The Intercept about Zoom:
A recent analysis of Zoom's encryption techniques, with key servers in China and 128-bit AES-ECB. Also, their reactions and recent changes.

It highlights why investing in cyber security is more than asking developers to encrypt traffic.

Personally, I like to see this 'textbook knowledge' from my master (CybSec @ utwente) in articles like this :) Makes you appreciate courses like Security & Crypto, even though I already failed it twice... :')

Yeah this shows what the infosec community needs to be doing much more.

Interesting course btw, especially if it's difficult. Can you share some of the books, reading material used?

"Three times ship law." Hope you ace it next time.

Sign in to participate in the conversation
Mastodon U. Twente

A social network for the University of Twente community. Anyone with an or @* email address can create an account here and participate in the global fediverse with millions of other users. This means that students, staff and alumni can create an account here. Content does not reflect the opinions or policies of the University of Twente.
We support \( \LaTeX \) formulas: Use \( and \) for inline LaTeX formulas, and \[ and \] for display mode.