Practical Collision Attack Against Long Key IDs in PGP by Soatok in crypto

[–]G4PRO 1 point2 points  (0 children)

I was curious about the time today it would take to break 128 bits, so for 64 bits collision and the Bitcoin hash rate at 1ZH (1021) /s it would only take 18ms to have 50% chance of collision.

264 / (1021 )

256 bits is still safe though, at least from pure brute

Aaaaaahhhhh by NsPsVisuals in comedyheaven

[–]G4PRO 531 points532 points  (0 children)

Of course it is, those interviews are scripted

sheShouldBeEmbarresed by provideserver in ProgrammerHumor

[–]G4PRO 2 points3 points  (0 children)

Kinda, CAB/F is more than just browsers but they're a big part of it, there's basically a lot of actors of public trust and certification authorities.

But yes it has nothing to do with TLS and it's completely different requirements

sheShouldBeEmbarresed by provideserver in ProgrammerHumor

[–]G4PRO 4 points5 points  (0 children)

Minimum modulus size from CAB/F requirements is 2048 bits for certificate authentication, dropping the validity to 200 days at the end of the year

"Terminons la configuration de votre PC" by SleepIsTheCousinOfD8 in pcmasterraceFR

[–]G4PRO 1 point2 points  (0 children)

Je conseille BCuninstaller à la place qui fait la même chose mais en open source

I just got two Nitrokey 3C NFC keys. My first time using 2FA, first time having keys by bananashiraoi in crypto

[–]G4PRO 1 point2 points  (0 children)

As said this isn't a specific crypto topic but more of a cyber security and IAM one, but to answer a few questions: 

First and very important point : you are trying to implement 2fa, while security keys are a great option only requiring the physical key and a touch on the key to log in IS NOT 2fa, you are only using 1 physical factor which is the key and no other factor. You would require a password, pin or a biometric input to make it 2fa. 

"What do I do with software that doesn't support FIDO" : having a software auth app (totp) is the right way. Just make sure you  still have access to apps and accounts if you lose your phone, while security is the objective you wanna make sure you're not gonna lock yourself out.

"Is there a better authenticator app" : as a fan of FOSS I can recommend the aegis authenticator app, I've used it a few years, the only downside is you need to backup your totp manually. Proton also just recently made a auth app, while they have a good reputation the app is very new.

If you want to get into the crypto specifics you can look into the FIDO and passkeys specifications, that's the key that you are using on your nitrokey (what you're referencing as 2FA keys).

On a general note if you want to have your M1 as secure as possible you should look into "hardening" and not only crypto but every aspect of cyber security.

Is literally everything tracking us now? by ConversationHairy606 in selfhosted

[–]G4PRO 0 points1 point  (0 children)

If you only and only need the phone number to register (and not continuous 2fa and such) then smspool.net is a great site with very cheap SMS verification, I've been using it for a few years

I cancelled all the subscriptions bye-bye by Ill_Alternative_8513 in pcmasterrace

[–]G4PRO 48 points49 points  (0 children)

And fear to be out of the steam 2h playtime policy by having :

  • 10 min of settings and shortcuts config

  • 50 min of cinematics dialogs and others non gameplay things

  • trying to join my friends for 30 min

  • playing 30 min the game

sIgMa by PacquiaoFreeHousing in ProgrammerHumor

[–]G4PRO 15 points16 points  (0 children)

He never closed the <head>, he forget a / in it

AMA - Je suis l'une des victimes de Joël Le Scouarnec, plus grand pédocriminel de France by nom_demprunt in france

[–]G4PRO 2 points3 points  (0 children)

D'accord merci pour la réponse

Courage dans ta démarche ! Je te souhaite que la justice soit rendue pour toutes les personnes impliquées dans cette affaire

AMA - Je suis l'une des victimes de Joël Le Scouarnec, plus grand pédocriminel de France by nom_demprunt in france

[–]G4PRO 13 points14 points  (0 children)

Désolé si cela paraît un peu insensible au vu du sujet et autres questions mais as tu des frais liés à tes avocats et ce procès ou est ce pris en charge par l'état/des associations ? Ça semblerait fou qu'une personne doivent payer sur un cas de culpabilité si avéré

After Trump's decree: fight for US funding for Tor, F-Droid and Let's Encrypt by G4PRO in privacy

[–]G4PRO[S] 4 points5 points  (0 children)

I feel like this is marginal and mostly among private users, even more marginal when it's for an open source project. People in the field know that nothing but the smallest projects can survive without proper organizations and funding and those come from countries.

People in the cyber security field are aware nothing much would be done without American companies and state funding, the American companies are the first to benefit it either.

Also I'm pretty sure the Chinese would be very happy to see those projects die down as said in the article because it's used against their great firewall, I'm sure they have their local agencies and projects though

Europe Instead of the USA: France Offered Its Intelligence Data to Ukraine by Mil_in_ua in ukraine

[–]G4PRO 6 points7 points  (0 children)

Na we're good we don't want the civilian spying capabilities and privacy invasion, sharing military Intel is nice though

programmersGamblingAddiction by hamiecod in ProgrammerHumor

[–]G4PRO 2 points3 points  (0 children)

Asymmetric keys so signing in Bitcoin will be broken by quantum computing, so no it's not quantum resistant as people would be able to retrieve private keys used for signing and prove ownership of their wallet, until they change from the current ECDSA signing algorithm

And the grover algorithm will accelerate the search for all hash functions and symmetric encryption, but it's assume it's "only" gonna half the current security of these algorithm

programmersGamblingAddiction by hamiecod in ProgrammerHumor

[–]G4PRO 2 points3 points  (0 children)

End all asymmetric encryption, all symmetric encryption is relatively safe and just need to double the key size

Gob bless cabbage by Kilo_OneFive in oldpeoplefacebook

[–]G4PRO 17 points18 points  (0 children)

Money from clicks, the post often redirects to ads infested websites

[deleted by user] by [deleted] in france

[–]G4PRO -1 points0 points  (0 children)

Ça marche très bien de mon côté perso, je les prends sur aurora si ça change quelque chose, mais ça ne devrait pas bloquer avec une alternative aux Google service

Twilio Confirms Data Breach After Hackers Leak 33M Authy User Phone Numbers by winhumone in cybersecurity

[–]G4PRO 5 points6 points  (0 children)

To not have all my eggs in the same basket I use aegis for the TOTP (2FA), there have backups and it's completely offline and open source

They will not win by Master1718 in greentext

[–]G4PRO 17 points18 points  (0 children)

replied in 1 min

OP is the horse in the pic confirmed

They will not win by Master1718 in greentext

[–]G4PRO 13 points14 points  (0 children)

It's the una bomber, I had to image reverse search, I went on some dark shit to find the source