this post was submitted on 18 Nov 2024
11 points (92.3% liked)

Cybersecurity

5697 readers
216 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
top 1 comments
sorted by: hot top controversial new old
[–] BorisBoreUs@lemmy.world 8 points 21 hours ago

This is above my 'not keen on cryptographic maths' head. Can someone dumb this down and explain its usefulness in plain terms? I attempted to read the overview but it was also like Sanskrit to me. Is this a big change for public key encryption or maybe a more efficient way of processing the math, or just an alternate method someone has found?