Explore >> Select a destination


You are here

www.daemonology.net
| | blog.cryptographyengineering.com
5.0 parsecs away

Travel
| | If you've hung around this blog for a while, you probablyknow how much I like to complain. (Really, quite a lot.) You might even be familiar with one of my favorite complaints:dumb cryptostandards. More specifically:dumb standards promulgated by smart people. The people in question almost always have justifications for whatever earth-shakingly stupid decision they're about...
| | paragonie.com
4.7 parsecs away

Travel
| | How to implement field-level data encryption while still allowing fast queries.
| | notsosecure.com
5.0 parsecs away

Travel
| | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption.
| | www.zainrizvi.io
12.9 parsecs away

Travel
| My 12+ years as both the interviewer and interviewee at Google, Microsoft, and Stripe taught me one thing: Standard interviewing advice falls woefully short. Grinding interview questions isn't enough. Here's what to do.