Queer Lit Cats · @QLC
357 followers · 12712 posts · Server mastodon.roitsystems.ca

Pink News: Queer athlete Sha’Carri Richardson just became the fastest woman in the world thepinknews.com/2023/08/23/sha ’CarriRichardson

#lgbt #LGBTQ #trans #lesbian #2SLGBTQ #sha #sport #news #us

Last updated 1 year ago

Preston MacDougall · @ChemicalEyeGuy
399 followers · 11515 posts · Server mstdn.science

’CarriRichardson has outrun the absurdity of the Committee prior to the in 2020 and has proven that she is the fastest woman in the world 🌎!

nbcnews.com/news/sports/americ

#sha #usa #olympicgames #tokyogames

Last updated 1 year ago

Simon Racz · @simonracz
42 followers · 186 posts · Server discuss.systems

CLI Client for a Cryptographic Web Application

This is a long one. I write a new client for a real world E2E encrypted file transfer solution.

-256

youtu.be/GQBbgmbR1Ck

#aes #cryptography #hkdf #sha #hash #hmac

Last updated 1 year ago

💚Greenwyrm💚 · @DanisShippies
120 followers · 475 posts · Server baraag.net

Chilli and Sha at the beach!!

(There's an original version I never posted but I am NOT ready to get cancelled over a flag bikini LOL)

#sha #thewaltenfiles #chilli #bluey #beach #milfs #suggestive #bikinis #furry

Last updated 1 year ago

GOOVER · @goover
16 followers · 443 posts · Server mstdn.jp

今日は相模原の米軍住宅に行ってきました
朝からちょっと調子悪かったので、アメリカ人に起きてる?大丈夫?って言われてしまいました
家のクーラー壊れたから熱中症ぽい感じになっていたよいです
相模原は米軍基地としては小さい施設ですがいろんなものが入っています
タコベルもあるんですよ
#米軍基地
#英会話スクール

goover.co.jp

#sha

Last updated 1 year ago

milliways · @milliways
671 followers · 75 posts · Server milliways.social

Still Hacking Anyway - 2017

#sha

Last updated 1 year ago

MetalSnake · @metalsnake
16 followers · 161 posts · Server social.anoxinon.de

I just ran on a DS1821+ and on a Studio M1 Max on a bunch of ~7gb files.
The files are on HDDs Raid 6 on the Synology and on the internal SSD on the Mac.

The Synology took 7m 15s the Mac took 11m 5s.

I would have expected the Mac to be much faster.

What the heck is going on here?

#sha256sum #synology #mac #benchmark #sha #checksum

Last updated 1 year ago

jesterchen42 · @jesterchen
328 followers · 969 posts · Server social.tchncs.de

Could you give me some advice (and sources!) towards ? Is (seeded ) in any way still a valid scheme in 2023? I see only "SHA-1" and then I'm quitting.

Is there any way to somehow see SSHA as acceptable nowadays or should I enforce use of crypt/sha-512 "$6$%.16s"?

#sha #ssha #openldap

Last updated 1 year ago

Queer Lit Cats · @QLC
190 followers · 8719 posts · Server mastodon.roitsystems.ca
TiTiNoNero dice cose :idle: · @titinoNero
86 followers · 91 posts · Server mastodon.uno

Molti publisher di software offrono la possibilità di verificare l'integrità dei pacchetti software scaricati dai loro siti web. Questa è anche una comune pratica di adottata nell'Industria per garantire che un file non sia stato alterato dopo la sua emissione.

non offre nativamente il controllo degli -256 per i file scaricati. Vediamo dunque come implementarlo automatizzando l'interazione il più possibile.

77nn.it/2023/05/01/Verifica-ha

#foss #dataintegrity #windows #hash #sha

Last updated 1 year ago

DJ Papi · @djpapi
18 followers · 27 posts · Server rap.social

The new season of is live! Just heard the episode about -Rock and I can't believe it's taken 50 years to hear these conversations about gender in . But then again this feels right on time. Looking forward to listening the rest of the season.

npr.org/podcasts/510357/louder

#louderthanariot #sha #hiphop

Last updated 1 year ago

Tobias · @tobiasc
51 followers · 296 posts · Server nrw.social

Wozu dienen eigentlich die /n beim Download von Dateien? Wenn ich die Prüfdatei von der selben Quelle beziehe wie die Datei kann ist das doch nicht zielführend, kann ja genau so kompromitiert sein. Richtet sich das nur an über Mirrors oder Torrent bezogene Dateien?

#prufsumme #ISO #sha #linux

Last updated 1 year ago

Vengeur Masqué · @vm666
198 followers · 1478 posts · Server mastodon.hofud.com
Vengeur Masqué · @vm666
198 followers · 1478 posts · Server mastodon.hofud.com
Vengeur Masqué · @vm666
198 followers · 1478 posts · Server mastodon.hofud.com


in -3 and , as well as some versions of 😟
(on 64 bits systems only if I understood correctly)
eprint.iacr.org/2023/331

#infosec #buffer_overflow #sha #shake #keccak #xkcp #eddsa

Last updated 1 year ago

Vengeur Masqué · @vm666
198 followers · 1478 posts · Server mastodon.hofud.com


in -3 and , as well as some versions of 😟
(on 64 bits systems only if I understood correctly)
eprint.iacr.org/2023/331

#infosec #buffer_overflow #sha #keccak #xkcp #eddsa

Last updated 1 year ago

tkteo · @tkteo
39 followers · 1219 posts · Server infosec.exchange

Paper 2023/331 A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm

Abstract

This paper describes a vulnerability in several implementations of the Secure Hash Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been present since the final-round update of Keccak was submitted to the National Institute of Standards and Technology (NIST) SHA-3 hash function competition in January 2011, and is present in the eXtended Keccak Code Package (XKCP) of the Keccak team. It affects all software projects that have integrated this code, such as the scripting languages Python and PHP Hypertext Preprocessor (PHP). The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (without any restrictions on values to be XORed and even far beyond the location of the original buffer), thereby making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective. First, we provide Python and PHP scripts that cause segmentation faults when vulnerable versions of the interpreters are used. Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. The vulnerability applies to all hash value sizes, and all 64-bit Windows, Linux, and macOS operating systems, and may also impact cryptographic algorithms that require SHA-3 or its variants, such as the Edwards-curve Digital Signature Algorithm (EdDSA) when the Edwards448 curve is used. We introduce the Init-Update-Final Test (IUFT) to detect this vulnerability in implementations.

eprint.iacr.org/2023/331

#cryptography #encryption #sha #sha3 #cybersecurity #hash #hashing #algorithm #algorithms #nist #nistcybersecurityframework

Last updated 1 year ago

Jens · @schegge42
31 followers · 312 posts · Server nrw.social

Sichere Ahnen Prüfung mit Cryptographic Hashes

Bei der Erstellung eigner Stammbäume gibt es immer wieder den Wunsch in anderen Datenbeständen nach Familienangehörigen zu suchen. Dabei ergibt sich jedoch das Problem, dann personenbezogene Daten an andere versendet werden müssen.

schegge.de/2023/03/sichere-ahn

-Pattern -256

#algorithmen #bestpractices #Design #java #web #sha #sha3

Last updated 1 year ago

Jens · @schegge42
31 followers · 311 posts · Server nrw.social

Sichere Ahnen Prüfung mit Cryptographic Hashes

Bei der Erstellung eigner Stammbäume gibt es immer wieder den Wunsch in anderen Datenbeständen nach Familienangehörigen zu suchen. Dabei ergibt sich jedoch das Problem, dann personenbezogene Daten an andere versendet werden müssen.

schegge.de/2023/03/sichere-ahn

-Pattern -256

#algorithmen #bestpractices #Design #java #web #sha #sha3

Last updated 1 year ago

Geert Aarts · @geertaarts
123 followers · 54 posts · Server mastodon.green

conservancy.umn.edu/handle/112

Just Released: 2nd edition of our free textbook: Species-Habitat Associations: Spatial data, predictive models, and ecological insights.

#sha #SDM #niche #spatialecology #pointprocesses #rstats #ecology #spatial #SpeciesDistributionModels

Last updated 2 years ago