Trusted Third Party@infosec.pubMEnglish · edit-21 year agoForum rules for [email protected]plus-squarepinmessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareForum rules for [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-21 year agomessage-square0linkfedilink
Trusted Third Party@infosec.pubMEnglish · 1 year agoAdditional moderator in [email protected]plus-squarepinmessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAdditional moderator in [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · 1 year agomessage-square0linkfedilink
OCTADE@soc.octade.net · edit-25 days ago@[email protected] [email protected] @infosec.pub [email protected]plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square@[email protected] [email protected] @infosec.pub [email protected]plus-squareOCTADE@soc.octade.net · edit-25 days agomessage-square0linkfedilink
NomNom@feddit.ukEnglish · 12 days agoChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduNomNom@feddit.ukEnglish · 12 days agomessage-square0linkfedilink
Natanael@slrpnk.netEnglish · 12 days agoAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgNatanael@slrpnk.netEnglish · 12 days agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 17 days agoCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 17 days agomessage-square0linkfedilink
Ondore@lemmy.worldEnglish · 24 days agoA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduOndore@lemmy.worldEnglish · 24 days agomessage-square0linkfedilink
OCTADE@soc.octade.net · 1 month agoPERFECT PANGRAM HASH : Anagram Hash Functionplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squarePERFECT PANGRAM HASH : Anagram Hash Functionplus-squareOCTADE@soc.octade.net · 1 month agomessage-square0linkfedilink
litchralee@sh.itjust.worksEnglish · 2 months agoLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comlitchralee@sh.itjust.worksEnglish · 2 months agomessage-square0linkfedilink
cm0002@infosec.pubEnglish · 2 months agoThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netcm0002@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoNew round of gpg.fail bugsplus-squaregpg.failexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew round of gpg.fail bugsplus-squaregpg.failNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 3 months agoAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoMPC in the Wild mpcinthewild.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMPC in the Wild mpcinthewild.github.ioNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 3 months agoCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comNatanael@infosec.pubEnglish · 3 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 5 months agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comNatanael@infosec.pubEnglish · 5 months agomessage-square0linkfedilink