Trusted Third Party@infosec.pubMEnglish · edit-21 month agoForum rules for !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareForum rules for !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-21 month agomessage-square0fedilink
Trusted Third Party@infosec.pubMEnglish · 2 months agoAdditional moderator in !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAdditional moderator in !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · 14 days agoHow to Hold KEMsplus-squaredurumcrustulum.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Hold KEMsplus-squaredurumcrustulum.comNatanael@infosec.pubEnglish · 14 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-215 days agoApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-215 days agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 16 days agoPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 16 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 17 days agoePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 17 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-219 days agoApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-219 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-222 days agoIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govNatanael@infosec.pubEnglish · edit-222 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 25 days agoPDF: Constant-Time Code: The Pessimist Case eprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPDF: Constant-Time Code: The Pessimist Case eprint.iacr.orgNatanael@infosec.pubEnglish · 25 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 25 days agoZen and the Art of Microcode Hacking - Why to not use CMAC as a hashplus-squarebughunters.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZen and the Art of Microcode Hacking - Why to not use CMAC as a hashplus-squarebughunters.google.comNatanael@infosec.pubEnglish · 25 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 26 days agoAI Thinks It Cracked Kryptos. The Artist Behind It Says No Chanceplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAI Thinks It Cracked Kryptos. The Artist Behind It Says No Chanceplus-squarewww.wired.comNatanael@infosec.pubEnglish · 26 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-227 days agoApple launches legal challenge to UK ‘back door’ orderplus-squarewww.ft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple launches legal challenge to UK ‘back door’ orderplus-squarewww.ft.comNatanael@infosec.pubEnglish · edit-227 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 27 days agoUK quietly scrubs encryption advice from government websites | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUK quietly scrubs encryption advice from government websites | TechCrunchplus-squaretechcrunch.comNatanael@infosec.pubEnglish · 27 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 28 days agoPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 28 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoBluesky atproto sync v1.1 - efficient verification of repository Merkle tree deltasplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluesky atproto sync v1.1 - efficient verification of repository Merkle tree deltasplus-squaregithub.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoCommitments and zero-knowledge attestations over TLS 1.3: DiStefano protocolplus-squarebrave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommitments and zero-knowledge attestations over TLS 1.3: DiStefano protocolplus-squarebrave.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoUsing passkeys PRF extension for file encryptionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUsing passkeys PRF extension for file encryptionplus-squaregithub.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoApple turns off data protection in the UK rather than comply with backdoor mandateplus-squareappleinsider.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple turns off data protection in the UK rather than comply with backdoor mandateplus-squareappleinsider.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoProbe Security Without Identification - Anonymous credentialsplus-squareooni.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProbe Security Without Identification - Anonymous credentialsplus-squareooni.orgNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month agoHow to prove false statements? - 3 part series on fragility of Zero-knowledge proofsplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to prove false statements? - 3 part series on fragility of Zero-knowledge proofsplus-squareblog.cryptographyengineering.comNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink