vulnerability disclosure

How Not To Secure An Election (OP Presentation)

2019/10/17: Open Privacy Presentation given by Sarah Jamie Lewis retracing the timeline of events around the Swiss Post e-voting system bug bounty and vulnerability disclosures made by her teamRead more

Black Hat 2000 - Ranum and Granick VS Rausch and Amhed

April 2000, at the Black Hat Conference (Singapour) took place a debate with Ranum and Granick against Rausch and Amhed.Read more
Is the iDefense challenge worth it? (Chickowski paper)

2006/02/23 : Ericka Chickowski writes upon iDefense rewards and their way of working with enterprises and hackers. 

This artifact is part of the iDefense Bundle...Read more

Schneier - Cypto-Gram July 15, 2000

2000/07/15 : Bruce Schneier publishes his monthly crypto-gram, talking about the full disclosure CIA just faced and Counterpane Internet Security News, among other things.

This artifact is part of the ...Read more

Verschlüsselte E-Mails sind nicht sicher (Süddeutsche article)

2018/05/14: Article on the EFAIL vulnerbilities concerning OpenPGP and S/MIME encrypted emailRead more

"Ceci n’est pas une preuve : The use of trapdoor commitments in Bayer-Groth proofs and the implications for the verifiabilty of the Scytl-SwissPost Internet voting system"

2019/03/12: Report of researchers who found a vulnerability in the SwissPost e-voting shuffle. The trapdoor commitment scheme allows an undetectable vote manipulation. Two examples are shown in the report

Brief Summary hereRead more

Encrypted Email Has a Major, Divisive Flaw (Wired article)

2018/05/14: Article on the story of the EFAIL vulnerabilities concerning OpenPGP and S/MIME encrypted emailRead more

HackerOne bug bounty

2012 : HackerOne launched its bug bounty program.Read more
Subscribe to vulnerability disclosure