{ "title": "arnaucube - blog", "relativePath": "/blog", "absoluteUrl": "https://arnaucube.com/blog", "postsDir": "posts", "indexTemplate": "index.html", "postThumbTemplate": "postThumbTemplate.html", "metadescr": "arnaucube blog", "metaimg": "img/logoArnauCube.png", "posts": [ { "thumb": "shamir-secret-sharing_thumb.md", "md": "shamir-secret-sharing.md", "metadescr": "" }, { "thumb": "kzg-batch-proof_thumb.md", "md": "kzg-batch-proof.md", "metadescr": "The benefit of batch proof is that allows us to proof multiple points while the proof size remains constant to one G1 point." }, { "thumb": "kzg-commitments_thumb.md", "md": "kzg-commitments.md", "metadescr": "In the following notes I've tried to summarize the KZG Commitment scheme with the concepts that helped me to follow the reasoning." }, { "thumb": "blind-signatures-ec_thumb.md", "md": "blind-signatures-ec.md", "metaimg": "img/posts/blind-signatures-ec/flow1.png", "metadescr": "In this notes, we will cover the scheme proposed at 'New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem' paper by Hamid Mala & Nafiseh Nezhadansari." }, { "thumb": "coffeeminer_thumb.md", "md": "coffeeminer-hacking-wifi-cryptocurrency-miner.md", "metaimg": "img/posts/coffeeMiner/coffeeMiner-network-attack.png", "metadescr": "The goal of this post, is to explain how can be done the attack of MITM (Machine-In-The-Middle) to inject some javascript in the html pages, to force all the machines connected to a WiFi network to be mining a cryptocurrency for the attacker." }, { "thumb": "flock-botnet_thumb.md", "md": "flock-botnet.md", "metaimg": "img/posts/flock-botnet/markovchain.png", "metadescr": "Developing a twitter botnet with autonomous bots replying tweets with text generated based on probabilities in Markov chains" }, { "thumb": "blogo_thumb.md", "md": "blogo.md", "metadescr": "How has this blog been made? In this post we will see how to develop a minimalistic static blog template engine with Go." } ], "copyRaw": [ "css", "img", "vendor", "js" ] }