|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
www.benthamsgaze.org
|
|
| | | | | The MIKEY-SAKKE protocol is being promoted by the UK government as a better way to secure phone calls. The reality is that MIKEY-SAKKE is designed to offer minimal security while allowing undetectable mass surveillance, through the introduction a backdoor based around mandatory key-escrow. This weak | |
| | | | |
www.cossacklabs.com
|
|
| | | | | Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers. | |
| | | | |
blog.xot.nl
|
|
| | | | | ||
| | | | |
paragonie.com
|
|
| | | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP | ||