Notices tagged with crypto
-
I just read
S.S. Al-Riyami and K.G. Paterson, Certificateless public key cryptography 2003
https://web.archive.org/web/20181222114112/http://eprint.iacr.org/2003/126.pdf
The math is not too complicated, but I find the notation a pain.
Also, all the fuss over the group operation being additive in G_1 and multiplicative in G_2 seems such a faff.
#math #crypto
-
ALSO, I'm reminded that there was this other #HKP #keyserver released a few years ago, compatible w/ #SKS but written in #Golang, which might relieve some of "zomg unmaintainable!" problems with the SKS servers: https://hockeypuck.github.io/ !crypto #PGP #GnuPG
-
Also it seems kind of inappropriate to be using "poisoning" as its being used here: https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f !crypto
-
@boneidol The signature-flooding attack on the SKS #keyservers (and DoS of their users) is bad but doesn't actually sound like any kind of #apocalypse, and has basically nothing to do with the #WoT; signature-chains maybe, but that's something else entirely. !crypto
-
With the sudden realization that #Enigmail has been able to decrypt #email permanently upon reception for the last 3 years, I'm excited about using #PGP #crypto w/ #Enigmail again! But, oh, just in time for me #Mozilla broke Enigmail in #Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909000 #ugh
-
Holy crap! "Since version 1.8, Enigmail can decrypt mails permanently." https://enigmail.net/index.php/en/faq-en?view=topic&id=15 #enigmail #pgp #crypto
-
I actually do really want to secure my data in transit; but it's frustrating to the point of deterrence that the tools for secure transit seem to frequently create more problems for data at rest. #Enigmail maintained similar barriers to PGP use for years, for example: http://status.hackerposse.com/conversation/44450#notice-52884 #crypto
-
♻ @rtsn@gnusocial.de: A PGP keypair consists of multiple keys, the certificate, encrypting keys, signing keys etc. I personally have setup where I have an offline masterkey (for signing keys and creating new subkeys) and then I have signing subkeys on my everyday devices. Should my everyday computer be compromised in any way, I can just go home and revoke the subkey, create a ne…
-
TLS fingerprints:
https://tlsfingerprint.io/top/
!security !crypto
-
How To Create an Encrypted Drive in a File Container http://bob.jonkman.ca/blogs/2017/10/09/how-to-create-an-encrypted-drive-in-a-file-container/ !crypto
-
Wie man #scrypt richtig anwendet, hat @FiloSottile getestet:
https://blog.filippo.io/the-scrypt-parameters/
!crypto !verschluesselung
-
ISO Rejects NSA Encryption Algorithms - Schneier on Security - https://www.schneier.com/blog/archives/2017/09/iso_rejects_nsa.html !crypto !privacy
-
Almost a good thing: "NSA has now agreed to drop all but [the techniques] *least* likely to be vulnerable to hacks" http://www.reuters.com/article/us-cyber-standards-insight/distrustful-u-s-allies-force-spy-agency-to-back-down-in-encryption-fight-idUSKCN1BW0GV !Crypto via @HNTooter@mastodon.social
-
Just published our master's thesis student's paper on Post-Quantum Cryptography for digital signatures in PKI !crypto http://qttr.at/1y73
-
Porque en p4g decimos malas palabras y otras guarangadas, hemos tenido que crear una sala #xmpp con cifrado #openpgp ¡Ahora estamos más tranquilos! Creo. !xmppes !privacidad !crypto !p4g
-
#OpenSSL nutzt ab einen neuen Zufallszahlengenerator:
https://www.openssl.org/blog/blog/2017/08/12/random/
!crypto !verschluesselung
-
Is your encrypted USB drive secure? – Forscher greifen vermeintlich sichere sticks an https://quitter.se/url/4282847
!security !crypto
-
Loup Vaillant hat es getan. Selbst !crypto code geschrieben. Seine Erfahrungen
http://loup-vaillant.fr/articles/implemented-my-own-crypto
-
Con los muchachos de la pandilla cuatro gatos nos hemos puesto a probar esta excelente aplicación de mensajería cifrada descentralizada con cifrado e2e https://smokeappope.sourceforge.io/ Es una joyita !privacidad !bobinas !p4g !crypto
-
A brief history of GnuPG: vital to online security but free and underfunded:
http://theconversation.com/a-brief-history-of-gnupg-vital-to-online-security-but-free-and-underfunded-80800
!crypto