Trusted Third Party@infosec.pubMEnglish · edit-22 months agoForum rules for !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareForum rules for !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-22 months agomessage-square0fedilink
Trusted Third Party@infosec.pubMEnglish · 2 months agoAdditional moderator in !crypto@infosec.pubplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAdditional moderator in !crypto@infosec.pubplus-squarepinTrusted Third Party@infosec.pubMEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · 5 days agoThreema has deployed a new multi-device protocolplus-squarethreema.chexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThreema has deployed a new multi-device protocolplus-squarethreema.chNatanael@infosec.pubEnglish · 5 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-213 days agoDraft: Hybrid Post-Quantum Password Authenticated Key Exchangeplus-squaredatatracker.ietf.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDraft: Hybrid Post-Quantum Password Authenticated Key Exchangeplus-squaredatatracker.ietf.orgNatanael@infosec.pubEnglish · edit-213 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 19 days agoApple can now legally talk about the UK backdoor demandplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkApple can now legally talk about the UK backdoor demandplus-squarewww.theverge.comNatanael@infosec.pubEnglish · 19 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 19 days agoClubcards for the WebPKI: smaller certificate revocation tests in theory and practiceplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkClubcards for the WebPKI: smaller certificate revocation tests in theory and practiceplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 19 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-226 days agoAdaptively-Secure Big-Key Identity-Based Encryptionplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAdaptively-Secure Big-Key Identity-Based Encryptionplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · edit-226 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 27 days agoPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 27 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-227 days ago🕵️♂️plus-squareinfosec.pubexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-link🕵️♂️plus-squareinfosec.pubNatanael@infosec.pubEnglish · edit-227 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-228 days agoFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comNatanael@infosec.pubEnglish · edit-228 days agomessage-square1fedilink
Natanael@infosec.pubEnglish · 1 month agoBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoCrypto Forum Research Group Processplus-squarewiki.ietf.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCrypto Forum Research Group Processplus-squarewiki.ietf.orgNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 1 month agoThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month agoPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoHow to Hold KEMsplus-squaredurumcrustulum.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow to Hold KEMsplus-squaredurumcrustulum.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month agoApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 1 month agoPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square2fedilinkarrow-up17arrow-down13
arrow-up14arrow-down1external-linkPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 1 month agomessage-square2fedilink
Natanael@infosec.pubEnglish · 1 month agoePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink