Brotli compression algorithm and BREACH attack
I spent a lot of time on BREACH attack implementations. In theory, Brotli compression, like other compressions that use lzz7 family algorithms, must be vulnerable to the BREACH attack.
Experiences and tests that I did on a t… Continue reading Brotli compression algorithm and BREACH attack