Trusted Third Party@infosec.pubMEnglish · edit-21 month agoForum rules for !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareForum rules for !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-21 month agomessage-square0fedilink
Trusted Third Party@infosec.pubMEnglish · 2 months agoAdditional moderator in !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAdditional moderator in !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-23 hours ago🕵️♂️plus-squareinfosec.pubexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-link🕵️♂️plus-squareinfosec.pubNatanael@infosec.pubEnglish · edit-23 hours agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-222 hours agoFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comNatanael@infosec.pubEnglish · edit-222 hours agomessage-square1fedilink
Natanael@infosec.pubEnglish · 6 days agoBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devNatanael@infosec.pubEnglish · 6 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 7 days agoCrypto Forum Research Group Processplus-squarewiki.ietf.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCrypto Forum Research Group Processplus-squarewiki.ietf.orgNatanael@infosec.pubEnglish · 7 days agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 7 days agoThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 7 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-211 days agoPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comNatanael@infosec.pubEnglish · edit-211 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 13 days agoHow to Hold KEMsplus-squaredurumcrustulum.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow to Hold KEMsplus-squaredurumcrustulum.comNatanael@infosec.pubEnglish · 13 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-214 days agoApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-214 days agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 15 days agoPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square2fedilinkarrow-up17arrow-down13
arrow-up14arrow-down1external-linkPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 15 days agomessage-square2fedilink
Natanael@infosec.pubEnglish · 16 days agoePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 16 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-218 days agoApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-218 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-221 days agoIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govNatanael@infosec.pubEnglish · edit-221 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 24 days agoPDF: Constant-Time Code: The Pessimist Case eprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPDF: Constant-Time Code: The Pessimist Case eprint.iacr.orgNatanael@infosec.pubEnglish · 24 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 24 days agoZen and the Art of Microcode Hacking - Why to not use CMAC as a hashplus-squarebughunters.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZen and the Art of Microcode Hacking - Why to not use CMAC as a hashplus-squarebughunters.google.comNatanael@infosec.pubEnglish · 24 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 25 days agoAI Thinks It Cracked Kryptos. The Artist Behind It Says No Chanceplus-squarewww.wired.comexternal-linkmessage-square2fedilinkarrow-up131arrow-down13
arrow-up128arrow-down1external-linkAI Thinks It Cracked Kryptos. The Artist Behind It Says No Chanceplus-squarewww.wired.comNatanael@infosec.pubEnglish · 25 days agomessage-square2fedilink
Natanael@infosec.pubEnglish · edit-225 days agoApple launches legal challenge to UK ‘back door’ orderplus-squarewww.ft.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkApple launches legal challenge to UK ‘back door’ orderplus-squarewww.ft.comNatanael@infosec.pubEnglish · edit-225 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 25 days agoUK quietly scrubs encryption advice from government websites | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkUK quietly scrubs encryption advice from government websites | TechCrunchplus-squaretechcrunch.comNatanael@infosec.pubEnglish · 25 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 27 days agoPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 27 days agomessage-square0fedilink