Trusted Third Party@infosec.pubMEnglish · edit-23 months agoForum rules for [email protected]plus-squarepinmessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareForum rules for [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · edit-23 months agomessage-square0fedilink
Trusted Third Party@infosec.pubMEnglish · 3 months agoAdditional moderator in [email protected]plus-squarepinmessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareAdditional moderator in [email protected]plus-squarepinTrusted Third Party@infosec.pubMEnglish · 3 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · 17 days agoThreema has deployed a new multi-device protocolplus-squarethreema.chexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkThreema has deployed a new multi-device protocolplus-squarethreema.chNatanael@infosec.pubEnglish · 17 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-224 days agoDraft: Hybrid Post-Quantum Password Authenticated Key Exchangeplus-squaredatatracker.ietf.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkDraft: Hybrid Post-Quantum Password Authenticated Key Exchangeplus-squaredatatracker.ietf.orgNatanael@infosec.pubEnglish · edit-224 days agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoApple can now legally talk about the UK backdoor demandplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkApple can now legally talk about the UK backdoor demandplus-squarewww.theverge.comNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoClubcards for the WebPKI: smaller certificate revocation tests in theory and practiceplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkClubcards for the WebPKI: smaller certificate revocation tests in theory and practiceplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month agoAdaptively-Secure Big-Key Identity-Based Encryptionplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAdaptively-Secure Big-Key Identity-Based Encryptionplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogeniesplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month ago🕵️♂️plus-squareinfosec.pubexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-link🕵️♂️plus-squareinfosec.pubNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-21 month agoFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkFBI raids home of prominent computer scientist who has gone incommunicadoplus-squarearstechnica.comNatanael@infosec.pubEnglish · edit-21 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 1 month agoBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBreaking and Fixing Content-Defined Chunkingplus-squareblog.ktruong.devNatanael@infosec.pubEnglish · 1 month agomessage-square0fedilink
Natanael@infosec.pubEnglish · 2 months agoCrypto Forum Research Group Processplus-squarewiki.ietf.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCrypto Forum Research Group Processplus-squarewiki.ietf.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkThe Practical Limitations of End-to-End Encryption - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPrepping for post-quantum: a beginner's guide to lattice cryptographyplus-squareblog.cloudflare.comNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · 2 months agoHow to Hold KEMsplus-squaredurumcrustulum.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHow to Hold KEMsplus-squaredurumcrustulum.comNatanael@infosec.pubEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkApple has revealed a Passwords app vulnerability that lasted for months - No HTTPS, enabling phishing on untrusted networksplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink
Soatok Dreamseeker@pawb.socialEnglish · 2 months agoPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPost-Quantum Cryptography Is About The Keys You Don’t Play - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.socialEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · 2 months agoePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkePrint: SNARKs for Stateful Computations on Authenticated Dataplus-squareeprint.iacr.orgNatanael@infosec.pubEnglish · 2 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkApple will soon support encrypted RCS messaging with Android usersplus-squarewww.theverge.comNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink
Natanael@infosec.pubEnglish · edit-22 months agoIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkIR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process | CSRC - HQC gets standardized for post-quantum cryptographyplus-squarecsrc.nist.govNatanael@infosec.pubEnglish · edit-22 months agomessage-square0fedilink