Bits, Please!

Bits Please Blogspot. A security blog focusing on Android, the Linux Kernel and everything nice..

Read Bits-please.blogspot.com news digest here: view the latest Bits Please Blogspot articles and content updates right away or get to their most visited pages. Bits-please.blogspot.com is not yet rated by Alexa and its traffic estimate is unavailable. It seems that Bits Please Blogspot content is notably popular in USA. We haven’t detected security issues or inappropriate content on Bits-please.blogspot.com and thus you can safely use it. Bits-please.blogspot.com is hosted with Google LLC (United States) and its basic language is English.

  • Content verdict: Safe
  • Website availability: Live
  • English language flagLanguage: English
  • Last check:
  • N/A

    Visitors daily
  • N/A

    Pageviews daily
  • N/A

    Google PR
  • N/A

    Alexa rank

Bits-please.blogspot.com news digest

  • 7 years

    Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption

    After covering a TrustZone kernel vulnerability and exploit in the previous blog post, I thought this time it might be interesting to explore some of the implications of code-execution within the TrustZone kernel. In this blog post, I'll demonstrate...

  • 7 years

    TrustZone Kernel Privilege Escalation (CVE-2016-2431)

    In this blog post we'll continue our journey from zero permissions to code execution in the TrustZone kernel. Having previously elevated our privileges to QSEE, we are left with the task of exploiting the TrustZone kernel itself.
    "Why?", I hear you ask....

  • 7 years

    War of the Worlds - Hijacking the Linux Kernel from QSEE

    After seeing a full QSEE vulnerability and exploit in the previous blog post, I thought it might be nice to see some QSEE shellcode in action.
    As we've previously discussed, QSEE is extremely privileged - not only can it interact directly with the TrustZone kernel and access the hardware-secured TrustZone file-system (SFS), but it also has some direct form of access to the system's memory....

  • 7 years

    QSEE privilege escalation vulnerability and exploit (CVE-2015-6639)

    In this blog post we'll discover and exploit a vulnerability which will allow us to gain code execution within Qualcomm's Secure Execution Environment (QSEE). I've responsibly disclosed this vulnerability to Google and it has been fixed - for the exact...

Domain history

Web host: Google LLC
Registrar: MarkMonitor Inc.
Registrant: Google LLC
Updated: June 29, 2023
Expires: July 31, 2024
Created: July 31, 2000

Whois record

Safety scores

Trustworthiness

N/A

Child safety

N/A