Settings

Theme

Cryptographic Data Structures

blog.bren2010.io

62 points by bren2013 11 years ago · 2 comments

Reader

rawnlq 11 years ago

What are some applications of this? If an attacker has access to memory there's not much left you can do right?

Or is the use case similar to why you would want to zero out the memory used to store password strings?

  • bren2013OP 11 years ago

    There are lots of scenarios where you would want to let an untrusted intermediary handle critical operations for you without actually having to build trust with them.

    Typical example: Certificate authorities distribute CRLs primarily through untrusted channels and third parties to lower their operating cost. The CRLs are signed so its a win-win for everybody.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection