Edge Cases

A weekly podcast about (mostly Apple-related) software development by Andrew Pontious and Wolf Rentzsch.

Subscribe

  • iTunes
  • RSS Feed

Contact

  • Twitter
  • Email
120
22 Jan 2015

Don't Copy That Floppy

play (39 minutes 19 MB)

Andrew on weak references and Wolf on physical-access malware like Thunderstrike.

Links:

  • The Swift Programming Language: Automatic Reference Counting
  • Thunderstrike 31c3 « Trammell Hudson’s Projects
  • Thunderstrike Proof-of-Concept Attack Serious, but Limited « TidBITS
  • World’s first (known) bootkit for OS X can permanently backdoor Macs « Ars Technica
  • De Mysteriis Dom Jobsivs: Mac EFI Rootkits (PDF)
  • DMA attack « Wikipedia
  • The MacHax Best Hack Contest 2002 « TidBITS
  • Evil Maid goes after TrueCrypt! « The Invisible Things Lab’s blog
  • You Don’t Want XTS « Quarrelsome
  • Secret of Intel Management Engine by Igor Skochinsky « Slideshare
  • Cold boot attack « Wikipedia
  • FROST: Forensic Recovery Of Scrambled Telephones « IT-Sicherheitsinfrastrukturen (Informatik 1)
  • Evidence Search and Analysis Software for Digital Forensic Investigations « Belkasoft
  • Memory controller, Scrambling « Wikipedia
  • Apple keyboard firmware hack demonstrated « SemiAccurate