#Cryptographic

Sikorski Arkadiusz vel ArakuSsikorski@ioc.exchange
2025-11-25

Distributed.net is working on RC5-72 (breaking RC5 with a 72-bit key).

Cryptographic attack.
Long... long...
stats.distributed.net/particip
#Cryptographic #attacks #security #rc5 #rc572 #crypto #distributed #dnetc

N-gated Hacker Newsngate
2025-11-16

๐ŸŽ‰ Wow, who knew needed another layer of complexity? Enter , where you can now enjoy the thrill of pulling hash-pinned packages and living in fear of , all while pretending your deployments are suddenly faster. ๐Ÿš€ Because nothing says "cutting-edge" like making your life an even bigger nightmare. ๐Ÿ˜œ
flox.dev/kubernetes/

โ˜ฎ โ™ฅ โ™ฌ ๐Ÿง‘โ€๐Ÿ’ปpeterrenshaw@ioc.exchange
2025-09-03

How long till encryption busting is applied to the Aus implementation of the OSA?

โ€œAside from #AgeVerification, the most controversial aspect of the act is power it gives to #Ofcom to require #tech firms to install โ€œaccredited technologyโ€ to ^monitor encrypted communications^ for #illegalContent.

In essence, this would mean tech companies using #software to bulk-scan #messages on #encrypted services (such as #WhatsApp, #Signal and #Element) before their #encryption, otherwise known as client-side scanning (#CSS).

Implementing such measures would undermine the #security and #privacy of encrypted services by scanning the content of every message and #email to check whether they contain illegal content.

This has been repeatedly justified by the #government as necessary for stopping the creation and spread of child sexual abuse materials (#CSAM), as well as violent #crime and #terrorism.

#Cryptographic experts, however, have repeatedly argued that measures mandating tech firms to proactively detect harmful content through client-side scanning should be abandoned.โ€

It just keeps getting better, doesnโ€™t it? ๐Ÿฟ

#Straya / #secrecy / #information <computerweekly.com/feature/The>

Zach ๐Ÿ‡ฎ๐Ÿ‡ฑ ๐Ÿ‡บ๐Ÿ‡ธdemiguru@fosstodon.org
2025-08-15

@berniethewordsmith The main way to respect #privacy is to avoid #scanning #private, end-to-end encrypted content at scale. Focus on:
- #Voluntary and opt-in tools for local scanning.

- #Serverside checks only for data thatโ€™s already leaving the private domain.

- #Cryptographic #protocols that verify matches without exposing the rest of usersโ€™ data.

N-gated Hacker Newsngate
2025-07-08

๐Ÿš€โœจ Behold, a *groundbreaking* innovation: a "fast" for Go! Because clearly, generating wasn't enough without . ๐Ÿ˜… But hey, who needs actual when you can fiddle with GUIDs and call it a day! ๐Ÿ”’๐ŸŽ‰
github.com/sdrapkin/guid

Dyne.org foundationdyne@toot.community
2025-03-13

๐——๐˜†๐—ป๐—ฒ ๐Ÿ’œ ๐—ฆ๐—ฝ๐—ต๐—ถ๐—ป๐˜…

SPHINX is a simple, elegant, & unconditionally secure zero-trust password manager. It stores a random numbers, not your password, ensuring the server knows nothing. Free, offline-bruteforce resistant, self-hostable, and extensible.

Built on a well-studied #cryptographic algorithm by respected experts, SPHINX brings password management into the 21st century.

๐—œ๐—ป ๐—ณ๐—ฎ๐—ฐ๐˜ ๐˜„๐—ฒ ๐—น๐—ผ๐˜ƒ๐—ฒ ๐—ถ๐˜ ๐˜€๐—ผ ๐—บ๐˜‚๐—ฐ๐—ต ๐˜๐—ต๐—ฎ๐˜ ๐˜„๐—ฒ ๐—ฎ๐—ฟ๐—ฒ ๐—ต๐—ผ๐˜€๐˜๐—ถ๐—ป๐—ด ๐—ฎ ๐—ฝ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ!

๐Ÿ”— sphinx.pm/servers.html

#PasswordSecurity

A sphinx looking like misskitty. It is pink on a grey background. Over her the text: "Next-Generation password Storage, Sphinx. For more info visit sphinx.pm" The dyne logotype is visible in the lower right corner
Dyne.org foundationdyne@toot.community
2025-03-06

But cryptography is hard. Until recently, institutions and individuals who need to run #cryptographic operations had to rely on specialists to review the code that their applications is running. Cryptography can protect our privacy and authenticate sources of important information. For #cryptography to work for the people, the people need to understand it.

2025-02-09

The #chatmail #fosdem talk from @compl4xx is public. It goes into topics such as

- why chatmail servers?
- how to setup a server with your child
- (avoiding) spam filtering
- metadata and guaranteed end to end encryption in #deltachat
- #cryptographic #interoperability for email message routing

Thanks to attendees for the great energy even if was the last talk on the day and also for questions and conversations afterwards!

ftp.fau.de/fosdem/2025/k4601/f

found

taking walks in the landscapes of my childhood nothing is like it was - the forests are gone - the trees are dead thanks to the bark beetle and too dry summer days. the character of the landscape, originally shaped by dark humid green has turned into a desert with sun-bleached stumps like dry bones

#font #cipher #cryptographic #enigma #typeface #barkbeetle #moki #mioke #woodensticks #decipher #secrets #secretlifeoftrees #beetlefont #insecthole #message #climatechange
found

taking walks in the landscapes of my childhood nothing is like it was - the forests are gone - the trees are dead thanks to the bark beetle and too dry summer days. the character of the landscape, originally shaped by dark humid green has turned into a desert with sun-bleached stumps like dry bones

#font #cipher #cryptographic #enigma #typeface #barkbeetle #moki #mioke #woodensticks #decipher #secrets #secretlifeoftrees #beetlefont #insecthole #message #climatechange
cryptrz :opensource:cryptrz@infosec.exchange
2025-01-27

Key Management Lifecycle
Best Practices

Failure to securely manage #cryptographic keys may lead to security breaches and data loss. There are also various regulatory requirements and guidelines related to key management, such as #PCI #DSS, #GDPR, #HIPAA, and #NIST which ensure the confidentiality, integrity, and availability of sensitive data and systems that use cryptographic keys.

This document provided by Cloud Security Alliance serves as guidance for enterprise technologists and service providers to effectively and securely manage cryptographic keys throughout the key management lifecycle.

s3.amazonaws.com/content-produ

h o ส l e t thomlett@mamot.fr
2024-10-22

โ†’ Chinese researchers break #RSA encryption with a #quantum computer
csoonline.com/article/3562701/

โ€œIn a potentially alarming development for global #cybersecurity, Chinese researchers have unveiled a method [โ€ฆ] to #crack classic #encryption, potentially accelerating the timeline for when quantum computers could pose a real #threat to widely used #cryptographic systemsโ€

โ€œdata being encrypted today could be at risk if adversaries are stealing it with the intention of decrypting it in the futureโ€

Benjamin Carr, Ph.D. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐ŸงฌBenjaminHCCarr@hachyderm.io
2024-10-15

Scientists in #China use #quantum computers to crack military-grade #encryption โ€” quantum attack poses a "real and substantial threat" to #RSA and #AES. According to a report published by the SCMP, the researchers utilized a #DWave #quantumcomputer to mount the first successful quantum attack on widely used #cryptographic algorithms.
tomshardware.com/tech-industry

2024-09-09

The #cryptographic flaw, known as a side channel, resides in a small microcontroller used in a large number of other authentication devices, including smartcards used in banking, electronic passports, and the accessing of secure areas.
#security
arstechnica.com/security/2024/

2024-09-06

#YubiKeys Are a #Security Gold Standardโ€”but They Can Be Cloned

Security researchers have discovered a #cryptographic flaw that leaves the #YubiKey 5 vulnerable to attack.
#privacy

wired.com/story/yubikey-vulner

2024-07-10

@jpl - Good points, but specifically your last point is indeed rather concerning. Thankfully, there is RADIUS over #TLS, which is probably anyway a good idea. Perhaps this will be an incentive to prioritize the deployment of RADIUS over TLS, which enforces modern #cryptographic #security guarantees.

2024-07-09

Additionally, resistant to have been developed, including:

1. Constant-time algorithms like Curve25519 and ChaCha20
2. Masking techniques for algorithms like AES
3. White-box implementations
4. Leakage-resilient cryptography***

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst