Profile cover photo
Profile photo
Will Drewry
617 followers
617 followers
About
Will's posts

Post has shared content
Brillo and Weave: our complete solution for building connected devices

"Today, we’re extending to the broader developer community as part of our invite program. Read on to find out how you can receive an invitation."

#brillo    #weave   #android #iot

Post has shared content
For those who were locked out of their dev-mode Chromebooks when the battery ran down, there's now a workaround. I apologize for not coming up with this way back when the problem first surfaced, but it uses a trick that I didn't expect to work. Thanks to +Will Drewry for pointing it out.

Post has shared content
The Pwnium 4 security competition kicked off this morning at CanSecWest in Vancouver, Canada, and has now concluded. * Thanks to the many participants who applied to pwn Chrome OS. It was an exciting day with one demonstrated exploit on the HP Chromebook 11 confirmed for a $150,000 reward, and we’ll be considering partial credit for a second researcher working on the same platform.

We always look forward to this event to see what the security research community has cooked up for us. In line with our security principles, it’s one of the best ways we know to engage the community while improving web safety overall.

The first Pwnium competition launched at this conference in 2012, out of our desire to provide extra incentive to security researchers to find flaws in Chrome. The past two years, we invited researchers to set their sights on Chromebooks — which we built to be secure from the ground-up. Pwnium, combined with our ongoing vulnerability rewards programs, have resulted in awards to researchers nearing $3 million, which has the added benefit of keeping our users safer.

As usual we’ll post a full recap after the conclusion of the conference. More details about Pwnium 4 and the prize levels are detailed on the Chromium blog: http://goo.gl/JeLCVS

*Stay tuned as several researchers attempt to crack Chrome running on Windows during ZDI’s Pwn2Own Thursday afternoon.

Post has shared content
Play Amiga games in Chrome! Check out our latest Portable Native Client technology demo: an Amiga emulator running in Chrome. Now you can play the good old Amiga games directly in the browser. Portable Native Client is supported in Chrome on Windows, Mac, Linux, and Chrome OS. Cloanto kindly provided the ROMs and disks for this demo, and also put together a Chrome Web Store app (Amiga Forever Essentials) in record time (thanks guys!) You can run the Amiga in full-screen and even connect a USB gamepad.

The emulator code is based on the Open Source Universal Amiga Emulator which is about 400k lines of C code, which were ported to Native Client. All the code is available in Open Source for anyone interested in porting their own C/C++ code to the web.

Post has shared content
Introducing the HP Chromebook 11 -- perfect #FOREVERYONE

(PS, this #Chromebook  comes in colors, charges via microUSB, and rocks an amazing IPS screen with wide viewing angles)  

Post has shared content

Post has shared content

Post has shared content
Project Windstorm

A terrain flyover demo built in JS and WebGL. Very nicely done. This sort of project makes me think it won't be long before we see some high-end CAD/CAM tooling done entirely in the browser.

As seen on reddit.com/r/gamedev.

Post has shared content
Pwnium 3 is now kicking off at CanSecWest in Vancouver, Canada, and will run until 2pm PST today. We’re excited to hear from the security community, and see what bugs they've discovered and attacks they've cooked up for Chrome OS. Pwnium competitions continue to inspire us as some of the brightest minds in security show off their creativity & engineering skills. We can't wait to see who will take home a piece of the $3.14 million "pi", and help us enhance security for Chrome and the Internet overall. 

Stay tuned - confirmations will be announced in the next few days once we have validated any entries. More details about Pwnium 3 and the prize levels are detailed on the Chromium blog: http://goo.gl/pzzlJ.

Update: deadline extended to 5pm due to researchers' request.

Update: We just closed out the competition. We did not receive any winning entries but we are evaluating some work that may qualify as partial exploits. Thanks to those who attempted, see you next time!

Post has shared content
Here we go!
Pwnium 3 is now kicking off at CanSecWest in Vancouver, Canada, and will run until 2pm PST today. We’re excited to hear from the security community, and see what bugs they've discovered and attacks they've cooked up for Chrome OS. Pwnium competitions continue to inspire us as some of the brightest minds in security show off their creativity & engineering skills. We can't wait to see who will take home a piece of the $3.14 million "pi", and help us enhance security for Chrome and the Internet overall. 

Stay tuned - confirmations will be announced in the next few days once we have validated any entries. More details about Pwnium 3 and the prize levels are detailed on the Chromium blog: http://goo.gl/pzzlJ.
Wait while more posts are being loaded