DB
David Buchanan
@retr0.id
Reverse Engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time. Occasional CTF player.
Fediverse: @retr0id@retr0.id
Twitter: @David3141593 (inactive)
Web: www.da.vidbuchanan.co.uk/
20.5k followers396 following19.8k posts
I'm exploring this because I think it might be useful for console hacking - where you have physical access, and the ability to execute sandboxed code (say, inside a web browser)
That knock at your door? It's MI5
I'm wondering what the effect of DRAM data scrambling would be on FI.
DB
David Buchanan
@retr0.id
Reverse Engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time. Occasional CTF player.
Fediverse: @retr0id@retr0.id
Twitter: @David3141593 (inactive)
Web: www.da.vidbuchanan.co.uk/
20.5k followers396 following19.8k posts