|
Avesta Hojjati
@
sudoq7
Earth
|
|
R&D @ DigiCert. views == my own
|
|
|
593
Tweetovi
|
698
Pratim
|
1.311
Osobe koje vas prate
|
| Tweetovi |
| Avesta Hojjati proslijedio/la je tweet | ||
|
Graham Cluley
@gcluley
|
30. sij |
|
Run-Up to the Tokyo Olympics - Teleworking Threats in the Security Spotlight businessinsights.bitdefender.com/teleworking-th…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matthew Green
@matthew_d_green
|
28. sij |
|
As it stands, the recent status report from the Huawei Cybersecurity Evaluation Center in the UK indicates that they can’t even get a handle on Huawei’s code, or even verify that it’s the same code running in hardware. google.com/amp/s/www.wash…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matthew Green
@matthew_d_green
|
31. sij |
|
I retweeted this post yesterday, but I urge people who care about encryption online to read it, because this legislation should scare you. I am going to follow with a (much less thorough and accurate) summary thread below. twitter.com/riana_crypto/s…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matthew Green
@matthew_d_green
|
31. sij |
|
1. So in case you haven’t been paying attention, there’s been a bit of a struggle going on between law enforcement and the tech industry over encryption. TL;DR: law enforcement doesn’t like it. The FBI even made a website: fbi.gov/services/opera…
|
||
|
|
||
|
Avesta Hojjati
@sudoq7
|
15 h |
|
Would be nice if the cyber security had the same level as trying to go through TSA security. twitter.com/gcluley/status…
|
||
|
|
||
|
Avesta Hojjati
@sudoq7
|
15 h |
|
Fear is a big driver for hackers. Trust is so far gone today that a random email seems okay versus common sense. twitter.com/gcluley/status…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Peter Shor
@PeterShor1
|
1. velj |
|
35 years ago today, Richard Feynman's paper "Quantum Mechanical Computers" was published in 𝘖𝘱𝘵𝘪𝘤𝘴 𝘕𝘦𝘸𝘴. I think he'd be surprised and gratified to see everything that his original idea has led to.
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matter Labs
@the_matter_labs
|
31. sij |
|
Excited to announce the long-awaited alpha release of Zinc framework — a programming language and execution environment for easy creation of safe zero-knowledge proof circuits (programs to run on ZKPs).
medium.com/matter-labs/re…
|
||
|
|
||
|
Avesta Hojjati
@sudoq7
|
30. sij |
|
Hybrid certificates where you have classic (RSA/ECC) / PQC algs embedded in one cert. allows you to migrate from the classical algs to PQC algs in an event we get a scalabale and stable quantum computer.
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Khalil Sehnaoui
@sehnaoui
|
29. sij |
|
You can tell all your problems to this doggo and he will guide you to a better life. 12/10 @dog_rates would consult. pic.twitter.com/XUimBBQjsI
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matthew Green
@matthew_d_green
|
28. sij |
|
A photo is a mathematical representation of your face. twitter.com/Apple/status/1…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Jan Schaumann
@jschauma
|
28. sij |
|
How I think containers work. pic.twitter.com/823bBoYUTQ
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
kennyog
@kennyog
|
22. sij |
|
Coming soon to OpenSSL: a simple, safe and performant API for primality testing. With @Massicrypt, and with thanks to Kurt Roeckx from OpenSSL and @LindellYehuda who posed the question. #AppliedCryptoFTW twitter.com/iacr_news/stat…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Parisa Tabriz
@laparisa
|
28. sij |
|
Where @ericlaw reminds us of the 20+ year history of web browser privacy work at @Microsoft #enigma2020 pic.twitter.com/FirArTsott
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Alan Henry
@halophoenix
|
11. sij |
|
WHO DID THIS pic.twitter.com/m9riRhZoUQ
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Matthew Green
@matthew_d_green
|
28. sij |
|
We have never in history managed to secure a complex and dynamic codebase against the threat model of malicious behavior. It’s important to understand that, if this works, it will require new engineering techniques that don’t yet exist. twitter.com/KenDilanianNBC…
|
||
|
|
||
|
Avesta Hojjati
@sudoq7
|
28. sij |
|
Whether there is a clear tie here, the implications are terrifying and interesting at the same time. twitter.com/gcluley/status…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
BrianHonan
@BrianHonan
|
23. sij |
|
LOL, I like this. twitter.com/btanderson72/s…
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Graham Cluley
@gcluley
|
22. sij |
|
Microsoft data breach exposes 250 million customer service and support records grahamcluley.com/microsoft-data… pic.twitter.com/b8vHsdr0fY
|
||
|
|
||
| Avesta Hojjati proslijedio/la je tweet | ||
|
Graham Cluley
@gcluley
|
26. sij |
|
Webex flaw allowed anyone to join private online meetings - no password required grahamcluley.com/webex-flaw-all… pic.twitter.com/7uftEBe15T
|
||
|
|
||