Size: a a a

2020 July 26

AD

Andrey Dilated in 2ch /pr/
Еще хуже
источник

P

PRISE in 2ch /pr/
Хуево работает инфасотка
источник

AD

Andrey Dilated in 2ch /pr/
Ха
источник

AD

Andrey Dilated in 2ch /pr/
PRISE
Хуево работает инфасотка
Иба пишет не на том языке
источник

AD

Andrey Dilated in 2ch /pr/
Ток илита знает на каком ЯП надо писать
источник

P

PRISE in 2ch /pr/
А ключами ты как обмениваешься?
источник

AD

Andrey Dilated in 2ch /pr/
А всякие лохи пишут на плюсах и простом си
источник

P

PRISE in 2ch /pr/
На сишке сам Диффи хеллмана пишешь?
источник

P

PRISE in 2ch /pr/
Там же нет нихуя
источник

z

zeroid in 2ch /pr/
Я читал что сжимать + шифровать плохо
источник

z

zeroid in 2ch /pr/
Типа надо что то одно
источник

P

PRISE in 2ch /pr/
zeroid
Я читал что сжимать + шифровать плохо
Схуяли
источник

P

PRISE in 2ch /pr/
https + brotli
источник

z

zeroid in 2ch /pr/
PRISE
Схуяли
You should not compress data before encrypting it in most cases. A side-channel attack method known as a "compression oracle" can be used to deduce plaintext data in cases where the attacker can interactively cause strings to be placed into an otherwise unknown plaintext datastream. Attacks on SSL/TLS such as CRIME and BREACH are examples of this.
источник

z

zeroid in 2ch /pr/
источник

P

PRISE in 2ch /pr/
zeroid
You should not compress data before encrypting it in most cases. A side-channel attack method known as a "compression oracle" can be used to deduce plaintext data in cases where the attacker can interactively cause strings to be placed into an otherwise unknown plaintext datastream. Attacks on SSL/TLS such as CRIME and BREACH are examples of this.
Какая-то хуйня нереализуемая 100%
источник

z

zeroid in 2ch /pr/
Ssh?
источник

P

PRISE in 2ch /pr/
zeroid
You should not compress data before encrypting it in most cases. A side-channel attack method known as a "compression oracle" can be used to deduce plaintext data in cases where the attacker can interactively cause strings to be placed into an otherwise unknown plaintext datastream. Attacks on SSL/TLS such as CRIME and BREACH are examples of this.
BREACH is an instance of the CRIME attack against HTTP compression—the use of gzip or DEFLATE data compression algorithms via the content-encoding option within HTTP by many web browsers and servers.[2] Given this compression oracle, the rest of the BREACH attack follows the same general lines as the CRIME exploit, by performing an initial blind brute-force search to guess a few bytes, followed by divide-and-conquer search to expand a correct guess to an arbitrarily large amount of content.
источник

P

PRISE in 2ch /pr/
Не сильно эта хуйня упрощает жизнь бтв
источник

z

zeroid in 2ch /pr/
Уязвимость не уязвимость
источник