Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | www.cossacklabs.com
3.2 parsecs away

Travel
| | Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers.
| | lwn.net
7.7 parsecs away

Travel
| | One of the core objectives of any confidential-computing implementation is to protect a guest s [...]
| | blog.trailofbits.com
3.9 parsecs away

Travel
| | This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates.
| | katelynsills.com
94.1 parsecs away

Travel
| Glen Weyl, Puja Ohlhaver, and Vitalik Buterin argue that we should create non-transferable, initially public, soulbound tokens to represent commitments, credentials, and affiliations. This is a bad idea. Instead, we should make off-chain statements digitally signed with Ethereum private keys.