| ▲ | tptacek a year ago | |
Important to keep in mind here that the timing attacks Kettle is talking about generally do not take the form of "providing secret input to a function with variable timing". | ||
| ▲ | jack_pp a year ago | parent [-] | |
He says this exact same thing in the Defense at the end: > Finally, yes I do recommend using constant-time functions when comparing user input with secret keys. Just ask anyone who says this is an actual threat to provide a proof of concept. | ||