Explore >> Select a destination


You are here

blog.blindspotsecurity.com
| | golb.hplar.ch
4.5 parsecs away

Travel
| | [AI summary] A comprehensive guide covering the initial setup, security hardening, and configuration of a self-hosted Virtual Private Server using Ubuntu and SSH.
| | adsecurity.org
3.2 parsecs away

Travel
| | [AI summary] The article discusses the POODLE vulnerability in SSL 3.0, explaining its risks, exploitation scenarios, and mitigation strategies such as disabling SSL 3.0 and implementing TLS_FALLBACK_SCSV.
| | educatedguesswork.org
3.6 parsecs away

Travel
| | [AI summary] The text provides an in-depth analysis of encrypted DNS protocols (DoX) and their implications for security, privacy, and network management. Key points include the importance of secure channels for DNS queries, the role of DNSSEC in complementing DoX, and the challenges of implementing encrypted DNS in various network environments. The discussion covers different transport protocols like DoH and DoT, the use of DDR for resolver discovery, and the trade-offs between privacy and network control. The text also touches on the technical and policy aspects of encrypted DNS, including the need for trust in resolvers and the limitations of current implementations.
| | soatok.blog
19.8 parsecs away

Travel
| Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment...