincoln.bsky.social
Security consultant, forward/reverse engineer.

https://www.beneaththewaves.net/
If this happens to you, you can set the screen lock password on the original device (even if it's to the same value), and you should be able to restore the backup on the other device again.

Of course, this doesn't help if you no longer have access to the device, or it's inoperable.
March 24, 2025 at 5:04 PM
Reposted by Ben Lincoln
Playing through the cut content has been joyous but has left me hungry for more! I'd pay good money for dlc where the original vision for the game is playable in its entirety, though I appreciate this is perhaps unrealistic 😅

Great work, people! @rainaaudron.bsky.social @blincoln.bsky.social
December 13, 2024 at 12:41 PM
Reposted by Ben Lincoln
Thank you @rainaaudron.bsky.social, and also to @blincoln.bsky.social whose work on TLW I followed since high school back in 2001. Seeing the Lost Levels in an official release is a dream come true.
December 10, 2024 at 10:46 AM
I also added a walkthrough/comparison of using Broken Hill's rollback feature to jailbreak Phi-3, with some statistics and analysis of effectiveness versus a few other configurations: github.com/BishopFox/Br...
github.com
November 12, 2024 at 10:22 PM
It didn't seem like there were any good examples to practice against, so I also built a sample vulnerable application to test your tooling: https://github.com/BishopFox/VulnerableGWTApp
December 18, 2023 at 5:21 PM
It's likely exploitable without authentication, unless access control is handled by a non-GWT layer of the stack. My writeup includes a walkthrough of building and using payloads with a modified version of ysoserial: https://github.com/BishopFox/ysoserial-bf
December 18, 2023 at 5:21 PM