vulnerability disclosure

GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature (The Hacker News article)

2018/06/15: Article about the SigSpoof vulnerability which makes it possible for attackers to fake digital signaturesRead more

Intigriti bug bounty

2017 : Intigriti launched its bug bounty program.Read more
Efail or OpenPGP is safer than S/MIME (W. Koch email)

2018/05/14: Werner Koch statement on EFAIL vulnerabilities concerning OpenPGP and S/MIME encrypted emailRead more

Kerckhoffs - La cryptographie militaire (Part Two)

1883/02 : Auguste Kerckhoffs writes the first part of « La cryptographie militaire » in Journal des sciences militaires (vol. IX, pp. 161–191).Read more

Google Open Source Vulnerabilities (OSV)

2021/02/05 : Google launches OSV (Open Source Vulnerabilities).
"The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consumers of open source software accurately identify if they are impacted and then make security...Read more

Borchers Detlef - Bankraub per Telefon (on BTX-Hack)
Retro 2018 / S. 66 / Heise Magazine : Detlef Borchers explains the BTX-Hack

1984 : Two members of the Chaos Computer Club (CCC) hacked BTX, by stealing 135 000Marks. They wanted to prove...Read more

Improving the Security of Your Site by Breaking Into it

"In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, we will look through the eyes of a potential intruder, and show why it is one. We will illustrate that even seemingly harmless network services can...Read more

Microsoft Says No to Paying Bug Bounties (Fisher paper)

2010/07/22 : "Microsoft has no plans to follow in the footsteps of Mozilla and Google and pay researchers cash rewards for the bugs that they find in Microsoft’s products."

This artifact is part of the ...Read more

Trapdoor commitments in the SwissPost e-voting shuffle proof

2019/03/12 : Report of researchers who found a vulnerability in the SwissPost e-voting shuffle. The trapdoor commitment scheme allows an undetectable vote manipulation.

Full version hereRead more

Subscribe to vulnerability disclosure