☕
dilly dally shilly shally
- Portland, OR
-
03:33
(UTC -07:00) - novafacing.github.io
- https://orcid.org/0000-0001-9932-3798
- @novafacing@haunted.computer
- @novafacing.bsky.social
Low Level TV
lowleveltv
Hacker | YouTube Content Creator | Security Engineer | Teacher
Washington D.C.
Alex Bennée
stsquad
@Linaro South Wales, UK
David Lattimore
davidlattimore
Developer currently working on Rust development tools with a focus on Rust warm build times.
Sydney, Australia
Matt Revelle
drone29a
CS Assistant Professor at @msu. Working on computer security via programming languages, formal methods, and machine learning.
Previously at @kudu-dynamics.
@msu Bozeman, MT
Alexander Taylor
fuzyll
Rewriting history like there's no tomorrow!
Current employee of @Vector35.
Nils Bars
nbars
Systems security researcher & PhD student @CISPA-SysSec / @RUB-SysSec
Ruhr-Universität-Bochum Bochum
Santiago Pastorino
spastorino
@rust-lang compiler team contributor and @rails core team alumni. Working on @rust-lang for @futurewei-tech. @wyeworks co-founder.
@futurewei-tech & @wyeworks Montevideo, Uruguay
Jorge Aparicio
japaric
"Everything else is a distraction". @ferrous-systems engineer.
@ferrous-systems Germany
David A. Wheeler
david-a-wheeler
My work title is "Director of Open Source Supply Chain Security" at the Linux Foundation. Much of this isn't work though.
Linux Foundation
Manos Pitsidianakis
epilys
@Linaro Athens, Greece
Guillaume Claret
clarus
Security researcher at @formal-land 🌲 for Web3 applications
Applying the 🐓 proof system to find all the vulnerabilities.
🐻❄️
Formal Land Paris
aurelf
On Twitter: @aurelsec
Check our projects here: https://github.com/eurecom-s3
https://github.com/avatartwo/avatar2
malwareunicorn
malware-unicorn
MALWARE + FASHION = UNICORN
Reverse Engineering Malware
twitter: @malwareunicorn
San Francisco
PreviousNext