Charlie Miller Profile Banner
Charlie Miller Profile
Charlie Miller

@0xcharlie

Followers
73,924
Following
72
Media
1,199
Statuses
19,503

I'm that 0day guy

St. Louis, MO
Joined August 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@0xcharlie
Charlie Miller
3 months
My hot take on the xz back door: it’s a success for the community. It took 2 years to sneak it in and it was caught in 1 month before it was in any major distro. It is really hard to backdoor a distro which is pretty cool.
88
382
4K
@0xcharlie
Charlie Miller
4 years
Today I'm glad I'm no longer the tech lead for Twitter's Application Security team anymore. Trying to deal with an incident with 300 million people watching is not fun.
17
199
2K
@0xcharlie
Charlie Miller
3 years
This seems like an impossible task to me. The director of the NSA makes 197k a year (with no equity). Glassdoor says the AVERAGE appsec engineer at facebook makes 195k. How can you recruit elite talent in that market?
@TheRecord_Media
The Record From Recorded Future News
3 years
An inside look at how the US Cybersecurity and Infrastructure Security Agency is planning to recruit elite cybersecurity talent
0
44
120
72
166
1K
@0xcharlie
Charlie Miller
6 months
As a former NSA guy, watching the community reverse engineer this exploit makes me think of all the people who developed it sitting and crying somewhere as it’s secrets are spilled.
@sweis
Steve Weis
6 months
Hector Martin (marcan) has some good ideas that the iMessage exploit used dbgwrap and cache debugging registers. He also talks about how the "sbox" design is very clearly an ECC or CRC and not intended to obfuscate anything.
4
52
287
27
127
1K
@0xcharlie
Charlie Miller
3 years
This is lame. In Pwn2Own, if you hack a fully patched system, you win. I don't care if the vendor knew about the vuln. If they knew about it, they should have patched it. This is a win, plain and simple.
@thezdi
Zero Day Initiative
3 years
It's a partial win. Despite the great demonstration (with ASCII art), the bug used by @alisaesage had been reported prior to the contest. It's still great work, & we're thrilled she broke ground as the 1st woman to participate as an independent researcher in #Pwn2Own history.
89
22
166
14
175
983
@0xcharlie
Charlie Miller
6 years
I disagree with all “advice” in this article. Making yourself miserable everyday to protect against an incredibly unlikely attack doesn’t make sense.
100
261
946
@0xcharlie
Charlie Miller
3 years
I bought a new Jeep today and the sales guy was asking if I knew anything about Uconnect and I said “yes, yes I do…”
35
51
858
@0xcharlie
Charlie Miller
3 years
@GovParsonMO Hi governor, I’m a Missouri resident and a computer security expert. You’re totally wrong here, there was no unauthorized access and reporting security issues is encouraged in our field (so they can get fixed!). The alternative are flaws never getting fixed. cc: @stltoday
4
51
783
@0xcharlie
Charlie Miller
3 years
When you watch this do you wonder about hackers taking control of the car? Myself and other team members have been working for almost four years to make that really hard to do. So far so good 😊
@olivercameron
Oliver Cameron
3 years
Watch the most advanced robot in the world driving—without hesitation or confusion—through a bunch of anxiety-inducing scenarios. @Cruise ’s technology is rapidly rocketing beyond human driving capability. So exciting.
36
178
963
8
84
513
@0xcharlie
Charlie Miller
7 years
I don't know why everyone is mad at Kaspersky, how about NSA employees don't bring classified docs home and put them on your computer?
26
103
476
@0xcharlie
Charlie Miller
2 years
This is the first infosec book I’ve read in a while. It’s a fun read.
Tweet media one
10
40
427
@0xcharlie
Charlie Miller
7 years
After 1.5 years, today I'm moving on from @Uber . I've enjoyed the challenge of making their autonomous cars as secure as possible.
39
68
393
@0xcharlie
Charlie Miller
7 years
In the field of computer security, you can be bad at defense and not know it. You can't be bad at offense without knowing about it.
16
141
352
@0xcharlie
Charlie Miller
6 years
So @keen_lab just dropped a really awesome paper about hacking BMW cars. Get it here: . What follows in my analysis (1/21):
3
201
333
@0xcharlie
Charlie Miller
8 years
One of the biggest problems in infosec is it's impossible to know who the experts are and who the frauds are. Has impact on policy, hiring.
45
165
308
@0xcharlie
Charlie Miller
3 years
Hello darkness my old friend…
Tweet media one
10
7
307
@0xcharlie
Charlie Miller
7 years
As former appsec tech lead for twitter, I'll just say I'm not shocked this was in code from the ads team.
@jms_dot_py
Justin Seitz
7 years
Twitter Bug Allowed Hackers To Tweet From Any Account
1
61
51
12
156
279
@0xcharlie
Charlie Miller
3 years
a young(er) iphone hacker circa 2007
Tweet media one
11
3
275
@0xcharlie
Charlie Miller
3 months
So folks who are wringing their hands over the xz backdoor… What are we going to do differently to stop this in the future? My guess is we will preach and pontificate but not actually do anything useful…just like we always do!
31
26
275
@0xcharlie
Charlie Miller
5 years
you know what else costs $28k and can be used to learn about car hacking? a car!
14
60
262
@0xcharlie
Charlie Miller
5 years
I’ve said it before, and I’ll say it again: don’t plug internet connected devices into your car
16
142
258
@0xcharlie
Charlie Miller
1 year
I see a lot of security folks complaining about twitter sms 2fa going away which is weird because I thought they all left for mastadon.
16
27
267
@0xcharlie
Charlie Miller
4 years
It reminds me of the time Nick D kept tweeting a unicode character that was crashing Twitter for iOS and I had to explain to upper management he wasn't being mean, he was just being dumb. (They wanted to ban him from Twitter)
12
29
247
@0xcharlie
Charlie Miller
7 years
I can't even understand what this is trying to say, but i think my iphone-android is infected???
Tweet media one
30
104
233
@0xcharlie
Charlie Miller
6 years
I figured out why i didn’t get picked this year for american ninja warrior...the new title sponsor is Jeep :(
9
21
223
@0xcharlie
Charlie Miller
8 years
Bye bye hack jeep. It's been fun and sorry for what we did to you.
Tweet media one
9
49
218
@0xcharlie
Charlie Miller
8 years
11
99
197
@0xcharlie
Charlie Miller
9 years
Our paper is released: http://t.co/fJQWfwtZK0 Read it and start doing some car hacking!
7
214
201
@0xcharlie
Charlie Miller
6 years
In their response, BMW say the attack is sophisticated and so "BMW Group considers the security level for our customers and produces ensured". Basically their cars are safe as long as nobody smart tries to hack them.
11
118
205
@0xcharlie
Charlie Miller
5 years
Super interesting paper (as usual) by @keen_lab . It talks about how Tesla autopilot works and how what happens if attacker can get code execution on it.
3
88
204
@0xcharlie
Charlie Miller
7 years
Excited to announce I'm joining Didi Research America to lead the safety and security of their autonomous transportation systems.
30
38
201
@0xcharlie
Charlie Miller
8 years
Here is a public service announcement: Anybody who couldn't hack your iPhone yesterday will still not be able to do so today.
8
135
199
@0xcharlie
Charlie Miller
5 years
Its easy to criticize security decisions if you don't understand the tradeoffs involved. Let me explain why Twitter made various security decisions, right or wrong. Remember I was Twitter appsec tech lead a while back so I have some insight.
@Support
Support
5 years
We’re taking this step because of vulnerabilities that need to be addressed by mobile carriers and our reliance on having a linked phone number for two-factor authentication (we’re working on improving this).
55
174
604
7
77
194
@0xcharlie
Charlie Miller
3 years
The weirdest part of moving from being a car hacker to working for an autonomous car company is seeing how much better the automotive techs are at disassembling cars than I was. They don't let me near them with tools, which is smart.
3
7
193
@0xcharlie
Charlie Miller
6 years
Actually it was OCTOBER 23, not September. I know because I hacked it a day later.
@JonErlichman
Jon Erlichman
6 years
On this day in 2008: first Android phone released
Tweet media one
40
1K
4K
5
43
191
@0xcharlie
Charlie Miller
6 years
Cool new research out on car hacking: . Hang on or mute as I'll give my thoughts on it.
2
111
193
@0xcharlie
Charlie Miller
8 months
Interesting data from this week's Pwn2Own. 1) No attempts against Google Pixel or iPhone even though they are worth 4-5x other targets. 2). 15 straight years of hacking Apple products at Pwn2Own ended last year and continues this year. Apple is secure now? 1/n
@thezdi
Zero Day Initiative
8 months
The schedule for #Pwn2Own Toronto is now live! We've got an exciting four days of exploits ahead of us. Check it out at
0
12
65
15
31
192
@0xcharlie
Charlie Miller
1 year
Over my decades in computer security, I've really matured. For example, right now I'm redoing my kitchen and didn't even sell a 0-day to the US government to fund it.
11
16
189
@0xcharlie
Charlie Miller
6 years
this is not how viruses work
@jelleprins
Jelle Prins
6 years
Airplanes have to run a virus scanner every week to get rid of all the malware, because people casually charge their phones in the cockpit??!! 🤯
Tweet media one
50
660
1K
7
53
187
@0xcharlie
Charlie Miller
3 years
life was more fun when we were hacking cars!
9
17
184
@0xcharlie
Charlie Miller
3 years
This is really cool. Physical protections are always better than software protections
@ryanaraine
Ryan Naraine
3 years
iPad hardware microphone disconnects via sensor when the case is closed
Tweet media one
27
332
2K
1
49
187
@0xcharlie
Charlie Miller
3 years
Computer hacking advice from superstar @ThatBigRon , compliments of @nudehaberdasher .
6
43
180
@0xcharlie
Charlie Miller
9 years
Guess I'll buy a Mercedes “There is no way you could hack a Mercedes-Benz from outside the car,” a senior Daimler engineering executive said
61
150
176
@0xcharlie
Charlie Miller
5 years
Controversial opinion alert: Car hack villages are super fun but don't advance research or make cars more secure. Similar to how lock pick villages haven't produced a bunch of lock engineers.
34
23
178
@0xcharlie
Charlie Miller
11 years
Lost chapters from iOS hackers handbook. One on ARM architecture, one on payloads and ROP.
9
122
175
@0xcharlie
Charlie Miller
6 years
“People who store their fobs in Faraday cages aren’t paranoid, experts say”. True, I guess, those people are paranoid AF.
3
11
163
@0xcharlie
Charlie Miller
9 years
I am volunteering to step up and accept government funding for the new crypto Manhattan project. I promise to work until the money runs out
13
96
173
@0xcharlie
Charlie Miller
9 years
How not to get my help... http://t.co/tco6tucKZq
Tweet media one
29
70
169
@0xcharlie
Charlie Miller
6 years
PS I do not practice safe fob storage.
14
15
165
@0xcharlie
Charlie Miller
7 years
Would feel so sad if I worked for a high powered govt hacking agency and all I did was phishing attacks. I'd dream of doing sqli attacks.
5
43
167
@0xcharlie
Charlie Miller
7 years
Had I consulted for Fast and the Furious 8, the car hacking scene would have been way more boring.
10
34
161
@0xcharlie
Charlie Miller
1 year
Interesting read on how you can use CAN injection to steal a car. This type of attack has been known for many years but nice writeup of how it works in this case.
6
41
163
@0xcharlie
Charlie Miller
4 years
You may recall me and @nudehaberdasher hacked a 2014 Jeep Cherokee. We chose that car because it had no gateway module between the telematics module and the modules with physical controls. I just looked at the 2020 model, there is still no gateway module.
13
36
160
@0xcharlie
Charlie Miller
4 years
Having worked at the nsa... ✅ NSA would love to backdoor stuff ✅ Backdoors make products less secure ✅ NSA bureaucracy loses stuff
@dnvolz
Dustin Volz
4 years
This is wild: Juniper had a back door in its gear—placed at the request of the NSA—compromised by a hostile foreign government. NSA informed @RonWyden they wrote a "lessons learned" report after the episode, but now says it cannot locate that document.
Tweet media one
34
736
1K
3
60
156
@0xcharlie
Charlie Miller
7 years
Here is an old video of some jeep hacking I just rediscovered that I don't think I ever released.
10
109
159
@0xcharlie
Charlie Miller
7 years
Second edition of my book on fuzzing (with @JaredDeMott , @attekett , and @aritakanen ) pre-sale available now 30% off, see flyer for details.
Tweet media one
10
50
160
@0xcharlie
Charlie Miller
7 years
I wonder what these ports go to on this airplane?
Tweet media one
40
41
155
@0xcharlie
Charlie Miller
3 years
There haven’t been many infosec cons the last couple of years due to covid. There used to be one every weekend. What the heck were people talking about in all those talks and was it even helping solve the problem of securing stuff?
28
17
157
@0xcharlie
Charlie Miller
3 months
@chrisrohlf that’s the thing, it’s not really lots of eyes but it just takes one pair and there’s lots of lonely guys in their basement (like me)
3
0
155
@0xcharlie
Charlie Miller
7 years
I miss computers with ethernet jacks and CDROM drives.
20
20
156
@0xcharlie
Charlie Miller
5 years
my hot take on the whatsapp exploit: code we use has vulnerabilities. this exploit does not necessarily say anything about whatsapp security team efforts, ios vs android, closed vs open source, imessage vs whatsapp, etc.
2
23
156
@0xcharlie
Charlie Miller
6 years
I love that this job req calls me out by name but i don’t meet their requirements...
@softwarnet
Charles R. Smith🔹
6 years
@0xcharlie Automotive Security Researcher Do you know who Kevin Mahaffey and Marc Rogers are? How about Charlie Miller and Chris Valasek? Do you want to be in their line of work, but for national security purposes?
1
0
1
10
26
149
@0xcharlie
Charlie Miller
6 years
This line cracks me up: “Cybersecurity experts say privately that anyone who knows anything about the ease of auto and personal data hacking practices safe fob storage.” Because it’s real hard to get cyber experts to talk :)
7
18
148
@0xcharlie
Charlie Miller
7 years
I tried telling you guys by the choice of my twitter handle but nobody got the message!
@tomituominen
Tomi Tuominen (@[email protected])
7 years
User accounts starting with a digit (such as 0d) get root privileges under systemd
6
102
120
5
44
148
@0xcharlie
Charlie Miller
6 years
just came across this gem
Tweet media one
14
16
147
@0xcharlie
Charlie Miller
4 years
Privacy concerned users switching to worse privacy protecting apps because Signal does something privacy preserving better than other apps but not perfectly. Welcome to infosec!
@moxie
Moxie Marlinspike
4 years
I've had a bunch of discussions with people here about Signal PINs over the past day. I don't usually spend this much time on Twitter, so parallel to the direct discussion, these are a few of the adjacent thoughts that have come up for me: 1/14
38
301
896
6
32
147
@0xcharlie
Charlie Miller
7 years
This navy commercial says this cyber attack cannot be stopped. nmap is 0-day?
Tweet media one
20
26
143
@0xcharlie
Charlie Miller
9 years
After 3 years I'm stepping down from protecting the tweets, effective Friday. Good times, great coworkers, time to move on. Be free, tweets!
43
57
142
@0xcharlie
Charlie Miller
7 months
When I was appsec tech lead at twitter, this would have been a major headache to fix. Now i just get to enjoy it! Cool work.
@shoucccc
Chaofan Shou
7 months
😝 Here is the full disclosure of the Twitter XSS + CSRF vulnerability. Clicking a crafted link or going to some crafted web pages would allow attackers to take over your account (posting, liking, updating your profile, deleting your account, etc.)
35
444
2K
4
14
145
@0xcharlie
Charlie Miller
5 years
Why on earth would you invest in secure boot or removing debug interfaces for a lightbulb? Let’s threat model folks.
17
46
141
@0xcharlie
Charlie Miller
7 years
I'm going to be a contestant on next month. I'm gonna represent parent basement dwelling, 400 pound hax0rs.
18
27
144
@0xcharlie
Charlie Miller
9 years
My whole career has been a build up to hack Apple's car.
15
84
139
@0xcharlie
Charlie Miller
5 years
i’m not a fan of invite only bounty programs
11
15
140
@0xcharlie
Charlie Miller
3 years
This is really about apple making money, but he is correct.
@MacRumors
MacRumors.com
3 years
Sideloading Apps Would ‘Break’ the Security and Privacy of iPhone, Says Tim Cook by @SamiFathi_
Tweet media one
53
91
980
10
15
142
@0xcharlie
Charlie Miller
4 years
I read these papers almost 20 years ago when I was getting started. If you haven’t read them, you should!
@todayininfosec
Today In Infosec
4 years
1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Then @dotMudge sent a copy to @aleph_one , who wrote "Smashing the Stack For Fun and Profit" in 1996. Seminal paper to seminal paper. Mudge's:
Tweet media one
4
301
839
4
25
140
@0xcharlie
Charlie Miller
9 years
Verified that Sprint has not only blocked phone to car traffic but car to car traffic as well. Nice!
10
133
138
@0xcharlie
Charlie Miller
7 years
Doing my taxes today. In 2016, Chrysler paid me $0. I paid Chrysler $210 for access to wiring diagrams. Car hacking doesn't pay.
10
41
134
@0xcharlie
Charlie Miller
7 years
Almost time
Tweet media one
13
6
138
@0xcharlie
Charlie Miller
6 years
Here is the link to our paper. I hope you like it!
4
65
139
@0xcharlie
Charlie Miller
8 years
If Chrysler was smart, they'd buy me a car from another manufacturer. Whenever I get an idea to try, there is only my jeep to try it on.
6
35
136
@0xcharlie
Charlie Miller
12 years
I'm reading the Apple iOS security doc: http://t.co/UA85iiKe and its amazing because Apple never talks about security in detail like this.
12
139
135
@0xcharlie
Charlie Miller
5 years
I planned a short romantic getaway with my wife @genderteach at Half Moon Bay while I was at #CISOFORUM . She had to cancel at the last second but I soldiered on as best I could without her.
3
14
135
@0xcharlie
Charlie Miller
6 years
i found my old business cards from when i worked at twitter #opsec
Tweet media one
0
6
134
@0xcharlie
Charlie Miller
3 years
When did pwn2own rules change to “the vendor can’t know about it”? When I was participating, there were some crazy rules, but when I got a shell, I knew I won. It didn’t matter what the vendor knew. In fact, I think they knew about one of my bugs and I still got paid...
6
14
136
@0xcharlie
Charlie Miller
6 years
For those of you who wonder what real hacking looks like, here it is:
Tweet media one
21
17
131
@0xcharlie
Charlie Miller
3 years
I’m trying to figure out why I wasn’t targeted by north korea. 1) they know i’m clever and would catch them. 2) i did that defcon talk where I pretended to help them. 3) I’m not a useful target. Wait, it’s not 3, right? RIGHT???
17
8
131
@0xcharlie
Charlie Miller
3 years
If the existence of 0-days changes your threat model, you’re doing threat modeling wrong.
@daveaitel
Dave Aitel
5 years
If you assume someone had the Microsoft exchange bug as 0day what does that do to your threat model? Do you or don't you consider active directory an unnecessary legacy technical debt that is a clear danger ?
6
10
31
4
33
131
@0xcharlie
Charlie Miller
4 years
This is a decision made by reading scary headlines and not understanding threat models or risk or software security basics. If enough people switch to MS teams, we’ll see similar issues reported with that software.
10
52
131
@0xcharlie
Charlie Miller
3 years
I say this about once a year but my biggest accomplishment of being @Twitter appsec tech lead was migrating them off imagemagick.
@ducnt_
Nguyen The Duc
3 years
So, here is another gift for you about Imagemagick RCE 0-day that afftceted to GhostScript-9.50 😀 #RCE #imagemagick #ghostscript
Tweet media one
14
328
826
1
13
131
@0xcharlie
Charlie Miller
7 years
Locked out of my banking site because I bought a new computer and can't remember what I thought my favorite TV show was as a kid...
37
19
131
@0xcharlie
Charlie Miller
7 years
Let's threat model before designing security systems, people!
11
66
131
@0xcharlie
Charlie Miller
3 years
Even though everyone, and especially @ryanaraine , hates when I say it, @BlackHatUSA should only contain highly technical talks. Less-technical talks are what RSA is for. (Also, there shouldn't be a "business hall" or pay-to-speak slots). Yes I lose this argument every year.
15
6
126
@0xcharlie
Charlie Miller
3 years
Will miss you @dakami . You were a cool dude. Personally, I learned a lot about public speaking from you and aspired to give talks like you.
1
4
129
@0xcharlie
Charlie Miller
3 years
i’m going to help make sure the new iOS image scanner used for CSAM is okay, but I seem to be having trouble logging into my apple developer account…
6
14
129
@0xcharlie
Charlie Miller
5 years
watching @natashenka preach attack surface reduction. About 90% of my day job is trying to reduce attack surface...
Tweet media one
1
31
129
@0xcharlie
Charlie Miller
4 years
everything goes full circle. 10 years ago - “we can’t find all the bugs so we’ll use sandboxes”. now - “sandboxes get bypassed, so we’ll find all the bugs”.
7
40
129
@0xcharlie
Charlie Miller
5 years
This paper is interesting as it points out flaws in other fuzzing papers, which it finds are many. It won an NSA paper competition for "bringing scientific understanding to the security community" which I find super insulting.
4
21
128
@0xcharlie
Charlie Miller
7 years
As someone who has hunted bugs for 15 years, having source code is barely advantageous
10
52
129