unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
In defense of crypto(currency)
Last week a group of technologists, including Bruce Schneier, sent a letter to Congress outl...
2022-6-10 01:26:57 | 阅读: 46 |
收藏
|
blog.cryptographyengineering.com
network
blockchain
centralized
rollup
ledger
An extremely casual code review of MetaMask’s crypto
NB: This post describes a very casual code review of a few cryptography functions used by Me...
2022-1-14 08:56:45 | 阅读: 69 |
收藏
|
blog.cryptographyengineering.com
metamask
library
ecdsa
drbg
noble
Thinking about “traceability”
A few weeks back, the messaging service WhatsApp sued the Indian government over...
2021-8-1 18:40:0 | 阅读: 24 |
收藏
|
blog.cryptographyengineering.com
police
encryption
originator
escrow
A case against security nihilism
This week a group of global newspapers is running a series of articles detailing...
2021-07-21 04:05:16 | 阅读: 106 |
收藏
|
blog.cryptographyengineering.com
imessage
security
precisely
network
telemetry
Thinking about “traceability”
A few weeks ago the messaging service WhatsApp sued the Indian government over n...
2021-06-08 03:40:14 | 阅读: 13 |
收藏
|
blog.cryptographyengineering.com
police
encryption
escrow
What’s in your browser (backup)?
It’s not every day that I wake up thinking about how people back up their web br...
2021-03-26 00:00:26 | 阅读: 115 |
收藏
|
blog.cryptographyengineering.com
cloud
bookmarks
encryption
justin
security
Ok Google: please publish your DKIM secret keys
The Internet is a dangerous place in the best of times. Sometimes Internet engin...
2020-11-17 00:45:19 | 阅读: 188 |
收藏
|
blog.cryptographyengineering.com
dkim
security
prove
Attack of the week: Voice calls in LTE
I haven’t written an “attack of the week” post in a while, and it’s been bumming...
2020-08-12 22:45:39 | 阅读: 126 |
收藏
|
blog.cryptographyengineering.com
lte
encryption
cellular
volte
attacker
Why is Signal asking users to set a PIN, or “A few thoughts on Secure Value Recovery”
Over the past several months, Signal has been rolling out a raft of new features to make its...
2020-07-11 04:50:33 | 阅读: 130 |
收藏
|
blog.cryptographyengineering.com
sgx
svr
enclave
backup
security
Does Zoom use end-to-end encryption?
TL;DR: It’s complicated.Yesterday Zoom (the videoconferencing company, not the d...
2020-04-03 22:27:15 | 阅读: 115 |
收藏
|
blog.cryptographyengineering.com
encryption
meeting
software
client
EARN IT is a direct attack on end-to-end encryption
Yesterday a bipartisan group of U.S. Senators introduced a new bill called the EA...
2020-03-07 01:56:21 | 阅读: 110 |
收藏
|
blog.cryptographyengineering.com
encryption
bill
earn
firms
committee
What is the random oracle model and why should you care? (Part 5)
This is part five of a series on the Random Oracle Model. See here for the previ...
2020-01-06 07:39:54 | 阅读: 124 |
收藏
|
blog.cryptographyengineering.com
attacker
rom
schemes
security
proofs
Can end-to-end encrypted systems detect child sexual abuse imagery?
A few weeks ago, U.S. Attorney General William Barr joined his counterparts from...
2019-12-09 01:52:07 | 阅读: 108 |
收藏
|
blog.cryptographyengineering.com
csai
photodna
client
network
barr
How safe is Apple’s Safe Browsing?
This morning brings new and exciting news from the land of Apple. It appears that...
2019-10-14 02:49:08 | 阅读: 124 |
收藏
|
blog.cryptographyengineering.com
malicious
database
silence
largely
encryption
Looking back at the Snowden revelations
Edward Snowden recently released his memoirs. In some parts of the Internet, this...
2019-09-25 05:12:37 | 阅读: 104 |
收藏
|
blog.cryptographyengineering.com
snowden
security
yahoo
encryption
dual
How does Apple (privately) find your offline devices?
At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”....
2019-06-06 04:29:15 | 阅读: 91 |
收藏
|
blog.cryptographyengineering.com
timmy
ruth
lassie
gps
broadcast
Attack of the week: searchable encryption and the ever-expanding leakage function
A few days ago I had the pleasure of hosting Kenny Paterson, who braved snow and historic cold (b...
2019-02-12 01:41:51 | 阅读: 107 |
收藏
|
blog.cryptographyengineering.com
database
attacker
encryption
leakage
client
Previous
2
3
4
5
6
7
8
9
Next