0xtosh Profile Banner
Tom Van de Wiele Profile
Tom Van de Wiele

@0xtosh

Followers
3K
Following
13K
Media
438
Statuses
7K

Offensive R&D Lead • Hacker • Advisor • Speaker Founder Hacker Minded https://t.co/vUexQ0rpvQ | https://t.co/rMzYCRJQn0

Copenhagen, Denmark
Joined May 2010
Don't wanna be here? Send us removal request.
@dhh
DHH
1 month
The EU Chat Control proposal would be a catastrophe for Europe. It would seal Europeans behind a new digital Berlin wall, cut off from Signal and other e2e messengers. It's embarrassing and dangerous that it's gotten this close already. Time to bail to back to sanity.
@signalapp
Signal
1 month
We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EU’s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. https://t.co/015qmQnIS2
184
1K
8K
@ProtonPrivacy
Proton
2 months
"We need to break with the completely erroneous perception that it is everyone's civil liberty to communicate via encrypted messaging services" - @PHummelgaard, 🇩🇰 Minister of Justice Remember: Under chat control, EU politicians would be exempt from being spied on, unlike you.
152
583
2K
@matthew_d_green
Matthew Green is on BlueSky
2 months
Something is rotten in Denmark. https://t.co/hN9xIqH1Rh
8
39
94
@0xtosh
Tom Van de Wiele
2 months
Keep your friends close and your fish closer
@depthsofwiki
depths of wikipedia!
2 months
0
0
1
@hetmehtaa
Het Mehta
3 months
Stop wasting time on CTF challenges. Learn Docker security, EDR evasion, network segmentation, SAML/OAuth flows, WAF configuration, and how to debug production incidents. You'll be 10x more hireable than someone who rooted 500 vulnerable VMs.
49
136
1K
@0xtosh
Tom Van de Wiele
4 months
Hacker chique LoRa pager, of course sold out already. But makes me want to make my own LoRa mesh chat device using meshtastic or a similar stack. https://t.co/VcvopIh8id
Tweet card summary image
hackerpager.net
Wireless messenger and LoRa radio multitool. Retro-stylish, open-source, and packed with features.
0
0
0
@HackingLZ
Justin Elze
4 months
9
19
123
@0xtosh
Tom Van de Wiele
4 months
31337
@ComputerLove_
Computer ♥ Records
4 months
An LA Times sidebar showing the codes teens used to chat via pagers.
0
0
1
@0xScourgedev
0xScourgedev
4 months
Many hackers are targeting security researchers by requesting quotes or offering jobs. Here are tips to stay safe, plus red flags to watch for. I'll use a recent submission form we received as an example. 🧵 (1/11)
3
17
146
@Dinosn
Nicolas Krassas
4 months
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
Tweet card summary image
thehackernews.com
Researchers uncover PerfektBlue flaws in OpenSynergy’s BlueSDK, exposing millions of vehicles to remote code execution
0
14
37
@TheHackersNews
The Hacker News
4 months
🚨 Hackers can hijack your car over Bluetooth. New “PerfektBlue” flaws let attackers run remote code on Mercedes, VW & Skoda—just by pairing. They can track location, record audio, and even reach engine controls. Full story → https://t.co/JBvlpjqCc7
14
274
735
@Cyb3rMaddy
Maddy 🐝
5 months
Would not trust a cyber security professional who has never worked as a sysadmin
69
46
938
@0xtosh
Tom Van de Wiele
5 months
AI voices need to identify themselves as such, so the other party knows they are talking to a robot. If we know we are talking to a robot, we absolutely do not need AI voices doing emotional vocalisations, or even worse: vocal fry or uptalk. Instant tab close & laptop slam.
0
0
0
@0xtosh
Tom Van de Wiele
5 months
Privilege escalation... in chroot. One of those "the firetruck is on fire" situations.
@0xm1rch
Rich Mirch
5 months
I published blogs detailing two vulnerabilities I recently discovered in Sudo. Update to 1.9.17p1. CVE-2025-32462 - Sudo Host option Elevation of Privilege Vulnerability https://t.co/IrN1Yj8nGD CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
0
0
2
@fr0gger_
Thomas Roccia 🤘
5 months
🤓 If you want to learn more about MCP attacks or vulnerabilities, check out this project called Damn Vulnerable MCP. It allows you to experiment on MCP server security through 10 challenges, from basic prompt injection to multi-vector attacks. https://t.co/ny0jOAPJFk
3
26
122
@0xtosh
Tom Van de Wiele
5 months
Reverse engineering Wipeout 2097 PSX models + animation = best 90s screensaver ever
0
0
3
@_0b1d1
0b1d1
5 months
6
80
749
@dinodaizovi
Dino A. Dai Zovi
5 months
This is a good example of how *any* untrusted tokens in the input to an LLM, including from the output of a tool (e.g. MCP server call) can hijack the rest of the output.
@wunderwuzzi23
Johann Rehberger
5 months
Prompt injection is fascinating.... 🧐
3
9
61
@0xtosh
Tom Van de Wiele
5 months
@GoogleAI But luckily it does come with integration between Gemini & Google Drive. Which is great! Bc Google Drive doesn't even allow you to sort on file size + doesn't tell you the size of folders. AI to the rescue! NOT.
0
0
1
@0xtosh
Tom Van de Wiele
5 months
For those of you considering paying for @GoogleAI Gemini Pro to try out Veo2: you get 4 videos per day. By the time you figure out how prompts work you are done for today i.e. don't bother and find another service.
1
0
0