jiska
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ
🎦 youtube.com/@jiskac
📝 naehrdine.blogspot.com
🐥 twitter.com/naehrdine
🎓 hpi.de/classen
📱 reversing.training
- Last weekend, Telekom changed their network name from "Telekom.de" to "Im besten Netz." 📶 Curious about how they did this? Will more ad campaigns follow? And what can you do to change it back? More details in this video: youtu.be/-PchHdFhl5M
- Reposted by jiska[Not loaded yet]
- Reposted by jiskaDon't miss out on Jiska Classen's - @naehrdine.bsky.social - training on "Practical iOS Reverse Engineering" at #OffensiveCon26 Find more details here🔗https://buff.ly/psTxdyG
- Reposted by jiska[Not loaded yet]
- Want to know how Apple's Low Latency WiFi works? Today, 3:40pm CET, Hall 1, #39c3. More details: events.ccc.de/congress/202... Stream: streaming.media.ccc.de/39c3/one
- Reposted by jiska[Not loaded yet]
- WOOT deadline approaching 👀
- Reposted by jiska[Not loaded yet]
- Using a Pixel with GrapheneOS that features Inactivity Reboot, MTE, and more? — You must be a drug dealer. 🚨
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiskaOn a Saturday night I stumbled across something on the internet that made me feel like ****** my pants. A giant dataset of real surveillance operations targeting 1000s of people across nearly every country. Unraveling it and the mysterious company behind it has consumed 1.5 years of my life
- Want to know more details on Apple's SPTM, TXM, and Exclaves? Read more on this in the paper based on Moritz Steffin's thesis. Lots of low-level details including their security implications are covered. arxiv.org/abs/2510.09272
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Want to learn reverse engineering? There'll be a free, women*-only BlackHoodie workshop from October 6th to 9th in Paris! Topics: • Linux memory forensics 🕵️♀️ (by Sonia) • Web app and mobile app pentesting 🕸️📱 (by Paula) • iOS reversing 🍎 (by me)
- Reposted by jiska[Not loaded yet]
- Been working on some interesting mobile security research lately? 📱🔬 Submit it to Black Hat Europe, the CFP deadline is August 11. Speaker honorarium + travel to London 🎡💂🏼♀️🏙️ are covered!
- My first day with a fancy new title 👩🏫🎉
- Reposted by jiska[Not loaded yet]
- Easy, beginner-friendly class teaching how to use Binary Ninja's debugger. Had the pleasure of beta testing it :)
- Reposted by jiska[Not loaded yet]
- The Apple Watch has a closed down ecosystem, only compatible with the iPhone. Nils reverse engineered its interfaces to open it up for Android! ✨ WatchWitch ✨ allows using your Apple Watch ⌚ on Android devices, interpreting your health data, answering messages on the Watch & more. (1/2)
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Liquid glass :|
- Going to the USENIX Security Symposium? Don't forget to also register for WOOT, the papers we selected are amazing 🤩
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Messenger so secure it can't decrypt my own messages 🔒
- Reposted by jiska[Not loaded yet]
- Remember Aaron's talk on iPhone Mirroring at #38c3? He just published a blog post about his findings in threat modelling and researching the security of this new feature, including more details he's only able to talk about now. aaronschlitt.de/threat-model...
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Great article about Apple's 🍎 Exclaves & Conclaves that provides a high-level overview and then dives into technical details implemented in XNU 👀 randomaugustine.medium.com/on-apple-exc...
- Have some hackademic research you'd love to see published as a paper? Submit it to WOOT 📝 Looking forward to your submissions!
- Tarlogic found a "backdoor" im the ESP32 chips: bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices Broadcom & Cypress chips have the same HCI "backdoor" allowing to write to the Bluetooth chip's RAM. This feature is used for firmware patches.
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiskaNEW: Google fixed three zero-day vulnerabilities in Android that were used by authorities to unlock phones with Cellebrite forensic tools. The fixes come after Amnesty alerted Google, following the analysis of a Serbian student protester's phone. techcrunch.com/2025/02/28/r...
- Reposted by jiska[Not loaded yet]
- "Why do we need to provide our fingerprints for entering Disney World?" - "It's not a fingerprint. It's a photo of your finger, converted to a number, which is then linked to your ticket." 🫠
- Reposted by jiska[Not loaded yet]
- Last chance to book my iOS 📱 reversing training at RE//verse! I've updated various training contents and added new exercises, which will help you understanding even more system internals 🔬
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiskaCrap crap crap. www.washingtonpost.com/technology/2...
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]
- Reposted by jiska[Not loaded yet]