120
            22 Jan 2015
        Don't Copy That Floppy
Andrew on weak references and Wolf on physical-access malware like Thunderstrike.
Links:
- The Swift Programming Language: Automatic Reference Counting
 - Thunderstrike 31c3 « Trammell Hudson’s Projects
 - Thunderstrike Proof-of-Concept Attack Serious, but Limited « TidBITS
 - World’s first (known) bootkit for OS X can permanently backdoor Macs « Ars Technica
 - De Mysteriis Dom Jobsivs: Mac EFI Rootkits (PDF)
 - DMA attack « Wikipedia
 - The MacHax Best Hack Contest 2002 « TidBITS
 - Evil Maid goes after TrueCrypt! « The Invisible Things Lab’s blog
 - You Don’t Want XTS « Quarrelsome
 - Secret of Intel Management Engine by Igor Skochinsky « Slideshare
 - Cold boot attack « Wikipedia
 - FROST: Forensic Recovery Of Scrambled Telephones « IT-Sicherheitsinfrastrukturen (Informatik 1)
 - Evidence Search and Analysis Software for Digital Forensic Investigations « Belkasoft
 - Memory controller, Scrambling « Wikipedia
 - Apple keyboard firmware hack demonstrated « SemiAccurate