Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Intuiting TLS

Entropy Attacks

Chunking Attacks on File Backup Services Using Content-Deļ¬ned Chunking [pdf]

Operationalizing Macaroons

CDC attack mitigation in Plakar

Zero-Knowledge Proofs

Chunking attacks on Tarsnap (and others)

Constant-Time Code: The Pessimist Case [pdf]

The Practical Limitations of End-to-End Encryption

How To Become A Hacker: A Step-By-Step Guide

Failing upwards: the Twitter encrypted DM failure

MLS is Coming to Wire App

Can I use Secure Curves in the Web Platform?

RPMB, a secret place inside the eMMC

Enhancing CA Practices: Key Updates in Mozilla Root Store Policy, v3.0

bad apple but it's ssh keys

Coding Theory and Cryptography [pdf]

Web-based cryptography is always snake oil

Encrypt Images Without a Key Using Visual Cryptography

Reviewing the cryptography used by Signal

Ring is unmaintained

U.K. asks to backdoor iCloud Backup encryption

Accelerating The Adoption of Post-Quantum Cryptography with PHP

Hell is overconfident developers writing encryption code

Why cryptography is not based on NP-complete problems

A brief history of code signing at Mozilla

Three questions about Apple, encryption, and the U.K

Europol: Financial institutions should switch to quantum-safe cryptography

Tuta Launches Post Quantum Cryptography for Email (2024)

Best practices for key derivation

More →