Aysajan Abidin

@aysajanabidin

Researcher at KU Leuven - COSIC, interested in security, privacy, and cryptography. Sick & tired of hypocrisy exercised by politicians and academics alike.

Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @aysajanabidin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aysajanabidin

  1. proslijedio/la je Tweet
    3. velj

    A couple weeks ago, I had the immense privilege to sit down and record a video with ! He took the Basic Test in 100 Endgames You Must Know on and chatted with me about his approach to the endgame. Enjoy!

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Out today, my Security Engineering book chapter 12 tells the story of the last decade's frauds against card payments and online banking, and how the defences have adapted:

    Poništi
  3. 1. velj
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Bart Preneel in on Huawei: “There is concern over political or strategic interference in technology. China could be capable of taking down a 5G network, espionage or no longer providing updates so the security of the network is put in jeopardy.”

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Clayton Christensen, a well-known professor of business from Harvard, just passed away. I highly recommend reading this article, written by him, which is an incredible tribute to who he was.

    Poništi
  6. proslijedio/la je Tweet
    21. sij
    Poništi
  7. proslijedio/la je Tweet
    20. sij

    We are pleased to announce LINDDUN GO, a toolkit that gives you a quick start to threat modeling. Find out more at

    Poništi
  8. proslijedio/la je Tweet
    19. sij

    Another blog in my series on MPC for cryptocurrency protection. This time about how it is possible to backup the key shares in a distributed key generation, while verifying that the backup is correct.

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    It can be hard to find good introductions to the mathematical theory of elliptic curves; these course notes are quite good

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    “The main people who spoof GPS signals ... are people who want to cheat at Pokémon Go” -

    Poništi
  11. proslijedio/la je Tweet
    9. sij

    . blogged from 2020 on a talk about DECO - Liberating Web Data Using Decentralized Oracles for TLS. Check it out here:

    Poništi
  12. proslijedio/la je Tweet
    9. sij

    SHA-1 usage today at the start of the talk at on SHA-1 chosen-prefix collisions. You can still buy SHA-1 certificates today and they are accepted in many places. This is the MD5 story all over again. Until it's COMPLETELY broken, people don't stop using it.

    Poništi
  13. proslijedio/la je Tweet
    8. sij

    Jean-Baptiste Bédrune on breaking HSMs . Not much has been done like this in the past. Why? (1) It's expensive. (2) HSM vendors don't give any information at all; zero transparency. (My opinion - the latter is the main reason.)

    Prikaži ovu nit
    Poništi
  14. 8. sij

    Summary of session on at : 1) TLS 1.3 deployment is increasing, specially among entertainment sites, 2) do not use RSA KX, and 3) DECO is a privacy-preserving oracle protocol allowing generation of commitments to TLS sessions and the proof of statements of TLS content.

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    The next chapter of Security Engineering v 3 is on inference control. It tracks the 40-year myth that sensitive personal data can be "anonymised" well enough to turn it into industrial raw material:

    Poništi
  16. proslijedio/la je Tweet
    6. sij
    Poništi
  17. proslijedio/la je Tweet
    1. sij

    Here is my take on what the past decade has meant for my Uyghur & Kazakh friends. They try to tell their own stories even as they are replaced.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    18. pro 2019.

    Facial recognition has improved by an order of magnitude since 2012. How does it work and what does it mean? See my new Security Engineering book chapter on biometrics:

    Poništi
  19. proslijedio/la je Tweet
    17. pro 2019.

    De ULB heeft beslist om haar Confuciusinstituut stop te zetten. Ook de VUB nam vorige week die beslissing, nadat hun Confucius onder vuur kwam wegens spionage door de Chinese directeur. Er zijn nog drie Belgische universiteiten met zo’n Confucius Instituut

    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.

    Gunes Acar shares his expertise in an documentary on Privacy and Digital Fingerprinting:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·