![Artur Janc Profile](https://pbs.twimg.com/profile_images/748170353797701633/PGWG2RNd_x96.jpg)
Artur Janc
@arturjanc
Followers
2K
Following
4K
Statuses
2K
Making the web platform more secure and private, and managing part of @Google's Information Security Engineering team in my spare time.
Zurich, Switzerland
Joined February 2012
One of Google's most fun security programs where engineers do 100% real-life ownage to leak their departing coworkers' passwords.
Celebrating 15 years of password hacking đ» đ, Swiss Army knives (and sometimes even chainsaws or swords) included! đČ Discover how Google's security teams turn employee farewells into security tests.
0
0
3
RT @ramez: There's one company in the US that actually has working autonomous robotaxis. It's not Tesla. It's Waymo.
0
11
0
RT @ifsecure: Don't panic now, but LLM-based agent discovered a previously unknown real-world vulnerability. Details in
0
59
0
RT @royalhansen: "Reducing entire classes of vulnerability has seen @Google adopt a safe coding framework and secure development environmenâŠ
0
3
0
RT @TimothyDSnyder: Here are a few thoughts about the decisions of the owners of the Washington Post and the LA Times to suppress their ediâŠ
0
762
0
RT @argvee: Secure by design takes dedication and years of hard work to get the balance right between velocity and safety. Read a bit aboutâŠ
0
25
0
RT @Rhynorater: Absolutely stunning work from @pspaul95 on this CSS Injection - > text node exfil technique.
0
57
0
RT @lcamtuf: I'm sick tired of people pushing their "memory-safe language" agenda when a viable solution is within reach.
0
582
0
RT @GoogleVRP: [Hackceler8 '24, 1 day to go] Hackceler8 is kicking off tomorrow and Domino and friends are ready to go! Curious? Join ourâŠ
0
4
0
RT @ayper: Excited to share Google's memory safety strategy! We're working to build safer software by migrating to memory-safe languages liâŠ
0
72
0
RT @kryc_uk: A new era for security in #MicrosoftEdge and it's web integrations as #MicrosoftBing now supports nonce-based CSP on Edge DeskâŠ
0
3
0
RT @rebane2001: new blogpost time!! this one's a fun writeup on a vulnerability chain i found across multiple google services that earnedâŠ
0
170
0
RT @estark37: Great comment from @arturjanc on why Content Security Policy is not a good tool for preventing untrusted code from exfiltratiâŠ
0
4
0
RT @arkadiyt: Chime is hiring our first red teaming role. JD to be posted soon but if you're a senior+ red teamer looking for a new gig, weâŠ
0
1
0
RT @CSMFHT: Nobody will remember: - your salary - how âbusy you wereâ - how many hours you worked People will remember: - your sub-stâŠ
0
2K
0
RT @kinugawamasato: DOM Clobberingăć©çšăăăă©ăŠă¶è”·ć ăźCSPăă€ăăčăèŠă€ăăŸăăă "CVE-2024-7524: CSP strict-dynamic bypass using web-compatibility shims" httpâŠ
0
25
0
RT @RubenHssd: gemini 1.5-pro-exp outperforms gpt-4o. Some say it's the end of OpenAI reign. So I ran my own tests: test #1 â write a virâŠ
0
111
0