Trusted Third Party@infosec.pubMEnglish · edit-21 year agoForum rules for !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareForum rules for !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-21 year agomessage-square0linkfedilink
Trusted Third Party@infosec.pubMEnglish · 1 year agoAdditional moderator in !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAdditional moderator in !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · 1 year agomessage-square0linkfedilink
NomNom@feddit.ukEnglish · 4 days agoChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduNomNom@feddit.ukEnglish · 4 days agomessage-square0linkfedilink
Natanael@slrpnk.netEnglish · 4 days agoAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgNatanael@slrpnk.netEnglish · 4 days agomessage-square1linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 9 days agoCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 9 days agomessage-square0linkfedilink
Ondore@lemmy.worldEnglish · 16 days agoA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduOndore@lemmy.worldEnglish · 16 days agomessage-square0linkfedilink
OCTADE@soc.octade.net · 25 days agoPERFECT PANGRAM HASH : Anagram Hash Functionplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squarePERFECT PANGRAM HASH : Anagram Hash Functionplus-squareOCTADE@soc.octade.net · 25 days agomessage-square0linkfedilink
litchralee@sh.itjust.worksEnglish · 1 month agoLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comlitchralee@sh.itjust.worksEnglish · 1 month agomessage-square0linkfedilink
cm0002@infosec.pubEnglish · 1 month agoThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netcm0002@infosec.pubEnglish · 1 month agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoNew round of gpg.fail bugsgpg.failexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew round of gpg.fail bugsgpg.failNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoMPC in the Wild mpcinthewild.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMPC in the Wild mpcinthewild.github.ioNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 5 months agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comNatanael@infosec.pubEnglish · 5 months agomessage-square0linkfedilink
cm0002@sh.itjust.worksEnglish · 5 months agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.tocm0002@sh.itjust.worksEnglish · 5 months agomessage-square0linkfedilink