Hacker News new | past | comments | ask | show | jobs | submit | from login
Reverse engineering a forgotten 1970s Intel dual core beast: 8271 (2020) (scarybeastsecurity.blogspot.com)
115 points by signa11 77 days ago | past | 21 comments
Recovering "lost" treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com)
3 points by goranmoomin 5 months ago | past
The cleverest floppy disc protection ever? Western Security Ltd. (2020) (scarybeastsecurity.blogspot.com)
2 points by mtmail 8 months ago | past
Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com)
1 point by nixass on May 18, 2021 | past
Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com)
306 points by scarybeast on May 17, 2021 | past | 53 comments
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com)
3 points by diffuse_l on Jan 12, 2021 | past | 1 comment
The cleverest floppy disc protection ever? Western Security Ltd (scarybeastsecurity.blogspot.com)
339 points by scarybeast on Dec 14, 2020 | past | 130 comments
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com)
169 points by scarybeast on Nov 16, 2020 | past | 39 comments
Turning a £400 BBC Micro (1981) into a $40k disc writer (1987) (scarybeastsecurity.blogspot.com)
34 points by scarybeast on July 10, 2020 | past | 5 comments
Weak bits floppy disc protection: an alternate origins story on 8-bit (scarybeastsecurity.blogspot.com)
65 points by scarybeast on June 27, 2020 | past | 11 comments
A wild bug: 1970s Intel 8271 disc chip ate my data (scarybeastsecurity.blogspot.com)
97 points by scarybeast on June 23, 2020 | past | 19 comments
Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com)
1 point by Luc on June 5, 2020 | past
Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com)
2 points by scarybeast on June 2, 2020 | past
Generic cross-browser cross-domain theft (2009) (scarybeastsecurity.blogspot.com)
1 point by networked on May 21, 2020 | past
Clocking a 6502 simulator to 15GHz (scarybeastsecurity.blogspot.com)
176 points by scarybeast on April 13, 2020 | past | 74 comments
Introducing Qualys Project Zero? (scarybeastsecurity.blogspot.com)
1 point by dsr12 on June 20, 2017 | past
Yahoobleed: access other users' private Yahoo! Mail image attachments (scarybeastsecurity.blogspot.com)
11 points by dsr12 on May 20, 2017 | past | 1 comment
Dumping Yahoo authentication secrets with an out-of-bounds read (scarybeastsecurity.blogspot.com)
91 points by scarybeast on May 19, 2017 | past | 7 comments
*bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images (scarybeastsecurity.blogspot.com)
4 points by scarybeast on May 19, 2017 | past
Further hardening glibc malloc() against single byte overflows (scarybeastsecurity.blogspot.com)
131 points by scarybeast on May 17, 2017 | past | 35 comments
Are we doing memory corruption mitigations wrong? (scarybeastsecurity.blogspot.com)
3 points by mpweiher on May 17, 2017 | past
Are we doing memory corruption mitigations wrong? (scarybeastsecurity.blogspot.com)
1 point by ingve on May 16, 2017 | past
Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 11, 2017 | past
Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty (scarybeastsecurity.blogspot.com)
6 points by scarybeast on May 11, 2017 | past
Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com)
65 points by ingve on May 8, 2017 | past | 25 comments
Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com)
2 points by el_duderino on May 6, 2017 | past
Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 6, 2017 | past
Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com)
2 points by jgrahamc on March 30, 2017 | past
Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com)
2 points by scarybeast on March 30, 2017 | past
Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes? (scarybeastsecurity.blogspot.com)
2 points by AndreyKarpov on Dec 16, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: