1. 15
  1. 1


    Crap crap.

    Crap crap crap crap crap.

    1. 2

      game over man, game over.

    2. 1

      Good grief. VOIP / video conferencing leaking your secret keys !

      1. 2

        Provided you use them 91 times to sign the same message, if I am reading this correctly.

        1. 1

          If I understand the paper correctly, they are suggesting that ECDSA is often implemented so that if you supply the same key, the code will calculate the same nonce & you can track that calculation to leak the nonce & therefore the secret key used by the other party. So simply connecting with the same ECDSA parameters is sufficient?