A survey of recent iOS kernel exploits
I recently found myself wishing for a single online reference providing a brief summary of the high-level exploit flow of every public iOS kernel exploit in recent years; since no such document existed, I decided to create it here.
This post summarizes original iOS kernel exploits from local app context targeting iOS 10 through iOS 13, focusing on the high-level exploit flow from the initial primitive granted by the vulnerability to kernel read/write. At the end of this post, we will briefly look at iOS kernel exploit mitigations (in both hardware and software) and how they map onto the techniques used in the exploits.
Wheelhouse is a newsletter for makers that covers new materials, techniques, and tools.
(You can read on the web without subscribing.)
GPU architecture resources
I am often get asked in DMs about how GPUs work. There is a lot of information on GPU architectures online, one can start with these:
Cognitive scientists have identified a number of common ways in which people avoid being gullible. But con artists are especially skillful at what social scientists call framing, telling stories in ways that appeal to the biases, beliefs and prominent desires of their targets. They use strategies that take advantage of human weaknesses.
Good collection of cons.
Cross post: https://theconversation.com/why-do-people-believe-con-artists-130361
Popular posts from leaky bug-tracking systems
My web server logs referrer data whenever it’s available. It means I pick up a bunch of attempted referrer spam from some crazy Kyivstar GSM blocks, but it also means I can see when certain sites link to me. While this has shrunk over the years as browsers curtail what data they’re willing to convey to foreign origins, it’s not quite dead yet. Watching this over the past year or so has showed me that a handful of my posts are apparently very popular in bug tracking systems. I see quite a few inbound visitors from various corporate JIRA systems, and even a couple from some GitHub issue tracking pages.
This is certainly an interesting way to make a best of list.
Top 10 web hacking techniques of 2019
Despite the title, this isn’t so much a roundup of generic techniques but links to write ups of specific exploits. Good coverage.
The Year Ahead
There are a few conferences from 2019 that I didn’t manage to get to last year (notably CCS, SOCC, and NeurIPS) which are still on my plate. And then I’ve pulled together this initial ‘watch list’ for the coming year.
Our Favorite Rides of 2019
Every week The Wall Street Journal’s My Ride column profiles vehicles and their owners, with surprising back stories. Here’s a look back at 2019.
A young Studebaker fan, a historic race car made newly famous by a Matt Damon movie and a Corvette expert’s Corvette are among the My Ride column’s highlights this year
On the Metal: Ron Minnich
On this episode of On the Metal, we interview Ron Minnich. Ron has had a fascinating career working on the interface between software and hardware. Join us as ~we install Gentoo and compile GCC~ to hear a mesmerizing conversation about Unix, Plan9, LinuxBIOS, Chromebooks, RISC-V, of course some Gentoo jokes, flip flop programming toys, and more!
Didn’t actually listen, but there’s a pile of links here anyway.
Research based on the .NET Runtime
Over the last few years, I’ve come across more and more research papers based, in some way, on the ‘Common Language Runtime’ (CLR). So armed with Google Scholar and ably assisted by Semantic Scholar, I put together the list below.
All Penn, No Teller
Why Penn Jillette kind of makes sense as a tech magazine’s back-page columnist
But Jillette was something different. He was already famous—certainly more famous than Pournelle, an established science-fiction author, thanks to being a regular fixture on television during much of his career and starring in a legendary Run-DMC music video—and he likely did not need a nationally distributed computer magazine column to make a living. Jillette simply liked computers and knew a lot about them, which meant that he could rant about the details of an Autoexec.bat file just as easily as he can about politics. He gave the tech writing form something of an edge, while maintaining the freewheeling nature established by fellow pre-blogging voices like Pournelle.
Some good quotes and links here.
Lots of articles and links about design of shared urban spaces and their affect on behavior.
2019 Pwnies Award Nominations
Shit happened. Mistakes were made.
Vintage TV Test Patterns
As you might expect, the BBC test card with the girl and clown has both a backstory and a cult following.
Vulnerability disclosure publications and discussion tracking
A long and vivid debate for and against different vulnerability disclosure models is still taking place. Sources that collect all these valuable arguments are scarce. This document acts as a place-holder for related contributions that we are aware of. Paper, articles and more informal documents are grouped based on the type of publication. We hope that these links are useful to anyone familiarising themselves with the scene or planning further contributions.
Meta note: new domain, new code base, everything should be about the same, but not quite done converting all features.
RSS now at /rss.
Porting old posts
I’ve started the long process of porting old articles and it has been fun revisiting topics I haven’t thought about much for years.
Anyways, as I port articles over I’ll post links to them here, with a few reflections.
A short reading list on voting security
The Internet of Food
You know something you can’t get through the internet’s wires, at least not on its own? Food. We’ve been working on it for years, but no, we’re not at the point where we can deliver nourishment directly via the series of tubes. But food has always been something of a means to an end—a way of driving the internet forward, making it something people would actually like to use.
Plus tons of links.