How AWS request signatures version 4 and 4a work security Article 1500 words, published Sep 9 2021 3 votes
Understanding extended-nonce constructions: How and why XSalsa20/XChaCha were designed, and why they’re secure Link 6 votes
Transparent and verifiable electronic elections are technically feasible, but the techniques used are not actually viable for running most elections—and definitely not for remote voting security Article 4355 words 5 votes
Using zero knowledge proofs to prove set membership without exposing the set or the member Article 1139 words, published Aug 10 2019 5 votes
GnuPG can now be used to perform notarial acts in the state of Washington privacy foss open source Link 15 votes
Signing CryptPad - Experiments with making a webapp secure despite the server security Article 1215 words 7 votes
SigSpoof: Spoofing signatures in GnuPG, Enigmail, GPGTools and python-gnupg (CVE-2018-12020) security Article 2307 words 5 votes