Security Leftovers
-
A Taxonomy of Access Control
My personal definition of a brilliant idea is one that is immediately obvious once it’s explained, but no one has thought of it before. I can’t believe that no one has described this taxonomy of access control before Eyal Ittay laid it out in this paper.
-
Security updates for Friday
Security updates have been issued by Debian (gnutls28, libtirpc, postgresql-11, and samba), Fedora (microcode_ctl, wpebackend-fdo, and xen), Oracle (.NET 6.0, galera, mariadb, and mysql-selinux, and kernel), SUSE (dbus-1 and python-numpy), and Ubuntu (booth).
-
Twitter Exposes Personal Information for 5.4 Million Accounts
Twitter accidentally exposed the personal information—including phone numbers and email addresses—for 5.4 million accounts. And someone was trying to sell this information.
-
A Wide Reduction Trick
Elliptic curve cryptography implementations all roughly share the following structure: there's a base field implementation, the group logic, a scalar field implementation, and a higher level protocol (key exchange, signatures, ...) over the group.
The base field is the set of numbers modulo a large prime number (such as 2^255-19, from which Curve25519 takes its name). The implementation provides arithmetic operations in the field, such as modular addition, subtraction, multiplication, and inversion, as well as encoding and decoding of field elements to/from bytes.
-
New Alpha Release: Tor Browser 12.0a1 (Windows, macOS, Linux) | The Tor Project
Tor Browser 12.0a1 is now available from the Tor Browser download page and also from our distribution directory.
Tor Browser 12.0a1 updates Firefox on Windows, macOS, and Linux to 91.12.0esr.
- Login or register to post comments
- Printer-friendly version
- 445 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
today's howtos
| Open Hardware: XON/XOFF and Raspberry Pi Pico
|
Security Leftovers
| How to Apply Accent Colour in Ubuntu Desktop
A step-by-step tutorial on how to apply accent colour in Ubuntu desktop (GNOME) with tips for Kubuntu and others. |
Malicious PyPI packages drop ransomware
Malicious PyPI packages drop ransomware, fileless malware [Ed: Malware? So don't install it. Windows back doors? Then don't use Windows.]