from the Security Cryptography Whatever podcast, talking about openssl API design choices: https://youtu.be/jhdLja5mWbU

YouTube
Obviously you have to do a string compare to do AES GCM in OpenSSL 3
@jann@infosec.exchange
human borrow checker (but logic bugs are best bugs).
works at Google Project Zero.
The density of logic bugs (compared to memory corruption bugs) goes down as the privilege differential between attacker context and target context goes up.
from the Security Cryptography Whatever podcast, talking about openssl API design choices: https://youtu.be/jhdLja5mWbU

YouTube
Obviously you have to do a string compare to do AES GCM in OpenSSL 3posteo does have a thing where incoming email is cryptographically protected when being stored to disk, in a way that ties back to the user's password; https://posteo.de/en/site/encryption#cryptomailstorage documents this and Posteo's interpretation of what they can be compelled to do under german law.
posteo.de
Email green, secure, simple and ad-free - posteo.de - EncryptionPosteo is an innovative email provider that is concerned with sustainability and privacy and is completely ad-free. Our email accounts, calendars and address books can be synchronised - we use comprehensive encryption.
Thanks for your interest in trying out Elk, our work-in-progress Mastodon web client!
Expect some bugs and missing features here and there. we are working hard on the development and improving it over time.
Elk is Open Source. If you'd like to help with testing, giving feedback, or contributing, reach out to us on GitHub and get involved.
To boost development, you can sponsor the Team through GitHub Sponsors. We hope you enjoy Elk!