cryptography

5 articles
sort: new top best
clear filter
0 3/10

A historical timeline documenting significant events and developments in the evolution of SSL/TLS protocols and PKI infrastructure, based on Ivan Ristić's 'Bulletproof TLS and PKI' reference material.

Ivan Ristić Bulletproof TLS and PKI CodyHouse
feistyduck.com · fanf2 · 7 hours ago · details · hn
0 7/10

Security researchers from Irregular found that LLM-generated passwords from Claude, ChatGPT, and Gemini are fundamentally weak due to predictable patterns, with entropy around 27-20 bits instead of the 98-120 bits expected from truly random passwords. This allows passwords to be brute-forced in hours rather than centuries, despite appearing strong to standard password checkers.

Irregular Claude ChatGPT Gemini OpenAI Google Anthropic Dario Amodei HackerOne 1Password Bitwarden GitHub
theregister.com · pabs3 · 12 hours ago · details · hn
0 2/10

DarkMatter is an open-source peer-to-peer mesh networking protocol that enables direct discovery and communication between AI agents without a central coordinator, using Ed25519 cryptographic identities, optional message encryption, and trust scoring between peers.

DarkMatter Ed25519 HTTP WebRTC MCP (Model Context Protocol) Claude Codex OpenCode Meta Moltbook TCP/IP
loseylabs.ai · DanielJLosey · 14 hours ago · details · hn
0 7/10
vulnerability

ChainLight researchers discovered a critical soundness bug in zkSync Era's ZK-circuit that allowed malicious provers to generate fake proofs for invalidly executed blocks. The bug was responsibly disclosed to Matter Labs, which deployed a fix and awarded a 50K USDC bounty.

zkSync Era ChainLight Matter Labs EraVM zk_evm sync_vm L2EthToken MsgValueSimulator Code4rena
medium.com · ChainLight · 17 hours ago · details
0 7/10
-
vulnerability

A cross-chain messaging protocol's signature verification can be bypassed when a new domain is added: if enrollValidator is called before setThreshold, the commitment is saved with threshold=0, allowing attackers to frontrun setThreshold and process unsigned messages with a malicious commitment hash matching the stored zero-threshold commitment.

Heuss Immunefi ECDSA
medium.com · Heuss · 17 hours ago · details