AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
In this podcast episode, the hosts discuss various topics including Black Hat, cryptography, and the implementation of a post-quantum secure variant of FIDO2. They also touch on the challenges of using JWTs, the danger of confusing RSA signed and RSA encrypted tokens, and the vulnerability of using password encryption in JWTs. Additionally, they mention the competition for shorter post-quantum signatures and the potential use of ski-scheme signatures in the future. The hosts also address the complexities of X.509 certificates, the need to check key usage bits, and the importance of utilizing separate hierarchies for distinct purposes. They wrap up the episode by encouraging listeners to leave positive reviews for the podcast.