Preparing for a post-quantum future

Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algo… Continue reading Preparing for a post-quantum future

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. My goal is to capture and analyze the h… Continue reading How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

My android is locked out because it says my device is not allowed to view my password due to the encrypt, how do I get my access back and remove [migrated]

How do I go about getting the encrypt of my android google account so I can view my password and use my account like before

Continue reading My android is locked out because it says my device is not allowed to view my password due to the encrypt, how do I get my access back and remove [migrated]

Could this method allow two people using weak cryptography to bootstrap their way to unbreakable cryptography (e.g. otp) [migrated]

Encryption schemes are usually explained to the general public in terms of "time required to break" where strong encryption like AES-256 should in theory take millions of years.
Given that secure random numbers streams are incomp… Continue reading Could this method allow two people using weak cryptography to bootstrap their way to unbreakable cryptography (e.g. otp) [migrated]

Securing Online Business Transactions: Essential Tools and Practices

Enhance your online transaction security with encryption, VPNs, and authentication. Understand threats, address vulnerabilities, and use secure payment gateways. Stay compliant with PCI DSS and regulatory standards to protect your business and build cu… Continue reading Securing Online Business Transactions: Essential Tools and Practices

Omit IV for AES128-CBC when requiring to always get the same ciphertext encrypting random IDs

Imagine having images stored in a system with their 256 bit hash (BLAKE2b) as their unique ID. We want to produce a URL for each image, something like:
https://host/images/cleartext-image-ID

In order for one user not to be able to steal t… Continue reading Omit IV for AES128-CBC when requiring to always get the same ciphertext encrypting random IDs