Manfred Paul Profile
Manfred Paul

@_manfp

Followers
5K
Following
379
Media
2
Statuses
83

Security but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]

Outside of computed bounds
Joined January 2020
Don't wanna be here? Send us removal request.
@thezdi
Trend Zero Day Initiative
4 months
CVE-2025-4941 - Trend ZDI analyst @hosselot details the Firefox bug used at #Pwn2Own Berlin by Manfred Paul. Includes root cause analysis and video demo.
Tweet card summary image
zerodayinitiative.com
In recent years, there has been an increase interest in the JavaScript engine vulnerabilities in order to compromise web browsers. Notably, vulnerabilities in JIT engines are among the most favorite...
4
31
128
@_manfp
Manfred Paul
8 months
If you're a security researcher and in Germany, consider signing https://t.co/6x5ajjZSxq . Decriminalizing research might not be the top political priority right now, but it's still important!
1
12
75
@davidmcgeoch9
David Mirren
10 months
More important than ever!!
946
78K
149K
@_manfp
Manfred Paul
1 year
@ecsc2024 @MITAmalta @MITAmalta, this is not how you build up a cybersecurity community in your country. It was great to see a lot of ECSC players show their support people like @_mixy1 who faced both disqualification and legal action. As the vulnerability research community, we should do the same.
0
4
18
@_manfp
Manfred Paul
1 year
@ecsc2024 @MITAmalta @MITAmalta, this is not how you build up a cybersecurity community in your country. It was great to see a lot of ECSC players show their support people like @_mixy1 who faced both disqualification and legal action. As the vulnerability research community, we should do the same.
0
4
18
@_manfp
Manfred Paul
1 year
@ecsc2024 Only low point though was the lack of a Maltese team, apparently due to @MITAmalta blocking some of the (already qualified) team from coming after they were arrested for responsibly disclosing(!) a vulnerability in a student app in 2022.
Tweet card summary image
timesofmalta.com
The students were arrested in 2022 for requesting a reward after reporting a security flaw in a FreeHour app
1
3
22
@_manfp
Manfred Paul
1 year
Had a great time playing for the German team at @ecsc2024, shout out to the organizers for putting on a really great competition!
2
2
31
@taviso
Tavis Ormandy
1 year
This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... đź§µ1/n
250
3K
16K
@bjrjk
Jack Ren
1 year
Exploit for Pwn2Own CVE-2024-29943, an Integer Range Inconsistency caused OOB access! Analysis will be updated later. Shoutout to @_manfp for finding this bug. And shoutout to @maxpl0it for his integer range inconsistent PoC. https://t.co/6r3JNXMvAP
10
65
294
@h0mbre_
h0mbre
1 year
think i found a bug. which means it’s time to take a break and enjoy the possibility before looking more closely and finding out there’s a check in an upstream code path I missed
7
17
205
@AlecMuffett
Alec Muffett
1 year
@chrisrohlf @mncoppola Keeping open a bug to support a government operation is isomorphic to opening a backdoor to support a government. I'm pretty sure you wouldn't want Google to keep a bug open for the benefit of China, Chris. https://t.co/XY8o10Fdmc
Tweet card summary image
alecmuffett.com
Anyone who thinks the linked blog post is insightful or sensible should watch all of Marcus Ranum’s “Cyberwar: You’re Doing It Wrong” from 2012,  especially from 12:42 on th…
2
4
16
@GrapheneOS
GrapheneOS
1 year
https://t.co/cBUM1AoYuB Is this the "counterterrorism operation" by a U.S.-allied Western government that's being referenced? If saying the country and "terrorist" group involved paints a flattering picture of these exploit tools, why aren't they saying which ones are involved?
Tweet card summary image
theguardian.com
Analysis by Amnesty International linked them to Pegasus Project leak of more than 50,000 phone numbers
1
8
69
@_manfp
Manfred Paul
1 year
If you feel fine with selling vulns to states with vague hopes that they'll be used "for good", and can sleep soundly knowing your friends and loved ones are using preventably vulnerable products, that’s your choice. But that's not a fair demand to make of others.
0
0
19
@_manfp
Manfred Paul
1 year
This really just feels like the discourse of backdooring encryption all over again. There is no "secure but with exceptions for when the good guys need access". That's called being insecure.
1
1
20
@_manfp
Manfred Paul
1 year
(Of course, how would you even judge morality when all the information comes from people who pretty much have "lying" in their job description? Also, even they won't necessarily know about other actors exploiting the same vuln...)
1
0
12
@_manfp
Manfred Paul
1 year
Their job is making software more secure, not being geopolitical judges of which exploit campaign is moral and good. If you're concerned with tech companies inserting themselves into such things, then wouldn't the latter actually give them much *more* power?
2
1
23
@_manfp
Manfred Paul
1 year
This argument feels deeply unsettling to me. No matter your stance on states exploiting vulnerabilities, shifting the moral obligation to vendors and researchers and demanding they be complicit in it is a dangerous precedent and short-sighted.
@mncoppola
Michael Coppola
1 year
New blog post "Google: Stop Burning Counterterrorism Operations" My reflection on an incident where Project Zero and TAG knowingly shut down an active Western counterterrorism cyber operation, and the real-world harm that could have resulted from it. https://t.co/AtWxFPpE8u
1
18
128
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
This years Google CTF Qualification is over. Congratulations to @kalmarunionenDM, kijitora and Zer0RocketWrecks! The top 8 teams qualified for Hackceler8 2024 in Málaga. More details at https://t.co/9xUqG1nVDM. ¡Vamos!
0
19
90
@bpreneel1
Bart Preneel
1 year
Good news: vote on chatcontrol postponed. But this monster keeps raising its head: efforts to stop it need to be continued.
@chaosupdates
CCC Updates
1 year
Etappensieg: Die EU-Staaten einigen sich heute nicht auf eine Position zur #Chatkontrolle – Die Ratspräsidentschaft nimmt die Abstimmung von der Tagesordnung
3
70
220
@_manfp
Manfred Paul
2 years
Happy to have my write-up on @thezdi's blog again - after so many fights with some kind of range analysis, a bug that just directly gives every type confusion you want felt quite fun
@thezdi
Trend Zero Day Initiative
2 years
In a new guest blog, #Pwn2Own winner @_manfp details CVE-2024-2887 - a bug he used to exploit both #Chrome and #Edge during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at
0
9
126