These days I work on Tensor/Pixel and Android security
This affects everything from your car's driving directions to the guidance systems for precise missiles.
Sources:
www.theregister.com/2025/10/20/c...
www.cert.org.cn/publish/main...
This affects everything from your car's driving directions to the guidance systems for precise missiles.
Sources:
www.theregister.com/2025/10/20/c...
www.cert.org.cn/publish/main...
(An interesting source of drift: Relativistic time dilation, because the sats move at ~9,000 mph!)
(An interesting source of drift: Relativistic time dilation, because the sats move at ~9,000 mph!)
Attack outcome: If you disrupt the time, you can disrupt the entire communications grid.
Attack outcome: If you disrupt the time, you can disrupt the entire communications grid.
Modern tech relies on nanosecond-level accuracy. If you can mess with time, you can disrupt critical infrastructure.
Here are two key examples:
Modern tech relies on nanosecond-level accuracy. If you can mess with time, you can disrupt critical infrastructure.
Here are two key examples:
satcom.sysnet.ucsd.edu/docs/dontloo...
satcom.sysnet.ucsd.edu/docs/dontloo...
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic
"The Interior Ministry explained that... the G-Drive’s structure did not allow for external backups. This vulnerability ultimately left it unprotected."
"The Interior Ministry explained that... the G-Drive’s structure did not allow for external backups. This vulnerability ultimately left it unprotected."
cloud.google.com/blog/topics/...
cloud.google.com/blog/topics/...
- % of 0-days in enterprise technologies is increasing (37% ->44%)
- Much of that is due to 0-days in *security* and networking products.
- Security/networking products generally compromised with a single vulnerability, no exploit chain required. This is scary.
- % of 0-days in enterprise technologies is increasing (37% ->44%)
- Much of that is due to 0-days in *security* and networking products.
- Security/networking products generally compromised with a single vulnerability, no exploit chain required. This is scary.