_zaolin_ Profile Banner
Zaolin Profile
Zaolin

@_zaolin_

Followers
753
Following
2K
Media
73
Statuses
3K

Head of Solution Engineering @Binarly, IT-Consultant @ Niche Systems. Ex-CEO of @immune_gmbh. Founder of @9eSec, President of the @osfw_foundation.

Germany
Joined November 2011
Don't wanna be here? Send us removal request.
@_zaolin_
Zaolin
4 years
For eveyone wondering what's @IntelSoftware planning for the Firmware Support Package 3.0 #fsp and USF is basically going fully closed-source on the firmware side. This means Intel's #fsp decides to drop #OSF open-source firmware. It's really a shame...
8
25
34
@binarly_io
BINARLY🔬
1 year
Our REsearch team is thrilled about the new IDA v9.0! #efiXplorer is fully compatible with v9.0 and still supports IDA v8.4🚀 🔬 https://t.co/WHYGifmjGS We are thrilled to announce IDAlib — idiomatic Rust bindings for the IDA SDK 🎉 Kudos to @xorpse! ⚙️ https://t.co/PLoNkf8sQn
0
19
81
@vpetersson
Viktor Petersson
1 year
I chatted with @_zaolin_ from @binarly_io about firmware vulnerabilities, reverse engineering binaries, and the challenges in responsible disclosure. Don't miss this deep dive into firmware security! Listen here: https://t.co/U6eaEjBbVl
Tweet card summary image
vpetersson.com
I dive deep into firmware security with Philipp Deppenwiese from Binarly, exploring how attestation ensures system integrity from boot to runtime. We discuss their groundbreaking work in finding BIOS...
0
1
2
@3mdeb_com
3mdeb
1 year
The @QubesOS Summit 2024 has officialy started! We’d like to extend our gratitude once more to our Platinum Sponsors, @FreedomofPress Foundation and @mullvadnet for their unwavering support! Don't forget, you can still grab your virtual pass here:
0
3
15
@binarly_io
BINARLY🔬
1 year
NEW! Repeatable Failures: Test Keys Used to Sign Production Software…Again? 🔥Full details:
binarly.io
After discovering PKFail, the Binarly REsearch team went on the hunt for other instances of non-production test keys being used in firmware binaries. In this case, non-production test keys were...
@matrosov
Alex Matrosov
1 year
🚨In just a few hours at #LABScon, we’ll be unveiling a high-impact vulnerability and a critical security discovery affecting platform trust on Supermicro servers. Stay tuned and watch our REsearch blog!
0
18
23
@matrosov
Alex Matrosov
1 year
More updates will be coming tomorrow at the #LABScon stage. The problems related to the test and non-production keys are much bigger than we initially thought.
@binarly_io
BINARLY🔬
1 year
🚨NEW: "PKfail Two Months Later: Reflecting on the Impact." by @pagabuc Based on https://t.co/QAEyz82xnv data 📈 🖥️10,095 unique firmware images uploaded 🔥791 of which contained an untrusted PK 🛟9304 is safe 💥8.5% vulnerable rate 🔬Full report: https://t.co/Xyxfgii7j7
0
11
13
@arstechnica
Ars Technica
1 year
Secure Boot-neutering PKfail debacle is more prevalent than anyone knew
arstechnica.com
Keys were marked “DO NOT TRUST.” More devices than previously known used them anyway.
0
10
15
@binarly_io
BINARLY🔬
1 year
🚨NEW: "PKfail Two Months Later: Reflecting on the Impact." by @pagabuc Based on https://t.co/QAEyz82xnv data 📈 🖥️10,095 unique firmware images uploaded 🔥791 of which contained an untrusted PK 🛟9304 is safe 💥8.5% vulnerable rate 🔬Full report: https://t.co/Xyxfgii7j7
1
8
15
@binarly_io
BINARLY🔬
1 year
🚀 Just one week until @LABScon_io , where @pagabuc and @matrosov unveil our latest research: “PKFAIL: Supply-Chain Failures in Secure Boot Key Management.” 🔬 This research dives into new data insights uncovered since the initial #PKFAIL disclosure, including a brand-new
0
14
22
@Dasharo_com
Dasharo
1 year
🎤 Excited to announce @_zaolin_'s demo at Dasharo vPub: "@Binarly_io Risk Hunt: Finding Firmware Vulnerabilities in the Wild!" #Dasharo #FirmwareSecurity #Binarly #RiskHunt #CyberSecurity #Firmware #VulnerabilityHunting 📄 More info:
1
3
6
@Dasharo_com
Dasharo
1 year
@_zaolin_ @binarly_io Philipp will showcase the latest updates to Binarly's Risk Hunt platform and demonstrate its capabilities. 🗓️ Sep 12, 19:00 UTC 🎟️ Sign up:
0
2
4
@binarly_io
BINARLY🔬
1 year
We believe in giving back to the research community that drives progress! We are proud to support OpenSecurityTraining2 in advancing security education and knowledge sharing.
@OpenSecTraining
OpenSecurityTraining2
1 year
Thanks to @binarly_io for Sponsoring #OST2 at the Gold🥇 level! Learn more about them here:
0
10
27
@binarly_io
BINARLY🔬
1 year
🎉 The all-new Binarly Transparency Platform v2.5 introduces Reachability Analysis to help security teams prioritize vulnerabilities by analyzing the potential reach and impact of exploitable code paths. A game-changer in software security! https://t.co/BOQ1dR2F1V
1
16
25
@rmhrisk
Ryan Hurst
1 year
Wohoo! @binarly_io has just released 2.5 of their platform with some major new capabilities like reachability analysis, custom rules , secret discovery and cryptographic asset discovery, and container support.
0
2
10
@rmhrisk
Ryan Hurst
1 year
Most products that detect secrets do little more than a ‘strings’ looking for certificates and high entropy data. @binarly_io actually does reachability analysis which cuts down on the noise substantially enabling you to focus on what matters.
@rmhrisk
Ryan Hurst
1 year
Wohoo! @binarly_io has just released 2.5 of their platform with some major new capabilities like reachability analysis, custom rules , secret discovery and cryptographic asset discovery, and container support.
1
3
12
@hardenedlinux
Hardened-GNU/Linux
1 year
We are thrilled to make Chiba public, a centralized management system PoC for racks running OpenBMC. We believe this initiative will enhance transparency within the OEM supply chain. Patch are welcomed! https://t.co/wDAQLXFfu5 @R0yMu @osfc_io @osfw_foundation #chiba #openbmc
github.com
The framework for next generation data center. Contribute to hardenedlinux/chiba development by creating an account on GitHub.
0
3
2
@matrosov
Alex Matrosov
1 year
The question is whether this key is reused (like the Intel Boot Guard story) across the Intel ecosystem or rotates per CPU generation or product line🍿 Confidential computing? 🔥
@_markel___
Mark Ermolov
1 year
Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀
2
18
65
@binarly_io
BINARLY🔬
1 year
Last week, @NIST rolled out new guidance on Post-Quantum Encryption. ⏳The clock is ticking ... “Technology managers can inventory their systems for applications that use encryption, which must be replaced before cryptographically relevant quantum computers appear."
1
5
14
@NikolajSchlej
Nikolaj Schlej
1 year
Returned to Cupertino and restarted my FWSEC job today. Was a productive leave and I was able to resolve most of the issues that pushed me into it, but selling everything and moving over the Atlantic just to move back in 4 month is no fun, will try not to repeat this ever again.
1
1
23
@nostarch
No Starch Press
1 year
Don't miss the rest of today's #DEFCON32 author signings! @mattburrough & @josweyers (Locksport) at 2:30pm. @sk3wl & Kara Nance (The Ghidra Book) at 3:30pm. @matrosov (Rootkits and Bootkits) at 4:30pm. Detailed schedule + map:
nostarch.com
See you at DEF CON 33! Stop by our booth* in the Las Vegas Convention Center's vendor area to peruse new releases, meet Bill Pollock, chat with an editor, and snag some swag, plus: Get our exclusive
0
5
5