-
whoami, who am I? Thoughts on protecting digital and human identities.
TL;DR: What is identity security, why we often do it wrong, and how we can get it right.
-
BeeSTrING: Critical Vulnerability in BPF Subsystem Allows Fully Unauthenticated RCE as Root
TL;DR: Look at the publication date, I’m fucking with you.
-
every Boring Problem Found in eBPF
This article was originally written for tmp.0ut volume 2 and is available here: https://tmpout.sh/2/4.html. Due to the unique (read: badass) format of the zine, it is replicated here as plaintext.
-
eBPF for security: a beginner's guide
This post was written for Red Canary and originally appeared on their site here.
-
Learning eBPF through gamification: The Hive CTF Challenge and Walkthrough
TL;DR: A (relatively) simple eBPF capture the flag challenge and writeup. The challenge was made by a colleague on the R&D team and the writeup by one of our detection engineers. The writeup goes through the whole discovery process and is a great way to dive into BPF.