
In early March, the GitGuardian cybersecurity research team joined several hundred cryptographers, security engineers, and practitioners in Taipei for the tenth edition of the Real World Cryptography Symposium (RWC 2026). Held from March 9 to 11, the conference lived up to its name: three dense days of talks grounded in the reality of production-deployed crypto-systems.
Beyond oolong drinking and the night markets, Taipei had more serious business to offer: GitGuardian was there to present our own research. We took the stage on Day 3 to share the findings behind "Private Key Leaks in the Wild", mapping 945,560 leaked private keys to 139,767 certificates through Certificate Transparency logs, evidence that key material escaping into the wild is not a niche incident but a systemic problem.

Across the three days, recurring themes emerged: the industry-wide migration toward post-quantum algorithms and its hard engineering trade-offs; formal verification maturing into a practical tool; privacy-enhancing technologies finding their way into production systems; and secure channels and PKI infrastructure proving more fragile than assumed. All talks are worth a read or a replay, and the recordings are already available online.
This article, however, focuses on what resonated most with GitGuardian.
Matteo Scarlata and Giovanni Torrisi represented their team of four researchers in this presentation about password managers' security. Their talk was titled Zero Knowledge (About) Encryption, a pointed jab at the "zero-knowledge" marketing promise that cloud-based password managers like Bitwarden, LastPass, and Dashlane use to sell themselves: the claim that the provider never sees your plaintext secrets. This is usually the definition of what is called end-to-end encryption (E2E).
This research focused on studying the security of four cloud-based password managers under the E2E encryption hypothesis, especially in a malicious server attack model. Matteo Scarlata et al demonstrated serious attacks against all four password managers. 27 attacks in total. Most issues stem from a weak cryptography protocol, especially related to “advanced” features:
Notable attacks included:
The full paper backing this research is available online and is a must-read.
Password-based authentication has been an open problem for decades now, and this research shows that this is still the case, despite the existing vaults and other storage solutions. The whole industry has been pushing toward vaults and password managers to manage authentication secrets, which makes sense considering the state of authentication. That said, this research reminds us that the threat model of a compromised vault is important to consider.
Under the assumption of a compromised secret vault, having a good understanding of one’s own secret landscape is paramount, a situation where NHI governance and secrets observability can help.
Somehow on the same line, Christina Garman and Daniel Genkin presented their talk “TEE.fail: Breaking Trusted Execution Environments via Memory Bus Interposition”, where they also found and exploited vulnerabilities in a technology everyone would deem the state-of-the-art of security: trusted execution environments. They targeted both AMD and Intel’s latest TEE technologies, which shifted significantly in how they are implemented. Especially, both now rely on AES-XTS for memory encryption, which offers no integrity protection.
Through a brilliant live demonstration, Christina and her team showed how, using hobbyist-level hardware, it is possible to set up an interposition attack on a server’s physical memory. They later used this setup to recover private keys from the TEE in an otherwise simple attack.
Although the threat model for this attack is quite convoluted, making it difficult to perform outside a state-sponsored operation, and, more specifically, an adversarial law enforcement situation, this talk puts some perspective on best-of-breed security mechanisms. As showcased with the password safes example above, even the best-protected secrets can leak, and we should keep that in mind when designing our risk analysis.
In one rather interesting talk, Yubiko’s Christopher Harrell explored a fundamentally interesting question: how did we get from a mostly-unencrypted internet to 95% of Chrome page loads being HTTPS? His main point is that it did not occur in a blast after a single breakthrough: the cryptography to make it happen has been as old as the internet itself. However, real adoption stemmed from a mix of policies, standards evolution, or accessible infrastructure (Let’s Encrypt in that case).
Harrell then traced the same pattern through human identities and authentication, with the example of passkeys and FIDO. Human authentication has gone through three recognizable phases:
Similar to the encryption on the Internet, while the technology required for secure human authentication exists, the adoption is not there yet.
What resonated particularly with GitGuardian’s activities is how we can parallel human authentication evolutions to the Non-Human Identities world. Non-human identities (the API keys, service account passwords, and OAuth tokens that machine-to-machine communication relies on) are still largely stuck in phase one. Long-lived API keys are, functionally, passwords: static, shareable, leak-prone, and with no equivalent of origin binding. OAuth tokens represent an improvement analogous to MFA, but they remain stealable and, in many configurations, reusable beyond their intended context.
The FIDO moment for non-human identities has not arrived yet, and the scale of the problem is already visible in the data. As showcased in the State of Secret Sprawl report, the number of leaked secrets, largely linked to NHIs, has never been higher. While the technology evolves, hopefully, before we get locked in the insecure defaults, you’d better be equipped with a good secret security solution.

There is so much more that could be told about the content that was presented at RWC 2026, and so many more presentations are worth watching – just like Nadia Heninger’s talk about the encryption technologies used in space and technical debt, a topic that could very much find parallels in the NHIs world. If you want to know more, the slides of all the presentations are available on the conference website. Video recordings should also be made available soon.
We can only hope GitGuardian’s research team will be able to attend Real World Crypto again in the future. Presenting at such a conference is an honor, and we need to thank the organizers and chairmen for allowing us to promote our work there this year.
Until next time, if you want to have a peek at GitGuardian research topics and results, now is the perfect time to have a look at our fresh release of the State of Secret Sprawl report.
*** This is a Security Bloggers Network syndicated blog from GitGuardian Blog - Take Control of Your Secrets Security authored by Gaëtan Ferry. Read the original post at: https://blog.gitguardian.com/highlights-from-rwc-2026/