The Debricked Blog

Welcome to our corner of the internet. Here we share insights, news, best-practices and behind the scenes stories

JSON
Events

CTF: JSON Web Tokens (JWT)

Vulnerabilities in JWT libraries JSON Web Tokens (JWTs) are commonly used for authorization purposes, since they provide a structured way to describe a token which

Read More »
Keystream Generation
Events

CTF: Repeated keystream

The problems with repeated keystream in stream ciphers Repeated keystream can sometimes be devastating when using stream ciphers. The Capture the Flag event co-organized by

Read More »

Introducing Debricked

Debricked AB is a spin off company from a research project coordinated by Lund University, Sweden. The project’s main goal was to develop, implement and

Read More »