

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://echoslow.dev/</id>
  <title>Echo_Slow</title>
  <subtitle>Technical writeups of cybersecurity topics.</subtitle>
  <updated>2026-03-08T16:54:01+01:00</updated>
  <author>
    <name>Echo_Slow</name>
    <uri>https://echoslow.dev/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://echoslow.dev/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://echoslow.dev/"/>
  <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator>
  <rights> © 2026 Echo_Slow </rights>
  <icon>/assets/img/favicons/favicon.ico</icon>
  <logo>/assets/img/favicons/favicon-96x96.png</logo>


  
    
    <entry>
      <title>Understanding the difference between verify and decode - CVE-2025-59934</title>
      <link href="https://echoslow.dev/blog/Covering_CVE-2025-59934/" rel="alternate" type="text/html" title="Understanding the difference between verify and decode - CVE-2025-59934" />
      <published>2026-03-08T17:00:00+01:00</published>
    
      <updated>2026-03-08T17:00:00+01:00</updated>
    
      <id>https://echoslow.dev/blog/Covering_CVE-2025-59934/</id>
      <content type="text/html" src="https://echoslow.dev/blog/Covering_CVE-2025-59934/" />
      <author>
        <name>Echo_Slow</name>
      </author>

    
      
      <category term="CVE Analysis" />
      
      <category term="2025" />
      
    

    <summary>Taking a look at an authentication bypass by abusing the none algorithm in JWT tokens</summary>

    </entry>
  

</feed>


