Sylvain Pelissier's Avatar

Sylvain Pelissier

@ipolit.bsky.social

20 Followers  |  40 Following  |  1 Posts  |  Joined: 10.05.2023  |  1.6638

Latest posts by ipolit.bsky.social on Bluesky

Preview
USB: the most successful interface that also brings power We use it every day, but how does it really work? USB has been around for almost 30 years and it evolved into really universal interface ...

I use USB daily but I have no idea how it works ๐Ÿค”

USB 2 vs USB 3, USB-A vs USB-C, the PD standardโ€ฆ this talk is full of interesting details ๐Ÿ’Ž

And now I even understand why my USB-C power bank doesnโ€™t work with *this* cable unless flipped ๐Ÿ™ƒ

media.ccc.de/v/why2025-25...

19.08.2025 20:04 โ€” ๐Ÿ‘ 32    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
pallet of phrack

pallet of phrack

๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€

5 pallets of zines have landed at @defcon.bsky.social

05.08.2025 03:15 โ€” ๐Ÿ‘ 26    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations WHY2025 RFID reverse engineering has seen significant advancements, yet a comprehensive overview of the field remains scattered across research and practitioner communities. Here the authors presents a struc...

๐Ÿ”ฅ The future of RFID hacking isnโ€™t dead, its even more...

At #WHY2025, Kirils and I are breaking down current RFID hacking situation

No fluff. Just spilling the beans.

๐Ÿ—“๏ธ 9th of August 13:00 at Andromeda
๐Ÿ”— cfp.why2025.org/why2025/talk...

RT if youโ€™re ready.

13.07.2025 14:40 โ€” ๐Ÿ‘ 7    ๐Ÿ” 7    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Some people keep calling the summer migration to Vegas a campโ€ฆ

But who will sleep in a tent for real? The ones attending @why2025.bsky.social โ›บ๏ธ

27.07.2025 04:27 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
RWC 2026 call for papers Real World Crypto Symposium

The Call for Contributed Talks is now open for RWC 2026! And the deadline for submissions is now Oct. 10, 2025.
rwc.iacr.org/2026/contrib...

13.07.2025 15:52 โ€” ๐Ÿ‘ 13    ๐Ÿ” 9    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐ŸŽ™ Ce jeudi, Vincent Strubel, directeur gรฉnรฉral de l'ANSSI, sera l'invitรฉ de l'รฉmission @quotidienofficiel.bsky.social โ€ฌ diffusรฉe sur TMC.

๐Ÿ“บ Rendez-vous ce soir ร  partir de 19h15 sur le canal 10.

12.06.2025 12:20 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Go Cryptography Security Audit Go's cryptography libraries underwent an audit by Trail of Bits. Read more about the scope and results.

Three Trail of Bits engineers audited core Go cryptography for a month and found only one low-sev security issue... in unsupported Go+BoringCrypto! ๐Ÿพ

Years of efforts on testing, limiting complexity, safe APIs, and readability have paid off! โœจ

Yes I am taking a victory lap. No I am not sorry. ๐Ÿ†

19.05.2025 19:07 โ€” ๐Ÿ‘ 574    ๐Ÿ” 84    ๐Ÿ’ฌ 15    ๐Ÿ“Œ 4
Post image

The second Levchin Prize goes to the CADO-NFS team: Emmanuel Thomรฉ, Pierrick Gaudry, and Paul Zimmerman! Congratulations!

#realworldcrypto

26.03.2025 09:24 โ€” ๐Ÿ‘ 16    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 3
Preview
Blog: Zen and the Art of Microcode Hacking This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.

Ouch, AMD masterclass in what not to do with cryptography to secure its microcode patching mechanism ๐Ÿ˜ฑ โ€ผ๏ธ

08.03.2025 10:49 โ€” ๐Ÿ‘ 5    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Private key extraction in ECDSA upon signing a malformed input (e.g. a string) ### Summary Private key can be extracted from ECDSA signature upon signing a malformed input (e.g. a string or a number), which could e.g. come from JSON network input Note that `elliptic` by...

This is a fascinating vulnerability.

The root causes are implementing deterministic signatures instead of hedged, using a general purpose big number implementation, and leaking its API at the crypto layer.

JavaScript types are a red herring, could have happened in any language.

16.02.2025 10:08 โ€” ๐Ÿ‘ 175    ๐Ÿ” 30    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 2
Preview
Best practices for key derivation By Marc Ilunga Key derivation is essential in many cryptographic applications, including key exchange, key management, secure communications, and building robust cryptographic primitives. But itโ€™s โ€ฆ

Marc Ilunga has written a nice blog post about "Best practices for key derivation":

29.01.2025 07:43 โ€” ๐Ÿ‘ 14    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Pourquoi peut-on pirater un mot de passe de 10 caractรจres en 2 semaines, contre 5 mois l'an passรฉ ? CheckNews, le service de fact-checking de Libรฉration, revient sur une infographie partagรฉe par France Numรฉrique expliquant qu'un pirate pouvait, en 2023, pirater un mot de passe de 10 caractรจres en 2 semaines, alors qu'un tableau ...

@anomalroil.bsky.social : https://www.nextinpact.com/lebrief/71680/pourquoi-peut-on-pirater-mot-passe-10-caracteres-en-2-semaines-contre-5-mois-an-passe

16.05.2023 10:50 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

more postquantum https://blog.taurushq.com/quantum-doomsday-planning-2-2-the-post-quantum-technology-landscape/

09.05.2023 09:34 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@ipolit is following 20 prominent accounts