A thingy I just wrote, on why we need a new edition of Practical Cryptography & why you’d care: http://sockpuppet.org/blog/2013/07/22/applied-practical-cryptography/ …
@eachus @tqbf @newshtwit stay tuned for BlackHat. My coworker is presenting a more general version of CRIME: https://www.blackhat.com/us-13/briefings.html#Prado …
-
-
@bascule@tqbf@newshtwit My point was it's faulty USE of compression, not inherent fault of compression in general. But maybe nitpicking. -
@eachus@bascule@newshtwit People keep pointing out attacks you clearly weren’t familiar with, which is fine, but then you argue with them. -
@tqbf@bascule@newshtwit My point was simply that it's not inherent to the math of compression, it's implementation. -
@eachus@tqbf@newshtwit FWIW, here's an attack exploiting compression that doesn't rely on attacker-controlled data: http://www.cs.unc.edu/~fabian/papers/tissec2010.pdf … -
@bascule@tqbf@newshtwit Yes, that uses the kind of "compression signature" I was originally referring to (but it was out of context then).
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.