Dustin R. HeartThinking Like A Hacker — Part III: At Smart Lock, Your Voice Is Your PasswordIn Part I, I cover an approach to finding the hacking mindset through looking at your own code. In Part II, I approach this discovery…Aug 20, 2017Aug 20, 2017
Dustin R. HeartThinking Like A Hacker — Part II: When The Backdoor Finds YouThe world of software engineering is the culmination of efforts — teams assembling new works, improving old works, leveraging the…Aug 14, 2017Aug 14, 2017
Dustin R. HeartThinking Like A Hacker — Part I: Finding The MindsetIn my prior article, I encourage leadership at tech companies to adopt an official policy for permitting vulnerability research internally…Aug 13, 2017Aug 13, 2017
Dustin R. HeartYour Company Should Have A Red TeamIn the parlance of the Intelligence Community (IC), there exists the concept of a “Red Team” — an oppositional yet internal force which has…Aug 12, 2017Aug 12, 2017
Dustin R. HeartBuilding A Rust Phone, Part 1: Picking the PlatformIn Part 0, I cover the justifications behind building a custom cellphone. In short, security cannot be guaranteed in the current offerings…Jan 11, 20171Jan 11, 20171
Dustin R. HeartBuilding a Rust Phone, Part 0: JustificationsIf you were to ask the entirety of people who know me what is one attribute that stands out about myself, they will say that, without a…Jan 9, 2017Jan 9, 2017