1LastPass problems uncovered that make the incident so bad (opens in new tab)(heylogin.com)9sufficient3y ago0
2Pin Bypass in Passwordless WebAuthn on Microsoft.com and Nextcloud (opens in new tab)(hwsecurity.dev)7sufficient5y ago3
4Evaluation of VoIP encryption with ZRTP (opens in new tab)(sufficientlysecure.org)1sufficient9y ago0
5How to use the gait (unique pattern how someone walks) for secure pairing? (opens in new tab)(sufficientlysecure.org)1sufficient9y ago0
6A Study of Key-Fingerprints: Hex vs. Base32 vs. Wordlists Vs (opens in new tab)(usenix.org)11sufficient9y ago4
7Surreptitious Sharing: Vulnerability in many popular Android apps (opens in new tab)(ibr.cs.tu-bs.de)1sufficient9y ago0
9OpenKeychain 3.6: Security Audit and Tons of New Features (opens in new tab)(openkeychain.org)3sufficient10y ago1