Security experts often warn against rolling your own crypto, but do we listen? Of course not! This fun talk examines many public implementations of homegrown crypto, including single-sign on, hash functions, and even completely custom encryption functions. A large study was conducted of publicly available custom single-sign on implementations and bugs were found in every single one. How to avoid the same mistakes will be included between the horrors.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek