Daily Shaarli

All links of one day in a single page.

August 30, 2019

FreeBSD KTLS

Add kernel-side support for in-kernel TLS.

Project Zero: A very deep dive into iOS Exploit chains found in the wild
thumbnail

Terrifying iOS Exploit found in the wild

Impact: The implant has access to almost all of the personal information available on the device, which it is able to upload, unencrypted, to the attacker's server. The implant binary does not persist on the device; if the phone is rebooted then the implant will not run until the device is re-exploited when the user visits a compromised site again. Given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device.

CAST Handbook

Hanbook on Causal Analysis based on System Theory by Nancy Leveson.

Security Engineering - A Guide to Building Dependable Distributed Systems

Security Engineering Book