-
Really good look on the new version of the cornerstone internet crypto protocol:
#TLS 1.3 aka#RFC8446 https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/amp/?__twitter_impression=true … -
TLS 1.3 is official
https://www.rfc-editor.org/rfc/rfc8446.txt
#RFC8446 -
#RFC8446 - The Transport Layer Security (TLS) Protocol Version 1.3 https://rfcs.web.fc2.com/rfc8446.html -
tls 1.3 is now rfc'd! https://tools.ietf.org/html/rfc8446
#rfc8446#TLS13 -
"TLS 1.3 is poised to provide a foundation for a more secure and efficient Internet over the next 20 years and beyond." 10 years ago this month
@ietf released TLS 1.2, here's to another 20 with#TLS13,#RFC8446! https://www.ietf.org/blog/tls13/ -
In the first full year since
#RFC8446 was published, adoption of#TLS13 -- which delivers superior security, performance, and privacy -- is growing rapidly. Read more from the#TLSWG chairs in their latest post. https://www.ietf.org/blog/tls13-adoption/ …pic.twitter.com/a6d1H8xnu4
-
A Detailed Look at
#RFC8446 (a.k.a.#TLS1.3) https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/ … -
#TLS13 is finally there. Read, understand and implement#RFC8446 https://www.rfc-editor.org/rfc/rfc8446.txt -
Unless you are a big fan of reading RFCs,
@grittygrease has this comprehensive writeup on TLS 1.3 (#RFC8446). TLS1.3 removes support for RSA in favor of ephemeral DH (hence#PFS by default), restricts DH parameters and symmetric cr…https://lnkd.in/gAbuGAk https://lnkd.in/guURsmH -
Learn about TLSv1.3
#rfc8446 https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/ … -
Is it true that the JVM will be the first platform to have built-in support for TLS 1.3?
#rfc8446 -
Downgrade Attack on
#TLS 1.3 &#Vulnerabilities in#TLS#libraries Excellent#researchwork@eyalr0@cryptodavidw@yuvalyarom Robert Gillham & Daniel Genkin@IEEESSP#RFC8446@NCCGroupInfosec@NCCGroupplc#cryptographic#Attack@ZDNet@campuscodi https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/february/downgrade-attack-on-tls-1.3-and-vulnerabilities-in-major-tls-libraries/?Year=2019&Month=2 …pic.twitter.com/mfyJuRcStq
-
Avec du retard dans la lecture de mes podcasts, écoute d’un épisode assurément à diffuser afin de comprendre pourquoi il faut migrer côté serveur ET poste de travail vers TLS 1.3 implémentant le standard
#RFC8446 https://tools.ietf.org/html/rfc8446 https://twitter.com/nolimitsecu/status/1061876857451302912 …Prikaži ovu nit -
Wir klären noch, wann genau die Unterstützung für den finalen RFC in der von uns genutzten Version von LiteSpeed kommt. Support für
#RFC8446 ist selbstverständlich geplant. Als SSL-Library kommt bei LiteSpeed übrigens BoringSSL zum Einsatz. ^PZ -
-
In an ossified architecture designing for the future means making it look like the past.
#TLS#IETF#RFC8446 pic.twitter.com/Vpz6ZNebzb
-
Anyone need to take a nap?
#TLS13isHere#rfc8446 https://tools.ietf.org/html/rfc8446 -
The
#IETF has FINALLY published#TLS1.3 as#RFC8446 https://bit.ly/2PcwGFa#sslcertificate#https#ssl -
IETF Publishes TLS 1.3 as RFC 8446
#IETF#TLS #1.3#RFC8446#cybersecurity#infosec#security#tech#fintech#regtech@Archonsec@cioAmaro @Fisher85M @1DavidClarke https://www.securityweek.com/ietf-publishes-tls-13-rfc-8446 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.