Why Nostr? What is Njump?
2023-03-09 04:01:32

rcarback on Nostr: "Then, we show how this vulnerability can be used to construct second preimages and ...

"Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. " 💥🔥

https://eprint.iacr.org/2023/331
Author Public Key
npub1cac5f9tvz8k8wvnyjpnfm46m022vr0tdu554de0zrfk35qunq72s5lmnv7