-
How to identify a TLS 1.3 connection? https://www.linkedin.com/pulse/how-identify-tls-13-connection-saravanan-musuwathi-kesavan/ …
#TLS1_3#TLS -
Thx
@Google Big step in the right direction.#tls1_3#security#AndroidSecurity#Android#GoogleIO2019@ExoKryptpic.twitter.com/DLKaY7yn9z
-
Our
#FinalYearStudent Joel, gave a presentation this morning to our#2ndYearStudents in their#Security module with@YCherdantseva about#TLS1_3 (Transport Layer Security 1.3), a new encryption protocol that#EnhancesSecurity and improves speed for users of the internetpic.twitter.com/Iw5CFJVJ6q
-
-
Another big achievement is a perfect A+ on
#ssltest from@qualys with 100% on each parameter. I had to violate the#RFC for#TLS1_3 but the server connects fine using#TLS 1.3.#CyberSecurity.pic.twitter.com/m2Ru6KQfTc
-
nginx-1.15.12 & openssl-1.1.1bでTLS1.3を試してみた。 たまにはソースパッケージからインストールしとくと スキルのリハビリになっていいし、yumやaptなどが利用できるありがたさも再確認できていい。
#nginx#openssl#TLS1_3 https://www.opensourcetech.tokyo/entry/20190523/1558623193 … -
#mew#Ethereum#etherwallet#cryptowallet#TeamMEW#MEWconnect@tayvano_#TLS1_3 Server upgrade done! https://github.com/Zwilla/mytokenwallet.com/blob/master/README.md … https://mytokenwallet.com now ONLY on TLS 1.3#SSL read this: https://www.davidwong.fr/tls13/ pic.twitter.com/iJxohK3DuT
Prikaži ovu nit -
Cool crypto, bro.
@Cloudflare#Encryption#TLS1_3 pic.twitter.com/TDzdmpJwlm
-
Worth repeating, regards the recent adoption of
#TLS1_3 / TLS1.3: Why we should quietly stop#DomainFronting and instead pursue#EncryptedSNIhttps://medium.com/@alecmuffett/eli5-why-we-should-quietly-stop-domainfronting-and-instead-pursue-encryptedsni-f2696c94469e … -
Der Einsatz von CDN ist ambivalent. Des einen Performance ist des anderen Verlust an Sicherheit.
#0RTT#TLS1_3#Infosechttps://www.heise.de/security/meldung/Moderne-Transportverschluesselung-fuers-Web-TLS-1-3-ist-IETF-Standard-4134527.html … -
#Domainfronting is/was a cute hack, but it relies upon a disjoint between what the encrypted communication claims to be connecting-to, versus the HTTP request's `Host` destination; we should do better by promoting#TLS1_3 with#EncryptedSNI — make all traffic robustly private!https://twitter.com/AlecMuffett/status/1019468247823978496 …
-
In short: why pursue support of a busted hack which propagates traffic fingerprintability and censorship, rather than pursue fixing the problem at source & seeking ubiquity of the fix? <ends/>
#TLS1_3Prikaži ovu nit -
Ob
#TLS1_3 mal was wird bleibt fraglich... :-( https://twitter.com/Quuux/status/980100625731112965 … -
Technische Standards als Grundlage von Sicherheit und Qualität - die Diskussion um Transport Layer Security 1.3 betrifft Grundfragen der Web-Kommunikation. Auch für
#Verbraucher.#Verbraucherrecht#TLS1_3 http://www.deutschlandfunk.de/datenverschluesselung-geheimdienste-wollen-abhoeren-in.684.de.html?dram:article_id=414468 … -
The idea that selective proxying (using whitelists) based on the server certificate ever functioned is false.
#ITSECURITY,#TLS1_2,#TLS1_3 https://www.imperialviolet.org/2018/03/10/tls13.html … -
TLS 1.3についてのセッションを30分の動画にしました。先月の組込み総合技術展プライベートカンファレンスでご紹介した内容です。お時間のあるときにぜひご覧ください! https://youtu.be/5cpcsWaSJZM
#TLS#TLS1_3#組込み#ネットワークセキュリティ#IoTセキュリティ
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.