{"id":1462,"date":"2014-04-07T23:30:49","date_gmt":"2014-04-07T21:30:49","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1462"},"modified":"2024-10-14T13:26:20","modified_gmt":"2024-10-14T11:26:20","slug":"assorted-links-crypto-3","status":"publish","type":"post","link":"https:\/\/cerezo.name\/blog\/2014\/04\/07\/assorted-links-crypto-3\/","title":{"rendered":"Assorted Links (Crypto)"},"content":{"rendered":"<ul>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/popa\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Building Web Applications on Top of Encrypted Data Using Mylar<\/a>: practical <a href=\"http:\/\/css.csail.mit.edu\/cryptdb\/\" target=\"_blank\" rel=\"noopener\">CryptDB<\/a> for the web, just adding some lines of&nbsp;code!<\/li>\n<li>More attacks on <span class=\"caps\">WPA2<\/span>:&nbsp;<a href=\"http:\/\/inderscience.metapress.com\/content\/d566077551229663\/\" target=\"_blank\" rel=\"noopener\">Exposing <span class=\"caps\">WPA2<\/span> security protocol vulnerabilities<\/a><\/li>\n<li>Identity based encryption for <a href=\"https:\/\/freedom-to-tinker.com\/blog\/felten\/secure-protocols-for-accountable-warrant-execution\/\" target=\"_blank\" rel=\"noopener\">secure and accountable warrant execution<\/a><\/li>\n<li>If the <a href=\"http:\/\/blog.0xbadc0de.be\/archives\/155\" target=\"_blank\" rel=\"noopener\">backdooring of Dual <span class=\"caps\">EC<\/span> <span class=\"caps\">DRBG<\/span><\/a> wasn\u2019t enough, now a <a href=\"http:\/\/dualec.org\/\" target=\"_blank\" rel=\"noopener\"><span class=\"caps\">TLS<\/span> extension named Extended Random<\/a> makes it&nbsp;worse.<\/li>\n<li>An illuminating story on <a href=\"http:\/\/www.bbc.com\/news\/magazine-26838177\" target=\"_blank\" rel=\"noopener\">freedom and spying under totalitarian regimes<\/a>: What would current records say about&nbsp;you?<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Building Web Applications on Top of Encrypted Data Using Mylar: practical CryptDB for the web, just adding some lines of&nbsp;code! More attacks on <span class=\"caps\">WPA2<\/span>:&nbsp;Exposing <span class=\"caps\">WPA2<\/span> security protocol vulnerabilities Identity based encryption for secure and accountable warrant execution If the backdooring of Dual <span class=\"caps\">EC<\/span> <span class=\"caps\">DRBG<\/span> wasn\u2019t enough, now a <span class=\"caps\">TLS<\/span> extension named Extended Random makes it&nbsp;worse.&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,16,18],"tags":[],"_links":{"self":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1462"}],"collection":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1462"}],"version-history":[{"count":2,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1462\/revisions"}],"predecessor-version":[{"id":1532,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1462\/revisions\/1532"}],"wp:attachment":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}