Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Ed25519-unsafe-libs Alternatives
Similar projects and alternatives to ed25519-unsafe-libs
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a better ed25519-unsafe-libs alternative or higher similarity.
ed25519-unsafe-libs reviews and mentions
Posts with mentions or reviews of ed25519-unsafe-libs.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-04.
-
Is my transaction signature system secure for my blockchain? (audit)
I tried to explain to you last time you asked about "your own crypto" that the answer always will be "it's not good, don't do it". First thing that strikes me is that you take public key from the provided data, which suggests a trivial attack like in https://github.com/MystenLabs/ed25519-unsafe-libs
- Vulnerability in the elliptic curve lib used by Trezor (among others)! Has this been disclosed by Trezor team?
- List of unsafe ed25519 signature libs
-
Initial impact report about this week's EdDSA Double-PubKey Oracle attack in 40 affected crypto libs
original findings and audit report by MystenLabs' Cryptography Chief + continuously updated list of affected libs: https://github.com/MystenLabs/ed25519-unsafe-libs
-
40 unsafe ed25519 libs where private key can be leaked via signing api misuse
TL;DR A new audit report revealed that the signing api of many ed25519 libs (some of them very popular) unfortunately expects a public key as input. An attacker may extract the private key by requesting two different signatures for the same message and private key, but on purpose for a different public key. Applications should not expose this api publicly and should refactor it to protect devs against accidental api misuse. Read more: https://github.com/MystenLabs/ed25519-unsafe-libs and https://blog.safeheron.com/blog/safeheron-originals/analysis-on-ed25519-use-risks-your-wallet-private-key-can-be-stolen
-
A note from our sponsor - InfluxDB
www.influxdata.com | 27 Apr 2024
Stats
Basic ed25519-unsafe-libs repo stats
5
212
3.8
6 months ago
MystenLabs/ed25519-unsafe-libs is an open source project licensed under MIT License which is an OSI approved license.
The primary programming language of ed25519-unsafe-libs is Rust.
Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com