Explore >> Select a destination


You are here

blog.asymmetric.re
| | arstechnica.com
13.8 parsecs away

Travel
| | Company says it has contacted the hacker in an attempt to recover the funds. Good luck.
| | blog.trailofbits.com
12.9 parsecs away

Travel
| | By Joop van de Pol We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret
| | malgregator.com
13.0 parsecs away

Travel
| | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out.
| | neilmadden.blog
87.9 parsecs away

Travel
| Note: this post will probably only really make sense to cryptography geeks. In "When a KEM is notenough", I described how to construct multi-recipient (public key) authenticated encryption. A naïve approach to this is vulnerable to insider forgeries: any recipient can construct a new message (to the same recipients) that appears to come from the...