Tweets from April 2014

radare2 running on a #Omate #trueSmart watch LOL :) http://t.co/X11pvkDZ7N

12:57pm April 30th 2014 via web

ProTip: wakeup #Omate #TrueSmart screen while in the dock/cradle (buttons inaccessible): $ adb shell input keyevent 26

12:15pm April 30th 2014 via web

@kapitanpetko @jduck LOL! dinosaurs, they are better than unicorns :D

11:41am April 30th 2014 via Falcon Pro in reply to kapitanpetko

Remember Ubuntu for Android? It's not dead, but it's in limbo - http://t.co/FFh20tKDBJ

7:19am April 30th 2014 via Falcon Pro

RT @daniel_bilar: Evading Android runtime analysis via sandbox detection [also see π calc time] http://t.co/OS24i0gyRR cc @jduck http://t.co/rJTegbhGPL

7:10am April 30th 2014 via Falcon Pro

RT @Joshua_Brindle: @pof Even Toro (Verizon Galaxy Nexus) built from AOSP w/no gapps asked VZW if tethering was okay via one of their nasty binary blobs...

6:30am April 30th 2014 via Falcon Pro

RT @prodrigestivill: . @pof last comment simplest solution for tethering http://t.co/4StmWFZGAD

6:30am April 30th 2014 via Falcon Pro

RT @mikko: F-Secure Mobile Threat Report Q1/2014 is out: http://t.co/bPMAf7JENV http://t.co/XdsStjte8X

10:03pm April 29th 2014 via Falcon Pro

RT @LacoonSecurity: RT @lseltzer @jduck: @LacoonSecurity researcher demos how attackers using #Heartbleed can steal #Android user data. http://t.co/0EH9yKFW3s

10:02pm April 29th 2014 via Falcon Pro

RT @esizkur: On the other hand, Icera's custom processor (DXP) will be a hurdle for all non-state actors doing baseband exploitation. All three of them.

9:45pm April 29th 2014 via Falcon Pro

RT @esizkur: So BlackPhone uses a Tegra 4i (shared-memory design). I just hope NViDIA cleaned up the old TTPCom stack.

9:45pm April 29th 2014 via Falcon Pro

Android betrays tethering data - http://t.co/2nNVOEHa86

9:38pm April 29th 2014 via Falcon Pro

RT @radareorg: Added 'VV' command to run the interactive ascii-art graph viewer. http://t.co/zawa43PvqJ

10:50am April 29th 2014 via Falcon Pro

Omate TrueSmart Touchscreen problem: http://t.co/09U1TXVpX3 via @YouTube

8:09am April 29th 2014 via Google

RT @m0nk_dot: I did a quick teardown of the Samsung Note 3, took some pictures and wrote some text for fun... http://t.co/DMljPN4JUD

10:09pm April 28th 2014 via Falcon Pro

@s7ephen @omatetruesmart the touchscreen sucks, launcher could be better and security wise is crap... but it's a fun piece of hardware :)

8:36pm April 28th 2014 via Falcon Pro in reply to s7ephen

RT @arkadeum: @pof yo, saw u enjoy chiptunes. @Rainwavecc have been very good to us, they also have a #chiptune station!

8:34pm April 28th 2014 via Falcon Pro

@miaubiz @omatetruesmart its small, but feels a bit heavy on the wrist

12:17pm April 28th 2014 via Falcon Pro in reply to miaubiz

my @omatetruesmart smart watch has just arrived! :D http://t.co/8KXbWayTDn

11:21am April 28th 2014 via Falcon Pro

RT @2xAA: Once a member of 8bc? Got a bunch of music you downloaded? Why not upload it? http://t.co/Ademt6AnhP #chiptune #8bc #chipmusic

11:44pm April 27th 2014 via Falcon Pro

How to Cheat Your MDM: Compliance without a Password - http://t.co/pky66T7BkS

10:39pm April 27th 2014 via Falcon Pro

RT @AndroidTamer: a good collection of Blogs, sites and books about the latest security and malware news on Android. : https://t.co/dde1kmZw7f

8:21pm April 27th 2014 via Falcon Pro

RT @IBMSecurity: How to Cheat Your MDM: Compliance without a Password - http://t.co/N0ORbRXZ58 #MDM #mobile #Android #ibmxforce

4:56pm April 27th 2014 via Falcon Pro

RT @i0n1c: And yeah iOS jailbreaks deactivate a bunch of protections. Those that your android device didn't have in the first place.

4:40pm April 27th 2014 via Falcon Pro

RT @thegrugq: “@radareorg: The Radare2 vs IDA vs Hopper comparison page http://t.co/NHb8xUjg4B share your comments”< -v -c -r4 -m 'no one can use radare'

9:03pm April 26th 2014 via Falcon Pro

RT @volkerdi: When I realized I wasn't reading the Onion, I cried into my morning coffee. http://t.co/uHBy3C8F5B

8:41pm April 26th 2014 via Falcon Pro

RT @OWASPSpain: .@pof será ponente en el VIII #OWASP Spain Chapter Meeting. ¡Nos vemos en Barcelona! http://t.co/rofaUolnTd #OWASPSpain8

3:33pm April 26th 2014 via Falcon Pro

RT @radareorg: The Radare2 vs IDA vs Hopper comparison page http://t.co/bdxw1nGD8x share your comments!

3:29pm April 26th 2014 via Falcon Pro

RT @collinrm: The #QPSISummit is likely the most interesting mobile security event I have attended.

3:25pm April 26th 2014 via Falcon Pro

RT @nedos: #QPSISummit was a blast. I think it really sets the bar for vendor-specific conferences.

3:25pm April 26th 2014 via Falcon Pro

RT @raviborgaonkar: #QPSISummit was definitely an effective approach to bridge researchers and Mobile industry to fight security issues. Thanks @againsthimself

3:25pm April 26th 2014 via Falcon Pro

RT @againsthimself: #QPSISummit is over. Innumerable thanks to all the speakers, attendees, and QPSI staff that made it happen!

3:25pm April 26th 2014 via Falcon Pro

RT @TeamAndIRC: It won't be immediate, but this type of communication between OEM, carrier, researcher etc will lead to more secure mobile.

3:25pm April 26th 2014 via Falcon Pro

RT @bitJudo: Analyzing (and reversing) an #android app with ease using #docker and #androguard -- new @bitJudo blog by @insitusec http://t.co/x7WmdJ1AC2

5:47am April 25th 2014 via Falcon Pro

RT @Fuzion24: Great talk about using silicon flaws for the purpose of exploitation by @esizkur at #QPSISummit http://t.co/9jgtU9rf2i

8:10pm April 24th 2014 via Falcon Pro

RT @xdadevelopers: UnbelovedHosts Uses Xposed to Block Unwanted Connections http://t.co/YVsWywMXAG

7:53pm April 24th 2014 via Falcon Pro

RT @elathan: @gunther_ar @timstrazz @pof We have a similar paper in this year's EuroSec (took place a couple of weeks ago): http://t.co/ZjhrsKrQFZ

1:38pm April 24th 2014 via Falcon Pro

I added a video to a @YouTube playlist http://t.co/PFYWbHeXNj Defcon 21 - Defeating SEAndroid

9:14am April 24th 2014 via Google

I added a video to a @YouTube playlist http://t.co/14AHGzbMit Beginners Guide to Reverse Engineering Android Apps

9:13am April 24th 2014 via Google

RT @Gunther_AR: Evading Android runtime analysis via sandbox detection. http://t.co/MmeLY0muR7 CC @timstrazz

8:20am April 24th 2014 via Falcon Pro

RT @viaforensics: We're still hunting for superstar Android developers - http://t.co/Z9TqtUQHsp

7:57am April 24th 2014 via Falcon Pro

RT @dragosr: Cracking WEP with Android tablets. http://t.co/exwz02H6IY

7:56am April 24th 2014 via Falcon Pro

Worst online shopping experience ever with @palensunglasses had to open dispute with @PayPal. ProTip: if you want them, buy at local store.

7:05pm April 23rd 2014 via web

RT @WileyTech: eBook Deal/Day: Save 50% on #Android Hacker's Handbook by @jduck @pof @quine @s7ephen @collinrm Use code DEAL http://t.co/ArSzBQopaz

4:28pm April 23rd 2014 via web

RT @0x08: A Forensic Examiner's Guide to Google Glass http://t.co/UwJSNKj4YQ #DFIR

2:35pm April 23rd 2014 via Falcon Pro

RT @collinrm: Mobile Security News Update April 2014 http://t.co/EfbAa94osQ How vulnerable was/is Android to heartbleed? Did anybody really investigate?

2:26pm April 23rd 2014 via Falcon Pro

@matalaz I hope you enjoy it! :)

11:21am April 22nd 2014 via web in reply to matalaz

RT @michael_howard: Windows Phone 8.1 Security Overview http://t.co/EYQVfm0O4B

7:10am April 22nd 2014 via Falcon Pro

RT @carlosacastillo: [PDF] VirtualSwindle: An Automated Attack Against In-App Billing on Android http://t.co/hEWDCq4XNX

7:00am April 22nd 2014 via Falcon Pro

RT @carlosacastillo: JavaScript Code Injection possible in Feedly Android App via RSS Feeds http://t.co/Jz98FiW6Un

6:48am April 22nd 2014 via Falcon Pro

RT @jduck: Maybe this other little tool will make auditing Android devices file systems a bit easier - https://t.co/XjYzG30RfG - (compliments privmap)

6:12am April 22nd 2014 via Falcon Pro

RT @jduck: Hopefully this little tool will make Android device privilege auditing a bit easier for you - https://t.co/A30pNEcgnB - Enjoy!

6:12am April 22nd 2014 via Falcon Pro

New post on my blog "SSF2T: The quest for the perfect training mode" - http://t.co/x5bR59S3zU #SuperTurbo

1:40am April 22nd 2014 via web

RT @HECFBlog: Daily Blog #301: Sunday Funday 4/20/14 a mobile forensics challenge for a $200 amazon gift card #dfir http://t.co/sB6I3vkCg6 @celldet

9:23pm April 20th 2014 via Falcon Pro

@8Kone submitted my response, let me know if I can be of help for the Linux or Android ports :)

10:06am April 20th 2014 via web in reply to 8Kone

RT @newsycombinator: How to crash any media player on Android http://t.co/vJwRiYuufR

7:32am April 19th 2014 via Falcon Pro

RT @virusbtn: IOActive's @reversemode issued wake-up call for the SATCOM industry after research found many serious vulnerabilities http://t.co/RpY3kokdQS

7:28am April 19th 2014 via Falcon Pro

RT @JonathanSalwan: ROPgadget v5.0 using @capstone_engine is out :). ELF/PE/Mach-O on x86, x64, ARM, MIPS, Sparc and PPC. http://t.co/OQYfEdbVKS

7:46am April 18th 2014 via Falcon Pro

I liked a @YouTube video http://t.co/G5izMtmgtc X-Mania Europe 2 : Kurahashi matches

11:13pm April 17th 2014 via Google

RT @trufae: How to get the Kc from a SIM card? http://t.co/s1VSvKbILf #gsm #sim

10:36pm April 17th 2014 via Falcon Pro

RT @droidsec: OMG, thanks to @AndroBugs the people of #droidsec (freenode) now have a group twitter account!

10:35pm April 17th 2014 via Falcon Pro

Ubuntu 14.04 LTS released - http://t.co/A9ula5Vcxt

6:09pm April 17th 2014 via Falcon Pro

Super Turbo Training Mode: http://t.co/lh5Sc2l5xH via @YouTube

10:53am April 17th 2014 via Google

Great article explaining TrustZone: Genode, An Exploration of ARM TrustZone Technology - http://t.co/l3eMwNHCny

11:01pm April 15th 2014 via Falcon Pro

This would be nice: Enable Go programming language support in the NDK toolchain - https://t.co/01WHHK4NxN

10:52pm April 15th 2014 via Falcon Pro

Occupy Your Icons Silently on Android: vuln allows to replace legit Android home screen icons with fake ones - http://t.co/3oBI2Fy19v

10:35pm April 15th 2014 via Falcon Pro

Samsung Galaxy S5 Fingerprint Scanner also susceptible to ordinary spoofs - http://t.co/fnQnhGxGMf

9:49pm April 15th 2014 via Falcon Pro

RT @viaforensics: We're looking to hire an Android Developer – http://t.co/QiP0mV8ORy #mobilesecurity

5:19pm April 15th 2014 via Falcon Pro

RT @r_netsec: CERT Secure Coding Standards for Android - http://t.co/GRSUAt1XDv

5:16pm April 15th 2014 via Falcon Pro

RT @WEareTROOPERS: Just to let you know: most #troopers14 presentations can already be found at https://t.co/8lHeUshCCr. Rest of them and videos 2 follow soon.

5:15pm April 15th 2014 via Falcon Pro

RT @adi1391: The most amazing book on AndroidSec I've found so far. #AndroidHH by @jduck @pof @s7ephen @ochsff @collinrm @quine http://t.co/VF7Dssu2yh

5:10pm April 15th 2014 via Falcon Pro

RT @0xroot: xgoldmon - Convert log messages by phones with XGold baseband processor back to GSM/UMTS radio messages - https://t.co/waVfkKnH3u

7:02am April 15th 2014 via Falcon Pro

RT @0xroot: Galaxy Nexus and the RIL - http://t.co/xOzfyPbPPA

7:01am April 15th 2014 via Falcon Pro

RT @ErrataRob: Here's my 'heartleech' getting the CloudFlare Challenge key. '-a' means 'autopwn' https://t.co/9Ht7wRTNMA http://t.co/THwUHfS0ug

6:56am April 15th 2014 via Falcon Pro

@Xgamerz nice combos! you also have a DC?

6:43am April 15th 2014 via Falcon Pro in reply to Xgamerz

RT @solardiz: Radare Summer Of Code: http://t.co/7ixNKvDpTw for radare2 reverse engineering framework. Crowdfunding target 12k EUR: http://t.co/mUPImr83eb

8:38pm April 14th 2014 via Falcon Pro

RT @0xroot: Adobe Reader for Android exposes insecure JavaScript interface - http://t.co/7ZuWJo3JBw

6:56pm April 14th 2014 via Falcon Pro

RT @breakNenter: Finally my master's thesis has it's moment of glory: Identifying binary key material is all the rage: https://t.co/4TRFwrzzK7 #heartbleed

1:39pm April 13th 2014 via Falcon Pro

RT @raviborgaonkar: This is pretty impressive work on "Making of Kosher Phone" by Assaf. Luking forwrd 2 his talk @reconmtl @hugofortier http://t.co/lg6LFcyhFq

11:49pm April 12th 2014 via Falcon Pro

RT @angealbertini: on Pac-Man's (buggy) ghost algorithm http://t.co/bIuTmY71bH

9:20pm April 11th 2014 via Falcon Pro

RT @sf2kuroppi: Check out the STR #xmaniausa / #tol2 donation drive. Some nice ST goodies are avialable: http://t.co/UPshn6hCMj http://t.co/OBhpF1qnt9

12:17pm April 11th 2014 via web

@hteso i'm sure you'll love to see this, if you haven't already - https://t.co/Tsd3nWrfqI

7:48am April 11th 2014 via web

RT @Android: We're expanding Google's security services for Android with the ability to continually protect you from harmful apps: http://t.co/rm4cMJlvUZ

7:18am April 11th 2014 via Falcon Pro

RT @trufae: Chiptune: Pushing the limits using constraints #tedx https://t.co/E3paHIpKmw

11:35pm April 10th 2014 via Falcon Pro

RT @adi1391: My latest book on introductory guide of Android Security just got published : "Learning Pentesting for Android" http://t.co/mn2t7lF7R2

4:16pm April 10th 2014 via Falcon Pro

RT @jduck: BTW, I released the first version of my Android Cluster Toolkit scripts - https://t.co/hOI5gRQjqF (nothing special, but invaluable)

8:25am April 10th 2014 via Falcon Pro

RT @blubbfiction: Wrote a quick&dirty TLS server for checking client implementations if they are vulnerable against #heartbleed: https://t.co/ACJcoGmfxY

8:24am April 10th 2014 via Falcon Pro

RT @marcograss: Just noticed the new lunch target aosp_arm64-eng in AOSP master

10:40pm April 9th 2014 via Falcon Pro

RT @SpiderLabs: SpiderLabs Anterior> Capturing Ghosts: Using inotify to defeat an Android DRM system http://t.co/ckatnpTrDx

5:31pm April 9th 2014 via Falcon Pro

RT @BlueboxSec: There's a new #bug out there that affects #mobiledevices! It's called #Heartbleed. Are you affected?! http://t.co/zMPeSp4M2J

4:18pm April 9th 2014 via web

RT @BlueboxSec: Download the #Google Play: #Heartbleed Scanner it recognizes if you're running a vulnerable version of #OpenSSL http://t.co/a43LET7Kml

4:18pm April 9th 2014 via web

RT @jduck: @thegrugq they added openssl 1.0.1 in Android 4.1.1 but no-heartbeat in 4.1.2+

9:01am April 9th 2014 via Falcon Pro

RT @redditprogrammn: Writing an iOS app using only ARM assembly https://t.co/6NNxEBV85p #reddit

7:35am April 9th 2014 via Falcon Pro

RT @radareorg: Oops. m68k instruction length is fixed now. You can continue hacking the street fighter roms. Sorry for the inconvenience

6:56am April 9th 2014 via Tweet Button

RT @ryanaraine: remote code execution vulnerability in BlackBerry 10 http://t.co/DxpHsox8EI

9:42pm April 8th 2014 via Falcon Pro

RT @m0thran: #heartbleed client attack PoC at https://t.co/Ebkwz58ahg Shout out to @ultramegaman for the help.

9:35pm April 8th 2014 via Falcon Pro

Secure Usage of Android Webview: - http://t.co/ULdEoeqI0i

9:24pm April 8th 2014 via Falcon Pro

RT @m0thran: My PoC for the #heartbleed bug: https://t.co/otZeJIVLiF Find the script in scripts/heartbleed.py

9:20pm April 8th 2014 via Falcon Pro

RT @viaforensics: Heartbleed OpenSSL Vulnerability Disclosed – http://t.co/MpQ50mg4vT

6:12pm April 8th 2014 via Falcon Pro

RT @FredericJacobs: Here's the Pull Request that introduced the #HeartBleed bug. https://t.co/fq0o24V3Il

3:42pm April 8th 2014 via Falcon Pro

@cocaman @seebrock3r "[...] can be used to reveal up to 64k of memory to a connected *client* or server" - https://t.co/lgVEkLDUjl

3:24pm April 8th 2014 via web in reply to cocaman

TIL: strace + tcpdump + lsof + awesome sauce = sysdig http://t.co/JKvEvDVRqK via @Newlog_

12:53pm April 8th 2014 via web

RT @cocaman: @seebrock3r @pof guess not, says "-no-heartbeats" at https://t.co/2yUDsbA2JA

12:11pm April 8th 2014 via Falcon Pro

RT @seebrock3r: So apparently Android is also affected by this nifty Heartbleed bug... https://t.co/CqYHNhJjvJ

11:49am April 8th 2014 via Falcon Pro

RT @capstone_engine: Capstone officially supports Android! Time to write your cool native reverse tool for mobile: https://t.co/6fASUQfboe http://t.co/eGWlu1RGl

11:49am April 8th 2014 via Falcon Pro

RT @j4cob: @sinic @ivanristic openssl s_client -connect google\.com:443 -tlsextdebug 2>&1| grep 'server extension "heartbeat" (id=15)' || echo safe

10:43am April 8th 2014 via Falcon Pro

RT @roman_soft: "According to the currently available information, private keys should be considered as compromised" https://t.co/TDkQ5OUEIe #Heartbleed

10:43am April 8th 2014 via Falcon Pro

RT @roman_soft: #Heartbleed New OpenSSL vulnerability permits leaking of private keys !!! P-A-T-C-H !! http://t.co/cSSDDgXtSx http://t.co/CJ0hjjuGhD

10:43am April 8th 2014 via Falcon Pro

RT @s7ephen: Wow. @jduck was just told our book is #1 in "Privacy", #3 in "Hacking", and #3 in "Network Security" on Amazon... http://t.co/Z7S9w80pGO

10:41am April 8th 2014 via Falcon Pro

RT @esizkur: CVE-2014-0160 looks like a neat bugdoor. OpenSSL allowed remote memory disclosure (key leakage) for > 2 years: http://t.co/enbJyPJfZ4

10:41am April 8th 2014 via Falcon Pro

RT @Gunther_AR: SyScan 2014 slides is out now. Grab them here. http://t.co/HywfL2d8pJ

10:36am April 8th 2014 via Falcon Pro

I liked a @YouTube video http://t.co/eSufaqoiUO Just keep trying!

9:44am April 8th 2014 via Google

Here's the second post on the "Hacking Super Street Fighter II Turbo" series, with a quick intro to m68k patching - http://t.co/bZ2AW6sRmp

8:12am April 8th 2014 via web

RT @_FireFart_: WhatsApp protocol implementation for libpurple (pidgin) https://t.co/28174uDv4G

7:28am April 7th 2014 via Falcon Pro

RT @firewaterdevs: firewater is released for m8, visit http://t.co/JDikkVwMNP

11:04pm April 6th 2014 via Falcon Pro

RT @justincormack: @rumpkernel screenshot of NetBSD running in Android userspace http://t.co/CYEyKna7Uy

10:04pm April 6th 2014 via Falcon Pro

RT @evdokimovds: Windows Phone 8.1 Security Features http://t.co/Iq2Tj5xbKk

1:23pm April 6th 2014 via Falcon Pro

RT @jason_kint: this is how you get tracked on a site using every ad network, exchange, dmp, native ad possible. one click. http://t.co/w9KD7BkpZB

8:22am April 6th 2014 via Falcon Pro

RT @k3170Makan: Nifty little bash script I've been using to fuzz Android Manifests https://t.co/3EOFw6bLb6

8:16am April 6th 2014 via Falcon Pro

RT @ecsparrow: Kudos to Mike Perry for the first real "securing android" post I have seen. Also, hilarious how difficult it is. https://t.co/fffXcU9oW1

8:57pm April 5th 2014 via Falcon Pro

@Marccoga es igual el tema es pillar una direcció (amunt o la que sigui) i no anar mai cap allà... ja veuràs com va millor

5:10pm April 5th 2014 via Falcon Pro in reply to Marccoga

@Marccoga no vagis mai cap amunt, intenta tenir els num +grans sempre a baix i sempre a la dreta :)

4:59pm April 5th 2014 via Falcon Pro in reply to Marccoga

RT @climagic: socat -d -d TCP-L:22,reuseaddr,fork SYSTEM:"nc \$SOCAT_PEERADDR 22" # Confuse people SSHing to your host with a redirect back to theirs.

4:02pm April 5th 2014 via Falcon Pro

RT @firewaterdevs: and on the 10th day, there was s-off, and it was good..... http://t.co/3h75NnAsIZ

7:10am April 5th 2014 via Falcon Pro

@Antoniojojojo vaya :( que raro que se pueda comprar desde España y no desde Venezuela

10:29pm April 4th 2014 via Falcon Pro in reply to Antoniojojojo

Looks like "Android Hacker's Handbook" ebook is already available on Google Play Books - https://t.co/1EMJHrWAJ3 http://t.co/OW2RIB9WlT

10:15pm April 4th 2014 via Falcon Pro

RT @r_netsec: The Android Hacker's Handbook from jduck, s7ephen, and Georg Wicherski is now available on Amazon! - http://t.co/05ml32571A

8:05pm April 4th 2014 via Falcon Pro

RT @thegrugq: Slides for my talk on mobile phone operational security and hardening Android: http://t.co/qLUGuC3sSL + source code: https://t.co/x8eNK2dc6H

12:12pm April 4th 2014 via Falcon Pro

RT @angealbertini: I'll talk about arcade games at Area41 (improved talk since Recon and then T2).

12:03pm April 4th 2014 via Falcon Pro

@angealbertini plenty of them in eBay if you still haven't got one. (reg. CPS2 B board).

12:02pm April 4th 2014 via Falcon Pro in reply to angealbertini

RT @dukebarman: I waited this book from August 2013! Thanks @pof @jduck and others. http://t.co/hq0J9ZvpSM

11:00am April 4th 2014 via Falcon Pro

RT @thegrugq: Source code to DarkMatter, my Android hardening app is live: https://t.co/x8eNK2dc6H

9:18am April 4th 2014 via web

RT @matalaz: Here are the slides for my #syscan talk "Breaking AV Software". ODP http://t.co/ZTQXsGWglD PDF http://t.co/5Yma9FMTPu

7:45am April 4th 2014 via Falcon Pro

RT @matalaz: ...here are some POCs of AV bugs http://t.co/RN4ggp0Wb7 and here is my fuzzing suite http://t.co/ZWyq15Tqs0 #syscan Enjoy!

7:44am April 4th 2014 via Falcon Pro

RT @cryptax: My Insomni'Hack slides are available here: http://t.co/buDoLSacZn #hidex #Dex #Android #INS14

12:16am April 4th 2014 via Falcon Pro

RT @bascule: Breaking Half of the (silly) Telegram Contest: https://t.co/ge7Mfkey4e

8:06am April 3rd 2014 via Falcon Pro

I liked a @YouTube video http://t.co/e6XuYxy6lG SSF2T Combo Video by Zero Koubou

10:58pm April 2nd 2014 via Google

RT @phofe: TIL USB3.0 can impact on a 2.4Ghz wireless device performance http://t.co/rSjO4gxeg2

10:01pm April 2nd 2014 via Falcon Pro

RT @TeamAndIRC: Can we stop blogging when an unlockable device "gets rooted"? It sets off my alerts for no real reason

8:52pm April 2nd 2014 via Falcon Pro

Oldboot.B: the hiding tricks used by bootkit on Android - http://t.co/RH8rUJem8S

10:02am April 2nd 2014 via Falcon Pro

RT @jduck: Android Hacker's Handbook is now shipping! Get yours today! Electronic version release will be in ~ 2 weeks http://t.co/8fuwt8BgZt

8:45am April 2nd 2014 via Falcon Pro

RT @jduck: An article where @fabynou says VIM+plugins is superior to XCode, Eclipse, and Visual Studio - http://t.co/kFQhnVRawR (also code review \o/)

8:43am April 2nd 2014 via Falcon Pro

RT @quarkslab: Want to assess the security of your video games? @quarkslab starts a new service: http://t.co/zlL7GSJzHB

8:38am April 2nd 2014 via Falcon Pro

.@k3170Makan thanks again for your work improving dexinfo! pull request merged :) https://t.co/CsAO51NADX

8:28am April 2nd 2014 via web in reply to k3170Makan

Verifying myself: I am pof on Keybase.io. h2thZ3Jy_BLl3w4pxGaGeMmoLTmxlAmwyTkO / https://t.co/8j8y8k1Lxy

7:50am April 2nd 2014 via web

RT @k3170Makan: testing my additions to dexinfo (against 102 browser apps) ... looks like it doesn't break anything :) cc: @pof http://t.co/hqJ5dFDfnG

8:43pm April 1st 2014 via Falcon Pro

RT @ahoog42: "Why Mobile Should Stop Worrying and Learn to Love the Root" http://t.co/11LhV9f2wI

8:57am April 1st 2014 via Falcon Pro

RT @grsecurity: Your turn, Mr. @comex. 16-Line KASLR Defeat: https://t.co/wXfJRPw5Lb

7:25am April 1st 2014 via Falcon Pro

RT @travisgoodspeed: Hey everyone, Linux added basic KASLR. Not terribly effective for defense, but it's unimaginably effective for trolling @grsecurity!

7:25am April 1st 2014 via Falcon Pro