scrypt
security-research-pocs
scrypt | security-research-pocs | |
---|---|---|
15 | 5 | |
460 | 1,814 | |
0.7% | - | |
7.0 | 1.5 | |
26 days ago | about 3 years ago | |
C | C++ | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
scrypt
-
Looking for file encryption method? (In order to upload cloud)
Check out the scrypt encryption tool.
-
A warning to always remember that Obsidian Sync is potentially dangerous
Given that the encryption algorithm is open source (https://github.com/Tarsnap/scrypt) can you try to explain what you mean here?
-
OpenSSL and a rookie (me)
I wouldn't use OpenSSL personally. If you just need simple but secure symmetric encryption, checkout the scrypt(1) encryption utility from Tarsnap. If you need support for public keys, check out age(1).
- Ask HN: What does everyone use for encrypting their personal stuff?
- Intel and AMD CPUs vulnerable to a new speculative execution attack (RETBLEED)
-
What is the best encryption for files?
scrypt if you strictly only need symmetric encryption.
-
Litecoin 😎
^ "scrypt page on the Tarsnap website". Retrieved 21 January 2014.
-
Ask HN: Where to ask for feedback about a cryptography related tool
First of all I know that "implementing your own cryptography is bad". However, at some point, one does stumble upon a use-case that is not (well) covered by existing tools.
Now, assuming one has already done his due-diligence and has read (and hopefully understood at least the main ideas of) cryptography related articles / posts / etc. (especially in the area pertaining to what one wants to build), and thus we can assume one is not a complete newbie in this mater, however, nor is he an expert. Basically we can assume he is an "amateur".
Where would one go with his design to ask for feedback about it, in the hope to at least eliminate some weaknesses that one (as a non expert) might have overlooked. (I'm not speaking here about "proofs" or "audits".)
----
More specifically ---- but please let's not get into this right now, this being just an example ---- I'm trying to implement something similar to `scrypt` (the encryption utility, that uses the `scrypt` PBKDF, ) or `age` (), as a replacement to my current solution that relies on GnuPG.
- Hat.sh V2 release - simple, fast, secure client-side file encryption.
-
Audacity Is Now A Possible Spyware, Remove It ASAP
It entirely does and that's exactly my point. Most "hashes" are designed to be fast, for data validation/checking whatever. For securing data (passwords, anonymisation, etc) you want a "hash" to be as slow as possible. Scrypt for example is designed to be extremely slow and use much memory (making GPU-based parallelisation useless and driving up the cost of CPU-based work). The default settings for five-second hashes changes their 18 hour estimate to a bit over two years... and that's assuming you don't turn it up further.
security-research-pocs
-
A call to reconsider Linux address-space isolation
> Suppose I'm a typical desktop user, how is important information going to be stolen if I have mitigations turned off and JavaScript enabled?
https://github.com/google/security-research-pocs/tree/master...
I don't imagine I'm going to explain it better than the many others who have already done so.
> What state does my browser have to be in, and what actions do I have to take (or not take) for the attack to succeed?
Your browser would have to be pretty old/ outdated since they've been updated to mitigate these attacks.
> What likelihood is it that someone has deployed an attack that meets those requirements?
That's not a simple question. Threat landscapes change based on a lot of factors. As I said earlier, we won't see these attacks because people have already patched and attackers have other methods.
> So we agree it's OK to leave mitigations off and browse the web?
You can do whatever you want, idk what you're trying to ask here. What is "OK" ? You will be vulnerable but unlikely to be attacked for the reasons mentioned. If you are "OK" with that that's up to you.
-
Intel and AMD CPUs vulnerable to a new speculative execution attack (RETBLEED)
Those attacks relied on performance.now() https://github.com/google/security-research-pocs/blob/d10780...
Chrome has limited "performance.now" to have a relatively low resolution: https://chromium-review.googlesource.com/c/chromium/src/+/85...
Also, "2018 install of win10", you might have already been patched during install.
Microsoft rolled out specture/meltdown mitigations at the OS level in January 2018.
-
New Spectre Vulnerability Version Beats All Mitigations, Performance to Badly Degrade After the Fix
That said, I'm using 'arbitrary' to mean any algorithm can be downloaded and ran without the user doing much; JS is Turing Complete. Additionally, older browsers' JS engines (at least the configuration of them) were feature-rich enough to do the relevant exploits.
- Spectre JavaScript PoCs
- Google released proof-of-concept code to conduct Spectre attacks against its Chrome browser to share knowledge of browser-based side-channel attacks.
What are some alternatives?
age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
GpgFrontend - A free, open-source, robust yet user-friendly, compact and cross-platform tool for OpenPGP encryption. It stands out as an exceptional GUI frontend for the modern GnuPG (gpg).
hat.sh - Encrypt and Decrypt files securely in your browser.
serve - Static file serving and directory listing
react-idle-timer - User activity timer component
PrismJS - Lightweight, robust, elegant syntax highlighting.
phc-winner-argon2 - The password hash Argon2, winner of PHC
browserify - browser-side require() the node.js way
securefs - Filesystem in userspace (FUSE) with transparent authenticated encryption
libsodium.js - libsodium compiled to Webassembly and pure JavaScript, with convenient wrappers.
Material UI - Ready-to-use foundational React components, free forever. It includes Material UI, which implements Google's Material Design.
audacity - Audio Editor