PrivacyDigest · @PrivacyDigest
570 followers · 2185 posts · Server mas.to

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s

After leaving many questions unanswered, explains in a new postmortem the series of slipups that allowed attackers to steal and abuse a valuable key.

wired.com/story/china-backed-h

#China #encryption #security #privacy #cryptographic #Microsoft #signingkey

Last updated 1 year ago

BadGuysGetDead · @badguysgetdead
119 followers · 126 posts · Server synthwave.social

Once a is successfully broken and meticulously documented, its veil of becomes irreparably compromised.

ROT13 - Out Now

/// Gur shegure n fbpvrgl qevsgf sebz gehgu gur zber vg jvyy ungr gubfr jub fcrnx vg. - Bejryy ///

badguysgetdead.bandcamp.com/tr

---
-hop

#cryptographic #cipher #security #chipwave #chiptune #chip #cyberpunk #dystopia #technology #encryption #privacy #music #cinematic #synthwave #newmusic

Last updated 1 year ago

CryptoNewsBot · @cryptonewsbot
689 followers · 37723 posts · Server schleuss.online
sbo · @sbo_slv
76 followers · 424 posts · Server mas.to

"Microsoft says hackers somehow stole a cryptographic key, perhaps from its own network, that let them forge user identities and slip past cloud defenses."
wired.com/story/microsoft-clou

#cloud #hackers #masterkey #cryptographic #Microsoft

Last updated 1 year ago

Alhaythum · @Alhaythum
42 followers · 108 posts · Server noc.social

says hackers somehow stole a key, perhaps from its own network, that let them forge user identities and slip past .

wired.com/story/microsoft-clou

#defenses #cloud #cryptographic #microsoft

Last updated 1 year ago

Toni Aittoniemi · @gimulnautti
292 followers · 3365 posts · Server mastodon.green

@Juro With - , we could still enable somewhat strong together with strong human id .

Learning from India’s Aadhar system, it is clear that a single isn’t good enough.

Perhaps something similar to blockchain, where you can mine some tokens that identify you. And you can throw away like wallets to escape tracking when you need to.

#single #use #cryptographic #hashes #anonymity #verification #token

Last updated 1 year ago

· @ediepdx
86 followers · 114 posts · Server mstdn.party

And speaking of which:
Robert Hanssen died recently. He was seen as a and expert- also seen as a expert. But as it turns out- he was the ultimate threat.
I think also one of the lessons of is understand that the experts themselves are the threat.

#cryptographic #computer #cybersecurity

Last updated 1 year ago

DevWouter · @DevWouter
77 followers · 638 posts · Server s.poweredbydev.com

I just want to send a encrypted decryption key that can’t be used to encrypt another message using the wrapKey of but I get unspecified errors all around. Guess tomorrow I will be spending time figuring out which combinations are allowed.

#subtlecrypto #browser #security #cryptographic #programming

Last updated 1 year ago

5h15h · @shish
89 followers · 550 posts · Server techhub.social

Zero Knowledge Proofs () can provide with a powerful tool for ensuring , enhancing , and improving the overall .

A is a protocol in which one party, th…lnkd.in/gtNc3Rxk bit.ly/3m8eTEH

#zkp #retailers #customerprivacy #security #customerexperience #cryptographic

Last updated 2 years ago

Justin D Kruger · @jdavidnet
39 followers · 94 posts · Server me.dm

@rasterweb
For a solution in the browser,
Create an javascript library that can take an encrypted asset and then decrypt it. Then render the image in a <canvas> tag.

I see two possible implementations:

1. system - meant to add a decryption step; it won't stop anyone who uses the same library to decrypt it. which requires willful intent to steal the image.

2. use a private system, and use auth or payment to release a key

#cryptographic #ai #imageprotection #opensource #html5 #openkey

Last updated 2 years ago

Justin D Kruger · @jdavidnet
39 followers · 94 posts · Server me.dm

@rasterweb
can work for a few reasons

1. declares an intent to protect
2. amplifies law around encrypted content
3. scrappers are usually simple, and this adds complexity at a different layer than the machine learning algorithm
4. adds compute time to the process; how much depends on how dense the method is.

But and are also useful

#cryptographic #ai #imageprotection #copyright #cryptography #metadata #microformats

Last updated 2 years ago

IL Photonics · @ILphotonics
5 followers · 42 posts · Server qoto.org

Ultimate for connected devices and systems: Combining quantum random number generator () technology and communication semiconductor technology into one security chipset. This next generation security chip provides the highest level of security for IoT and connected devices and unrivalled protection against hacking. Learn more: ilphotonics.com/new-quantum-en

#security #iot #QRNG #cryptographic

Last updated 2 years ago

doegox · @doegox
528 followers · 50 posts · Server infosec.exchange

Wanna break whitebox implementations protected by external encodings? We're releasing Dark Phoenix, an open source implementation of the 2019 DFA paper by Amadori, Michiels and Roelse
blog.quarkslab.com/dark-phoeni

#cryptographic #attack

Last updated 2 years ago

CryptoNewsBot · @cryptonewsbot
353 followers · 12555 posts · Server schleuss.online

A group of researchers have published an impressive of .

"We provide an extensive analysis of Threema , a Swiss-based application with more than 10 million users and 7000 corporate customers. As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between different sub-protocols. [...]"

securityboulevard.com/2023/01/

#swiss #securityanalysis #threema #cryptographic #encrypted #messaging #cybersecurite #ibexprotocol

Last updated 2 years ago

LE SPHINX was a pocket device, developed around 1930 by Société des Codes Télégraphiques Georges Lugagne in ( ). The device consists of 10 sliding bars with two scrambled each, and should therefore be classed as an alphabet transposition . At the time, it was advertised as a method for writing when sending ( ) .

cryptomuseum.com/crypto/lugagn

#cryptographic #paris #france #alphabets #cipher #secret #radio #telegrams #telegraphe #chiffrement #cryptographie #belobjet

Last updated 2 years ago

Tod Beardsley 🏴‍☠️ · @todb
1093 followers · 1020 posts · Server infosec.exchange

I’ve been doing some basic research on email the last couple days, and just came across this lovely blog post about assurances lasting way long than intended. It’s a pretty great “intro to DKIM” read! From 2020!

blog.cryptographyengineering.c

#security #dkim #cryptographic

Last updated 2 years ago

Sam A Lamb, A Ding-Dong · @Heterokromia
118 followers · 446 posts · Server aus.social

I would like to find a technique that would allow Alice and Bob to exchange messages.
Each message is written in a simple defined language.

I want; syntactic correctness of both messages to be essential to the decryption of each message, and that the timestamps of both be near-enough for them to be considered to have passed each other in flight.

Please help me to find code where this already exists? I am struggling.

#cryptographic

Last updated 2 years ago

Mirabeau Tech · @rss_tech
1 followers · 468 posts · Server social.technoetic.com

is a high-precision tool used for detecting application programming interface misuse. In this article explore the needs and challenges of deployable : computer.org/csdl/magazine/sp/

Originally posted by IEEE ComputerSociety / @ComputerSociety@twitter.com: twitter.com/ComputerSociety/st (Wed, 04 Jan 2023 17:31:01 GMT)
Referenced link: computer.org/csdl/magazine/sp/

#cryptoguard #cryptographic #researchers #security #research #cybersecurity #privacy #stem #tech

Last updated 2 years ago

Kristian Harstad · @KristianHarstad
357 followers · 537 posts · Server mastodon.cloud

so i saw this here

and it got me thinking about and

and how much more fun they would be if they were themed

purretty good purrivacy?

furball instead of ?

ohhhh... remember ?

#tarball #cryptocat #cryptographic #algorithms #pgp #gpg #kitty #compression #cat

Last updated 2 years ago