Update 2020-02-14: As pointed out by a reader (thank you!), attestations do not protect against man-in-the-middle attacks where an attacker owns a genuine authenticator of
Tag: cyber
Decoding Lecroy oscilloscope traces with sigrok
Sigrok is an open source signal analysis software suite which is very helpful for the analysis of hardware protocols. The two main tools provided by
Forget Homomorphic Encryption, Here Comes Functional Encryption
Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong,
Google, IBM, and the Quantum Supremacy Affair Explained
You have probably heard about some big announcement by Google on the topic of “quantum supremacy”, and maybe also about a rebuttal by IBM criticizing
FIDO2: Solving the Password Problem
Introduction Passwords are a problem and you’d be hard-pressed to find a security professional who disagrees. According to Verizon’s 2019 Data Breach Investigation Report, 62%
Pilfering Kubernetes Clusters
Kubernetes is one of the most used container orchestration frameworks for people building, deploying and managing scalable micro-services. I won’t explain how it works since