-
A Few Thoughts on Cryptographic Engineering – Some …
If you already know what MetaMask does, skip this part.
Yet another dependency: this time to … -
A Few Thoughts on Cryptographic Engineering – Some …
I want to stress that this was an informal code review : I didn’t use any tooling, didn’t even …
-
A Few Thoughts on Cryptographic Engineering – Some …
NB: This post describes a very casual code review of a few cryptography functions used by MetaMask. …
-
A Few Thoughts on Cryptographic Engineering – Some …
Follow
-
A Few Thoughts on Cryptographic Engineering – Some …
— Justin Schuh (@justinschuh) March 24, 2021
(Note that the third case is kind of weird. It might be … -
A Few Thoughts on Cryptographic Engineering – Some …
Is Apple's Cloud Key Vault a crypto backdoor?
-
A Few Thoughts on Cryptographic Engineering – Some …
Does Zoom use end-to-end encryption?
-
A Few Thoughts on Cryptographic Engineering – Some …
iCloud: Who holds the key?
-
A Few Thoughts on Cryptographic Engineering – Some …
A riddle wrapped in a curve
-
A Few Thoughts on Cryptographic Engineering – Some …
This brings us to the central challenge of all content tracing proposals so far: to make tracing …
-
A Few Thoughts on Cryptographic Engineering – Some …
A few weeks back, the messaging service WhatsApp sued the Indian government over new legislation …
-
A Few Thoughts on Cryptographic Engineering – Some …
A first thing to keep in mind is that content tracing is not really a natural feature for messaging …
-
A Few Thoughts on Cryptographic Engineering – Some …
A few weeks ago the messaging service WhatsApp sued the Indian … -
A Few Thoughts on Cryptographic Engineering – Some …
Truecrypt report
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: TLS timing oracles
-
A Few Thoughts on Cryptographic Engineering – Some …
It's the end of the world as we know it (and I feel fine)
-
A Few Thoughts on Cryptographic Engineering – Some …
By Matthew Green in Apple , attacks , backdoors , malware July 20, 2021 July 20, 2021 1,417 Words 2 …
-
A Few Thoughts on Cryptographic Engineering – Some …
A perverse reaction I’ve seen from some security experts is to shrug and say “there’s no such thing …
-
A Few Thoughts on Cryptographic Engineering – Some …
A case against security nihilism
This week a group of global newspapers is running a series of … -
A Few Thoughts on Cryptographic Engineering – Some …
What's the deal with RC4?
-
A Few Thoughts on Cryptographic Engineering – Some …
Random number generation: An illustrated primer
-
A Few Thoughts on Cryptographic Engineering – Some …
A history of backdoors
-
A Few Thoughts on Cryptographic Engineering – Some …
How do you know if an RNG is working?
-
A Few Thoughts on Cryptographic Engineering – Some …
On the NSA
-
A Few Thoughts on Cryptographic Engineering – Some …
How safe is Apple's Safe Browsing?
-
A Few Thoughts on Cryptographic Engineering – Some …
On Ghost Users and Messaging Backdoors
-
A Few Thoughts on Cryptographic Engineering – Some …
On cellular encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
Secure computing for journalists
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: POODLE
-
A Few Thoughts on Cryptographic Engineering – Some …
Dear Apple: Please set iMessage free
-
A Few Thoughts on Cryptographic Engineering – Some …
Beyond public key encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
A few thoughts on CSRankings.org
-
A Few Thoughts on Cryptographic Engineering – Some …
On the Juniper backdoor
-
A Few Thoughts on Cryptographic Engineering – Some …
Zerocoin: making Bitcoin anonymous
-
A Few Thoughts on Cryptographic Engineering – Some …
Can Apple read your iMessages?
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: 64-bit ciphers in TLS
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the Week: Apple iMessage
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: DROWN
-
A Few Thoughts on Cryptographic Engineering – Some …
The Internet is broken: could we please fix it?
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the Week: Group Messaging in WhatsApp and Signal
-
A Few Thoughts on Cryptographic Engineering – Some …
Digital Fortress: I read it so you don't have to
-
A Few Thoughts on Cryptographic Engineering – Some …
Format Preserving Encryption, or, how to encrypt a credit card number with AES
-
A Few Thoughts on Cryptographic Engineering – Some …
Write a Comment…
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: searchable encryption and the ever-expanding leakage function
-
A Few Thoughts on Cryptographic Engineering – Some …
How (not) to use symmetric encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
Multiple encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
The limitations of Android N Encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
The future of Ransomware
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: Logjam
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: FREAK (or 'factoring the NSA for fun and profit')
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the Week: Triple Handshakes (3Shake)
-
A Few Thoughts on Cryptographic Engineering – Some …
Why I hate CBC-MAC
-
A Few Thoughts on Cryptographic Engineering – Some …
EARN IT is a direct attack on end-to-end encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
Useful cryptography resources
-
A Few Thoughts on Cryptographic Engineering – Some …
A very casual introduction to Fully Homomorphic Encryption
-
A Few Thoughts on Cryptographic Engineering – Some …
A note on blind signature schemes
-
A Few Thoughts on Cryptographic Engineering – Some …
Can end-to-end encrypted systems detect child sexual abuse imagery?
-
A Few Thoughts on Cryptographic Engineering – Some …
What is the Random Oracle Model and why should you care? (Part 1)
-
A Few Thoughts on Cryptographic Engineering – Some …
Ok Google: please publish your DKIM secret keys
-
A Few Thoughts on Cryptographic Engineering – Some …
DKIM allows providers to periodically “rotate”, or replace, the keys that they use to sign outgoing …
-
A Few Thoughts on Cryptographic Engineering – Some …
Attack of the week: RC4 is kind of broken in TLS
-
A Few Thoughts on Cryptographic Engineering – Some …
What's the matter with PGP?
-
A Few Thoughts on Cryptographic Engineering – Some …
So you want to use an alternative cipher... -
A Few Thoughts on Cryptographic Engineering – Some …
Why is Signal asking users to set a PIN, or “A few thoughts on Secure Value Recovery”
-
A Few Thoughts on Cryptographic Engineering – Some …
Hash-based Signatures: An illustrated Primer
-
A Few Thoughts on Cryptographic Engineering – Some …
The strange story of "Extended Random"
-
https://blog.cryptographyengineering.com
[Marking site as being monitored from now on]
-
A Few Thoughts on Cryptographic Engineering – Some …
How does Apple (privately) find your offline devices?
-
https://blog.cryptographyengineering.com/
[Marking site as being monitored from now on]