|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
www.cossacklabs.com
|
|
| | | | | Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers. | |
| | | | |
lwn.net
|
|
| | | | | One of the core objectives of any confidential-computing implementation is to protect a guest s [...] | |
| | | | |
blog.trailofbits.com
|
|
| | | | | This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates. | |
| | | | |
katelynsills.com
|
|
| | | Glen Weyl, Puja Ohlhaver, and Vitalik Buterin argue that we should create non-transferable, initially public, soulbound tokens to represent commitments, credentials, and affiliations. This is a bad idea. Instead, we should make off-chain statements digitally signed with Ethereum private keys. | ||