@cryptaxCreating inefficient IT, or hiding our own inefficiency behind ITWe, humans, normally have brains, and a heart, and we should use them more.Oct 16Oct 16
@cryptaxThe Next Generation Conference FormatI have now been attending conference for … hum … several decades and I believe the traditional format of 30, 40 or 50-minute talks should…Oct 4Oct 4
@cryptaxArguments descriptor arrays in DartWhile reading Dart assembly, you may have noticed lines such as the following:Sep 191Sep 191
@cryptaxUsing AI-assisted decompilation of Radare2A few months ago, Radare2 (aka r2), an open source disassembler which can be entirely used by command line, started implementing AI plugins…Sep 17Sep 17
@cryptaxDart shifts to standard calling conventionUp until Dart SDK v3.4.0, Dart was using an uncommon calling convention where all arguments for a function were passed on the stack [see my…Jul 19Jul 19
@cryptaxUntangling Android/TangleBotWe dig in a malicious sample of Android/TangleBot of May 2024. TangleBot is also reported as a BankBot, although it is more an Android RAT…Jul 121Jul 121
@cryptaxOn the security of Google SecretsGoogle Secrets Gradle plugin is “for providing your secrets securely to your Android project”. I would like to make it clear in this…Jul 11Jul 11
@cryptaxInside Sinchat Flutter riskwareIn this blog post, we analyze 2 borderline Flutter apps. As I’ll explain in conclusion, they are not malicious but expose borderline/risky…May 24May 24
@cryptaxTesting Restricted Settings of Android 13 on an emulatorAndroid 13 introduced a new security measure called “Restricted Settings”. The measure is meant to limit access to notification settings…Apr 4Apr 4
@cryptaxPhishing attempt on French e-tollsYesterday, I received a well-crafted phishing attempt email targeting users of a French e-toll company. While this email contains no mobile…Mar 21Mar 21