You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Hector Martin (marcan42) on Twitter http://twitter.com/marcan42<br />
Case3:11-cv-00167-SI Document4 Filed01/11/11 Page117 of 282<br />
11.<br />
12.<br />
13.<br />
14.<br />
15.<br />
16.<br />
17.<br />
18.<br />
19.<br />
20.<br />
21.<br />
22.<br />
23.<br />
24.<br />
25.<br />
26.<br />
27.<br />
Wednesday, January 05, 2011 4:54:56 PM via Choqok<br />
On the other hand, the December 20th "private keys leak" tweet was<br />
in fact a slight teaser (we discovered everything on December 10th)<br />
Wednesday, January 05, 2011 4:51:30 PM via Choqok<br />
FWIW, the sha1 I posted in October was of a .txt file explaining the<br />
psjb exploit Wednesday, January 05, 2011 4:50:34 PM via Choqok<br />
e.g. http://goo.gl/k9HPy "hinted at the "keys""? "Kinect Hack called<br />
OpenLase"? "actually has known this all along"? What are they<br />
smoking? Wednesday, January 05, 2011 4:49:51 PM via Choqok<br />
wow, seriously, dukio.com is publishing the most retarded articles<br />
ever Wednesday, January 05, 2011 4:48:57 PM via Choqok<br />
I mean, maybe it's just me, but I think the "calculating private keys"<br />
part deserves a bit more credit than a metldr exploit. Monday,<br />
January 03, 2011 4:19:00 PM via Choqok<br />
Announce/publish a ridiculous break in embedded security, a few<br />
sites pick it up. Geohot uses it, it's all over the web. Sigh. Tuesday,<br />
January 04, 2011 12:30:42 PM via Choqok<br />
copumpkin I want Google to stop assuming I've misspelled my<br />
queries and showing me bad results. "I search for uncommon terms;<br />
please trust me!" Wednesday, January 05, 2011 3:03:15 AM via<br />
Tweetie for Mac Retweeted by marcan42 and 52 others<br />
@kakashigr so he obviously used our method to calculate the key,<br />
but he had to use a metldr exploit to dump it (which we don't yet<br />
have). Sunday, January 02, 2011 1:26:38 PM via Choqok in reply to<br />
kakashigr<br />
@kakashigr you need an exploit in a loader (or a prior loader) to<br />
dump it. We had most everything below metldr, but not metldr itself.<br />
RSS feed of marcan42's tweets<br />
Sunday, January 02, 2011 1:25:45 PM via Choqok in reply to<br />
RSS feed of marcan42's favorites<br />
kakashigr<br />
@r1cola he likes that sort of game, but we aren't playing it. We're<br />
polishing then releasing what we have, then that's it. Sunday,<br />
January 02, 2011 1:25:04 PM via Choqok in reply to r1cola<br />
geohot++ for breaking metldr, geohot-- for making it another ego act<br />
and not publishing how he did it. Tuesday, January 04, 2011<br />
12:41:43 PM via Choqok<br />
For those who missed it, video of the talk here: http://goo.gl/UjtPx<br />
Saturday, January 01, 2011 10:37:30 PM via Choqok<br />
So now, if you don't have a laser, technically you can try OpenLase<br />
using that code :) Saturday, January 01, 2011 10:28:15 PM via<br />
Choqok<br />
Now you know what my code looks like when I'm drunk :P (we<br />
hacked the bar PC and had ASCII demos running on it) Saturday,<br />
January 01, 2011 10:25:57 PM via Choqok<br />
While at c-base (and on a couple Tschunks) I hacked ASCII-art<br />
output onto OpenLase. Pushed that to the cbase branch: http://goo.gl<br />
/5Rq1O Saturday, January 01, 2011 10:25:11 PM via Choqok<br />
Also pushed the 27C3 OpenLase slides to the openlase.git repo.<br />
They include cleaned-up/updated libol versions of some of the<br />
effects too. Saturday, January 01, 2011 10:05:48 PM via Choqok<br />
Pushed the AsbestOS parts of the 27C3 demo (native AsbestOS boot<br />
from HDD). Tools to make AsbestOS into a SELF coming later.<br />
View all…<br />
3 of 58 1/9/2011 12:16 PM