home.social

#keystore — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #keystore, aggregated by home.social.

  1. #Lokale #Datensicherheit mit #Android #Keystore#Threema:

    Der Schutz lokal gespeicherter Daten ist ein zentraler Aspekt jeder sicheren #Messaging-App – insbesondere dann, wenn wie bei #Threema bewusst auf eine serverseitige Speicherung verzichtet wird. Unter Android stellt der Keystore dafür eine systemseitige Möglichkeit zur sicheren Verwaltung #kryptografischer Schlüssel bereit.

    Threema verfolgt seit jeher einen klaren Ansatz:...

    threema.com/de/blog/android-ke

  2. #Lokale #Datensicherheit mit #Android #Keystore#Threema:

    Der Schutz lokal gespeicherter Daten ist ein zentraler Aspekt jeder sicheren #Messaging-App – insbesondere dann, wenn wie bei #Threema bewusst auf eine serverseitige Speicherung verzichtet wird. Unter Android stellt der Keystore dafür eine systemseitige Möglichkeit zur sicheren Verwaltung #kryptografischer Schlüssel bereit.

    Threema verfolgt seit jeher einen klaren Ansatz:...

    threema.com/de/blog/android-ke

  3. #Lokale #Datensicherheit mit #Android #Keystore#Threema:

    Der Schutz lokal gespeicherter Daten ist ein zentraler Aspekt jeder sicheren #Messaging-App – insbesondere dann, wenn wie bei #Threema bewusst auf eine serverseitige Speicherung verzichtet wird. Unter Android stellt der Keystore dafür eine systemseitige Möglichkeit zur sicheren Verwaltung #kryptografischer Schlüssel bereit.

    Threema verfolgt seit jeher einen klaren Ansatz:...

    threema.com/de/blog/android-ke

  4. #Lokale #Datensicherheit mit #Android #Keystore#Threema:

    Der Schutz lokal gespeicherter Daten ist ein zentraler Aspekt jeder sicheren #Messaging-App – insbesondere dann, wenn wie bei #Threema bewusst auf eine serverseitige Speicherung verzichtet wird. Unter Android stellt der Keystore dafür eine systemseitige Möglichkeit zur sicheren Verwaltung #kryptografischer Schlüssel bereit.

    Threema verfolgt seit jeher einen klaren Ansatz:...

    threema.com/de/blog/android-ke

  5. #Lokale #Datensicherheit mit #Android #Keystore#Threema:

    Der Schutz lokal gespeicherter Daten ist ein zentraler Aspekt jeder sicheren #Messaging-App – insbesondere dann, wenn wie bei #Threema bewusst auf eine serverseitige Speicherung verzichtet wird. Unter Android stellt der Keystore dafür eine systemseitige Möglichkeit zur sicheren Verwaltung #kryptografischer Schlüssel bereit.

    Threema verfolgt seit jeher einen klaren Ansatz:...

    threema.com/de/blog/android-ke

  6. PKI in a Nutshell
    A blog by Ronald

    This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

    #dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

    jdriven.com/blog/2026/04/PKI-i

  7. PKI in a Nutshell
    A blog by Ronald

    This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

    #dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

    jdriven.com/blog/2026/04/PKI-i

  8. PKI in a Nutshell
    A blog by Ronald

    This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

    #dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

    jdriven.com/blog/2026/04/PKI-i

  9. PKI in a Nutshell
    A blog by Ronald

    This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

    #dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

    jdriven.com/blog/2026/04/PKI-i

  10. PKI in a Nutshell
    A blog by Ronald

    This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

    #dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

    jdriven.com/blog/2026/04/PKI-i

  11. Tôi đã xây dựng một hệ thống lưu trữ phân tán với giao thức Raft, 2PC và động cơ lưu trữ tự thiết kế bằng Rust. Dự án Minikv được chia sẻ trên GitHub - cung cấp giải pháp đơn giản cho quản lý cặp khóa-giá trị. #Rust #KeyStore #PhânTán #Raft #2PC #MáyChủLưuTrữ

    reddit.com/r/opensource/commen

  12. #OneMoreSecret is a standalone security layer for your data (e.g. passwords, TOTP tokens, files, and Bitcoin private keys). It leverages the #Android #Keystore system, turning your phone into a hardware #security module. In other words: with OneMoreSecret, you decrypt your secrets with your phone and your fingerprint.
    https://github.com/stud0709/OneMoreSecret

  13. #OneMoreSecret is a standalone security layer for your data (e.g. passwords, TOTP tokens, files, and Bitcoin private keys). It leverages the #Android #Keystore system, turning your phone into a hardware #security module. In other words: with OneMoreSecret, you decrypt your secrets with your phone and your fingerprint.
    https://github.com/stud0709/OneMoreSecret

  14. 🗓 Khal di #Inleo : "Partecipate con noi all'evento di lancio in diretta!

    Registrati con #Keystore, guadagna in #DASH

    La nostra partnership con l'ecosistema #Dashpay è ora attiva 🚀 "

    📣 LIVE OGGI Martedì 26 Novembre ore 18.00!

    x.com/khalkaz/status/186129091

  15. Abbiamo pubblicato la registrazione del nostro incontro di Ottobre 2024 🎃

    Potete rivedere gli splendidi talk di Matteo Vitali @trotto e Marco Pagliaricci 🚀

    Correte sul nostro canale YouTube 👇
    youtu.be/JxwPAoPfFv0?si=KBsYyF

    #Python #Pescara #YouTube #DevSecOps #KeyStore #PyBeer

  16. Abbiamo pubblicato la registrazione del nostro incontro di Ottobre 2024 🎃

    Potete rivedere gli splendidi talk di Matteo Vitali @trotto e Marco Pagliaricci 🚀

    Correte sul nostro canale YouTube 👇
    youtu.be/JxwPAoPfFv0?si=KBsYyF

    #Python #Pescara #YouTube #DevSecOps #KeyStore #PyBeer

  17. Abbiamo pubblicato la registrazione del nostro incontro di Ottobre 2024 🎃

    Potete rivedere gli splendidi talk di Matteo Vitali @trotto e Marco Pagliaricci 🚀

    Correte sul nostro canale YouTube 👇
    youtu.be/JxwPAoPfFv0?si=KBsYyF

    #Python #Pescara #YouTube #DevSecOps #KeyStore #PyBeer

  18. Abbiamo pubblicato la registrazione del nostro incontro di Ottobre 2024 🎃

    Potete rivedere gli splendidi talk di Matteo Vitali @trotto e Marco Pagliaricci 🚀

    Correte sul nostro canale YouTube 👇
    youtu.be/JxwPAoPfFv0?si=KBsYyF

    #Python #Pescara #YouTube #DevSecOps #KeyStore #PyBeer

  19. Abbiamo pubblicato la registrazione del nostro incontro di Ottobre 2024 🎃

    Potete rivedere gli splendidi talk di Matteo Vitali @trotto e Marco Pagliaricci 🚀

    Correte sul nostro canale YouTube 👇
    youtu.be/JxwPAoPfFv0?si=KBsYyF

    #Python #Pescara #YouTube #DevSecOps #KeyStore #PyBeer

  20. PinLockSreen на основе KeyStore. Kotlin. Jetpack Compose

    В данной любительской статье разберемся, что такое KeyStore в контексте мобильной разработки, для чего нужен и применим его в крайне легком варианте. Также погрузимся в разработку экрана входа в ваше приложение. Статья будет разделена на 3 так называемых раздела — KeyStore, UI и ViewModel.

    habr.com/ru/articles/831914/

    #kotlin #android_development #android_apps #android #jetpack_compose #keystore #viewmodel #ui #github

  21. PinLockSreen на основе KeyStore. Kotlin. Jetpack Compose

    В данной любительской статье разберемся, что такое KeyStore в контексте мобильной разработки, для чего нужен и применим его в крайне легком варианте. Также погрузимся в разработку экрана входа в ваше приложение. Статья будет разделена на 3 так называемых раздела — KeyStore, UI и ViewModel.

    habr.com/ru/articles/831914/

    #kotlin #android_development #android_apps #android #jetpack_compose #keystore #viewmodel #ui #github

  22. PinLockSreen на основе KeyStore. Kotlin. Jetpack Compose

    В данной любительской статье разберемся, что такое KeyStore в контексте мобильной разработки, для чего нужен и применим его в крайне легком варианте. Также погрузимся в разработку экрана входа в ваше приложение. Статья будет разделена на 3 так называемых раздела — KeyStore, UI и ViewModel.

    habr.com/ru/articles/831914/

    #kotlin #android_development #android_apps #android #jetpack_compose #keystore #viewmodel #ui #github

  23. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  24. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  25. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  26. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  27. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  28. For lengthy bureaucratic reasons you don't want to know about, I'm trying to avoid adding a dependency to my #python project.

    Is there a relatively straightforward way to open a #java #keystore/#truststore *without* adding a package?

    I would almost prefer to system('keytool....') than add a package.

  29. For lengthy bureaucratic reasons you don't want to know about, I'm trying to avoid adding a dependency to my #python project.

    Is there a relatively straightforward way to open a #java #keystore/#truststore *without* adding a package?

    I would almost prefer to system('keytool....') than add a package.

  30. For lengthy bureaucratic reasons you don't want to know about, I'm trying to avoid adding a dependency to my project.

    Is there a relatively straightforward way to open a /#truststore *without* adding a package?

    I would almost prefer to system('keytool....') than add a package.

  31. For lengthy bureaucratic reasons you don't want to know about, I'm trying to avoid adding a dependency to my #python project.

    Is there a relatively straightforward way to open a #java #keystore/#truststore *without* adding a package?

    I would almost prefer to system('keytool....') than add a package.

  32. For lengthy bureaucratic reasons you don't want to know about, I'm trying to avoid adding a dependency to my #python project.

    Is there a relatively straightforward way to open a #java #keystore/#truststore *without* adding a package?

    I would almost prefer to system('keytool....') than add a package.