cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Crypto links

Show more
Japan14 519The language is not specifiedThe category is not specified
Advertising posts
270
Subscribers
No data24 hours
No data7 days
No data30 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

CertPatrol implements ''pinning'' for Firefox/Mozilla/SeaMonkey http://patrol.psyced.org/ Pale Moon's version: https://addons.palemoon.org/addon/certpatrol/
Show all...
How is SSL hopelessly broken? Let us count the ways https://www.theregister.com/2011/04/11/state_of_ssl_analysis/
Show all...
How is SSL hopelessly broken? Let us count the ways

Blunders expose huge cracks in net's trust foundation

How Spies Stole the Keys to the Encryption Castle https://theintercept.com/2015/02/19/great-sim-heist/
Show all...
How Spies Stole the Keys to the Encryption Castle

U.S. and U.K. spies stole encryption keys from the leading SIM card maker, exposing communications on millions of mobile phones.

Theoretical vs. practical cryptography in the kernel https://lwn.net/Articles/828705/
Show all...
Theoretical vs. practical cryptography in the kernel

Shortly before the release of the 5.8 kernel, a brief patch to a pseudo-random-number generator (PRNG) used by the networking stack was quietly applied to the kernel. As is the norm for such things, the changelog gave no indication that a security vulnerability had been fixed, but that turns out indeed to be the case. The resulting controversy had little to do with the original vulnerability, though, and everything to do with how cryptographic security is managed in the kernel. Figuring prominently in the discussion was the question of whether theoretical security can undermine security in the real world.

HTTP Desync Attacks: Request Smuggling Reborn | Blog - PortSwigger https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
Show all...
HTTP Desync Attacks: Request Smuggling Reborn

Show all...
thotypous

The final version of our (@dfaranha @tncardoso @pedroysb @CaioLuders @thotypous) paper about the arbitrary code execution vulnerability in the Brazilian voting machine is finally online. Available free-of-charge from Elsevier for limited time at

https://t.co/eyFyevcSsO.

Show all...
Disclosure: Key generation vulnerability found on WalletGenerator.net — potentially malicious.

If you have used a private key generated on WalletGenerator.net after August 17, 2018, move your funds immediately to a secure address.

@deepwebbrasil que tal usarem o dtube?
Show all...
:(
Show all...