juraj somorovsky

@jurajsomorovsky

Used to break XML Security, now playing with TLS and crypto. Co-author of DROWN, EFAIL, main developer of TLS-Attacker. Hackmanit GmbH / Ruhr University Bochum

Vrijeme pridruživanja: listopad 2010.

Tweetovi

Blokirali ste korisnika/cu @jurajsomorovsky

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jurajsomorovsky

  1. Prikvačeni tweet
    12. lip 2019.

    A preliminary program of the second Crypto Workshop on Attacks in Cryptography is now out: Very happy to have , , , , Daniel Genkin, , , and there.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    We did it! The study is complete 💯 percent! >30 people were willing to participate. We are amazed by the response and thank each and every one of you for taking the time and giving us your expert opinion! You are the best! ❤️ Results will come to:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Do you use and ? Take part in our research study at . For Science! (we have chocolate, too)

    Prikaži ovu nit
    Poništi
  4. 31. sij

    Also...I have two open positions in the area of applied crypto and system security. Contact me if you are interested. Will reference the official offers soon :)

    Prikaži ovu nit
    Poništi
  5. 31. sij

    Exactly 10 years ago I started at Next week I am beginning a new journey at as a prof for system security. Big thanks goes especially to all my co-authors, and to all colleagues at the chair for Network and Data Security

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Breaking: German government says it has proof that water is wet, the Pope is Catholic, and video confirmation of where bears shit. News, at 11

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Question to my Twittersphere: There are stories in the media about mobile platforms/apps spying on conversations to extract information for targeted advertisements. Does anyone know of “proof” for this spying (e.g., app being caught using the microphone; scientific study; etc)?

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Coming soon to OpenSSL: a simple, safe and performant API for primality testing. With , and with thanks to Kurt Roeckx from OpenSSL and who posed the question.

    Poništi
  9. proslijedio/la je Tweet
    20. sij

    CVE-2020-2655: TLS/DTLS client authentication bypass in Java 11 & 13 (JSSE) Details & PoC

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Please welcome the new W3C Privacy Community Group, chaired by people from Apple, Mozilla, and Microsoft. The web has a bright future!

    Poništi
  11. proslijedio/la je Tweet
    17. sij

    We are hiring! Recently, my team at has engaged in a strategic partnership with a leading vendor of tools. In the context of this project, and beyond, we are hiring several scientific staff with an interest in tools.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. sij

    If you are using TLS client authentication with Java 11 or Java 13 you should patch your servers NOW.

    Poništi
  13. proslijedio/la je Tweet
    15. sij

    History repeats itself: after padding oracles, another attack discovered by Serge becomes a practical threat many, many years after its publication.

    Poništi
  14. proslijedio/la je Tweet
    14. sij

    It looks like it exploits what Vaudenay warned against in 2004 : "Digital Signature Schemes with Domain Parameters" ( )

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    7. sij

    We are pleased to announce that 2020 will be live-streamed. Link:

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet

    THREAD: Exactly two years ago today, an engineer working on an embargoed bug made a tiny opsec slip-up. The bug was very complicated and the slip-up contained NO info about its exploitation. There was already lots of discussion about the KPTI patch being rushed in Kernel. (1/4)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.

    Congratulations to our IT security consultant and more importantly friend Karsten Meyer zu Selhausen. He has won the Eurobits Excellence Award due to his outstanding master thesis about breaking PDF signatures. Congratulations. 🎉🥇

    Award ceremony
    Lightning talk
    Poništi
  19. proslijedio/la je Tweet

    It's time you were T0RTT a lesson: Here's how you could build a better Tor, say boffins

    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.

    Embargo ends - is public: It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. Great collaboration with Kit Murdock, , , , Frank Piessens!!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet

    You are female*, study IT security or currently doing your Ph.D. at - and want to go to the Chaos Communication Congress in Leipzig this year? Then apply for our scholarship for the event, it includes travel expenses and registration fees.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·