Jay (Jeremiah) Cox
@int0x6
Google employee, but tweets are my personal musings. Formerly @ Microsoft securing UEFI, Secure Boot, TPMs, BitLocker, ... aka @int0x6@infosec.exchange
127 Following    651 Followers
Pixel 9. It was actually the 10th _unique_ incorrect PIN, 20+ duplicate PIN attempts (the so called fat finger) did not count against them. https://t.co/QyX2hK1OkS
0
0
0
0
🧠 #Hacking# fearlessly at #HardPwn# on day 2⌚with Pixel tablet, Pixel watch, Wifi Pro, Chromecast being hunted #hw_ioNL2023# https://t.co/JGQI01uBQt
0
1
13
7
Hardcore pwnage in a Faraday cage at #Pwn2Own# Toronto 2023 https://t.co/RdLgApFDpj
0
0
2
0
Big day, setting the standard for healthy lifetime commitment at time of purchase and sustainability! https://t.co/jQd27acdSS
0
0
15
5
We're happy to announce #Google# as a new sponsor for #Pwn2Own# Toronto. They add devices in Surveillance and SOHO Smashup, plus a couple of targets in their own Google Devices category. Check out the updates at https://t.co/0KqCASoQwW
Show more
0
0
1
0
Google Pixel Watch in the USB debug cradle @hardwear_io #hardpwn# #hw_ioUSA2023# https://t.co/ZlehyFKf6A
0
0
25
5
Attendees will receive a pogo pin debug cradle for flashing images and debugging...
🎯#HardPwn# Setup & Target session ⌚Jeremiah @int0x6 @GoogleVRP explaining ➡️All about Google devices architecture #hw_ioUSA2023# #hardwaresecurity# https://t.co/MgV4QwvcGJ
0
0
5
2
We will have a tear down workshop at 6:00pm by @thingmakerQ during #hardpwn# Today https://t.co/zl9TAcROEZ
0
0
17
3
Pixel Watch firmware images now available for download 🎉 https://t.co/LKuAcgXm2E @hardwear_io
0
0
8
5
A happy @GoogleVRP customer
Love to see Magisk being used to reverse-engineer Google Home and found a serious security vulnerability! https://t.co/weqwNq9lk3
0
0
1
0