Found this user’s site while browsing around & thought the work was great & wanted to save it here for reference.
OCIACIA ROBOTS
Month: March 2018
Silicon Valley: Facebook \ Фейсбук
During the Silicon Valley opening credits, the Facebook logo flipped from English to Russian. First-rate burn by one of the best series on TV. pic.twitter.com/zvh9ZPd3td
— Adam Best (@adamcbest) March 26, 2018
Happy [Early] Halloween…
Great video on YouTube:
Nintendo Switch Console & Joy-Con Case Replacement
So it took me two attempts to get this done, but it was definitely worth it. I used the below kit & YouTube video for direction.
- Amazon: BASSTOP [Update Version] DIY Replacement Housing Shell Case Set for Switch NS NX Console and Right Left Switch Joy-Con Controller without Electronics(Set-Atomic Purple)
- YouTube: How To Mod Your Nintendo Switch and Joy-Con
Below are some of the in-progress & completed photos of the mod:
















Black Mirror: Season 05
Yes!
The future will be brighter than ever
The future will be brighter than ever. pic.twitter.com/slVeg3VPd7
— Black Mirror (@blackmirror) March 5, 2018
YAPSF (Yet Another Apple Security Flaw): Info.plist Path Traversal
Abraham Masri (iabem97) has revealed a new flaw in Apple latest iOS 11.3 beta, allowing an Info.plist file to grab a file outside of the current application’s sandbox. Granted this is a beta OS, but still, this is another example of Apple seemingly rushing a release, & having all sorts of flaws. This is just the latest one.
Redmond Pie: Abraham Masri Drops iOS 11.3 0day Vulnerability, Here’s What That Means For Future Jailbreak
GitHub: iabem97/securityd-racer2
And here is the Wiki write-up that explains how an app’s Info.plist file can access another app’s icon:
GitHub: iabem97/writeups: Info.plist Path Traversal
Here’s a quick excerpt from that Wiki article that shows the sandbox escape:
