Tomas Hidalgo

@tommy_hs

PKI | HSM | Key Manager | eIDAS | Digital Signatures. Continuous Learning & Slow Life.

Almeria - Spain
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @tommy_hs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tommy_hs

  1. proslijedio/la je Tweet
    28. sij

    Publicada la clase Class4cryptc4c0.1 Presentación. Archivo pdf: Resumen: presentación del proyecto Class4crypt, con una introducción de la temática que será tratada en las vídeoclases de los 13 módulos de los que consta el proyecto.

    Poništi
  2. proslijedio/la je Tweet
    28. sij
    Poništi
  3. proslijedio/la je Tweet
    22. sij
    Poništi
  4. proslijedio/la je Tweet
    19. sij

    CityPainter, una versión perfecta del mítico City Connection, disponible gratis en la App Store a través de

    Poništi
  5. proslijedio/la je Tweet
    19. sij

    I don't know who needs to hear this, but... don't use Internet Explorer to browse the web.

    Poništi
  6. proslijedio/la je Tweet
    19. sij

    Es universal y esta gratis 🎁🎉🥂

    Prikaži ovu nit
    Poništi
  7. 17. sij

    Interesante estudio de los Servicios de Confianza (TSP) que operan en diferentes regiones del mundo con el fin de identificar medidas que faciliten el reconocimiento mutuo. Global Acceptance of EU Trust Services (ETSI TR 103 684 v1.1.1).

    Poništi
  8. 14. sij

    La gestión de vulnerabilidades Críticas que propone CISA (Dpto HomeLand Security) para Dptos. y Agencias Federales en USA es contundente; en 10 días, parches aplicados en todos los assets implicados.

    Poništi
  9. 14. sij

    Vulnerabilidad crítica (CVE-2020-0601) que afecta a la funcionalidad criptográfica de Microsoft Windows. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.

    Poništi
  10. proslijedio/la je Tweet
    13. sij

    Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch

    Prikaži ovu nit
    Poništi
  11. 10. sij
    Poništi
  12. proslijedio/la je Tweet

    "SIM swap" attacks have been in the news for years. They’ve enabled serious financial crimes and even a hack of the Twitter CEO's account. We spent 6 months researching how vulnerable wireless accounts are to these attacks. Our draft study is out today.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Publicada la versión 0.5 del libro gratuito de criptografía aplicada de Dan Boneh y Victor Shoup (USA). Ultima versión del libro gratuito "A Graduate Course in Applied Cryptography", de Dan Boneh y Victor Shoup, Universidad de Stanford.

    Poništi
  14. 7. sij

    CA/Browser Forum Baseline Requirements in 7.1 say "CAs SHALL generate Certificate serial numbers greater than zero (0) containing at least 64 bits of output from a CSPRNG". Are we safe? Do the CA's rigorously enforce this? Your opinion Mr ? Thanks!

    Prikaži ovu nit
    Poništi
  15. 7. sij

    With the latest news about SHA-1, generating collisions with defined prefixes (), the authors indicate that there is an affectation in those X509 certificates under SHA-1 that use predictable Serial Numbers.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    With the recent SHA-1 news, it’s important to understand why collisions and chosen-prefix attacks have different impacts on security. Luckily I wrote a blog post about this!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    31. pro 2019.

    Bulletproof TLS Newsletter is out! New factoring and discrete log records, but RSA stays safe -

    Poništi
  18. proslijedio/la je Tweet
    22. pro 2019.

    I'm gonna prepare most of the December Bulletproof TLS newsletter early, so if you have interesting links to this month's crypto/tls news please send them now.

    Poništi
  19. proslijedio/la je Tweet
    20. pro 2019.

    Oh, lol, Cisco, this is a fun one to drop 13 days before things explode *with those 13 days spanning xmas when half of IT is on a moratorium*. Self-signed x509 certs on Cisco gear expire on 2020-01-01 and cannot be created again.

    Poništi
  20. proslijedio/la je Tweet

    Tenemos un problema creado por nosotros mismos. En la educación española se ha banalizado el esfuerzo, el talento y también la recompensa. Los universitarios matriculados en carreras tecnológicas caen un 30% porque "no compensa el esfuerzo"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·