@bascule @worldwise001 now ppl will think those old Mozilla tshirts are about an SSL vuln. Thanks Tonbama.
-
-
-
@strathmeyer@worldwise001 what shirts now? -
@strathmeyer@worldwise001 lolrly? is there some context around that?
End of conversation
New conversation -
-
-
@bascule which specific AES impl did you test? -
@mik235 it wasn't me, it was@hashbreaker
End of conversation
New conversation -
-
-
@bascule Nice blog post! But where is the commercial for https://norx.io ? ;) -
@Daeinar haha, win CAESAR first! ;) -
@bascule that’s our plan! ;) -
-
@cynicalsecurity@bascule@veorq pssst, don’t tell everything … -
New conversation -
-
-
-
@dakami thankfully. Because it’s a dumb approach.
End of conversation
New conversation -
-
-
@ivanristic@bascule was this rule: "Use separate types for secret and non-secret information" added before or after#libressl's findings?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@bascule@ivanristic dumb q: would adding (good) random delays work to prevent this attack, in lieu of available constant-time operations?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.