Me now: “ok guess I’m sending a PR to Wycheproof
Me now: “ok guess I’m sending a PR to Wycheproof
Normally I use that to explain to people that they need to minimize excessive complexity in their designs but imagine what designs the team responsible for this code is capable of
This is from the second vuln, where keys' signatures aren't checked before they're stored in the trusted key store.
Why would you ever ship a "TODO, actually validate signatures lol" in your secure messenger?!
Normally I use that to explain to people that they need to minimize excessive complexity in their designs but imagine what designs the team responsible for this code is capable of
When you determine your views as being the midpoint between two opposing positions, it just shows that you don't hold actual beliefs or principles.
When you determine your views as being the midpoint between two opposing positions, it just shows that you don't hold actual beliefs or principles.
The agent responds, "Have you all not learned from the past couple of days?"
"Learned what?" she asks
Then he knocks her phone out of her hand
1. Remember to write 2024 instead of 2023
2. Read about another person “discovering” TPM Genie attacks against use cases that never bothered with that threat model research.nccgroup.com/2018/03/09/t...
1. Remember to write 2024 instead of 2023
2. Read about another person “discovering” TPM Genie attacks against use cases that never bothered with that threat model research.nccgroup.com/2018/03/09/t...