|
You are here |
www.daemonology.net | ||
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | If you've hung around this blog for a while, you probablyknow how much I like to complain. (Really, quite a lot.) You might even be familiar with one of my favorite complaints:dumb cryptostandards. More specifically:dumb standards promulgated by smart people. The people in question almost always have justifications for whatever earth-shakingly stupid decision they're about... | |
| | | | |
paragonie.com
|
|
| | | | | How to implement field-level data encryption while still allowing fast queries. | |
| | | | |
notsosecure.com
|
|
| | | | | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption. | |
| | | | |
www.zainrizvi.io
|
|
| | | My 12+ years as both the interviewer and interviewee at Google, Microsoft, and Stripe taught me one thing: Standard interviewing advice falls woefully short. Grinding interview questions isn't enough. Here's what to do. | ||