marcinw Profile Banner
Marcin Profile
Marcin

@marcinw

Followers
2K
Following
2K
Media
112
Statuses
6K

because tweeting and blogging is a full time job

New York, NY
Joined July 2008
Don't wanna be here? Send us removal request.
@kvogt
Kyle Vogt
3 years
Well folks, we did it. I have been waiting for this day for almost 10 years. I am proud to announce @Cruise is now running 24/7 across all of San Francisco! This is a pivotal moment for our business. Let me tell you why 👇(1/6)
167
379
3K
@WeldPond
Chris Wysopal
3 years
You'd be hard pressed to find someone in the hacker community that you could have deep tech conversations with & also turn everything they touch into fun. @aloria is a legend that I am privileged to call a friend. We will remember! Photo from 15th anniversary of "Hackers" party.
@BiellaColeman
Gabriella "Biella" Coleman
3 years
When speaking with @aloria my spirits would lift. Her wit and brilliance were stuff of legend and she would often make me smile and think at the same time. You will be missed and this is how I will remember you:
0
14
48
@rmhrisk
Ryan Hurst
4 years
“Code signing” as sold by CAs is a Microsoft only offering. It doesn’t really belong in CA/Browser Forum at all. Doing so just shunts Microsoft’s responsibility to evolve its own code signing practices to commercial CAs. This is problematic for several reasons.
@digicert
DigiCert
4 years
The Code Signing Working Group recently improved requirements for code signing. Effective Nov. 15, 2022, key protection requirements for OV code signing certificates are harmonized to be the same as EV code signing certificates.
2
9
28
@dinodaizovi
Dino A. Dai Zovi
4 years
Where else in our lives do we actively create and promote the infrastructure that allows malicious actors scalable and frictionless destruction? Why run AD, which enables scalable ransomware? So that we can automatically deploy EDR to maybe detect (but not stop) that ransomware?
0
2
5
@dguido
Dan Guido
4 years
My scooter was stolen last week. Unknown to the thief, I hid two Airtags inside it. I was able to use the Apple Find My network and UWB direction finding to recover the scooter today. Here’s how it all went down:
226
3K
12K
@dinodaizovi
Dino A. Dai Zovi
5 years
There's a focus that comes with protecting cryptocurrency. Security theater doesn't play at all, there are real direct consequences for breaches, and you can't keep them a secret. There is real useful innovation happening and the rest of infosec ignores it to their own detriment.
@singe
Dominic White 👾
5 years
For years I’ve avoided anything to do with cryptocoins. Initially it was because people assumed being in security meant I knew about it & kept pestering me. Later it was because I saw the greed derail a couple of good hackers careers. Then it was some of the unpleasant community.
4
10
48
@tyler
Tyler Winklevoss
5 years
Big congratulations to @brian_armstrong, @FEhrsam and the entire @coinbase team on a monster debut today! Huge moment for crypto. To the moon! 👍🏻🚀🍾🥂🥳🎉🎈🎊
58
214
3K
@marcinw
Marcin
5 years
I wrote a smart card token driver for MacOS to interface with identities backed by Secure Enclave
Tweet card summary image
github.com
A Secure Enclave Token Driver Smartcard Extension. Contribute to mwielgoszewski/SecureEnclaveToken development by creating an account on GitHub.
0
3
7
@randomoracle
Cem Paya
5 years
Windows crypto API makes it easy to use keys on hardware eg HSMs Example: ADFS with SAML signing key on AWS CloudHSM v2 (Marvel Nitrox née Cavium) Sometimes showing the key is on an HSM is the hard part 🤷‍♂️ Key container → CSP → certificate → ADFS settings
1
1
1
@randomoracle
Cem Paya
5 years
Common pattern in infosec: 1. Fail at threat modeling (In this case: conflate risks of non-constant time comparison of HMACs vs password hashes) 2. Attempt at "fix" for said "problem" 3. Introduce a more serious & real vulnerability 🤦‍♂️
0
1
1
@randomoracle
Cem Paya
5 years
Alternative view: given that enterprise IT is a market for lemons, it is the buyer responsibility to manage that risk by making sure untrusted vendor code (read: all except a handful such as MSFT/Google/AWS…) is properly sandboxed & contained assuming it *will* fail
0
1
0
@dinodaizovi
Dino A. Dai Zovi
5 years
My take: if you have the team on-staff to invent ALTS, use that. Otherwise, use mTLS for your service-to-service communication. You should still use other authn/authz mechanisms that are closer to end-to-end, though.
5
4
15
@tqbf
Thomas H. Ptacek
5 years
If you know me you already know what I think about this but on the off chance you don’t: NCC Cryptography is legit.
Join an amazing team and work on interesting cryptography projects and research at the forefront of information security and privacy!
0
5
12
@0x30n
Jesse D'Aguanno
5 years
I grew up on software exploitation, but always thought crypto was beyond me. In the ~5 yrs since finding Cryptopals, I’ve found & exploited critical crypto bugs in products like secure messengers, and helped design secure protocols. Thanks @tqbf @spdevlin @marcinw @iamalexalright
@0x30n
Jesse D'Aguanno
5 years
Periodic reminder that you should check out https://t.co/I49bqsYoFG if you’re involved in making or breaking software that uses cryptography
1
14
69
@randomoracle
Cem Paya
6 years
This is why using credentials bound to hardware— smart-cards, USB tokens, TPMs— is crucial You can not paste them into Slack or share with another colleague even if you wanted to 🤷‍♂️ 1/2
1
3
10
@randomoracle
Cem Paya
6 years
Twitter, meet Streisand Effect PS: If my account mysteriously disappears from Twitter after this, that is your cue the company is escalating efforts to silence discussion of its internal security features 🤷‍♂️ https://t.co/bBibWyAIv9
Tweet card summary image
vice.com
After a wave of account takeovers, screenshots of an internal Twitter user administration tool are being shared in the hacking underground.
2
16
22
@Gemini
Gemini
6 years
Gemini is now the first #crypto exchange to offer support for hardware security keys across both Android and iOS #mobile devices via WebAuthn! Add a hardware #security key to your Gemini account for the strongest level of protection. More on our blog ⬇️
Tweet card summary image
gemini.com
A Simple and Secure Place to Buy, Sell, and Store Bitcoin and Cryptocurrency. Easy, Free, and Secure. Get Started Today.
9
22
123
@randomoracle
Cem Paya
6 years
From past experience using a setup like this on Ubuntu 18, here is what can go wrong Setup script seals LUKS key to TPM state including PCR0. https://t.co/perALLt30r Firmware updates change that PCR → TPM key is no longer usable → LUKS partition can not be unsealed
1
2
4
@randomoracle
Cem Paya
6 years
"Hipster cryptography"? Or "not-invented-in-Mountain-View"? Problem is PKCS#11 works just fine & enables a whole host of scenarios besides SSH including VPN, TLS client authentication, disk encryption & S/MIME…
@FiloSottile
Filippo Valsorda @filippo.abyssdomain.expert
6 years
What should we call this? It's an ssh-agent for YubiKeys (and other PIV tokens) that just works out of the box. (Hat tip to @dominikhonnef for sshubikey!)
0
3
11