@jedisct1 what vector allows iterated attacker chosen plaintext in the same context as a static high value secret?
-
-
-
@hillbrad Same. HTTP queries. - 1 more reply
New conversation -
-
-
@jedisct1 Can you refer to me what you mean by TLS compression being exploitable? I'm not familiarThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@jedisct1 there's no relatively short cookie to attack...Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@jedisct1 Isn't pretty much all transport cryptos vulnerable to traffic analysis when you know what to look for?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.