taviso Profile Banner
Tavis Ormandy Profile
Tavis Ormandy

@taviso

Followers
130K
Following
9K
Media
225
Statuses
9K

I'm also @[email protected]

California
Joined April 2008
Don't wanna be here? Send us removal request.
@taviso
Tavis Ormandy
7 years
I finally wrote a small tool I've wanted for a long time: A parallel testcase minimizer. It's called halfempty, and I'm already finding it useful as part of my fuzzing workflow. /cc @lcamtuf https://t.co/SIC2y0k0p0
33
436
2K
@taviso
Tavis Ormandy
20 days
Thanks everyone for all the kind words, it means so much 🥲
6
1
238
@ryanaraine
Ryan Naraine
20 days
On the pod this week, I saved a closing shoutout for @taviso and his work at P0 https://t.co/P7iLc26k3T
@jvanegue
Julien Vanegue
20 days
The work of Tavis Ormandy has been a strong influence on my personal research program. Lately, our work on automatically finding divergent execution bugs was directly inspired by one of Tavis’ infinite loop vulnerability in openssl’s elliptic curve implementation. Hat tip 🎩
2
3
27
@taviso
Tavis Ormandy
23 days
I have many good stories from my time here, maybe I'll share some later! And yes, the leaving tradition is real, and yes they got me 😆
11
0
179
@taviso
Tavis Ormandy
23 days
A personal update... after nearly 20 years at Google, today is my last day! I'm going to be working on independent research for the foreseeable future, then who knows! I've worked with so many talented people, made so many friends and seen incredible research over the years 🫡
117
87
2K
@taviso
Tavis Ormandy
2 months
I've met so many nerds who have a story about this box arriving from America in their small town, and having enough manuals to nerd over for weeks 🤓 (I have a story like this too).
13
47
5K
@taviso
Tavis Ormandy
2 months
I have a (dumb) theory about Intel. They used to ship beautiful printed manuals anywhere in the world for free if you called them. That program made a lot of engineering students customers for life. Then some middle manager killed it, and probably got a promotion.
@usgraphics
U.S. Graphics Company
2 months
These are forever gone btw. Intel stickers had cool semiconductor holographics on the backside that no one will ever see, it wasn't there by accident. It was too beautiful for the modern marketing bug people, so they wiped it out.
141
3K
48K
@taviso
Tavis Ormandy
2 months
Hey... quick question, why are anime catgirls blocking my access to the Linux kernel? 😸 https://t.co/0Ew0aG4rxu
96
159
4K
@_MatteoRizzo
Matteo Rizzo
3 months
EntrySign won 2 pwnies 🤯🤯
1
1
30
@_MatteoRizzo
Matteo Rizzo
4 months
EntrySign was nominated for two Pwnies (best crypto bug and best desktop bug)! 🥳 https://t.co/PDl3xARuNK @__spq__ @sirdarckcat @taviso
0
6
42
@taviso
Tavis Ormandy
4 months
This is neat, using EntrySign to backport microcode patches to EOL systems without BIOS updates.
3
22
68
@taviso
Tavis Ormandy
4 months
I just learned that OSC8 (hyperlinks) in Windows Terminal uses ShellExecute(). Excellent trolling potential for README files 😆
14
85
483
@perribus
Perri Adams
6 months
Back in 2023, the assessment of the pre-authentication vulnerability in SSH was that it wasn't exploitable on Linux. For my OffensiveCon 2025 keynote, I wrote enough of an exploit to show, with the right heap groom and stabilization, it's likely exploitable. Then I tried to have
@taviso
Tavis Ormandy
3 years
If someone get a working OpenSSH exploit from this bug, I'm switching my main desktop to Windows 98 😂 (this bug was discovered by a Windows 98 user who noticed sshd was crashing when trying to login to a Linux server!)
4
35
243
@_MatteoRizzo
Matteo Rizzo
6 months
The recording of our OffensiveCon presentation about EntrySign is live! https://t.co/atQGAV39l3 Slides at https://t.co/twMFJ9L8Mv @sirdarckcat @__spq__
2
21
101
@robertswiecki
Robert Swiecki
6 months
Fuzzing Windows Defender in the Honggfuzz+IntelPT (hardware) mode https://t.co/NDmMtergrL by @buherator
1
62
199
@taviso
Tavis Ormandy
8 months
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials.
Tweet card summary image
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
39
523
2K
@taviso
Tavis Ormandy
9 months
welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡
5
60
293
@SomeUnusualGame
SomeUnusualGames
1 year
Hey! I made a game in Bash with raylib! It's a "bullet hell" game featuring beloved penguin Tux vs an evil mutant Window! Bash is a simple scripting language, so simple it doesn't have floating point variables/arithmetic! So how was this game possible? 👇
11
51
315
@_markel___
Mark Ermolov
1 year
Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀
103
977
5K
@patrickwardle
Patrick Wardle
1 year
@CrowdStrike This 100% matches our/@taviso's conclusions derived from analyzing the crash report/disasm 🧠 RAX: input pointer array R11: index (0x14/20d) Accessing Array[20] retrieved the 21st item (as arrays are 0-based). This returned an invalid memory address that 💥'd when deref'd!
4
23
72