Soatok Dreamseeker

  • 39 Posts
  • 37 Comments
Joined 3 年前
cake
Cake day: 2023年6月3日

help-circle


































  • TL;DR from oss-security:

    At a glance, what I found is the following:

    1. Session only uses 128 bits of entropy for Ed25519 keys. This means their ECDLP is at most 64 bits, which is pretty reasonably in the realm of possibility for nation state attackers to exploit.
    2. Session has an Ed25519 verification algorithm that verifies a signature for a message against a public key provided by the message. This is amateur hour.
    3. Session uses an X25519 public key as the symmetric key for AES-GCM as part of their encryption for onion routing.

    Additional gripes about their source code were also included in the blog post.




  • How much can you control the conversation if the entity you are discussing only wants their name published?

    It’s not about what they want published. It’s about what they don’t want published.

    Sure there will be a few GDPR letters and maybe an inquiry by some regulatory body. Satisfyingly annoying to them, but compared to the cost of an advertising campaign; would this not be just a drop in the bucket.

    Advertising campaigns generally don’t include OSINT on the people behind it and evidence of their crimes. How does what I published help them increase their revenue or reduce their costs? Everything is ruled by incentives.