Logjam: the latest TLS vulnerability explained

Published on by Filippo Valsorda.

Image: "Logjam" as interpreted by @0xabad1dea. Yesterday, a group from INRIA, Microsoft Research, Johns Hopkins, the University of Michigan, and the University of Pennsylvania published a deep analysis of the Diffie-Hellman algorithm as used in TLS and other protocols. This analysis included a novel downgrade attack against the TLS protocol

Keyless SSL: The Nitty Gritty Technical Details

Published on by Nick Sullivan.

We announced Keyless SSL yesterday to an overwhelmingly positive response. We read through the comments on this blog, Reddit, Hacker News, and people seem interested in knowing more and getting deeper into the technical details. In this blog post we go into extraordinary detail to answer questions about how Keyless