Vinoth (Mobile security)

I am Vinoth, from San Diego. I lead the silicon security architecture and silicon security operations teams at #Google. Before this, I worked on mobile silicon security at #Qualcomm.

Much of my work is about improving the security of #Pixel and other #Android devices. I will mostly talk about #mobilesecurity, #androidsecurity and #infosec.

I sometimes invest in seed stage start-ups, primarily technology companies. My portfolio includes Modumate, Akido Labs, kia.ai, Zendoc and Zeoauto. If you are building something cool, hit me up.

Vinoth (Mobile security) boosted:
Mitch Wagnermitchw
2025-07-10
Vinoth (Mobile security) boosted:
2025-07-07

@felis_catus_domesticus @seyfr @kamatahvel @Tutanota Android's privacy and security model for applications is massively ahead of the desktop Linux software stack. Android Open Source Project has dramatically better privacy and security throughout the OS too. Mandatory app sandboxing with a strong permission model increasingly based around case-by-case consent instead of software doing anything it wants is important. Traditional desktop operating systems do not have good privacy and security.

Vinoth (Mobile security) boosted:
Christina Warrenfilm_girl
2025-07-02

Imagine paying $300 a year for email and it gets acquired by a glorified keylogger.

Vinoth (Mobile security) boosted:
Dare Obasanjocarnage4life@mas.to
2025-06-27

I didn’t think it was possible to be this out of touch. Nice job, NYT.

Vinoth (Mobile security) boosted:
Łukasz :verified:maldr0id@infosec.exchange
2025-06-02
Vinoth (Mobile security) boosted:
Steve Randy Waldmaninterfluidity@zirk.us
2025-05-20

“maybe if you tax poverty you get less of it.”

Vinoth (Mobile security) boosted:
Full Metal Accountantordrad@lor.sh
2025-04-30

Who called them 'genetic engineer' instead of 'heir stylist'?

Vinoth (Mobile security)vinoth@infosec.exchange
2025-04-29

Good news on mobile zero-days in 2024:
- Zero day exploits in mobile fell YoY (~50%)
- Exploit chains with multiple zero day vulnerabilities are almost exclusively in mobile. Generally, this means mobiles are harder to break in.

The flip side:
- % of zero days in enterprise technologies (i.e not end-user facing) is increasing (37% ->44%)
- Much of that is due to zero days in *security* and networking products.
- Security and networking products are generally compromised with a single vulnerability, no exploit chain required. This is scary given the outsized impact of compromising these products.
- Actors conducting cyber espionage still lead the attributions

Google Threat Intelligence Group released their analysis of 2024 0-days that the group tracked:
cloud.google.com/blog/topics/t

Vinoth (Mobile security) boosted:
BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-04-29

#Forbes just published a rare photo of what password spraying attack looks like 😈

Vinoth (Mobile security)vinoth@infosec.exchange
2025-04-28

Move over Cryptanalysts. Quantum computing has a new application: Payroll processing. This is according to the payroll company Deel, in it's court filing on this case.

"To date, however, on information and belief no one has been able to build a large-scale payroll engine to process payroll on a global scale. Indeed, these likely cannot actually be built without significant advances in quantum computing"

Yeah, right.

documentcloud.org/documents/25

Vinoth (Mobile security) boosted:
David Chisnall (*Now with 50% more sarcasm!*)david_chisnall@infosec.exchange
2025-04-28

@hacks4pancakes

But if I jump to conclusions, I can assume that the cause is the thing my product fixes!

Vinoth (Mobile security) boosted:
lcamtuf :verified: :verified: :verified:lcamtuf@infosec.exchange
2025-04-24

One of the cool things about electricity is that there's more charge in a button battery than in a bolt of lightning. I promise this is true.

One ampere is the flow of one coulomb (~6 quintillion electrons) per second. A typical CR2032 battery packs about 200 mAh; simplifying a bit, this means it can supply 1 mA for 200 hours. An hour is 3,600 seconds, so it works out to 720 coulombs.

A typical lightning bolt is often quoted at 15 coulombs.

Anyway, I think this is why you're not supposed to swallow batteries.

Vinoth (Mobile security) boosted:
Philip Theus (prev. Mueller)exterm@layer8.space
2025-04-23

“For all of human history, we’ve been living like energy is scarce and matter is infinite, when in fact the opposite is true: we need to learn to live like we have access to unlimited energy, but with the deep understanding that the atoms we have to work with are part of a closed system.”

@debcha , “How Infrastructure Works”

Vinoth (Mobile security) boosted:
Steve Randy Waldmaninterfluidity@zirk.us
2025-04-22

if AI writes the law, what was the legislative intent?

Vinoth (Mobile security)vinoth@infosec.exchange
2025-04-19

Is someone working in the "Secret Service" still in "public" service?

Vinoth (Mobile security) boosted:
2025-04-19

Today's most meta announcement: The FBI is warning that scammers are impersonating the Internet Crime Complaint Center (IC3), which is operated in partnership with the FBI to receive consumer complaints about fraud.

Naturally, the FBI urges victims to immediately report the fraud to the IC3.

FEDERAL BUREAU OF INVESTIGATION x TF
Alert Number: I-041825-PSA
April 18, 2025
FBI Warns of Scammers Impersonating the IC3
The Federal Bureau of Investigation (FBI) warns the public about an ongoing fraud scheme where criminal scammers are impersonating FBI Internet Crime Complaint Center (IC3) employees to deceive and defraud individuals. Between December 2023 and February 2025, the FBI received more than 100 reports of IC3 impersonation scams.
HOW IT WORKS
Complainants report initial contact from the scammers can vary. Some individuals received an email or a phone call, while others were approached via social media or forums. Almost all complainants indicated the scammers claimed to have recovered the victim's lost funds or offered to assist in recovering funds. However, the claim is a ruse to revictimize those who have already lost money to scams.
A recent example of the impersonation scheme variant indicates scammers create female persona profiles on social media networking sites and join groups for financial fraud victims, representing themselves as fellow financial fraud victims. Scammers then recommend actual victims reach out to male persona, "Jaime Quin" (Quin), the alleged "Chief Director" of IC3, via Telegram. Once contacted, "Quin" claims to have recovered the lost funds, but uses this as a ruse to gain access to their financial information and revictimize them.
Vinoth (Mobile security) boosted:
Ars Technicaarstechnica
2025-04-19

To regenerate a head, you first have to know where your tail is
Planaria can't replace a missing head until after the tail develops sufficiently.
arstechnica.com/science/2025/0

Vinoth (Mobile security)vinoth@infosec.exchange
2025-04-17

My thoughts on why PUF never took off in the SoC world:
vinothd.com/blog/3-the-manufac

tl;dr: PUF does not simplify the secure manufacturing trust model. Not having to generate the root private key is cool. But you cannot do much with it without extracting the corresponding public key. And that extraction needs to be done securely, which re-introduces the problem of having the trust the manufacturing facilities, and all the complexity needed to minimize that trust.

Vinoth (Mobile security)vinoth@infosec.exchange
2025-04-15

Xi and Trump could have been born the same day!! I have never been more curious about someone's exact time of birth.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst