Posts by dah@bsd.network
 (DIR) Post #9lt7rllNHP0yhNy3Rw by dah@bsd.network
       2019-08-14T19:49:47Z
       
       0 likes, 0 repeats
       
       @infosechandbook @reyk s httpd(8).
       
 (DIR) Post #9mXUwqulIrNC16bbv6 by dah@bsd.network
       2019-09-03T07:16:10Z
       
       0 likes, 0 repeats
       
       @tedu No parles/parlas catalĂ /occitan?
       
 (DIR) Post #9nMI0inBX26OwkH1G4 by dah@bsd.network
       2019-09-27T19:53:06Z
       
       1 likes, 0 repeats
       
       @pony @tedu https://www.ieee-security.org/TC/SP2019/papers/310.pdfTL;DR: There are plenty of implementations, you can find any you imagine:- Default/Master keys- Unsafe storage/wiping of key materials- Bad cypher modes- Bad RNGsJust think about how MS would build software encryption. And what would some random hardware vendor do, to be able to check this extra feature mark?I was pretty surprised though, that MS nevertheless seemed to be silently using this obscure HW HDD encryption if offered.