eShard
@eshard
Beyond testing tools, solutions that deliver expertise. 🌐 Chip & binary security testing https://infosec.exchange/@eshard https://bsky.app/profile/eshard.bsk
Read our joint blog series with @eshard entitled "Shifting left secures PQC implementations from physical attacks." Read more: hubs.li/Q03y9SC90 #postquantum #PQC #quantumattack #cybersecurity #cryptography
Missed our webinar with @PQShield on physical attacks against post-quantum cryptography? You can now watch the full session on YouTube. 👉 youtu.be/Z1_q6wLk5V0

We're starting a new session for the webinar "Securing post-quantum implementations against physical attacks" with @PqShield. ⏰ Join here: pqshield.zoom.us/webinar/regist… #pqc #hardware

Post-quantum crypto resists quantum computers, not physical attacks. On July 10, we're live with @PqShield to show how side-channel and fault injection techniques still break schemes like ML-KEM, and how to protect your implementations. Register now: 🔵 11am CEST:…

Live with @PqShield on July 10th to see how side-channel and fault injection break ML-KEM and what you can do to stop them. Register now: 🔵 11am CEST: pqshield.zoom.us/webinar/regist… 🔵 6pm CEST: pqshield.zoom.us/webinar/regist…

🔔 This July 10th, uncover the critical truth about physical attacks on post-quantum schemes. @eshard & PQShield will show you how. ✅ 10am GMT: hubs.li/Q03tjny70 ✅ 5pm BST: hubs.li/Q03tjmQH0
To most users, it’s just a tap. To us, it’s a trace filled with memory operations, encryption, and system calls. We’ll show you how to capture it, and everything behind it, using #Telegram as our target. 👉 Register to our webinar: eshard.eventbrite.fr 📆 June 18th & 19th…
We put together summaries of some of the talks we attended at this year’s @hardwear_io USA 🇺🇸 👉eshard.com/posts/a-look-b… #hw_ioUSA2025

WinDBG vs esReverse: Same concept (time travel debugging), very different scope. We break down the differences in our blog: eshard.com/posts/differen… #windows #cybersecurity

Our work is a continuation of Aleph Research, Trung Nguyen and ChefKiss (@HeWhomCodes). The current state of ChefKiss allows you to have the iOS UI if you apply binary patches on the OS. We will publish binary patches later as open source.
Our journey with the #iOS emulator continues. We show how we reached the home screen, enabled multitouch, unlocked network access, and started running real apps 👉 eshard.com/posts/emulatin…
Learn how to trace Telegram on #Android, from setup to execution to analysis. Full-system vs lightweight tracing, real use cases, and Time Travel Analysis in action. Register here 👉 eshard.eventbrite.fr #AndroidSecurity #ReverseEngineering #Telegram

