<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ed25519 on Answer</title>
    <link>https://answer.freetools.me/tags/ed25519/</link>
    <description>Recent content in Ed25519 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Wed, 11 Mar 2026 02:11:27 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/ed25519/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>当密钥逃离JavaScript：Web Crypto API设计背后的安全哲学</title>
      <link>https://answer.freetools.me/%E5%BD%93%E5%AF%86%E9%92%A5%E9%80%83%E7%A6%BBjavascriptweb-crypto-api%E8%AE%BE%E8%AE%A1%E8%83%8C%E5%90%8E%E7%9A%84%E5%AE%89%E5%85%A8%E5%93%B2%E5%AD%A6/</link>
      <pubDate>Wed, 11 Mar 2026 02:11:27 +0800</pubDate>
      <guid>https://answer.freetools.me/%E5%BD%93%E5%AF%86%E9%92%A5%E9%80%83%E7%A6%BBjavascriptweb-crypto-api%E8%AE%BE%E8%AE%A1%E8%83%8C%E5%90%8E%E7%9A%84%E5%AE%89%E5%85%A8%E5%93%B2%E5%AD%A6/</guid>
      <description>深入分析Web Crypto API的设计哲学、安全边界和演进历程，揭示浏览器原生密码学基础设施如何重新定义Web应用的安全边界。</description>
    </item>
    <item>
      <title>SSH密钥认证的隐形危机：为何你的私钥可能正在成为攻击者的通行证</title>
      <link>https://answer.freetools.me/ssh%E5%AF%86%E9%92%A5%E8%AE%A4%E8%AF%81%E7%9A%84%E9%9A%90%E5%BD%A2%E5%8D%B1%E6%9C%BA%E4%B8%BA%E4%BD%95%E4%BD%A0%E7%9A%84%E7%A7%81%E9%92%A5%E5%8F%AF%E8%83%BD%E6%AD%A3%E5%9C%A8%E6%88%90%E4%B8%BA%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E9%80%9A%E8%A1%8C%E8%AF%81/</link>
      <pubDate>Fri, 06 Mar 2026 13:46:02 +0800</pubDate>
      <guid>https://answer.freetools.me/ssh%E5%AF%86%E9%92%A5%E8%AE%A4%E8%AF%81%E7%9A%84%E9%9A%90%E5%BD%A2%E5%8D%B1%E6%9C%BA%E4%B8%BA%E4%BD%95%E4%BD%A0%E7%9A%84%E7%A7%81%E9%92%A5%E5%8F%AF%E8%83%BD%E6%AD%A3%E5%9C%A8%E6%88%90%E4%B8%BA%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E9%80%9A%E8%A1%8C%E8%AF%81/</guid>
      <description>从1995年Tatu Ylönen发明SSH协议，到2023年GitHub RSA密钥泄露事件，SSH密钥认证已经走过了三十年历程。本文深度剖析SSH密钥认证的安全困境：Ed25519与RSA的算法博弈、Agent转发攻击原理、证书认证的企业级方案、以及FIDO2硬件密钥的零信任实践。基于USENIX Security论文、Qualys安全公告、NIST SP 800-63标准等权威信源，揭示SSH密钥管理中的十大安全陷阱，以及从密钥蔓延（key sprawl）到证书权威（CA）架构的技术演进路径。</description>
    </item>
  </channel>
</rss>
