Namaste!
Thursday assorted links:
Using Homebrew to Distribute Early Access Binaries from Private Github Repositories :: LGUG2Z
🔗 https://lgug2z.com/articles/using-homebrew-to-distribute-early-access-binaries-from-private-github-repositories/
---
Recovering a Wallet from an Incomplete Seed Phrase | 0xkato
🔗 https://www.0xkato.xyz/Recovering-Wallet/
---
TEE.fail: Breaking Trusted Execution Environments via DDR5 Memory Bus Interposition
In this work, we show that the security guarantees of modern TEE offerings by Intel and AMD can be broken cheaply and easily, by building a memory interposition device that allows attackers to physically inspect all memory traffic inside a DDR5 server
🔗 https://tee.fail/
Login to reply