A complete authentication bypass in pac4j-jwt. 😬
www.codeant.ai/security-res...
A complete authentication bypass in pac4j-jwt. 😬
www.codeant.ai/security-res...
Abstract. End-to-end cloud storage solutions are deployed at large scale, yet recent works have demonstrated severe attacks against their confidentiality and integrity. Motivated by this, a first formal treatment of secure cloud storage was given at CRYPTO 2024 by Backendal, Davis, Günther, Haller and Paterson (BDGHP). They define syntax and security notions, capturing client-to-client security of cloud storage schemes with respect to a password distribution. They also give an efficient construction using the Two-Hash Diffie-Hellman (2HDH) OPRF and standard cryptographic building blocks, which they prove secure under selective corruptions in the random oracle model. However, several aspects of practical security guarantees remain open. We extend and refine the work of BDGHP along multiple dimensions, advancing the analysis of secure cloud storage schemes. First, we prove that their construction can be proven secure against adaptive corruptions (with a slight modification), circumventing technical challenges posed by file sharing. Second, we modularize the scheme further by introducing an abstraction for the authentication procedure. This allows us to identify the concrete role of 2HDH and alternative instantiations. Third, we introduce a weaker model that captures adversaries who can arbitrarily control the network, except during registration. This allows us to prove concrete guarantees about online password guessing attacks, whereas the stronger model inherently allows for offline guessing. Finally, we formalize and prove explicit authentication, relying on the security of our new authentication abstraction and the MAC scheme, where the latter was previously not used in the security analysis.
Image showing part 2 of abstract.
Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions (Jonas Janneck, Doreen Riepel) ia.cr/2026/434
05.03.2026 06:22 — 👍 2 🔁 1 💬 0 📌 1Två citatrubriker med tillhörande bilder: 1. ”Jag var inte färdig med målningen” + bild på Jesusmålningen i en spansk kyrka som förstördes av en amatörmålare. 2. ”Romina Pourmokhtari (L): ’Vi är inte färdiga med klimatarbete i Sverige’” + bild på nöjd klimat- och miljöminister.
25.02.2026 05:53 — 👍 268 🔁 100 💬 7 📌 3
I'm a Trail of Bits fan. Can you blame me? A couple of days ago they released Claude Code skills, from reversing and vuln research to burnout detection.
github.com/trailofbits/...
come on become a world power [EU]
21.01.2026 13:46 — 👍 1397 🔁 218 💬 12 📌 16
Interesting post/research by Sean Heelan investigating the current state of exploit generation using frontier models like GPT-5.2 and Opus 4.5.
sean.heelan.io/2026/01/18/o...
I do appreciate the US state department strengthening my case here with their sanctions on former EU officials & other supporters of EU digital safety acts just now: berthub.eu/articles/pos...
23.12.2025 22:25 — 👍 87 🔁 57 💬 2 📌 4
Internships in MPC available, for both recent PhD graduates and current PhD students...
mpcinthewild.github.io
This is a project funded by the Zama Cryptanalysis Grant program
Interested in the security of MPC implementations?
Peter Scholl (@schollster.bsky.social) and I are looking for research interns to study the theory/practice gap for MPC. We can host multiple interns in Aarhus for the summer 2026.
More information: mpcinthewild.github.io
Help us spread the word!
what people think hacking is like: Mr. Robot
what hacking is actually like: Hmm. That’s weird
We should all be using dependency cooldowns
https://blog.yossarian.net/2025/11/21/We-should-all-be-using-dependency-cooldowns
#security #oss
That being said, I think it probably makes sense to report all vulnerabilities in messaging apps used by the US. I’m assuming they’re not talking about bugs in WeChat or VKontakte.
15.11.2025 20:48 — 👍 1 🔁 0 💬 0 📌 0I think it would make more sense to draw the line between vulnerabilities that only allow targeted exploitation (against a single device), and vulnerabilities that could allow for mass-exploitation. 🤷♂️ Cryptographic vulnerabilities can be either.
15.11.2025 20:43 — 👍 0 🔁 0 💬 1 📌 0
Come for the Go implementations of ML-DSA and SLH-DSA, stay for the introduction to side-channel mitigation techniques.
blog.trailofbits.com/2025/11/14/h...
#golng #crypto #cryptography #postquantum
Why is it excellent policy? Do you mean they report vulnerabilities that don’t require active measures? 🤔
15.11.2025 20:03 — 👍 0 🔁 0 💬 1 📌 0
The call for talks for CAW 2026 (a workshop affiliated with Eurocrypt) is out!
This year's motto is "cryptography under real-world constraints and threat models", but other applied cryptography is also very welcome.
All info is on: caw.cryptanalysis.fun.
Uppfriskande att se att någon har visioner som inte handlar om att utvisa människor eller sätta barn i fängelse.
www.dn.se/varlden/eu-v...
Omni Klimathotet/Svenska krisberedskapen Rubrik: Klimatanpassning på paus: Elva tjänster kvar i landet
Steg 1
Regeringen tar bort anslaget för klimatanpassning
Steg 2
Två av tre tjänster inom förebyggande klimatarbete försvinner
Steg 3
Klimatrelaterade katastrofer blottar luckor i krisberedskapen
Steg 4
Klimatministern läxar upp länsstyrelserna
Steg 5
[inget händer]
¯\_(ツ)_/¯
omni.se/a/73Xzmo
Good post on Merkle tree certificates.
29.10.2025 06:43 — 👍 4 🔁 0 💬 0 📌 0Överskrider kvarvarande koldioxidbudget med 1000 procent • AP-fonderna försvarar sina fossilinvesteringar.
27.10.2025 05:16 — 👍 15 🔁 6 💬 0 📌 0
ABB:s robotikförsäljning till Japan är ett tecken på Sveriges och Europas industriella förtvining.
Där tänker man långsiktigt – här jagar man snabba klipp, skriver @jonasalgers.bsky.social.
WAICT builds on subresource integrity to create an end-to-end transparency solution for web applications. It is still early days, but this looks like great news for web application auditability and trust! 🎉
blog.cloudflare.com/improving-th...
Geostationary satellites are leaking critical data, transmitting sensitive communications in the clear. With just $800 of consumer hardware, researchers intercepted military, telecom, retail, and infrastructure traffic. satcom.sysnet.ucsd.edu/docs/dontloo...
14.10.2025 10:47 — 👍 56 🔁 27 💬 1 📌 4Vad bra Moderaterna mår. (Återigen: Underlaget jag skriver utifrån är alltså officiell SCB-statistik!)
08.10.2025 06:11 — 👍 93 🔁 21 💬 10 📌 1
Påminnelse. År 2025 lever 700 000 människor i materiell och social fattigdom i Sverige. Det är en ökning med 120 000 på ett år. Bara sedan 2021 har andelen fattiga nästan fördubblats, från 3,5% till 6,6%. Ojämlikheten skenar
www.dagensarena.se/innehall/fat...
Ett screenshot med texten ”Min avsikt: Med denna inloggning kommer FinShark AB komma åt följande tjänster i 180 dagar: - Titta på transaktionskonton och kortkoppladekontokopplade kort - Initiera betalningsuppdrag från transaktionskonton”
Jag försökte bli månadsgivare till en organisation jag stödjer, men för att godkänna autogirot var jag tvungen att ge något som heter FinShark tillgång till mitt konto i 180 dagar!? Det känns ju helt bananas! Är det här verkligen det bästa vi kan åstadkomma 2025?
07.10.2025 10:57 — 👍 2 🔁 1 💬 0 📌 0We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EU’s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. signal.org/blog/pdfs/ge...
03.10.2025 16:14 — 👍 3974 🔁 2407 💬 40 📌 140