Explore >> Select a destination


You are here

yifan.lu
| | comsecuris.com
2.9 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | labs.withsecure.com
4.2 parsecs away

Travel
| | Full disk encryption is one of the cornerstones of modern endpoint protection. It is not only an effective method to protect sensitive data against physical theft, but it also protects data integrity against tampering attacks.
| | www.copetti.org
5.3 parsecs away

Travel
| | An in-depth analysis that explains how this console works internally
| | www.nature.com
28.6 parsecs away

Travel
| The Atlantic meridional overturning circulation (AMOC)a system of ocean currents in the North Atlantichas a major impact on climate, yet its evolution during the industrial era is poorly known owing to a lack of direct current measurements. Here we provide evidence for a weakening of the AMOC by about 3?±?1 sverdrups (around 15 per cent) since the mid-twentieth century. This weakening is revealed by a characteristic spatial and seasonal sea-surface temperature fingerprintconsisting of a pattern of coolin...