Trusted Third Party@infosec.pubMEnglish · edit-21 year agoForum rules for [email protected]plus-squarepinmessage-squaremessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareForum rules for [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-21 year agomessage-square2linkfedilink
Trusted Third Party@infosec.pubMEnglish · 1 year agoAdditional moderator in [email protected]plus-squarepinmessage-squaremessage-square7linkfedilinkarrow-up19arrow-down13
arrow-up16arrow-down1message-squareAdditional moderator in [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · 1 year agomessage-square7linkfedilink
OCTADE@soc.octade.net · 1 day agoPERFECT PANGRAM HASH : Anagram Hash Functionplus-squaremessage-squaremessage-square2linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1message-squarePERFECT PANGRAM HASH : Anagram Hash Functionplus-squareOCTADE@soc.octade.net · 1 day agomessage-square2linkfedilink
litchralee@sh.itjust.worksEnglish · 18 days agoLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comexternal-linkmessage-square3linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLet’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitivesplus-squaresaltysquirrel1759d62f4c-tcyiv.wordpress.comlitchralee@sh.itjust.worksEnglish · 18 days agomessage-square3linkfedilink
cm0002@infosec.pubEnglish · 18 days agoThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkThe State of OpenSSL for pyca/cryptographyplus-squarelwn.netcm0002@infosec.pubEnglish · 18 days agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 26 days agoPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogexternal-linkmessage-square2linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPractical Collision Attack Against Long Key IDs in PGPplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 26 days agomessage-square2linkfedilink
Natanael@infosec.pubEnglish · 27 days agoImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkImpersonating Quantum Secrets over Classical Channelsplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 27 days agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 29 days agoEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkEverything You Need to Know About Email Encryption in 2026plus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 29 days agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 1 month agoNew round of gpg.fail bugsplus-squaregpg.failexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNew round of gpg.fail bugsplus-squaregpg.failNatanael@infosec.pubEnglish · 1 month agomessage-square0linkfedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnnouncing Key Transparency for the Fediverse - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square1linkfedilink
Natanael@infosec.pubEnglish · 2 months agoAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAsk Your Cryptographer if Context-Committing AEAD Is Right for Youplus-squareiacr.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoMPC in the Wild mpcinthewild.github.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMPC in the Wild mpcinthewild.github.ioNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkAfter Years of Controversy, the EU’s Chat Control Nears Its Final Hurdle: What to Knowplus-squarewww.eff.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 2 months agoCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCryptology Group Held an Election, but Can’t Decrypt the Results (Gift Article)plus-squarewww.nytimes.comNatanael@infosec.pubEnglish · 2 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 4 months agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comNatanael@infosec.pubEnglish · 4 months agomessage-square0linkfedilink
cm0002@sh.itjust.worksEnglish · 4 months agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?plus-squareblog.cr.yp.tocm0002@sh.itjust.worksEnglish · 4 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 4 months agoCryptPad Blog - Europe's future is at stake: Open letter against Chat Controlplus-squareblog.cryptpad.orgexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCryptPad Blog - Europe's future is at stake: Open letter against Chat Controlplus-squareblog.cryptpad.orgNatanael@infosec.pubEnglish · 4 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 4 months agoHedged Dilithium Dis-Faultingplus-squareeshard.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHedged Dilithium Dis-Faultingplus-squareeshard.comNatanael@infosec.pubEnglish · 4 months agomessage-square0linkfedilink
Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.comEnglish · 4 months agoSignal Protocol and Post-Quantum Ratchetsplus-squaresignal.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSignal Protocol and Post-Quantum Ratchetsplus-squaresignal.orgAndromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.comEnglish · 4 months agomessage-square0linkfedilink
Natanael@infosec.pubEnglish · 5 months agoOpen letter against the proposed EU legislation Chat Control, from over 500 researchersplus-squarecsa-scientist-open-letter.orgexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkOpen letter against the proposed EU legislation Chat Control, from over 500 researchersplus-squarecsa-scientist-open-letter.orgNatanael@infosec.pubEnglish · 5 months agomessage-square0linkfedilink