@lukasz.bsky.social
Breaking bad UTF-8 implementations since 1991. I secure journalists’ cybers at Internews and run trails. If I’m posting, I’m hopefully not on a trail. Views own. He/him
@carste1n.bsky.social
Security Engineer @ Cloudflare, ex-Google ISE, I use bad software and bad machines for the wrong things. My writing: https://carstein.github.io
@zardus.bsky.social
Retired DEFCON CTF org. Shellphish Captain Emeritus. ASU Prof. angr hacker. pwn.college sensei. Looking for students/interns! https://yancomm.net https://github.com/zardus https://defcon.social/@Zardus
@spq42.bsky.social
CTF player, Security engineer at Google, http://infosec.exchange/@spq ; @_spq__ on Twitter
@oflynn.com
Colin is a huge nerd. Hardware hacking, open-source hardware, electronics design, academic stuff, dog stuff in some order. Assistant Prof @ Dalhousie Uni, advisor/co-founder NewAE Technology Inc.
@mrexodia.bsky.social
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
@zetatwo.bsky.social
Security Engineer @ XTX. MSc in eng. physics & CompSci, dev & gamer. ❤️ music & long distance running. Wanna do a PhD sometime. Same U/N on all other sites
@ianholmes.org
Berkeley professor (Bioeng, Compbio). Visiting Scientist at Calico. JBrowse genome browser / Apollo annotation editor, ML for gene regulation / molecular evolution / synbio.
@andreaszeller.bsky.social
Software researcher at https://cispa.de, working on #Fandango, #S3, #FuzzingBook, #DebuggingBook. Testing, debugging, analyzing, and protecting software for a better world. Find me at https://andreas-zeller.info/
@markrussinovich.bsky.social
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
@jonhoo.eu
Rust live-coder and OSS tinkerer who loves teaching. I try to maintain a high SNR. Wrote Rust for Rustaceans. At Helsing.ai. Formerly AWS. Co-founded ReadySet. @jonhoo elsewhere. he/him/they
@signal.org
Signal is an end-to-end encrypted messaging app. Privacy isn’t an optional mode, it’s just the way that Signal works. Every message, every call, every time.
@gruss.cc
Aka @lavados #InfoSec University Professor @ #TUGraz. #meltdown, #spectre, #rowhammer, cache attacks, sustainable security. Produced a side channel security sitcom. https://gruss.cc https://x.com/lavados https://infosec.exchange/@lavados
@pagedout.bsky.social
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
@jevinskie.bsky.social
KEYWORDS ➡︎ cats, hacking, reverse engineering, llvm, binary analysis, side channel analysis, FPGAs, NFC/EMV tricks Previously Pay Security he/him
@hexacon.bsky.social
Offensive security conference in the heart of Paris. 10-11th October 2025 https://www.hexacon.fr/
@xenokovah.bsky.social
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://ost2.fyi
@offensivecon.bsky.social
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
@jonathansalwan.bsky.social
Program analysis, reverse engineering and vulnerability research at Apple SEAR. Some other stuff on https://shell-storm.org and http://github.com/JonathanSalwan
@travisgoodspeed.bsky.social
Author of books and tools for reverse engineering. Studebaker driver, but an awful mechanic. Home chip decapsulation. Currently writing a new assembler, to be released in February.
@lukasarnld.bsky.social
Researching iOS' Cellular Protocol Stack @ SEEMOO Studying CS @tuda.bsky.social 🌍 https://lukasarnold.de
@mu00d8.bsky.social
Postdoctoral researcher in the SEFCOM lab @ASU; prev @CISPA Helmholtz Center and @RUB; interested in Systems Security / Program Analysis / Fuzzing
@mrphrazer.bsky.social
Binary Security Researcher, Chief Scientist at http://emproof.com and Trainer. Website: https://synthesis.to
@stefan-marr.de
Researcher, Senior Lecturer. Working on interpreters, compilation, concurrency, and debugging tools.
@cmw.bsky.social
Connecting dots and untying knots. This is my personal account and my opinions are my own. CTO @ Corellium / Producer
@buherator.bsky.social
"I'm interested in all kinds of astronomy." https://scrapco.de Mostly cross-posting from Fediverse: @buherator@infosec.place
@matthiaskaiser.bsky.social
Java/Android Vulnerability Researcher. 0xACED. Ex-Apple. Posts are my own.
@dustri.org
Blog feed for https://dustri.org/b Also available at https://infosec.exchange/@jvoisin
@x30n.bsky.social
Hacker, Vuln Research, 2x winner DEF CON CTF, Founder & CEO Blackwing Intelligence, not a CISSP
@mboehme.bsky.social
Software Security @MPI, PhD @NUS, Dipl.-Inf. @TUDresden. Research Group: http://mpi-softsec.github.io
@alexplaskett.bsky.social
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
@cxx.dev
C++ developer specializing in source and binary program analysis and transformation.
@daax.bsky.social
reverse engineering • secure processor design • system emulation • strategically bluescreening @the_secret_club
@pmeerw.bsky.social
@grapheneos.org
Open source privacy and security focused mobile OS with Android app compatibility. https://grapheneos.org/
@naehrdine.bsky.social
ɿɘɘniϱnɘ ɘƨɿɘvɘɿ 🎦 youtube.com/@jiskac 📝 naehrdine.blogspot.com 🐥 twitter.com/naehrdine 🎓 hpi.de/classen 📱 reversing.training
@adrianherrera.bsky.social
Security researcher with a penchant for programming language theory. Building fuzzers @interruptlabs.bsky.social. https://adrianherrera.github.io/