Chris "tweedge" Partridge

Howdy. I'm Chris, I do a bunch of cybersecurity stuff. Certain people (Datto) are currently paying me as a software engineer to make their networking line of products even better than it is - both in terms of features and security. I burn that money and my free time on my own company (Machines Never Sleep, LLC) which does bleeding-edge cybersecurity research with a small team of nerds on staff.

I try to be a jack-of-all-trades in my work to develop a more holistic view of the cybersecurity landscape. This has meant hopping between a number of roles before, during, and after my college career (RIT CSEC BS '18). Thus far I've done everything from frontline IT, to information security strategy, to penetration testing, now onwards to software engineering and application security.

Ultimately, I'd like to make it easier for technical and nontechnical people to be safe on the internet. Security visbility and accessibility are main goals of mine in most of the work that I do. Below you'll find some notable examples, and maybe a blog someday when I get around to it.

Oh, and my email is here, as well as my resume, which was last updated on Aug. 12, 2019.


Presentations

"Turning Domain Data into Domain Intelligence"

Authors: Partridge, Chris. Presented: April 14, 2018 to Security B-Sides Rochester 2018 Hacker Conference.

A talk on the earlier rendition of Threatwork (then-titled 'dnstrace,' now a cooperative project under MNS LLC) and some of the interesting challenges of getting DNS data at scale, as well as fun statistics, notable misconfigurations, and some early results. You can see me sweat in front of peers for the first time here.


Publications

"From Bear to Vault: Designing a New Protocol to Extend the APT Communications Toolset"

Authors: Partridge, Chris; Hendee, Nicholas. Accepted: December 13-15, 2018 to the 2018 International Conference on Computational Science and Computational Intelligence, in the Symposium on Cyber Warfare, Cyber Defense, and Cyber Security.

Investigating what contemporary APTs do for covert communication, we prototype a novel system combining the more potent ideas from a number of adversaries, which allows for highly flexible data exfiltration and C2 ... if you're willing to write some wrappers. Our paper is available here from the American CSE proceedings portal, but if that goes down let me know and I'll reupload here, probably. I'm a new author so I don't actually know what I'm allowed to do yet.