Trusted Third PartyMEnglish · edit-21 year agoForum rules for !crypto@infosec.pubplus-squarepinmessage-squaremessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareForum rules for !crypto@infosec.pubplus-squarepinTrusted Third PartyMEnglish · edit-21 year agomessage-square2linkfedilink
Trusted Third PartyMEnglish · 1 year agoAdditional moderator in !crypto@infosec.pubplus-squarepinmessage-squaremessage-square7linkfedilinkarrow-up19arrow-down13
arrow-up16arrow-down1message-squareAdditional moderator in !crypto@infosec.pubplus-squarepinTrusted Third PartyMEnglish · 1 year agomessage-square7linkfedilink
NomNom@feddit.ukEnglish · 3 hours agoChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChip-processing method could assist cryptography schemes to keep data secureplus-squarenews.mit.eduNomNom@feddit.ukEnglish · 3 hours agomessage-square0linkfedilink
Natanael@slrpnk.netEnglish · 17 hours agoAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgexternal-linkmessage-square2linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkAirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networksplus-squarewww.ndss-symposium.orgNatanael@slrpnk.netEnglish · 17 hours agomessage-square2linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 5 days agoCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkCryptographic Issues in Matrix’s Rust Library Vodozemac - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 5 days agomessage-square0linkfedilink
Ondore@lemmy.worldBannedEnglish · 13 days agoA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkA History of Cryptography From the Spartans to the FBIplus-squarethereader.mitpress.mit.eduOndore@lemmy.worldBannedEnglish · 13 days agomessage-square0linkfedilink
OCTADE@soc.octade.net · 22 days agoPERFECT PANGRAM HASH : Anagram Hash Functionplus-squaremessage-squaremessage-square6linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1message-squarePERFECT PANGRAM HASH : Anagram Hash Functionplus-squareOCTADE@soc.octade.net · 22 days agomessage-square6linkfedilink
litchralee@sh.itjust.worksEnglish · 1 month agoLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comexternal-linkmessage-square3linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comlitchralee@sh.itjust.worksEnglish · 1 month agomessage-square3linkfedilink
cm0002English · 1 month agoThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netcm0002English · 1 month agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogexternal-linkmessage-square2linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square2linkfedilink
NatanaelEnglish · 2 months agoImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgNatanaelEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0linkfedilink
NatanaelEnglish · 2 months agoNew round of gpg.fail bugsplus-squaregpg.failexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkNew round of gpg.fail bugsplus-squaregpg.failNatanaelEnglish · 2 months agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square1linkfedilink
NatanaelEnglish · 2 months agoAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgNatanaelEnglish · 2 months agomessage-square0linkfedilink
NatanaelEnglish · 3 months agoMPC in the Wild mpcinthewild.github.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMPC in the Wild mpcinthewild.github.ioNatanaelEnglish · 3 months agomessage-square0linkfedilink
NatanaelEnglish · 3 months agoAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgNatanaelEnglish · 3 months agomessage-square0linkfedilink
NatanaelEnglish · 3 months agoCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comNatanaelEnglish · 3 months agomessage-square0linkfedilink
NatanaelEnglish · 4 months agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comNatanaelEnglish · 4 months agomessage-square0linkfedilink
cm0002@sh.itjust.worksEnglish · 5 months agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.tocm0002@sh.itjust.worksEnglish · 5 months agomessage-square0linkfedilink