
Adrian Dabrowski
@atrox_at
Followers
983
Following
8K
Media
207
Statuses
2K
Security, privacy, cellular, CTFs; living in clouds; night-owl; PostDoc @CISPA; former UCI, SBA, TU Wien, iSeclab. My own opinions. May contain sarcasm.
Joined August 2014
Ah, finally the tiresome election news cycle ends, and we can all return to the much more relaxing election denial news cycle.
0
0
3
🎉Success! 🍾 .I managed to get my professional communication down to just Teams, Element, Signal, and 3 eMail addresses! 🥳 . oh, and 3cx, .and Zoom,.
1
1
4
How to fix the broken Wi-Fi module of an LG washer? .Unplug the washer, discharge all the capacitors, wait five minutes, plug it in again. Welcome to the future.
0
0
3
I tried explaining why such processes would facilitate account takeovers. The agent was indifferent to that. On the other hand, they knew the type of my subscription, the length of my contract, the height of the last bill, so maybe it was really @magentatelekom ?.
0
0
0
cell provider called - "optimizing my subscription," - but before we continue, I should read back the SMS TAN they sending me now. I really hope that they were scammers, and not genuine my cell provider. It would set a terrible precedent telling customers to pass TANs via phone.
1
0
2
Drawing coloring images for my kids with AI while skirting copyright filters feels like a proper prompt engineer :) the "square sponge cartoon characters with thin legs and arms" or "silly-looking yellow pill-shaped characters with large silver eye goggles and blue dungarees.".
0
0
1
. @GGegenhuber and my new #UsenixSecurity paper is online! For years, some VoWiFi operators were not using randomized keys for Diffie-Hellman key exchange. Many phones can also be tricked into using unsupported, weak DH KE groups. Read more: .#Austria.
publications.cispa.de
Voice over Wi-Fi (VoWiFi) uses a series of IPsec tunnels to deliver IP-based telephony from the subscriber's phone (User Equipment, UE) into the Mobile Network Operator's (MNO) core network via an...
1
5
17
If you describe your team in a project proposal, please mention why each person is uniquely qualified to do this exact work (e.g., has a pub in that field). Please don't make it a detective game for the reviewer! Thank you. #PhDResearch #PIlife #academics.
0
0
1
Fake news/virus/scam chain letters are like: only you, my dear reader, can stop this catastrophe from happening by forwarding this message to all your contacts because $vendor has no other way to inform all its customers.
0
0
1
I love it, how every wooden train track build with my kids is a hidden topology lecture for them.
1
0
0
Speed camera operators hate this trick!. Just driving the speed limit.
0
0
1
Traveling to Heidelberg for an interesting #TelcoSecDay tomorrow!.
0
0
1
RT @natashenka: Can LLMs find vulns? Here’s what Project Zero found.
0
80
0
Is it normal for companies to wait with a CVE assignment until a fix is ready? Is it because the CVSS score is lower if a fix is available?.
0
0
1
If your phone hasn't been selected for Google's new Find My Device network yet, you can force it, by either pairing with a tracker or by being invited to a shared tracker. #findmydevice
0
0
2
Rule 34a: .if it's not a .ZIP, @angealbertini will make it a .ZIP.
1
0
3
The .ZIP file format turned 35 this year - and is alive as ever. Your Android app? A ZIP. Your iOS app? Zip. OpenOffice document? A ZIP. Java Archive? ZIP. Your Microsoft Word Docx? A ZIP.
1
0
1