We continue our post-quantum series with this blog post that details the process behind adding quantum resistance to the WireGuard protocol and evaluating the performance
Tag: Security
Building A Simple Neural Network Backdoor
Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
Replacing passwords with FIDO2 updated slides and resources
If you attended the 2020 edition of Pass the SALT, a conference dedicated to free software and security, you may have just stumbled upon a
Security Advisory: F5 BIG-IP Critical Severity RCE Vulnerability CVE-2020-5902
Updated on July 7th, 2020: The Cyber Fusion Center has learned that the original mitigation guidance provided by F5 was incomplete and has been bypassed.
An Introduction to Oblivious RAM (ORAM)
In this article we are going to have a look at a special kind of privacy-preserving cryptographic scheme: ORAMs. The acronym ORAM stands for Oblivious
SWD part 3 – SWO and nRST
The SWD interface does not only consist of the SWDIO and SWDCK lines, but also has optional signals used in more specific cases. In this