Twitter | Search | |
David Wang
Co-Founder of . Security Researcher. Formerly of evad3rs, iPhone Dev Team, iPhone Linux.
1,354
Tweets
110
Following
179,350
Followers
Tweets
David Wang 19h
Replying to @shiyuanis
Oh you know you spiced it up. :p
Reply Retweet Like
David Wang 19h
Know shit’s getting pretty real when I overhear saying “bitch of course designers live in the sky that’s where ideas are found. Know what you find in the ground? Dead bodies.”
Reply Retweet Like
David Wang Feb 22
I'll be volunteering at this event. :)
Reply Retweet Like
David Wang Feb 22
Late night McDonald's run with . Asked for signature sauce for the tenders. They said they were out but whether we wanted to try the new Szechuan sauce they had: HELL YES.
Reply Retweet Like
David Wang retweeted
Billy Ellis Feb 22
Big thanks to for giving me a live demo & answering some questions about ! Watch the video here
Reply Retweet Like
David Wang Feb 9
Hey, want to hack on iOS with me and some other really bright guys? My startup Corellium is looking for a full stack engineer to help out with our cloud compute platform.
Reply Retweet Like
David Wang retweeted
Chris Wade Jan 7
One of the coolest features of iOS virtualization is the integration of a web based version of Cycript from . Which blows my mind 🤯
Reply Retweet Like
David Wang retweeted
Corellium Jan 7
Want to be one of the first developers in the world to test on a virtualized iPhone? Reserve your invite now at .
Reply Retweet Like
David Wang retweeted
Joshua Hill Sep 9
Here's half of the surprise. Huge thanks to and for allowing me to upload this
Reply Retweet Like
David Wang Jul 1
Thank you! You are and I's favorite hotel in NY!
Reply Retweet Like
David Wang 20 Aug 16
Replying to @jmaxxz
thanks!
Reply Retweet Like
David Wang 20 Aug 16
Replying to @jmaxxz
... That doesn't sound great. Do you mind posting some sort of follow-up? I'm interested.
Reply Retweet Like
David Wang 20 Aug 16
Replying to @jmaxxz
Have they stopped leaking the firmware key?
Reply Retweet Like
David Wang retweeted
mdowd 17 Aug 16
Azimuth's is on risky business this week talking about Apples SEP implementation:
Reply Retweet Like
David Wang 9 Aug 16
Making stuff opaque doesn't reduce attack surface though. It's opaque to the (well-behaved) dev, not opaque to exploits.
Reply Retweet Like
David Wang 9 Aug 16
I think it's b/c it changes almost every version so the binary compatibility of kexts using it will also break that often.
Reply Retweet Like
David Wang 8 Aug 16
Replying to @chronic
Yeah, I'm sure we'll meet at one of these things in the future!
Reply Retweet Like
David Wang 7 Aug 16
Neat thing I didn't know until spoke was the SEP's UID is generated on-device, reducing the opportunity even Apple can read it.
Reply Retweet Like
David Wang 7 Aug 16
Replying to @chronic @johnrickman_t
It was good. Some was basically publicly known, a lot not publicly known, but some were completely new to me.
Reply Retweet Like
David Wang 7 Aug 16
Replying to @chronic
they might've turned them in late.
Reply Retweet Like