Hacker News
- Towards End-to-End Encryption for Direct Messages in the Fediverse https://soatok.blog/2022/11/22/towards-end-to-end-encryption-for-direct-messages-in-the-fediverse/ 2 comments
Lobsters
- Towards End-to-End Encryption for Direct Messages in the Fediverse https://soatok.blog/2022/11/22/towards-end-to-end-encryption-for-direct-messages-in-the-fediverse/ 39 comments cryptography , security
- Towards End-to-End Encryption for Direct Messages in the Fediverse https://soatok.blog/2022/11/22/towards-end-to-end-encryption-for-direct-messages-in-the-fediverse/ 18 comments privacy
- Towards End-to-End Encryption for Direct Messages in the Fediverse https://soatok.blog/2022/11/22/towards-end-to-end-encryption-for-direct-messages-in-the-fediverse/ 11 comments crypto
Linking pages
- Key Transparency and the Right to be Forgotten - Dhole Moments https://soatok.blog/2024/11/21/key-transparency-and-the-right-to-be-forgotten/ 57 comments
- Security Issues in Matrix’s Olm Library - Dhole Moments https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/ 41 comments
- Exodus | Opinionated Guides https://opguides.info/posts/exodus/ 0 comments
- Federated Key Transparency Project Update - Dhole Moments https://soatok.blog/2024/08/21/federated-key-transparency-project-update/ 0 comments
Linked pages
- Threema: Three Strikes, You’re Out - Dhole Moments https://soatok.blog/2021/11/05/threema-three-strikes-youre-out/ 220 comments
- Going Bark: A Furry’s Guide to End-to-End Encryption - Dhole Moments https://soatok.blog/2020/11/14/going-bark-a-furrys-guide-to-end-to-end-encryption/ 185 comments
- Understanding HKDF - Dhole Moments https://soatok.blog/2021/11/17/understanding-hkdf/ 93 comments
- Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022 - Dhole Moments https://soatok.blog/2022/05/19/guidance-for-choosing-an-elliptic-curve-signature-algorithm-in-2022/ 76 comments
- Nebuchadnezzar | Practically-exploitable Cryptographic Vulnerabilities in Matrix https://nebuchadnezzar-megolm.github.io/ 75 comments
- Canonicalization Attacks Against MACs and Signatures - Dhole Moments https://soatok.blog/2021/07/30/canonicalization-attacks-against-macs-and-signatures/ 61 comments
- GitHub - teslamotors/liblithium: A lightweight and portable cryptography library. https://github.com/teslamotors/liblithium 48 comments
- Moxie Marlinspike >> Blog >> The Cryptographic Doom Principle https://moxie.org/2011/12/13/the-cryptographic-doom-principle.html 11 comments
- Fast Message Franking: From Invisible Salamanders to Encryptment https://eprint.iacr.org/2019/016 6 comments
- entropy - XKCD #936: Short complex password, or long dictionary passphrase? - Information Security Stack Exchange https://security.stackexchange.com/a/6116 4 comments
- Lea Kissner on Twitter: "A buddy who's interested in end-to-end encryption (E2EE) but hasn't done one of these projects in the very messy place which is the real world happened to ask me this morning about pitfalls which might not be obvious. So here's a partial list in the hopes that it's helpful. 🧵" / Twitter https://twitter.com/leakissner/status/1592937764684980224 2 comments
- Critical vulnerabilities in JSON Web Token libraries https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/ 1 comment
- The foundations of end-to-end encryption: Domain separation (with code example in Rust) https://kerkour.com/end-to-end-encryption-domain-separation-cryptography/ 0 comments
- Lucid Multi-Key Deputies Require Commitment – Semantically Secure https://scottarc.blog/2022/10/17/lucid-multi-key-deputies-require-commitment/ 0 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.
Related searches:
Search whole site: site:soatok.blog
Search title: Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
See how to search.