-

2.3K posts

- banner
-

-

@lambdafu

https://t.co/tI4jg6u8vL // @[email protected]

Katılım Ağustos 2011
301 Takip Edilen769 Takipçiler
Sabitlenmiş Tweet
-
-@lambdafu·
@TrueSkrillor joins the infosec community with a bang: A new attack class against the SSH protocol!
English
1
0
3
1.3K
-
-@lambdafu·
Announcing SPIQE 2026: 2nd Workshop on Secure Protocol Implementations in the Quantum Era, bringing together researchers and implementers to securely deploy PQC! 📍 Co-located with Euro S&P in Lisbon, Portugal, July 6-10, 2026 spiqe.cool #SPIQE2026 #EuroSP #PQC
English
0
0
0
34
-
-@lambdafu·
FOLLOW US ON BLUESKY! We found a new vulnerability in TLS. It's a variant of the ALPACA attack that bypasses current countermeasures. Relatively low impact - but great insight! Check it out: opossum-attack.com // via bsky.app/profile/ic0nz1…
English
0
1
1
82
- retweetledi
Open Source Security mailing list
CVE-2025-32433: Unauthenticated Remote Code Execution in Erlang/OTP SSH openwall.com/lists/oss-secu… Allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication. Estimated CVSSv3 of 10.0.
English
1
8
29
4.7K
- retweetledi
Nigel Smart
Nigel Smart@SmartCryptology·
The deadline for getting talk proposals in for @RealWorldCrypto 2025 is about two weeks away... rwc.iacr.org/2025/contribut… Talk proposals are short, so there is no excuse in not putting in a bid to talk about your fave applied crypto thing from the last year.
English
0
15
36
11.8K
-
-@lambdafu·
@kaepora It’s not doing the same thing, though.
English
0
0
0
80
- retweetledi
Martin Dunsche
Martin Dunsche@MDunsche·
[1/4] If you've ever tried finding timing side channels by actually measuring, you probably know that this can be incredibly frustrating. But it does not have to! While major side-channels are easy to detect, more subtle ones, especially when the measurements are noisy, are not!
English
1
6
11
1.1K
-
-@lambdafu·
@RaphaelWimmer "Sehr geehrte Damen und Herren" ist vermutlich gerade noch ok?
Deutsch
0
0
1
10
- retweetledi
Luca Casonato 🏳️‍🌈
So, Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel. This API is not exposed to other sites - only to *.google.com.
English
236
2.2K
15.7K
2.5M
-
-@lambdafu·
@mysk_co Technical details are probably different but in 2022 another electron app, Microsoft Teams, leaked authentication tokens, and Microsoft tried to pull the same defense. Don’t know if they fixed it by now. bleepingcomputer.com/news/security/…
English
0
0
2
299
Mysk 🇨🇦🇩🇪
Mysk 🇨🇦🇩🇪@mysk_co·
The security bug about storing the encryption key in plain text wasn't considered a bug by Signal in 2018, wasn't considered a bug by Signal's president today, and even demanded responsible disclosure for it. Well, that not bug thing is getting a fix now: #issuecomment-2218845070" target="_blank" rel="nofollow noopener">github.com/signalapp/Sign…
English
26
44
321
35.7K
-
-@lambdafu·
@kaepora „ Signal’s group chat benefits from lesser security guarantees“ voice calls, too. They are just webrtc, lol
English
0
0
2
376
-
-@lambdafu·
@matthew_d_green File download can be easier than RCE, though, e.g. through path traversal bugs (I remember that some jabber clients used to have them back in the days).
English
0
0
0
56
Matthew Green
Matthew Green@matthew_d_green·
Let’s also be clear that while I wouldn’t use Signal Desktop, attacks that require access to your computer as a precondition are not terribly impressive.
English
3
7
77
10.8K
Matthew Green
Matthew Green@matthew_d_green·
I do not, and have never trusted Signal Desktop. Security colleagues sometimes express amazement that I only use Signal on my phone, and I wonder if they might prefer to use Slack.
Joey Krug@joeykrug

This feels like as good a time as any to disclose another critical Signal vulnerability I found. TLDR is that prior to mid 2021, Signal *didn’t delete* disappearing messages after they “disappeared.” So say you had a message from 2016 that you thought disappeared years ago, nope!

English
26
49
305
98.3K
- retweetledi
Miro Haller
Miro Haller@miro_haller·
When registering for IACR Crypto'24, please consider signing up for the Workshop on Attacks in Cryptography 7 (WAC7) on Sunday. Our program is online: wac7.cryptanalysis.fun (modulo some attacks that are too new to be out of their embargo yet).
Miro Haller tweet media
English
1
16
37
7.9K
-
-@lambdafu·
@RyanPolsley Can you upload gpx files?
English
0
0
0
83
-
-@lambdafu·
@PurnalToon Nice catch! This mask is a common pattern. It's the same in the Classic McEliece reference code (see preprint for how to exploit such a leak: eprint.iacr.org/2023/1536). I wonder if this compiler optimization would be applied there, too.
- tweet media
English
1
0
2
517
Antoon Purnal
Antoon Purnal@PurnalToon·
I recently found an exploitable timing leak in the reference implementation of Kyber (ML-KEM), the soon-to-be NIST standard for post-quantum key encapsulation. Let’s see if you can spot it in the source code - msg is secret:
Antoon Purnal tweet media
English
13
156
706
174.3K
-
-@lambdafu·
@the_aiju The principal author of glibc is Roland McGrath, and he has a personal web page at frob.com, check it out!
English
1
0
27
6.5K
Emily
Emily@the_aiju·
why the hell does glibc have a function “memfrob” that xors a memory area with the fixed value 42
English
29
49
916
176.3K
- retweetledi
Stairwell
Stairwell@InsideStairwell·
Researchers found #vulnerabilities in #PuTTY SSH libraries (v0.68-0.80). Stairwell's research goes further, revealing more potentially at-risk software not in the #NIST advisory. See our report for a full list and a YARA rule to help these vulns: stairwell.com/resources/stai…
English
0
5
10
1.4K