Password hashing algorithms that can transform an existing hash to a different cost setting without knowledge of the password

The password hashing competition, started in 2014 and Argon2 was the winner in 2015, listed evaluation criteria for the competition. There is an interesting one in the Functionality section;

Ability to transform an existing hash to a diff… Continue reading Password hashing algorithms that can transform an existing hash to a different cost setting without knowledge of the password

Does WhatsApp’s link preview on the link messages leak information?

When we want to send a message that contains only a link – such as a question from the Stack Exchange network – WhatsApp displays information from the website as below:

Does this leak information about what was sent, and from who, and to … Continue reading Does WhatsApp’s link preview on the link messages leak information?

Why we are still required to move the mouse when generating the keys in VeraCrypt?

During the setup of a new encrypted volume, the VeraCrypt requires a random mouse movement within the window. If someone looking from the outside can see that a monkey sitting in front of a computer playing with the mouse.
There are good s… Continue reading Why we are still required to move the mouse when generating the keys in VeraCrypt?

INTEL-SA-00086 extracting the secret key used to encrypt Intel CPU code: is the digital signature bypassed?

In a recent attack to INTEL-SA-00086, the researchers are able to extract the secret key that encrypts updates to various Intel CPUs.
In the arstechnica blog it is mentioned as

The key may also allow parties other than Intel—say a malicio… Continue reading INTEL-SA-00086 extracting the secret key used to encrypt Intel CPU code: is the digital signature bypassed?

Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

When a customer talks with a representative of a company in a chat on a web-page, it is possible that they are actually sending every keystroke to their server before you hit the enter or click the send button.

You are barte… Continue reading Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?

When a customer talks with a representative of a company in a chat on a web-page, it is possible that they are actually sending every keystroke to their server before you hit the enter or click the send button.

You are barte… Continue reading Does Real-time typing view in chats invades privacy? Are there any detection and prevention methods?