-
https://weakdh.org/imperfect-forward-secrecy.pdf
-
We're currently making several changes to the Gentoo Linux ebuild of OpenDKIM to address security issues. While doing so, we came across a problem which is bugging us. We have a user `opendkim` which …
-
From `Readme`:
> CIS benchmarks — best description of hardening strategies (for some OSes), but no mapping to MITRE ATT&CK. Once they will implement this mapping, we will integrate their analytics …
-
I'm currently working on adding group chat to Ricochet. The majority of the protocols are worked out already.
I've been keeping documentation and notes here: https://matt.traudt.xyz/ricochet/. Here's…
-
**[ UUID ]** fcce05a5-ac67-4a04-9a00-116d363c4408
**[ Session Name ]** The long road to the Amazing Privacy Land
**[ Primary Space ]** Privacy and Security
**[ Secondary Space ]** Web Literacy
**[ S…
-
Sphinx asks for several independent hash functions accepting a group element as input and various keys as outputs, for this a KDF is the suitable answer. HKDF-SHA256 is fine. Blake2b would be faster a…
-
I saw a really good presentation about threat modeling. I think that this repository needs to help the lay community understand how their understanding of threat model (although, let's shy away from …
-
There should be a way, in the event of a key compromise, to inform contacts that a ricochet id can no longer be trusted.
It looks like there is mention of providing some of the mechanisms around this…
s-rah updated
8 years ago
-
# Overview
This issue provides a high level specification for a service designated `reputation-tracker` that is responsible for managing reputation values for individual takers in an attempt to pro…
L-Kov updated
4 years ago
-
Hello,
I am creating an adversary profile with a bunch of abilities, which should be executed on two victim machines.
I deploy an agent on the first one and run the operation. However, the ad…