|
You are here |
jeffrey.yasskin.info | ||
| | | | |
sergioprado.blog
|
|
| | | | | This article is going to be an introduction to embedded Linux security. | |
| | | | |
tobert.github.io
|
|
| | | | | [AI summary] The author advises non-technical family members to switch from Internet Explorer to a more secure browser due to its vulnerability to zero-day exploits and malware. | |
| | | | |
cornay.co.za
|
|
| | | | | [AI summary] This article discusses recent cybersecurity developments, including Apple's expanded bug bounty program, the removal of ToTok from app stores due to potential surveillance risks, vulnerabilities in SMS-based security systems, and Microsoft's Chromium-based Edge browser and its security implications. | |
| | | | |
andrea.corbellini.name
|
|
| | | [AI summary] The text discusses the fundamentals of Elliptic Curve Cryptography (ECC), focusing on Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). It explains how ECDH enables secure key exchange and how ECDSA allows for digital signatures. The text also covers the importance of secure random number generation in ECDSA, highlighting the risks of using a predictable or static secret key, as seen in the PlayStation 3 incident. The discussion includes code examples for ECDH and ECDSA operations and the consequences of poor implementation practices. The text concludes by mentioning future articles on solving discrete logarithms and ECC compared to RSA. | ||