recentpopularlog in

mcherm : moxiemarlinspike   1

Moxie Marlinspike >> Blog >> The Cryptographic Doom Principle
Two very subtle protocol vulnerabilities, and a principle that avoids them. The principle is to verify the MAC as the very first thing that happens in a protocol.
cryptography  security  bugs  via:HackerNews  MoxieMarlinspike 
april 2015 by mcherm

Copy this bookmark:

to read