Elliot Alderson

@fs0c131y

French security researcher. Worst nightmare of Oneplus, Wiko, UIDAI, Kimbho, BJP IT Cell and others. Not completely schizophrenic. Not related to USANetwork.

Joined June 2015

Tweets

You blocked

Are you sure you want to view these Tweets? Viewing Tweets won't unblock

  1. Pinned Tweet

    My account is now fully setup. If you want to follow me => From today, I will publish my tweets on both platform. If you want to contact me for sensitive stuff use: - Keybase - Email fs0c131y[@]protonmail[.]com - Wire

    Show this thread
  2. This thread contains great insights on North Korea and is the best thread I saw on the Virgil case

  3. The famous secure XOR encryption

  4. Retweeted

    I'll just leave this here.

  5. Retweeted

    WW2 resistance in Poland was very well organized (awesome name too: ZWZ.) They had a black propaganda organization that was kept completely secret from the rest of the resistance and the Allies. Their security system of cutouts was so effective they were never penetrated.

    Show this thread
  6. Retweeted

    A problem infosec has - outside of the rampant misogyny - is that people believe that their opinions are facts. Infosec often doesn't have clear answers. We are terrible at science and parrot untruths. To push a valued member of the community out over an *opinion* is bullshit

  7. Le ministère de l’industrie et des Technologies chinoise a imposé une nouvelle réglementation exigeant que les personnes se fassent scanner leur visage lors de leur enregistrement à un service de téléphonie mobile.

  8. Retweeted

    After the leak, I was wondering how to find such forums in general. In my new article, I describe how to start investigations on right-wing extremists from scratch. Starting in and pivoting to many other platforms and channels.

  9. Retweeted

    FUN FACT (that I was told while I worked there so it may be entirely false): When the National Climatic Data Center was founded to store weather data, they did a study to find the safest city in the US, and the result was Asheville, NC.

    Show this thread
  10. Retweeted

    TL;DR: do what you want with your bugs, but don't think you're only "saving the bad guys time". You wouldn't believe how stupid and incompetent the average cybercrime actor is (majority can't even code and only use free tools).

    Show this thread
  11. Retweeted

    Not really piled into the discussion about vulns & PoCs because it's kinda toxic, but anyway here's my take: 1. That discussions in infosec are toxic *is* symptomatic of infosec toxicity in general, so let's look at that. 2. Attacking people asking it is gatekeeping and shitty.

    Show this thread
  12. 4/ It doesn’t mean anything out of context but he has an interest for DPRK, more than an average person

    Show this thread
  13. Show this thread
  14. 2/ This tweet has aged poorly

    Show this thread
  15. 1/ , a member of the Etherum foundation, has been arrested after giving a talk in a conference in North Korea. He volunteered to attend this conference.

    Show this thread
  16. Saturday afternoon 😀

  17. Retweeted

    Chongqing after dark

    Photography by Liam Wong of Chongqing, China at night. Two men can be seen on the entrance of a large cruise ship - taken at midnight.
    Photography by Liam Wong of Chongqing, China at night. Two men can be seen on the entrance of a large cruise ship - taken at midnight.
    Photography by Liam Wong of Chongqing, China at night. A wide photograph of a bridge surrounded by bokeh. It Is blue in color.
  18. I found this ticket related to my issue but unfortunately the fix is only available in the internal version of BinDiff at . Any plans to release BinDiff 6 soon?

    Show this thread
  19. In BinDiff, I have this error everytime I’m opening a flow graph. Is it a known issue? How can I debug that? I have IDA pro 7.2 and the latest BinDiff version cc

    Show this thread
  20. Protip: Giving a conference in DPRK is rarely a good idea. Protip 2: If the FBI told you not to go, you should probably listen to them Protip 3: if you go, don’t say you want to buy another citizenship publicly

    Show this thread
  21. ., a member of the etherum foundation, has been arrested. He “provided highly technical information to North Korea, knowing that this information could be used to help North Korea launder money and evade sanctions“

    Show this thread
  22. A hydra is difficult to kill. Hacking Team is back under the name Memento Labs. Business 1 - Ethics 0

  23. Bald is the new sexy 😘

  24. I guess the conclusion of this question: If you are not happy, do it yourself 😏

    Show this thread
  25. Hacking a phone with an unanswered phone call is a fantasy for a majority of people. Being able to show it would be super cool and would help to raise security awareness.

    Show this thread
  26. Don’t get me wrong, I’m convinced that somewhere an exploit dev working for a private company did create an exploit. But why keeping it private? Do you realize how cool a demo of this bug would be? Not only for infosec pros but also for the rest of the world

    Show this thread
  27. Hi pro, Why nobody publish publicly an exploit for the NSO WhatsApp vulnerability (CVE-2019-3568)?

    Show this thread
  28. Retweeted

    Happy to announce, I'll be giving the full disclosure talk on & fought hard against & detailing pressure against & myself. Story updates include & next week in London representing

  29. Retweeted

    I heard that somewhere on Twitter a discussion about publishing exploit PoCs arose. Good thing information security is so repetitive, and I can field most discussions by referring to previously written long-form blog posts:

    Show this thread
  30. Retweeted

    That! I generally don't pitch in on the "responsible PoC disclosure" debate, as I don't actively contribute to the area and rather let or argue (and enjoy learning the arguments). But here is my defender's point of view: 1/

    Show this thread
  31. Filming in progress

  32. I took the control of Twitter account, my current client. Follow us!

  33. Retweeted

    The evolution of the truck is here. Guaranteed shatterproof 😬

  34. It’s funny to see that people, when they see a situation like this, directly think it’s a political thing

    Show this thread
  35. This morning a professional photographer takes photos of me for an upcoming article: A pedestrian stops suddenly, look at us and said « Ah! It’s for the local elections! ». The photographer answered « Yes, but it doesn’t know it yet »

    Show this thread
  36. Retweeted

    So many details in this WSJ investigation i.e: Hewlett Packard owns 49% of a Chinese surveillance/network firm selling to law enforcement. One client is a Chinese city known for “broad surveillance of residents,” & home to “multiple internment camps.”

    Show this thread
  37. Retweeted

    Bug bounties and vuln disclosure are trending again. I've found it useful to think of external bug reports as a form of whistleblowing. Someone noticed something wrong with your product/infrastructure and is bringing it to your attention in the hope that you'll address it. 1/n

    Show this thread
  38. Retweeted

    We downloaded recent content from 151 US city subreddits (Reddit forums), three from each state plus Washington DC, and ran sentiment analysis on the content. This map shows each city colored by the percentage of posts/comments with negative sentiment scores. cc:

    Show this thread
  39. Is there already a “Mobile Security” newsletter? If not I should create it, do something similar to the excellent ’s newsletter. What do you think? Is there a public for that?

  40. So much choice, thank you all, you are awesome 😍

    Show this thread