Explore >> Select a destination


You are here

outflux.net
| | blog.rfox.eu
20.2 parsecs away

Travel
| | Patterns and structures of current operating systems and some thoughts about how that could be improved, with lessons learnt from Self, Smalltalk and other &quote;structured&quote; systems.
| | blog.lexfo.fr
16.3 parsecs away

Travel
| | The first article covers an in-depth CVE/bug analysis, designs an attack scenario and starts implementing a PoC in ring-0 with SystemTap. The core concept section focuses on file/socket related data structures, netlink and refcounters.
| | www.trailofbits.com
17.8 parsecs away

Travel
| | [AI summary] The text discusses various cryptographic constructions and their vulnerabilities. It highlights the importance of using established cryptographic primitives like HMAC, KMAC, and modern password-based key derivation functions (PBKDFs) instead of ad-hoc solutions. Key points include the risks of ambiguous encoding in MAC and hash functions, length-extension attacks, and the need for memory-hard KDFs to resist brute-force attacks. The text also touches on the broader implications of cryptographic design, emphasizing the necessity of rigorous standards and avoiding simplistic approaches that can lead to significant security weaknesses.
| | rigtorp.se
42.2 parsecs away

Travel
| This is a short guide describing the latency implications of the virtual memory abstraction.