I hereby claim:
- I am slashtpa on github.
- I am oisrp (https://keybase.io/oisrp) on keybase.
- I have a public key ASCu-R93ufWd-qIPFAZuMQ8sY9sbzlBdb-dHuby0O-lhkgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
SUPI/SUCI Concealment is a new 5G-Standalone (SA) feature to encrypt the IMSI/SUPI with a network operator public key. pySIM now supports writing these 5G-specific files to USIM cards.
In short:
To enable SUCI concealment, follow all steps. If you want to disable the feature, you can just disable USIM Service 124.
def verify_sign(public_key_loc, signature, data): | |
''' | |
Verifies with a public key from whom the data came that it was indeed | |
signed by their private key | |
param: public_key_loc Path to public key | |
param: signature String signature to be verified | |
return: Boolean. True if the signature is valid; False otherwise. | |
''' | |
from Crypto.PublicKey import RSA | |
from Crypto.Signature import PKCS1_v1_5 |
#include <iostream> | |
#include <fstream> | |
#include <cstdlib> | |
#include <cstdio> | |
#include <cstring> | |
class State | |
{ | |
unsigned char s[256]; | |
int i, j; |
Password-store keeps your passwords (or any other sensitive information) saved in GnuPG encrypted files organized in ~/.password-store
. For more information about GPG, consult the GNU Privacy Handbook.
To get started, install pass
and generate a keypair.
$ brew install pass
$ gpg --gen-key
$ gpg --list-keys