Tag: timing attack

  • MCP Server Cloud – The Model Context Protocol Server Directory: Slowtime MCP Server – MCP Server Integration

    Source URL: https://mcpserver.cloud/server/slowtime-mcp-server Source: MCP Server Cloud – The Model Context Protocol Server Directory Title: Slowtime MCP Server – MCP Server Integration Feedly Summary: AI Summary and Description: Yes **Summary:** The text outlines the architecture and functionality of the Slowtime MCP Server, which utilizes a Model Context Protocol for secure time-based operations, highlighting its features…

  • Hacker News: Double-keyed caching: Browser cache partitioning

    Source URL: https://addyosmani.com/blog/double-keyed-caching/ Source: Hacker News Title: Double-keyed caching: Browser cache partitioning Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the transition from traditional web caching models to Double-keyed Caching due to privacy concerns. This change fundamentally alters resource retrieval and storage in browsers, impacting performance and impacting web architecture strategies.…

  • Hacker News: Listen to the whispers: web timing attacks that work

    Source URL: https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work Source: Hacker News Title: Listen to the whispers: web timing attacks that work Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text introduces novel web timing attack techniques capable of breaching server security by exposing hidden vulnerabilities, misconfigurations, and attack surfaces more effectively than previous methods. It emphasizes the practical…

  • Wired: YubiKeys Are a Security Gold Standard—but They Can Be Cloned

    Source URL: https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/ Source: Wired Title: YubiKeys Are a Security Gold Standard—but They Can Be Cloned Feedly Summary: Security researchers have discovered a cryptographic flaw that leaves the YubiKey 5 vulnerable to attack. AI Summary and Description: Yes Summary: The text discusses a critical vulnerability in the YubiKey 5 hardware token due to a side-channel…