Latest episode - listen now! (Or read the transcript if you prefer.)
Read moreIf you've ever written code that left stuff lying around in memory when you didn't need it any more... we bet you've regretted it!
Read moreSlack admits to leaking hashed passwords for five years
August 8 2022"When those invitations went out... somehow, your password hash went out with them."
Read moreNIST’s Post-Quantum Cryptography Standards
August 8 2022Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0...
Read moreS3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!) [Audio + Text]
August 4 2022Latest episode - listen now! (Or read if that's what you prefer.)
Read moreSIKE Broken
August 4 2022SIKE is one of the new algorithms that NIST recently added to the post-quantum cryptography competition.
It was just broken, really badly.
We present an efficient key recovery...
Read more
And THIS is why you don't knit your own home-made encryption algorithms and hope no one looks at them.
Read moreTransactions were only approved, it seems, if they were initiated by... errrrr, by anyone.
Read moreTransactions were only approved, it seems, if they were initiated by... errrrr, by anyone.
Read moreGnuTLS patches memory mismanagement bug – update now!
August 1 2022GnuTLS may well be the most widespread cryptographic toolkit you've never heard of. Learn more...
Read more
Recent Comments