You are here |
paragonie.com | ||
| | | |
soatok.blog
|
|
| | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | |
littlemaninmyhead.wordpress.com
|
|
| | | | After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen. Bad crypto is everywhere, unfortunately. The frequency of finding crypto done correctly is | |
| | | |
blog.trailofbits.com
|
|
| | | | Here at Trail of Bits we review a lot of code. From major open source projects to exciting new proprietary software, we've seen it all. But one common denominator in all of these systems is that for some inexplicable reason people still seem to think RSA is a good cryptosystem to use. Let me save [...] | |
| | | |
blog.blundellapps.co.uk
|
|
| | This post shows you how to wrap a 3rd party Gradle plugin in your own plugin, so that you can interactive with it programmatically. |