### Notes on blind signatures over elliptic curves
In this notes, we will cover the scheme proposed at *"New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem"* paper by Hamid Mala & Nafiseh Nezhadansari.
## CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests
### CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests
The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker.
<metaname="description"content="In this notes, we will cover the scheme proposed at 'New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem' paper by Hamid Mala & Nafiseh Nezhadansari."/>
<metacharset="utf-8">
<title>Notes on blind signatures over elliptic curves - ArnauCube - Blog</title>
<metaname="title"content="Notes on blind signatures over elliptic curves - ArnauCube - Blog">
<title>Notes on blind signatures over elliptic curves - arnaucube</title>
<metaname="title"content="Notes on blind signatures over elliptic curves - arnaucube">
<metaname="description"content="In this notes, we will cover the scheme proposed at 'New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem' paper by Hamid Mala & Nafiseh Nezhadansari.">
<metaproperty="og:title"content="Notes on blind signatures over elliptic curves - ArnauCube - Blog"/>
<metaproperty="og:title"content="Notes on blind signatures over elliptic curves - arnaucube"/>
<metaproperty="og:description"content="In this notes, we will cover the scheme proposed at 'New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem' paper by Hamid Mala & Nafiseh Nezhadansari."/>
<metaname="twitter:title"content="Notes on blind signatures over elliptic curves - ArnauCube - Blog">
<metaname="twitter:title"content="Notes on blind signatures over elliptic curves - arnaucube">
<metaname="twitter:description"content="In this notes, we will cover the scheme proposed at 'New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem' paper by Hamid Mala & Nafiseh Nezhadansari.">
<metaname="description"content="How has this blog been made? In this post we will see how to develop a minimalistic static blog template engine with Go."/>
<metacharset="utf-8">
<title>Static blog template engine implementation in Go - ArnauCube - Blog</title>
<metaname="title"content="Static blog template engine implementation in Go - ArnauCube - Blog">
<title>Static blog template engine implementation in Go - arnaucube</title>
<metaname="title"content="Static blog template engine implementation in Go - arnaucube">
<metaname="description"content="How has this blog been made? In this post we will see how to develop a minimalistic static blog template engine with Go.">
<metaproperty="og:title"content="Static blog template engine implementation in Go - ArnauCube - Blog"/>
<metaproperty="og:title"content="Static blog template engine implementation in Go - arnaucube"/>
<metaproperty="og:description"content="How has this blog been made? In this post we will see how to develop a minimalistic static blog template engine with Go."/>
<metaname="twitter:title"content="Static blog template engine implementation in Go - ArnauCube - Blog">
<metaname="twitter:title"content="Static blog template engine implementation in Go - arnaucube">
<metaname="twitter:description"content="How has this blog been made? In this post we will see how to develop a minimalistic static blog template engine with Go.">
<metaname="description"content="The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker."/>
<metacharset="utf-8">
<title>CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCube - Blog</title>
<metaname="title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCube - Blog">
<title>CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - arnaucube</title>
<metaname="title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - arnaucube">
<metaname="description"content="The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker.">
<metaproperty="og:title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCube - Blog"/>
<metaproperty="og:title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - arnaucube"/>
<metaproperty="og:description"content="The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker."/>
<metaname="twitter:title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCube - Blog">
<metaname="twitter:title"content="CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - arnaucube">
<metaname="twitter:description"content="The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker.">
<metaname="description"content="Developing a twitter botnet with autonomous bots replying tweets with text generated based on probabilities in Markov chains"/>
<metacharset="utf-8">
<title>Auto generated tweets from Markov chains - ArnauCube - Blog</title>
<metaname="title"content="Auto generated tweets from Markov chains - ArnauCube - Blog">
<title>Auto generated tweets from Markov chains - arnaucube</title>
<metaname="title"content="Auto generated tweets from Markov chains - arnaucube">
<metaname="description"content="Developing a twitter botnet with autonomous bots replying tweets with text generated based on probabilities in Markov chains">
<metaproperty="og:title"content="Auto generated tweets from Markov chains - ArnauCube - Blog"/>
<metaproperty="og:title"content="Auto generated tweets from Markov chains - arnaucube"/>
<metaproperty="og:description"content="Developing a twitter botnet with autonomous bots replying tweets with text generated based on probabilities in Markov chains"/>
<metaname="twitter:title"content="Auto generated tweets from Markov chains - ArnauCube - Blog">
<metaname="twitter:title"content="Auto generated tweets from Markov chains - arnaucube">
<metaname="twitter:description"content="Developing a twitter botnet with autonomous bots replying tweets with text generated based on probabilities in Markov chains">
<h3>Notes on blind signatures over elliptic curves</h3>
<p>In this notes, we will cover the scheme proposed at <em>“New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem”</em> paper by Hamid Mala & Nafiseh Nezhadansari.</p>
<h2>CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests</h2>
<h3>CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests</h3>
<p>The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker.</p>