Jeff Vander Stoep Profile
Jeff Vander Stoep

@jeffvanderstoep

Followers
3K
Following
2K
Media
7
Statuses
1K

Android security @google [email protected]

Joined January 2016
Don't wanna be here? Send us removal request.
@jeffvanderstoep
Jeff Vander Stoep
9 months
RT @SCWpod: NEW EPISODE!. You may not be rewriting the world in Rust, but if you walk like the Android team, you'll drive down your memory-….
0
8
0
@jeffvanderstoep
Jeff Vander Stoep
9 months
Agreed. We’re already prioritizing differently based on this data. It was a fun conversation, and we believe that it applies to a lot more than just memory safety.
0
1
4
@jeffvanderstoep
Jeff Vander Stoep
9 months
Thomas also said “And that observation about the half life of vulnerabilities, if that’s true, says something pretty profound about what the work looks like to shift to a memory safe future.”.
1
1
4
@jeffvanderstoep
Jeff Vander Stoep
9 months
I agree with this. It feels like we discovered a game-changer not just in memory safety, but in security more generally - that doing something very practical results in major security improvements for non-obvious reasons. Focusing on new code is disproportionately effective.
1
1
3
@jeffvanderstoep
Jeff Vander Stoep
9 months
Something that Thomas said in the podcast really stood out to me. He said “the blog post undersells it. …. This is a lot more interesting than it looks like on the tin.”.
1
1
4
@jeffvanderstoep
Jeff Vander Stoep
9 months
I joined @durumcrustulum and @thomas on the “Security Cryptography Whatever” podcast to talk about our latest blogpost:.
2
3
15
@jeffvanderstoep
Jeff Vander Stoep
9 months
RT @OliviaGalluccii: I published an introductory post on how to use return-oriented programming (ROP) to bypass security mechanisms, like A….
0
23
0
@jeffvanderstoep
Jeff Vander Stoep
9 months
RT @clintgibler: 🦀 Eliminating Memory Safety Vulnerabilities at the Source. Rust caused memory safety vulnerabilities % in Android to drop….
0
5
0
@jeffvanderstoep
Jeff Vander Stoep
10 months
RT @ayper: The drop in Android's memory safety vulnerabilities is astonishing. It's counterintuitive, but prioritizing memory-safe languag….
0
3
0
@jeffvanderstoep
Jeff Vander Stoep
10 months
RT @royalhansen: Google's implementing #SafeCoding to build more secure software, and the results are impressive. @Android saw a massive dr….
0
19
0
@jeffvanderstoep
Jeff Vander Stoep
10 months
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why.
6
76
277
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @AndreaR9Md: Popping in to say that a presidential candidate advocating to stop all childhood vaccines should be national news and disqu….
0
10K
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @ThreemaApp: EU Commission: “End encryption!”. Internet users: “End-to-end encryption!”.
0
334
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @larsberg_: We've now seen #rustlang adopted by so many teams in so many settings that I'm thrilled to get to talk about some of the ad….
0
11
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @maldr0id: Do yourself a favour today and read the replies to this. I promise you won’t regret it.
0
198
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @DaveKSecure: Google has provided a grant of $1M to the Rust Foundation to improve Rust code interop with C++ codebases. We’re also furt….
0
28
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @rust_foundation: [NEWS] "@Google Contributes $1M to Rust Foundation in Support of C++/Rust 'Interop Initiative'" .➡�� .
0
83
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @MishaalRahman: Google announced today that they've provided a grant of $1,000,000 to the Rust Foundation to support efforts to improve….
0
24
0
@jeffvanderstoep
Jeff Vander Stoep
1 year
RT @shawnwillden: @MishaalRahman Android's experience with Rust has been excellent. My team built the first major Rust component (keystore)….
0
4
0
@jeffvanderstoep
Jeff Vander Stoep
2 years
RT @algo_luca: It's really encouraging to see such a rigorous approach to performance in rustls. It's not enough to push for a Rust-based i….
0
14
0