Notices tagged with crypto, page 20
-
Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 19:15:42 EST Joshua Judson Rosen @boneidol, something like that: https://en.wikipedia.org/wiki/Birthday_attack#Mathematics !crypto -
kat (boneidol)'s status on Sunday, 02-Mar-2014 19:03:32 EST kat so 8 hex digits is a 2^32 space, so 50% chance of collision is ~ 2^16, 1 in 65536 ? -
Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 16:47:52 EST Joshua Judson Rosen #git practically advocates abbreviating SHA-1 !crypto hashes to 7 hexits; #redmine habitually abbreviates them to 8; somehow this never collides with the notion that "the unlikelihood of hash-collisions is astronomical because it's SHA-1". -
Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 16:40:39 EST Joshua Judson Rosen For every person who understands all of the implications of abbreviating a !crypto #hash, I wouldn't be surprised if there are a million who can't imagine there's any problem. -
kat (boneidol)'s status on Sunday, 02-Mar-2014 16:04:07 EST kat if you truncate the checksum collisions will happen sooner. -
Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 15:18:51 EST Joshua Judson Rosen The #problem w/ #checksum as #ID: users need basic understanding of the nature of a !crypto #hash. http://status.hackerposse.com/url/5412 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 24-Feb-2014 20:34:54 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ John Adams @netik: "We don't understand strong !crypto, so let's run a new cable." DERP. http://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224 » !surveillance , via Christopher Soghoian @csoghoian -
Joshua Judson Rosen (rozzin)'s status on Friday, 21-Feb-2014 21:31:41 EST Joshua Judson Rosen I like @robmyers' post about !crypto #sigils: http://robmyers.org/2014/02/07/crypto-sigils/ !visualids -
kat (boneidol)'s status on Friday, 21-Feb-2014 13:38:52 EST kat The !crypto at telegram has been questioned. http://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest but so has whatsapp. Both seem equally shit to me -
qbi (qbi)'s status on Wednesday, 19-Feb-2014 05:46:01 EST qbi Die Audiodateien vom letzten @datenkanal hatten einen Fehler. Der ist jetzt korrigiert: http://yaturl.net/b35c #passwort !security !crypto -
kuro (kuro)'s status on Tuesday, 18-Feb-2014 03:56:11 EST kuro Die Liste ist wieder ein wenig länger: http://qttr.at/c2x #SSL !crypto -
kuro (kuro)'s status on Tuesday, 18-Feb-2014 03:35:42 EST kuro ♻ @datenkanal Wie werden Passwörter gespeichert? http://yaturl.net/b35c Podcast mit Prof.Lucks @bauhaus_uni !security !crypto !ccc #pbkdf2 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 17-Feb-2014 05:36:46 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I'll give KeepassX another try, this time the v2alpha version https://www.keepassx.org/news/2013/12/420 !crypto !security !infosec -
aqeeliz (aqeeliz)'s status on Monday, 17-Feb-2014 04:47:08 EST aqeeliz @lnxw48 @bobjonkman There is a new #KeepassX version in works (alpha currently) that is compatible with #Keepass v 2, and it's stable enough. -
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 17-Feb-2014 04:36:53 EST lnxw48 (Linux Walt) @bobjonkman ... It has been some time since I’ve used or even seen #Lastpass, so I can’t offer any insight.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 17-Feb-2014 04:35:40 EST lnxw48 (Linux Walt) @bobjonkman #Keepass v.1.x does not need Mono, and it is the version that #KeepassX, #KeepassDroid, etc are compatible with.
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 17-Feb-2014 04:09:17 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Got some interesting discussion going on the KW !Crypto mailing list: http://thread.gmane.org/gmane.comp.cryptography.kwcrypto/2 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 10-Feb-2014 15:31:12 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca !Cryptoparty for a GnuPG/PGP keysiging at @GTALUG tomorrow: http://gtalug.org/keysigning/ -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 09-Feb-2014 18:55:41 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca The only time self-signed certificates are insecure is if you don't verify the certificate signature. It is always necessary to verify a certificate's signature out-of-band. Usually that's done by a Certificate Authority (with pre-defined CA certs bundled with the browser), but certificate signatures can also be verified through other secure channels, eg. In-person, GnuPG message, … -
kat (boneidol)'s status on Saturday, 08-Feb-2014 07:37:51 EST kat Free book on !crypto http://cacr.uwaterloo.ca/hac/ "Handbook of Applied Cryptology"