On Cryptography and Security

Some thoughts I've actually managed to put into words.

  • Home

Types of Bitcoin transactions - Part I

This article assumes you have some knowledge how Bitcoin transactions work. If you're new into the world of cryptocurrencies I suggest you this starting page or this awesome video to kick it off.

  • Tomas Susanka
    Tomas Susanka
4 min read

Types of Bitcoin transactions - Part II Segwit

In a previous article we documented what some of the standard Bitcoin transactions are. In 2015, the Bitcoin developers came up with a number of improvements commonly referred to as a Segregated Witness

  • Tomas Susanka
    Tomas Susanka
4 min read

Installing Manjaro on Lenovo IdeaPad 720s

This is probably far from an ideal installation tutorial. It's more of a dump of how I've done this. dd the install iso to a usb disk, you may follow a tutorial on

  • Tomas Susanka
    Tomas Susanka
1 min read

What are TLS extensions?

The widespread Transport Layer Security protocol (TLS), a successor of the better-known SSL protocol, includes a very thoughtful mechanism to add an additional functionality to the protocol. Using the so-called extensions we can

  • Tomas Susanka
    Tomas Susanka
3 min read

My DEF CON talk on Telegram

Articles about Telegram: https://blog.susanka.eu/tag/telegram/ Shortend version of my master thesis on Telegram: https://www.susanka.eu/files/telegram-article.pdf And the full thing: https://www.susanka.eu/files/

  • Tomas Susanka
    Tomas Susanka
1 min read
Telegram

Replay attack vulnerability in Telegram for Android

In November 2016 I've discovered a vulnerability in the Telegram Instant Messenger for Android. This post will describe the discovery, responsible disclosure and Telegram's response. Replay attack A replay attack is an attack

  • Tomas Susanka
    Tomas Susanka
4 min read
Telegram

How to modify general TCP/IP traffic on the fly with Trudy

There are several great tools available to intercept network traffic. Scapy and Wireshark are great tools for passive sniffing and Scapy is also capable of sending additional packets. In case you want to

  • Tomas Susanka
    Tomas Susanka
3 min read
Telegram

How Telegram obfuscates its traffic to allegedly circumvent censorship

The Signal messenger recently incorporated an interesting mechanism to circumvent censorship in some troubled countries, such as Egypt or the UAE. The technique called domain fronting uses popular cloud services like the ones

  • Tomas Susanka
    Tomas Susanka
4 min read
Telegram

IGE Block Cipher Mode

Infinite Garble Extension (IGE) is a lesser-known block cipher mode. OpenSSL implemented IGE back in 2006 as described in its official paper. I came across IGE because of my analysis of Telegram IM

  • Tomas Susanka
    Tomas Susanka
1 min read
On Cryptography and Security © 2023
Latest Posts Twitter Ghost