unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why is Signal asking users to set a PIN, or “A few thoughts on Secure Value Recovery”
Over the past several months, Signal has been rolling out a raft of new features to make its...
2020-07-11 04:50:33 | 阅读: 127 |
收藏
|
blog.cryptographyengineering.com
sgx
svr
enclave
backup
security
Does Zoom use end-to-end encryption?
TL;DR: It’s complicated.Yesterday Zoom (the videoconferencing company, not the d...
2020-04-03 22:27:15 | 阅读: 112 |
收藏
|
blog.cryptographyengineering.com
encryption
meeting
software
client
EARN IT is a direct attack on end-to-end encryption
Yesterday a bipartisan group of U.S. Senators introduced a new bill called the EA...
2020-03-07 01:56:21 | 阅读: 107 |
收藏
|
blog.cryptographyengineering.com
encryption
bill
earn
firms
committee
What is the random oracle model and why should you care? (Part 5)
This is part five of a series on the Random Oracle Model. See here for the previ...
2020-01-06 07:39:54 | 阅读: 121 |
收藏
|
blog.cryptographyengineering.com
attacker
rom
schemes
security
proofs
Can end-to-end encrypted systems detect child sexual abuse imagery?
A few weeks ago, U.S. Attorney General William Barr joined his counterparts from...
2019-12-09 01:52:07 | 阅读: 105 |
收藏
|
blog.cryptographyengineering.com
csai
photodna
client
network
barr
How safe is Apple’s Safe Browsing?
This morning brings new and exciting news from the land of Apple. It appears that...
2019-10-14 02:49:08 | 阅读: 121 |
收藏
|
blog.cryptographyengineering.com
malicious
database
silence
largely
encryption
Looking back at the Snowden revelations
Edward Snowden recently released his memoirs. In some parts of the Internet, this...
2019-09-25 05:12:37 | 阅读: 101 |
收藏
|
blog.cryptographyengineering.com
snowden
security
yahoo
encryption
dual
How does Apple (privately) find your offline devices?
At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”....
2019-06-06 04:29:15 | 阅读: 88 |
收藏
|
blog.cryptographyengineering.com
timmy
ruth
lassie
gps
broadcast
Attack of the week: searchable encryption and the ever-expanding leakage function
A few days ago I had the pleasure of hosting Kenny Paterson, who braved snow and historic cold (b...
2019-02-12 01:41:51 | 阅读: 104 |
收藏
|
blog.cryptographyengineering.com
database
attacker
encryption
leakage
client
Previous
2
3
4
5
6
7
8
9
Next