Thijs Alkemade

Security researcher, SEAR.

Pronunciation
[ˈtɛis ˌɑlkəˈmaːdə]
Pronouns
he/him
Thijs Alkemade boosted:
2025-10-24

Apple SEAR is hiring offensive security researchers!

We’re looking for talented researchers across multiple areas of security.

Check out the job description here:
jobs.apple.com/en-us/details/2

If you’re interested in low level systems like RTOS, firmware, coprocessors, embedded components, or microkernels, my team would especially like to hear from you.

Feel free to reach out if you have any questions.

#infosec

2025-10-18

@fay59 I can attest that reverse-engineering one is definitely very slow and one is very fast. 🙃

Thijs Alkemade boosted:
2025-10-02

Are you interested in bleeding-edge microarchitecture offensive security research, with a concrete impact on user security?
We have just opened a Microarchitecture Security Internship position at Apple, in SEAR LASER! ❤️‍🔥

Apply here: jobs.apple.com/en-us/details/2

2025-08-28

After more than 9 years, this is my last week at Computest. I've had a great time here, especially in Sector 7, the security research team we started 5 years ago. Highlights for me are winning Pwn2Own with our 0-click Zoom RCE, our last-minute trips to Miami and Tokyo for other Pwn2Own events, and speaking at Black Hat USA, DEF CON, WHY2025 & MCH2022 and so many other places. I am very grateful for getting the chance to do this work, but now it is time for me to do something else and find some new challenges! 🔥

2025-08-12

@matthijskooijman Ben je nog bezig?

2025-08-10

@FlorentE_ That’s great, thank you!

2025-08-09

First talk is done! I think it went quite well.

Next one is tomorrow at 19:00 (probably, it has been moved around a lot already) in Andromeda.

#why2025

Picture of the announcement of the talk “From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface”.
2025-08-07

Made it to #WHY2025!

Last time we had to give 3 presentations, which was a bit much. So this time we’re doing 3 presentations again of course…

Sky with setting sun and different layers of clouds, with some RGB leds in the distance.
2025-08-05

@eloy Others I recognise from memory:

H4s = Gzip
iVBOR = PNG
MII = X.509 certificate

2025-07-22

@Catfish_Man Reminds me of my previous car, which had translated “dismiss” (to close an alert) into a word meaning “refuse”.

So every time it told me “drive carefully, it’s freezing outside” I had to tell it I refused!

Thijs Alkemade boosted:
2025-07-21

Today on our blog we have a guest post from René Ammerlaan about multiple vulnerabilities he found in Ruckus Unleashed. The most impressive part was how he chained some of them together to go from access to the guest WiFi network to RCE on the controller itself!

sector7.computest.nl/post/2025

#cve #ruckus

2025-06-17

@fj My dad used to work in that building. 🙂 He wasn’t involved in this project, but he did work on nanoscience. Getting to operate an electron microscope while visiting him there was really cool.

2025-06-12

@rosyna Yes, at a minimum a few days, sometimes months after they publish the advisory.

2025-05-21

@fay59 Just like the iPhone 9 right?

2025-05-13

About 5 years ago, I reported a vulnerability in iOS allowing apps to spoof the app name when requesting to add a VPN profile. The app could just specify whatever text to show there.

Yesterday, two writeups were posted about other TCC prompts trusting the apps triggering them too much:

wts.dev/posts/tcc-who/
rambo.codes/posts/2025-05-12-a

It does surprise me that Apple invests so much effort into their sandbox and permission system with the assumption that apps might be malicious, but then keeps messing up the UI around these features.

A iOS system prompt asking the user to approve a VPN configuration, but the app name has been spoofed as “New Network Settings for 4G”.
2025-05-02

@0xabad1dea Yeah, I agree. It’s probably the Apple PR department wanting to emphasize how “highly sophisticated” and “rare” these attacks are compared to other malware.

2025-05-02

@0xabad1dea @lorenzofb It does seem to line up with how they describe it here:

support.apple.com/en-us/102174

(The page has a Dutch translation as well but I’m not sure if they translate the notification emails too.)

2025-04-24

@still dm-verity might not even be enough. You can still mount an overlay over or mount a different filesystem inside a dm-verity mount.

I’ve seen a couple of devices that put a r/w overlay on /etc (I guess because making that directory read-only would be too hard). That also allows for easy persistence despite the dm-verity.

If you want to restrict what executables are started to those on dm-verity mounts you need something like XPin from Tesla:

github.com/teslamotors/linux/b

2025-04-21

@eloy I am curious how many call their page “captive wifi” instead of “captive portal”, because every time I see it named that I wonder if I’m actually in prison.

2025-04-08

@eloy Not just free, they even gave you backdated certificates to avoid stricter rules!

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst