DoingFedTime Profile Banner
Sam Bent Profile
Sam Bent

@DoingFedTime

Followers
11K
Following
42K
Media
2K
Statuses
5K

Journalist | OSINT & OPSEC Specialist | Darknet Expert (Ex Vendor & DNM Admin) | DEFCON/SANS Speaker | Youtuber | Social Engineer | Author | Paralegal

United States
Joined May 2021
Don't wanna be here? Send us removal request.
@DoingFedTime
Sam Bent
3 months
87E1LCiePLNJyufiUW48bNAH7bobcSXU8TSxLXWjkuXbfSDVq3oZgze9nvotdv8Fp55Ud5itCuUEmXbEbdanTRfECx9Ubh8.
5
28
49
@DoingFedTime
Sam Bent
58 minutes
Intel TSX (Transactional Synchronization Extensions) abort on cache conflicts. Transactional memory attacks use abort patterns to leak information.
Tweet media one
2
0
1
@DoingFedTime
Sam Bent
3 hours
ARM TrustZone secure world isolation can be bypassed through monitor mode exploits. Secure monitor calls provide attack surface between normal and secure worlds.
Tweet media one
1
2
13
@DoingFedTime
Sam Bent
14 hours
This paper in 1976 revolutionized secure communications by introducing the concept of public-key cryptography, enabling parties to exchange keys securely without prior secret sharing.
Tweet media one
1
6
32
@DoingFedTime
Sam Bent
17 hours
NEVER forget HONEY. Stop using VPNs recommended by retarded Youtubers.
@UK_Daniel_Card
mRr3b00t
1 day
Why is the Nord vpn app 426MB
Tweet media one
28
100
1K
@DoingFedTime
Sam Bent
1 day
Speculative return stack buffer attacks corrupt function return predictions. RSB stuffing mitigations flush the return stack but impact indirect call performance.
Tweet media one
0
0
6
@DoingFedTime
Sam Bent
1 day
The UK government secretly demanded that Apple build a permanent backdoor into iCloud encryption that would have compromised the privacy of millions of users worldwide.
Tweet media one
3
5
21
@DoingFedTime
Sam Bent
1 day
Hardware security modules generate entropy but can be compromised through side channels. HSM tamper resistance varies significantly between certification levels.
Tweet media one
4
0
8
@DoingFedTime
Sam Bent
1 day
Kernel guard pages detect buffer overflows through page fault exceptions. Stack guard pages catch overflow but not underflow attacks.
Tweet media one
0
0
10
@DoingFedTime
Sam Bent
2 days
Monero subaddress scanning optimization achieves 10-20x performance improvements through batch processing, parallel algorithms, and database indexing for high-volume wallet synchronization. performance-optimization/
Tweet media one
2
3
45
@DoingFedTime
Sam Bent
2 days
Which side-channel attack works against constant-time cryptographic implementations?.Power analysis can still extract key bits from algorithms designed to prevent timing leaks.
Tweet media one
0
0
6
@DoingFedTime
Sam Bent
2 days
FPGA bitstream manipulation can insert hardware trojans into reconfigurable logic. Encrypted bitstreams protect against modification but not all FPGAs support encryption.
Tweet media one
1
0
4
@DoingFedTime
Sam Bent
2 days
Intel CET indirect branch tracking validates call targets through ENDBR instructions. IBT can be bypassed through gadgets that contain valid landing pads.
Tweet media one
1
0
3
@DoingFedTime
Sam Bent
3 days
Transient execution attacks exploit CPU optimization to leak privileged data. Speculative barriers fence instruction reordering but add execution overhead.
Tweet media one
3
3
21
@DoingFedTime
Sam Bent
3 days
Tweet media one
17
191
749
@DoingFedTime
Sam Bent
3 days
ARM Memory Tagging provides spatial and temporal memory safety through hardware tags. MTE detection mode catches violations but doesn't prevent exploitation.
Tweet media one
0
2
7
@DoingFedTime
Sam Bent
3 days
Load value injection attacks corrupt speculative execution through cache poisoning. LVI mitigations require serializing instructions that impact performance.
Tweet media one
0
1
10
@DoingFedTime
Sam Bent
4 days
Ended up being an interesting comparison. ELinks if: you want tabs, mouse, external-editor text fields, and you’ll script or customize heavily. Lynx if: you want maximum stability/portability, zero-JS guarantees, excellent accessibility, and native SOCKS5 for Tor.
@EvilRabbitSec
Evil Rabbit Security Inc.
5 days
"Brave is the best browser"."No, firefox is"."I Use Librewolf". Me: * Using Lynx and laughing at the speed of my browser that's open source, doesn't track me and is ultra lightweight *
Tweet media one
2
4
27
@DoingFedTime
Sam Bent
4 days
Best comment on the current state of affairs. How long before we have to show ID before we can open the fridge?.
@naomibrockwell
Naomi Brockwell priv/acc
4 days
We built a world where your fridge watches you,.your phone records you,.your car tracks you. And somehow you’re the suspicious one for using privacy tools?.
3
9
40
@DoingFedTime
Sam Bent
4 days
How do attackers exploit race conditions in kernel drivers?.TOCTTOU (Time-of-Check-Time-of-Use) bugs create windows for privilege escalation.
Tweet media one
0
5
12
@DoingFedTime
Sam Bent
4 days
Microcode updates patch CPU vulnerabilities but can't fix all hardware flaws. Speculative execution mitigations often require both microcode and OS changes.
Tweet media one
1
3
24