Skip to main content

A feed of recommended external reading

Password managers are an important area with surprisingly little formal analysis and this work emphasized the importance of fixing that.

To be presented at Real World Crypto 2026 and published at USENIX Security 2026.

Full paper can be found here: https://eprint.iacr.org/2026/058.

Bitwarden’s blog post on the subject is here: https://bitwarden.com/blog/security-through-transparency-eth-zurich-audits-bitwarden-cryptography/1.


  1. Specific remediation details can be found in the report linked at the end. ↩︎

The jobs that were dependent on fundamentals of software aren’t going to stop being dependent on fundamentals of software … if you like doing software development, I don’t think interesting software development jobs are going to go away.

One way to tell a weak engineer in a discussion thread about some problem is to see who is bringing in specific facts about how the system currently works, and who is making purely general recommendations that could apply to any system. If their messages could all be public tweets, they’re probably not adding much value.

From USENIX Security 2005!

without [secure deallocation], data can remain in memory for days or weeks, even persisting across reboots.

The span from first write to last read is the ideal lifetime. The data must exist in the system at least this long. The span from first write to deallocation is the secure deallocation lifetime. The span from first write to the first write of the next allocation is the natural lifetime. Because programs often rely on reallocation and overwrite to eliminate sensitive data, the natural lifetime is the expected data lifetime in systems without secure deallocation.