Twitter | Pretraživanje | |
Artur Janc
Making the web platform more secure and private, and managing part of 's Information Security Engineering team in my spare time.
1.527
Tweetovi
284
Pratim
1.301
Osobe koje vas prate
Tweetovi
Artur Janc proslijedio/la je tweet
majek04 31. sij
S2 Systems joined Cloudflare: Cloudflare is now hiring web browser experts! If you are an engineer in Seattle, and want to get your hands dirty with Chromium, WebAssembly, Typescript, Docker and Terraform - consider applying!
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Dimitrios Vytiniotis 30. sij
Our team at is hiring engineers and researchers in PL, compilers, systems etc. Come work with us on challenging problems and help shape the next generation of AI infrastructure!
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Google Vulnerability Reward Program (VRP) 30. sij
2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.
Reply Retweet Označi sa "sviđa mi se"
Artur Janc 30. sij
Odgovor korisniku/ci @terjanq @Google i 2 ostali
We're lucky to have you, and look forward to pwning All The Things with XS-leaks together! (also to fixing some things, because that makes future pwning more fun)
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
terjanq 30. sij
What a year! 2019 was the year of my growth and success. 2121 of you clicked the follow button on my avatar🤪unbelievable. No words can describe the feeling of becoming an inspiration to you guys! As for a small update, In march I'm joining infosec😁
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Andrew R. Whalley 29. sij
Read about all the great things the Security team has been up to recently!
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Stephen Shankland 28. sij
Improving privacy too fast could break the web by scaring advertisers away, Chrome leader says. But Mozilla's disagrees. A discussion from privacy & security conference.
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Ricky Mondello 29. sij
We’ve published an explainer about an idea to harden SMS-delivered one-time passwords by allowing senders to associate the codes with a website. We’ve been talking about the idea with some folks at Google, and would like more feedback.
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
John Wilander 29. sij
Into TLS? Like helping teams and individuals reach their goals? Come manage Apple’s Secure Transports Team:
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Nafeez 29. sij
Odgovor korisniku/ci @mikispag @randomdross
We recently deployed Strict, nonce based CSP to Cloudflare dash as well :) We use an intermediary like Cloudflare Workers to do the job. But it changes the threat model a little bit. Since it’s react based, we are not worried about reflected html based injections.
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Nathaniel Fruchter 28. sij
Odgovor korisniku/ci @enigmaconf @ericlaw i 2 ostali
Chrome privacy sandbox highlights: 1. Remove tracking surfaces - make it harder to track 2. Audit and attestation - can't entirely rely on tech measures 3. Privacy preserving APIs - meet use cases devs need 4. Anti-abuse - still need to catch things that fall through
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
baseband javascript rce nightmare scenario 28. sij
Strict, nonce-based CSP now deployed on a good portion of . Yay!
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
John Wilander 27. sij
SameSite=Lax cookie issues imminent for AMP-enabled websites since the AMP cache loads under a faux first party:
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Parisa Tabriz 28. sij
.: Can y'all compare and contrast the different approaches to browser privacy? : You're asking us to rank our neighbor's children! 😂
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Aaron Alva @ missing ShmooCon :( 28. sij
Odgovor korisniku/ci @ericlaw @TanviHacks @justinschuh
We don't want to throw out what makes the web so great: - Open Standards - No Single Entity Control (low barrier to entry to do something on the web) - Ephemerality (users can seamlessly migrate between sites)
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Jasvir Nagra 27. sij
Δ My new team at just managed to convince me that my opinion of CSP has been overly pessimistic & in spite of it's warts, they are real world cases where the mitigation it provided was worth the pain of deployment.
Reply Retweet Označi sa "sviđa mi se"
Artur Janc 25. sij
Odgovor korisniku/ci @arturjanc
From a defender's point of view this looks much less optimistic. There's still a large number of patterns that developers frequently get wrong (including "easy" things like XSS prevention), and new patterns (SWs, JWT|localStorage) create new bug classes. You can still have fun!
Reply Retweet Označi sa "sviđa mi se"
Artur Janc 25. sij
As much as I'd like to retire, I'd guess that once the dust settles a large number of the applications worth attacking will set `SameSite=none`, so don't write off CSRF / XS-Leaks just yet :)
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Ezequiel Pereira 24. sij
From June 8th to September 4th, I'll be a Security Engineer intern at Google Zurich🇨🇭🥳
Reply Retweet Označi sa "sviđa mi se"
Artur Janc proslijedio/la je tweet
Lukas Weichselbaum 24. sij
Our research on Safari's Intelligent Tracking Prevention (ITP) is now available on cc
Reply Retweet Označi sa "sviđa mi se"