Revisiting: Pre-hash password before applying bcrypt to avoid restricting password length

Okta released a security advisory 4 days ago, stating that accounts with username longer than 52 characters can login with arbitrary password under specific conditions.
Some people in X/Twitter suspect that Okta use userid + username + pas… Continue reading Revisiting: Pre-hash password before applying bcrypt to avoid restricting password length

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

What is the point of a gpg file alongside the hash of a Linux ISO download? [duplicate]

I use linux and tend to distro hop a lot. I’ve noticed often that the distributions offer that you verify the download with a sha256sum hash and a GPG key.
My understanding is that a file, e.g. a linux .iso file will have an (almost) uniqu… Continue reading What is the point of a gpg file alongside the hash of a Linux ISO download? [duplicate]

Implications of SHA256 implementation producing false / unexpected hashes

I found that one of our programs uses an sha256 implementation, that produces different hashes for same inputs, compared to standard libraries (in this case compared to node:crypto and Web Crypto API.
The hashes are different for character… Continue reading Implications of SHA256 implementation producing false / unexpected hashes