![noct Profile](https://pbs.twimg.com/profile_images/1870202484255338496/LVC52L3__x96.jpg)
noct
@never_unsealed
Followers
303
Following
5K
Statuses
1K
22 | INTJ-T | InfoSec Student | Firmware & OS-Level Security Research
Stuttgart, Germany
Joined June 2021
@Defte_ true „zero trust“ isn‘t really possible on a system- kernel integrity requires trusting the hypervisor, this requires trusting the os loader which requires trusting the firmware (secure boot) or the cpu manufacturer (for dynamic root of trust). You‘ll always have to rely on trust
1
0
2
RT @AlanSguigna: SourcePoint WinDbg + Intel Processor Trace + IDA debugging the Secure Kernel. New blog content forthcoming.
0
22
0
@ChloeTheB1tch @GuseppeEnjoyer @Scarlet_CS2 Doesnt matter how long u wait. Unlike with other cooldowns like abandoning match, you can only reduce the grief cooldown level with xp. Takes around 4-5 levels to reduce by one day without getting more griefing reports.
0
0
0
RT @torzsics: Please @CounterStrike can you let me inspect my butterfly after i switch to it 😭
0
11
0
@SK83RJOSH @KiPos_info @redneckleeusmc @Avamander @chippyy1337 @an0n_r0 Cert leaks will be very unlikely if they are stored exclusively on HSM or other secure hardware. Most certficiate authorities already enforce this
1
0
1
@redneckleeusmc @Avamander @KiPos_info @chippyy1337 @an0n_r0 You don‘t. But they are not very expensive either
1
0
0
@chippyy1337 @an0n_r0 Instead of going by compile date (which can be altered anyways) check if its a known good executable or unknown. Unsigned executables should not have any business in a professional environment.
1
0
2