Bhushan Lokhande

@BhushanLokhande

Interested in SSL/TLS and PKI. security and applied cryptography. personal stream.

Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @BhushanLokhande

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BhushanLokhande

  1. Prikvačeni tweet
    12. pro 2017.

    You can also test for Return of Bleichenbacher’s Oracle Threat () on

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    Interested in Hardware Security Modules, Key Management, or simply are concerned with keeping secrets in a hardware secure? If so check out Jean-Baptiste Bédrune's talk from

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    20. sij

    CVE-2020-2655: TLS/DTLS client authentication bypass in Java 11 & 13 (JSSE) Details & PoC

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    noticeably speeds up secure connections while honoring revocation data for the whole Web: The median CRLite speedup is 115ms as measured in .

    Poništi
  5. proslijedio/la je Tweet
    3. pro 2019.

    The release of 71 today brings an all-new and feature-rich certificate viewer created with nothing but HTML, CSS, and JavaScript, thanks to the excellent PKI.js. If you're tired of squinty modal windows with tiny arrows, please check it out. 🔥🦊

    Poništi
  6. proslijedio/la je Tweet
    28. stu 2019.

    Bulletproof TLS Newsletter is out! Testing of delegated credentials begins and all the latest TLS news.

    Poništi
  7. proslijedio/la je Tweet

    Excited about what quantum computing means for the future - it gives us another way to speak the language of the universe and better understand the world, not just in 1s and 0s but in all of its states: beautiful, complex, and with limitless possibility.

    Poništi
  8. proslijedio/la je Tweet
    14. lis 2019.
    Poništi
  9. proslijedio/la je Tweet

    ACME for more than just WebPKI (from our sponsors ) -

    Poništi
  10. proslijedio/la je Tweet

    Minerva: practically exploitable side-channel vulnerabilities in implementations of ECDSA/EdDSA in programmable smart cards and cryptographic software libraries permitting full key recovery

    Poništi
  11. proslijedio/la je Tweet
    12. kol 2019.

    Nice blog post “Spying on HTTPS” - where writes about the tricks used by anti-virus vendors to monitor encrypted browser communication.

    Poništi
  12. proslijedio/la je Tweet
    12. kol 2019.

    TLS fact: All modern browsers send a client hello that's ~150 bytes larger than it needs to be in each connection.The reason is an extension that blows up the handshake to be larger than 512 bytes because some old F5 devices broke when you sent a handshake btw. 256 and 512 bytes.

    Poništi
  13. proslijedio/la je Tweet
    15. srp 2019.

    Use Java? We've released the optimized, native, cryptography providers we've been using for a few years as Open Source.

    Poništi
  14. proslijedio/la je Tweet
    1. srp 2019.

    I'm excited to share a project that I've been working on: a brand-new version of 's SSL Configuration Generator: Configuring TLS is perhaps the most complicated and error-prone of all IT tasks, and this tries to make it as easy as possible.

    Poništi
  15. proslijedio/la je Tweet
    12. lip 2019.

    Slides for my Debugging TLS issues with Wireshark session are up! TLS decryption with embedded secrets and more! @SharkFest_2019

    Poništi
  16. proslijedio/la je Tweet

    The kind people of have published the video of my DNS/DNS over TLS/DNS over HTTPS presentation. Contains shoutouts to & consequences of handing over DNS to US companies (content starts at 2:10):

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. svi 2019.

    Based on our TLS-Attacker, we created extension which allows you to evaluate TLS configurations: (like , just in Burp :) )

    Poništi
  18. proslijedio/la je Tweet
    22. tra 2019.
    Odgovor korisnicima

    For security folks, I blogged about the security-related enhancements in JDK 12:

    Poništi
  19. proslijedio/la je Tweet
    15. tra 2019.

    Great thread from a Mozilla dev on Google’s culture of “oops.” Where changes that harm competitors and boost Google’s business goals are always ‘accidents’.

    Poništi
  20. proslijedio/la je Tweet

    Today we're announcing our plan to transition subscribers to using our root certificate, rather than a cross-signature. Our root is widely trusted and most subscribers won't notice a change. Using the cross-signature will remain an option until Sept. 2021.

    Poništi
  21. proslijedio/la je Tweet

    This is terrific research showing 10%+ of global HTTPS traffic is being intercepted by middleboxes like Bluecoat.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·