shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

271
active users

#projectzero

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@reverseics" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>reverseics</span></a></span> Just do it like <a href="https://infosec.space/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://infosec.space/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectZero</span></a> and tell them straight up in their face:</p><p><a href="https://www.youtube.com/watch?v=F_XCDu6GQt4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=F_XCDu6GQt4</span><span class="invisible"></span></a></p><blockquote><p>I was nice once, now I won't! IDGAF what you need to do to fix it. Details will be public in 90 days. Go fuck yourselves! </p></blockquote><p>And basically prepare everything to be ready in precisely to the second 90 days from the moment mail was sent to them.</p><ul><li>Cuz only with <a href="https://infosec.space/tags/consequences" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>consequences</span></a> will we get <a href="https://infosec.space/tags/accountability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accountability</span></a>! </li></ul><p><a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a></p>
Jacob Saunders<p>Finished Project Zero: Maiden of Black Water on the Switch. It's spooky! Good game, too.<br><a href="https://mastodon.social/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> <a href="https://mastodon.social/tags/fatalframe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fatalframe</span></a> <a href="https://mastodon.social/tags/switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>switch</span></a> <a href="https://mastodon.social/tags/nintendo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nintendo</span></a> <a href="https://mastodon.social/tags/koeitecmo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>koeitecmo</span></a></p>
Esprit Kritik<p>Miku entame sa 2ème nuit dans le manoir Himuro, mais elle n'est pas encore au bout de ses peines.<br><a href="https://www.youtube.com/watch?v=m2HyU01APxA&amp;t=1189s&amp;ab_channel=EspritKritik" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=m2HyU01APx</span><span class="invisible">A&amp;t=1189s&amp;ab_channel=EspritKritik</span></a></p><p><a href="https://mastodon.social/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> <a href="https://mastodon.social/tags/gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaming</span></a> <a href="https://mastodon.social/tags/videogame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>videogame</span></a> <a href="https://mastodon.social/tags/jeuxvideo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jeuxvideo</span></a> <a href="https://mastodon.social/tags/fatalframe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fatalframe</span></a> <a href="https://mastodon.social/tags/horrorgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>horrorgame</span></a> <a href="https://mastodon.social/tags/survivalhorror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survivalhorror</span></a> <a href="https://mastodon.social/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a> <a href="https://mastodon.social/tags/ps2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ps2</span></a> <a href="https://mastodon.social/tags/playstation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>playstation</span></a> <a href="https://mastodon.social/tags/retrogaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrogaming</span></a></p>
Esprit Kritik<p>Premier épisode d'un classique du survival-horror : Project Zero sur Playstation 2.<br>Toujours aussi bon !<br><a href="https://www.youtube.com/watch?v=cqcExNarMtI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=cqcExNarMtI</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> <a href="https://mastodon.social/tags/survivalhorror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survivalhorror</span></a> <a href="https://mastodon.social/tags/playstation2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>playstation2</span></a> <a href="https://mastodon.social/tags/playstation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>playstation</span></a> <a href="https://mastodon.social/tags/game" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>game</span></a> <a href="https://mastodon.social/tags/gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaming</span></a> <a href="https://mastodon.social/tags/jeuvideo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jeuvideo</span></a> <a href="https://mastodon.social/tags/jeuxvideo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jeuxvideo</span></a> <a href="https://mastodon.social/tags/gameplay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gameplay</span></a> <a href="https://mastodon.social/tags/gamer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gamer</span></a> <a href="https://mastodon.social/tags/youtube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>youtube</span></a> <a href="https://mastodon.social/tags/youtubevideos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>youtubevideos</span></a></p>
maique :cravo:<p>👀 Today’s <a href="https://social.lol/tags/projectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectZero</span></a>, at the usual spot: Mira-Rio.</p><p><a href="https://social.lol/tags/photography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>photography</span></a></p>
Gnomer<p>I’m looking for a feed that aggregates recent reverse engineering and vulnerability centric security writeups, like the ones posted by Google project zero. I know there are many different security firms and academics that post these kind of articles now and then, but I’m having a hard time with discovery as every news site or feed I find is focused on cybersecurity threats and CVEs, or simply just malware actor reports. </p><p>Does anyone have something that fits the bill?<br><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>googleprojectzero</span></a> <a href="https://infosec.exchange/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerability_research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability_research</span></a></p>
CatSalad🐈🥗 (D.Burch) :blobcatrainbow:<p>Mateusz Jurczyk with Google Project Zero posted a nice two part blog post on their journey of auditing the Windows Registry...</p><p><strong>The Windows Registry Adventure</strong></p><p><strong>Part #1: Introduction and research results</strong><br>🔥⁠<a href="https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2024/04/the-windows-registry-adventure-1.html</span></a></p><p><strong>Part #2: A brief history of the feature</strong><br>🔥⁠<a href="https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-2.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2024/04/the-windows-registry-adventure-2.html</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectZero</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a></p>
Dan Goodin<p>Google has removed a video posted by academic researchers demonstrating how a newly discovered side channel in Apple's A- and M-series CPUs can be used to steal a password.</p><p>I thought for sure the removal was a mistake, but a Google representative told me the video was removed for violating a term of service barring "demonstrating how to use computers or information technology to steal credentials, compromise personal data, or cause serious harm to others."</p><p>The video, demonstrating important research by <span class="h-card" translate="no"><a href="https://infosec.exchange/@genkin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>genkin</span></a></span>, <span class="h-card" translate="no"><a href="https://infosec.exchange/@YuvalYarom" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>YuvalYarom</span></a></span> , <span class="h-card" translate="no"><a href="https://birdsite.wilde.cloud/users/themadstephan" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>themadstephan</span></a></span> and jason kim, is here:</p><p><a href="https://onedrive.live.com/?authkey=%21AMTjzIS6XfV1jzg&amp;id=8208800C17D803E6%211176&amp;cid=8208800C17D803E6&amp;parId=root&amp;parQt=sharedby&amp;o=OneUp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">onedrive.live.com/?authkey=%21</span><span class="invisible">AMTjzIS6XfV1jzg&amp;id=8208800C17D803E6%211176&amp;cid=8208800C17D803E6&amp;parId=root&amp;parQt=sharedby&amp;o=OneUp</span></a></p><p>Just to underscore how arbitrary and patently asinine Google's ToS enforcement is here, two additional videos the researchers posted demonstrating the same side channel remain available.</p><p>I wonder how researchers from <a href="https://infosec.exchange/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> feel about this. Is there any chance any of them can intervene?</p>
Tero Keski-Valkama<p><a href="https://rukii.net/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> tells users of some <a href="https://rukii.net/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> phones: Nuke voice calling to avoid infection | <a href="https://rukii.net/tags/ArsTechnica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArsTechnica</span></a></p><p>“Tests conducted by <a href="https://rukii.net/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectZero</span></a> confirm that those four vulnerabilities allow an attacker to remotely compromise a phone at the baseband level with no user interaction, and require only that the attacker know the victim's phone number.<br>With limited additional research and development, we believe that skilled attackers would be able to quickly create an operational <a href="https://rukii.net/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> to <a href="https://rukii.net/tags/compromise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compromise</span></a> affected devices silently and remotely.”</p><p><a href="https://arstechnica.com/information-technology/2023/03/critical-vulnerabilities-allow-some-android-phones-to-be-hacked/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2023/03/critical-vulnerabilities-allow-some-android-phones-to-be-hacked/</span></a></p>
Norobiik @Norobiik@noc.social<p>In a blog post, Google’s <a href="https://noc.social/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectZero</span></a> head <a href="https://noc.social/tags/TimWillis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TimWillis</span></a> said the in-house security researchers found and reported 18 <a href="https://noc.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> vulnerabilities in <a href="https://noc.social/tags/Exynos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exynos</span></a> modems produced by <a href="https://noc.social/tags/Samsung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samsung</span></a> over the past few months, including four top-severity flaws that could compromise affected devices “silently and remotely” over the cellular network."</p><p><a href="https://noc.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> warns users to take action to protect against remotely exploitable flaws in popular <a href="https://noc.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> | <a href="https://noc.social/tags/Mobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mobile</span></a> | TechCrunch<br><a href="https://techcrunch.com/2023/03/16/google-warning-samsung-chips-flaws-android/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2023/03/16/goog</span><span class="invisible">le-warning-samsung-chips-flaws-android/</span></a></p>
happygeek :unverified: + :verified: = $0<p>New by me at Forbes: The security research supremos over at Project Zero have uncovered no less than 18 zero-days impacting the Samsung Exynos modem chipset. That's bad right? Even worse, four of them, including CVE-2023-24033, enable internat-to-baseband level remote code execution. Silently and with zero user interaction. That's *really* bad.</p><p>Even worse, yeah, sorry, these were disclosed to Samsung more than 90 days ago, and no public patch is available yet - hence the Project Zero disclosure now.</p><p>Recommendations for affected users awaiting patches (Google Pixel 6 and 7 series were impacted but patched in the March security update) are advised to disable both Wi-Fi calling and VoLTE as a matter of urgency.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/samsung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>samsung</span></a> <a href="https://infosec.exchange/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://infosec.exchange/tags/projectzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projectzero</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> </p><p><a href="https://www.forbes.com/sites/daveywinder/2023/03/17/new-samsung-0-click-security-threat-alert-disable-wi-fi-calling-now/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">023/03/17/new-samsung-0-click-security-threat-alert-disable-wi-fi-calling-now/</span></a></p>
Toryzeus :gif_bunny_evil:<p>Bueno, nueva instancia nueva <a href="https://tkz.one/tags/introduccion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduccion</span></a> jajajajaja<br>Hola me podéis llamar Tory, mi hobby favorito son los videojuegos en especial los hack n slash y los survival horror aunque también me gustan muchos los simuladores tranquilitos, también me gusta mucho leer ya sea mangas o libros sobretodo fantasía y tengo una perrita llamada Brownie, en mi perfil tenéis mi Steam, mi usuario en Xbox y mi código amigo de Switch por si alguien quiere agregarme y jugar a algo, soy muy malo pero lo compenso riéndome mucho<br><a href="https://tkz.one/tags/videojuegos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>videojuegos</span></a> <br><a href="https://tkz.one/tags/DevilMayCry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevilMayCry</span></a> <br><a href="https://tkz.one/tags/Bayonetta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bayonetta</span></a> <br><a href="https://tkz.one/tags/ResidentEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ResidentEvil</span></a> <br><a href="https://tkz.one/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectZero</span></a> <br><a href="https://tkz.one/tags/Yakuza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yakuza</span></a> <br><a href="https://tkz.one/tags/libros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libros</span></a> <br><a href="https://tkz.one/tags/TerryPratchett" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TerryPratchett</span></a> <br><a href="https://tkz.one/tags/BrandonSanderson" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrandonSanderson</span></a> <br><a href="https://tkz.one/tags/ONEPIECE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ONEPIECE</span></a> <br><a href="https://tkz.one/tags/Fantasia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fantasia</span></a><br><a href="https://tkz.one/tags/terror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>terror</span></a></p>