Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

The cryptography behind electronic passports

Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more

Weaponizing image scaling against production AI systems

Marshal madness: A brief history of Ruby deserialization exploits

Buttercup is now open-source

Exploiting zero days in abandoned hardware

Unexpected security footguns in Go's parsers

The cryptography behind passkeys

Making PyPI's test suite 81% faster

A New ASN.1 API for Python

The $1.5B Bybit Hack

Don't Recurse on Untrusted Input

Best practices for key derivation

Attestations: A new generation of signatures on PyPI

A deep dive into Linux's new mseal syscall

Fuzzing between the lines in popular barcode software

Microsoft didn't sandbox Windows Defender, so I did (2017)

Friends don’t let friends reuse nonces

"Unstripping" binaries: Restoring debugging information in GDB with Pwndbg

Why You Should Stop Using RSA: A Deep Dive Into Its Security Pitfalls

Notes on AWS Nitro Enclaves: Attack Surface

AWS Nitro Enclaves: Attack Surface

Provisioning cloud infrastructure the wrong way, but faster

“YOLO” is not a valid hash construction

Our audit of Homebrew

Quantum is unimportant to post-quantum

AES-Gem (AES with Galois Extended Mode)

EuroLLVM 2024 trip report

The good, the bad, and the weird (2018)

Themes from Real World Crypto 2024

More →