Tag: signatures

  • Rekt: ByBit – Rekt

    Source URL: https://www.rekt.news/bybit-rekt Source: Rekt Title: ByBit – Rekt Feedly Summary: $1.43B heist on ByBit claims the throne on our Rekt Leaderboard! Lazarus pulled off the perfect digital sleight-of-hand, making multisig signers see legitimate transactions while signing away the keys to the kingdom. Now ByBit’s offering $140M to catch the hackers. AI Summary and Description:…

  • Hacker News: The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived

    Source URL: https://blog.trailofbits.com/2025/02/21/the-1.5b-bybit-hack-the-era-of-operational-security-failures-has-arrived/ Source: Hacker News Title: The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant operation security breach in the cryptocurrency domain, highlighting how sophisticated attackers, particularly North Korean state-sponsored threat actors, have shifted from exploiting vulnerabilities…

  • Cloud Blog: Announcing quantum-safe digital signatures in Cloud KMS

    Source URL: https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms/ Source: Cloud Blog Title: Announcing quantum-safe digital signatures in Cloud KMS Feedly Summary: The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential…

  • Cloud Blog: Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure

    Source URL: https://cloud.google.com/blog/topics/systems/mitigating-power-and-thermal-fluctuations-in-ml-infrastructure/ Source: Cloud Blog Title: Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure Feedly Summary: The recent explosion of machine learning (ML) applications has created unprecedented demand for power delivery in the data center infrastructure that underpins those applications. Unlike server clusters in the traditional data center,…

  • Hacker News: How (not) to sign a JSON object (2019)

    Source URL: https://www.latacora.com/blog/2019/07/24/how-not-to/ Source: Hacker News Title: How (not) to sign a JSON object (2019) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed examination of authentication methods, focusing on signing JSON objects and the complexities of canonicalization. It discusses both symmetric and asymmetric cryptographic methods, particularly emphasizing the strengths…

  • Hacker News: A Brief History of Code Signing at Mozilla

    Source URL: https://hearsum.ca/posts/history-of-code-signing-at-mozilla/ Source: Hacker News Title: A Brief History of Code Signing at Mozilla Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text explores the evolution of code signing processes at Mozilla, detailing the complexity of securely shipping software to end-user devices over the last two decades. It emphasizes improvements in automation…