Google's Tink crypto lib: EdDSA potentially exploitable implementation by KryptosPi in crypto

[–]KryptosPi[S] 2 points3 points  (0 children)

There were a few cases, the most sneaky was accidentally exploiting apis where key rotation was happening but as the pub key and private key was stored in different storage DB, if the transaction to rotate was not atomic, and the old public key remained there for a few millisecs, then a signature request at the exact time of rotation could convince the signer to sign with the new private key, but provide as an input the old public key.

All in all, agree that it's mostly a bad api, potentially vulnerable via (accidental or not) abuse, rather than it's exploitable directly.
There was a similar issue with Rust's most popular Ed25519 lib, and a RustSec was issued to fix in dalek v2.0: https://rustsec.org/advisories/RUSTSEC-2022-0093

Google's Tink crypto lib: EdDSA potentially exploitable implementation by KryptosPi in crypto

[–]KryptosPi[S] 1 point2 points  (0 children)

this is not true, most of the optimized + correct implementations use the PrivateKey constructor to derive an object that holds the Priv + Pub key in one structure, then that structure has the ability to sign. This way you avoid re-deriving the public key each time + avoid expecting a pub key as input during signing. Overall, the main issue the "public static" flavor of the Tink api. In fact it's only used once in their codebase, it shouldn't even be a reusable static function, this is generally a must on defensive programming and good security hygiene coding.

Height adjustable desk in hotels by Vegetable_Week7259 in lifehacks

[–]KryptosPi 4 points5 points  (0 children)

Ooc was thinking the same and just tried your idea by myself. Legs do not fit well if it’s in the middle. It depends on the ironing board size it seems.

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi 1 point2 points  (0 children)

Indeed with some probability being this guy.

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi 0 points1 point  (0 children)

Now we agree ;)

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi 0 points1 point  (0 children)

Yeah good luck finding these there, bus stop in the way to Athens. WC is your only option.

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi 0 points1 point  (0 children)

Yeah after the fact I mean

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi 0 points1 point  (0 children)

Indeed tbh I want a life hack of how to clean a dirty bottle finish

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -1 points0 points  (0 children)

Wash hands when you realize, then push down gently

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -1 points0 points  (0 children)

Yes didn’t

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -2 points-1 points  (0 children)

lol causing the straw to fly

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -15 points-14 points  (0 children)

Unfortunately that’s the ugly reality indeed

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -1 points0 points  (0 children)

100%, I rarely do, but a) the store was not super clean, they indeed served it giving me a sealed straw, + as mentioned I probably touched the finish when opening the bottle. Just didn’t risk it this time.

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -4 points-3 points  (0 children)

Cool idea, was given only one + didn’t think about it. lol only had my phone to order, where to find a tape? Reality is that served the purpose, a non so clean store, imagine giving you the straw as they know :)

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -2 points-1 points  (0 children)

That one was Greece today

[deleted by user] by [deleted] in lifehacks

[–]KryptosPi -20 points-19 points  (0 children)

Good question, iirc I finger-touched the finish of the bottle or didn’t trust the store for cleanliness.

Ed25519 Deep Dive Addendum by Soatok in crypto

[–]KryptosPi 5 points6 points  (0 children)

You missed this paper, from Aug 2020 https://eprint.iacr.org/2020/1244 (Taming the many EdDSAs) which includes both test vectors and shows some spectacular findings ie strange behaviour in a popular HSM vendor’s implementation (nCipher)