Joined 4/13/2016, 2:02:21 AM has 1429 karma
Security Researcher, reformed security consultant
https://ramimac.me
Supply Chain Attacks on Linux Distributions
GitHub Action supply chain attack: reviewdog/action-setup
History: What Happened with Ciscogate
My LLM Codegen Workflow
Thirty Things
Codename Goose
Hacking Subaru: Tracking and controlling cars via the admin panel
Big Bets
Story of a Pentester Recruitment
Systematizing Systematization of Knowledge
SoK: On the Offensive Potential of AI
A User's Guide to Building a Subculture
The death of Glitch, the birth of Slack
(Re)-Introducing La Cryptographie Militaire
Security ProbLLMs in XAI's Grok
Encryption using data-specific keys
Death Generator: Create Game over/You Died Screens
Ninja Threat Modeling (2009)
The Secret School for the Best Founders
To Build a Meritocracy
Source and Binary has ceased operations
Client-side filtering of private data is a bad idea
Google Pixel Phones Have Unpatched Flaw in Hidden Android App
Revealing the Inner Structure of AWS Session Tokens