0xD

joined 2 years ago
[–] 0xD@infosec.pub 5 points 1 month ago (1 children)

I love vertical tabs!!!!!!!

[–] 0xD@infosec.pub 2 points 1 month ago (1 children)

It's just a fancy history, it has nothing to do with pocket.

[–] 0xD@infosec.pub 7 points 1 month ago (1 children)

Wipe Windows, Install Linux ;D That was my last straw as well.

[–] 0xD@infosec.pub 1 points 1 month ago (4 children)

For the sake of argument, how do you expect something like that to be made for a dollar?

[–] 0xD@infosec.pub 1 points 1 month ago
[–] 0xD@infosec.pub 1 points 1 month ago (2 children)

The passphrase or the unencrypted database are still open in memory. Though that is, of course, a more complicated attack but they could simply read it through the app itself.

[–] 0xD@infosec.pub -2 points 1 month ago (4 children)

That doesn't really do anything. Attackers need local access to the device to get the database itself. Chances are, they'll get the key right with it.

[–] 0xD@infosec.pub 1 points 1 month ago (1 children)

No, apple is a piece of shit for not allowing you to flash whatever firmware you want on there. It makes my job harder and no one wants to do ios pentesting because of that.

I hope that apple burns to hell.

[–] 0xD@infosec.pub 20 points 1 month ago (3 children)

Lol, siding with apple here is a bootlicker thing to do.

[–] 0xD@infosec.pub 13 points 2 months ago (2 children)

OMG I've been motherfucking looking for this piece of shit EUVD for the past weeks and only found references and info pages, but never the actual fucking database!! Finally I know it exists.

Why is it hidden? Why does it have that braindead URL? And why, for the love of god, does it have a separate numbering scheme?!

[–] 0xD@infosec.pub 6 points 2 months ago

Unfortunately exactly my experience :( And nobody saw (or I guess liked/interacted with) my posts either, so it felt pointless.

view more: ‹ prev next ›