You are here |
blog.asymmetric.re | ||
| | | |
arstechnica.com
|
|
| | | | Company says it has contacted the hacker in an attempt to recover the funds. Good luck. | |
| | | |
blog.trailofbits.com
|
|
| | | | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret | |
| | | |
malgregator.com
|
|
| | | | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out. | |
| | | |
neilmadden.blog
|
|
| | Note: this post will probably only really make sense to cryptography geeks. In "When a KEM is notenough", I described how to construct multi-recipient (public key) authenticated encryption. A naïve approach to this is vulnerable to insider forgeries: any recipient can construct a new message (to the same recipients) that appears to come from the... |