|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
loudwhisper.me
|
|
| | | | | ||
| | | | |
mikegerwitz.com
|
|
| | | | | [AI summary] The article discusses the importance of end-to-end encryption and the potential risks of government surveillance and backdoors. It highlights the role of free software, decentralization, and federation in ensuring user privacy and control over data. The author emphasizes the need for ongoing debate and awareness about encryption, privacy, and digital rights. | |
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
neilmadden.blog
|
|
| | | There has been a lot of discussion recently around the LastPass breach, especially with regards to the number of PBKDF2 iterations applied to the master password to derive the vault encryption key. Other people have already dissected this particular breach, but I want to more generally talk about PBKDF2 iterations and security models. (I'm not... | ||