Explore other dev related sites in this ring. If you find this idea useful
click here to join
.
devring.club
Previous
Random
Next
🦃
linksfor.dev(s)
Posts for 'cryptography'
Bluesky for Science
Security means securing people where they are
What To Use Instead of PGP - Dhole Moments
Maybe Bluesky has “won”
We can have a different web
Writing secure Go code
Memecoins are the point
Authenticating People With Certificate Chains
Matrix 2.0 Is Here!
Scheduling Model in LLVM - Part II
Betting on Bali: My Journey Into the Offshoring Business
7 Things I Learned Drafting a Novel in 26 Days
Trust Rules Everything Around Me
$2 H100s: How the GPU Bubble Burst
It Was Ten Years Ago Today
Seven for a secret never to be told
OpenBSD 7.6
Purity is Great for Collaboration
Reverse Engineering and Dismantling Kekz Headphones
We've passed the peak of the economic cycle and everyone is sleeping on it - SingleLunch
Hypercomputation without bothering the cactus people: Software development for the DMT headspace
The Watermelon Operator
Cryptographic Innuendos - Dhole Moments
Digital signatures and how to avoid them
Solene'% : I moved my emails to Proton Mail
How Lazarus Group laundered $200M from 25 hacks
Founder Mode, hackers, and being bored by tech
If Everyone was a Billionaire
Radicle
This month in Servo: tabbed browsing, Windows buffs, devtools, and more! - Servo, the embeddable, independent, memory-safe, modular, parallel web rendering engine
Programming ZKPs: From Zero to Hero
My Software Bookshelf
Danny O'Brien's Oblomovka » Blog Archive
Is Telegram really an encrypted messaging app?
Giving the finger to MFA - a review of the Z1 Encrypter Ring from Cybernetic
I've Built My First Successful Side Project, and I Hate It
.:: Phrack Magazine ::.
Being on The Semantic Web is easy, and, frankly, well worth the bother
Reckoning: Part 2 — Object Lesson - Infrequently Noted
STD Doesn't Have to Abstract OS IO
What's Next? (2024 edition)
Hacking a VoIP Phone
Dual-Boot NetBSD And Archlinux
Leaving Stripe: Parting Thoughts
Against XMPP+OMEMO - Dhole Moments
In Life, One Sometimes Makes Bad Deals - rahul singireddy
Don't Use Preludes And Globs | corrode Rust Consulting
Protect your AWS Webservers from Port Scanning attacks
Protect your AWS Webservers from Port Scanning attacks
On the CrowdStrike Incident
how to pwn a billion dollar vc firm using inspect element - eva's site
NuGetAudit 2.0: Elevating Security and Trust in Package Management - The NuGet Blog
Engineering a New PDU from the Ground Up
Writing GUI apps doesn't have to be painful
Building a WoW server in Elixir
The Experience of Deploying Next.js Apps on Cloudflare
Exploring TLS certificates and their limits
Family Values
Machine Learning and the triumph of GOFAI
Ente - Private cloud for your photos, videos and more
Batteries: how cheap can they get?
Ladybird
Ladybird
The Great MEV Heist
My .gitconfig file dissected | Kiran Rao
Inside the tiny chip that powers Montreal subway tickets
Ladybird browser spreads its wings [LWN.net]
What You Get After Running an SSH Honeypot for 30 Days
The Australian Securities Exchange CHESS blockchain: seven years of sunk cost fallacy
cr.yp.to: 2024.06.12: Bibliography keys
Group chats rule the world
Solene'% : OpenBSD extreme privacy setup
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
password authentication – smudge.ai blog
Towards Federated Key Transparency - Dhole Moments
Bouncy Castle Cryptography Library for .NET - Code Maze
In Search of the Lost Web
Encryption At Rest: Whose Threat Model Is It Anyway?
Attacking NIST SP 800-108
Encryption At Rest: Whose Threat Model Is It Anyway?
Length Extension Attacks | Tiago Neto
We Already Have a Digital Currency | Kev Quirk
internetarchive (@internetarchive@mastodon.archive.org)
Mutual TLS (mTLS): building a client using the system keystore
I've figured out why some crypto rounds are way too big
Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
Mathematics and literature, really?
Adding Multiple Flutter Applications to Single Window on Web
Known Purpose and Trusted Potential.
Paying People in Equity and Dividends
16 years of CVE-2008-0166 - Debian OpenSSL Bug
using golang's crypto/aes and crypto/cipher packages
Protecting Next.js Apps Against Cross-Site Request Forgery
Deniable Encryption
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
Deniable Encryption
Traditional Publishing is Great, Actually
Online Cryptography Course by Dan Boneh
Reverse engineering BeReal
Verifying Slack Requests in Phoenix
Lateral Thinking: examples of creative solutions
What Computers Cannot Do: The Consequences of Turing-Completeness
The Moore-Nakamoto plain
Fully Decentralized Forum With 60 Lines of Code
AI - SkyNet Is Not Coming to Kill You
What is the Metropolis algorithm?
Good Ideas in Computer Science
0.12.0 Release Notes ⚡ The Zig Programming Language
How do electronic passports work? | Burak Can's Blog
PuTTY vulnerability vuln-p521-bias
T-Mobile Employees Across The Country Receive Cash Offers To Illegally Swap SIMs
Fixing Typos and Breaching Microsoft’s Perimeter
The golden rule of PR reviews
GCC version 14 coming soon – and will drop Itanium support
How I improved my crypto trading bot’s exit strategy - cryptomaton
Nightmare on Lemmy Street (A Fediverse GDPR Horror Story) - Michael Altfield's Tech Blog
Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
OpenBSD 7.5
XDP for Game Programmers
Automatic differentiation with dual numbers
What we know about the xz Utils backdoor that almost infected the world
GitHub - proposal-signals/proposal-signals: A proposal to add signals to JavaScript.
Technologist vs spy: the xz backdoor debate
Tell the LLM the business context
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
What Computers Cannot Do: The Consequences of Turing-Completeness
Protect your ASP.NET site using WebAuthn Passkeys
GitHub - janmojzis/tinyssh: TinySSH is small server (less than 100000 words of code)
What is Naimint?
101 things I would tell my self from 10 years ago
Senior Security Analyst, Threat Intelligence in Remote, United States | GitHub, Inc.
JIT WireGuard
A Primer On Randomness
Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
Lasso-based SNARK for non-uniform computation
Windows Subsystem for Android™️
The Nature of Technology Book Review
David Wong (@cryptodavidw) on Threads
An Overview Of Quantum Computing's Possible Impact On Cryptography
Mocking authorization tokens with WireMock.NET
The Linux CNA – Red Flags Since 2022
Bcrypt Hash Generator & Verifier
Exploring Next.js Forms with Server Actions
The Unbundling of Venture Capital
How Does BlueSky Work?
Language Checklist
System.IO.Hashing 8.0.0
Building a deep learning rig | part-1
The eBook for 'Why Cryptocurrencies?' is now available for free
Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
Using Azure Key Vault for signing and encrypting JSON Web Tokens
Is client side security dead - or a crucial part of the future?
Using a CSP nonce in Blazor Web
AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
How to feel when your startup feels easy
Climbing out of the rabbit hole
The Selfish GPU
Hello world, and the future for PyO3
Sign and Verify Messages with HMAC Using the Web Crypto API
FastPay: High-Performance Byzantine Fault Tolerant Settlement
Ransomware Hit $1 Billion in 2023
Does it matter where you live?
Reverse engineering Skylanders' Toys-to-life mechanics
The Noise Protocol Framework
Go 1.22 Release Notes - The Go Programming Language
Hacking a Smart Home Device
A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
GitHub - vitoplantamura/HackerNewsRemovals: List of stories removed from the Hacker News Front Page, updated in real time.
The end of my childhood
The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
41 Years in UX: A Career Retrospective
Crypto is not cryptocurrency
Crypto is not cryptocurrency
Want to learn more about zkBitcoin? I've made some videos
Position Paper on Quantum Key Distribution
On Climbing the Stat Arb (CEX/DEX) Leaderboard, Comparative Advantage and Careers, and My Future in Crypto - Daniel D. McKinnon
2023 letter | Dan Wang
Public Key Encryption with the JavaScript Web Crypto API
Learn to code. Or don’t.
Nethermind client: 3 Experimental Approaches to State Database Change
Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
RSA is deceptively simple (and fun)
High-speed 10Gbps full-mesh network based on USB4 for just $47.98
Authenticating a .NET GitHub App using a JSON Web Token (JWT) - Steve Gordon - Code with Steve
Your washing machine could be sending 3.7 GB of data a day — LG washing machine owner disconnected his device from Wi-Fi after noticing excessive outgoing daily data traffic
Storing WebAuthn challenge values without a database in Elixir
What's out there for ECDSA threshold signatures
JSON Web Tokens are actually great, just not for sessions
Binius: a Hardware-Optimized SNARK
Spot Bitcoin ETF receives official approval from the SEC
runtime/src/libraries/System.Net.WebSockets/src/System/Net/WebSockets/WebSocket.cs at 1d5f483fa4344328fb85fd67fc482b70b31e6c4d · dotnet/runtime
GitHub Quick Reviews
Format ChatGPT results with PydanticOutputParser - LangChain #2
Worse than SolarWinds: Three Steps to Hack Blockchains, GitHub, and ML through GitHub Actions
Add sample of integrating client apps (WinForms & WPF) into an Aspire app by DamianEdwards · Pull Request #78 · dotnet/aspire-samples
RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
.NET 8 — New Randomness Methods
Good News For Tether
Hacking a CTF: Do not use ECB mode for encryption
2024 Predictions by @ttunguz
Aleo completes security audits of snarkOS & snarkVM
How to Format a String as Base64 in CSharp – Beginner’s Guide
Why blog in an (AI) apocalypse?
Tech Predictions for 2024
commit signing in 2023 is kinda wack
Blockchain dev's wallet emptied in "job interview" using npm package
Security at Startup
Update in Thrussh: the SSH Terrapin attack
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Announcing the Aleo Foundation
Mastering Spring Boot with H2 Database Integration: A Step-by-Step Gui
Making God · EmilyGorcenski.com
Colliding Secure Hashes | Blog
Bricked Xmas
ZFS Profiling on Arch Linux | Bin Wang
Announcing the first Arecibo release
Bluesky and Blazor Migration
Good Docs Take Great Effort
Data Windowing in PostgreSQL: Harnessing SQL for Advanced Analytics
GNU ASCII armor: send encrypted data in plain text
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
zkLogin | Sui Documentation
The UX of UUIDs | Unkey
Unveiling secrets of the ESP32: creating an open-source MAC Layer
Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
Pollard's p-1 factorization algorithm
Monocypher 4: The Clean Break
Vicyyn - Simple Obsidian System for 99% of Your Needs
construct0, the first steps of an organisation with great aspirations.
My techno-optimism
Trying simple tree-search techniques for LLM token sampling
Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
Hackers Claim Attack on General Electric, Leak Data Samples
The Bond villain compliance strategy
6 year stream anniversary! C#, Postgres, and more
Investing Behavioral Hacks - The Big Picture
Moderation Features with C#, JavaScript, and ASP.NET
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
Monkey Conf 2023
Cryptographers Solve Decades-Old Privacy Problem
Fiat-Shamir security of FRI and related SNARKs — Part 1
Making a nice API of Amtrak's ugly API
CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
Frameworks Cover Up Skill Issues, And That's a Good Thing | jakelazaroff.com
HSG: Funded PhD student in Applied Cryptography & Privacy-preserving authentication (m/f/d) (m/w/d)
Blockchains and the Future of AI
Hare aims to become a 100-year programming language
Regulating Intelligence is Dumb
What Happened to the New Internet?
Article 45 Will Roll Back Web Security by 12 Years
GitHub Quick Reviews
2023-11-04 nuclear safety
GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
Why I Ran Away from Philosophy Because of Sam Bankman-Fried
Your Loved Ones Are Prisoners, and You Made the Chain
Visual Studio, Web Development and maybe even a little mobile with MAUI
Last Chance to fix eIDAS
Using WebAuthn for non-repudiation
The beautiful mind of Sam Bankman-Fried
Android and RISC-V: What you need to know to be ready
Intel N100: A Challenge to ARM - bret.dk
An Open Letter to Cryptographers: Please Work Together
Have I Been Pwned: API v3
Firstborn
My 2023 all-flash ZFS NAS (Network Storage) build
.NET 8 Top 10 New Features - NDepend Blog
Using Tailscale Custom OIDC with Authelia and Carpal
Why is there a hash of a weak password in the Windows cryptographic libraries? - The Old New Thing
Protecting Auth Tokens
An Analysis of Signal's PQXDH
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
Advice on early-stage fundraising
AppSec loves Agile
Debugging a kdump kernel crash
EI036: Schema Processing Service (Part 2)
Some concerns with OpenPubKey
'OpenBSD 7.4 released -- Oct 16, 2023'
Security: The Impact of Time
The Present Should Be Signed
Learn Live - Create methods in C# console applications
Drivechains: A Detailed Analysis
Weekly Update 369
An Intuitive Explanation Of Hashing
Unpopular Opinion: It’s harder than ever to be a good software engineer
Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
Polylang – Polylang by Polybase Labs
funding rate manipulation shenanigans on ftx
“We’ll call it AI to Sell it, Machine Learning to Build it”
A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
things i just don't like about git
Bitwise and Shift Operators in C#: A Deep Dive
Uncensored Thoughts on Product Management, [Fin]Tech Markets, and VC as I Look for my Next Adventure
How many times do you need to call `Math.random()` to get a collision? (Firefox will tell you, Chrome may not!)
Announcing the $12k NIST Elliptic Curves Seeds Bounty
Store ssh keys inside the TPM: ssh-tpm-agent
The inability to count correctly
Why I no longer get writer's block
Succinct Proofs and Linear Algebra
Rolling Forward to Major Versions in .NET
A journey into zero-knowledge proofs
Reclaim Successfully Passed the ZK Circuit Security Audit
Public report of Reclaim protocol's ChaCha20 circuit
Return to Office Is Bullshit And Everyone Knows It - Dhole Moments
Wifi without internet on a Marabu flight – marx.wtf
What the Birthday Paradox Teaches Us About Protecting Patron Privacy
Stoic philosophy, finding a meaningful life, and the cancer treatment struggle
How I failed to find a job in London 2023.
Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
Welcome to Birthday Week 2023
DON'T use this EF Core Performance trick #shorts
How To Opt Out Of The Career Ladder
Signal Messenger: Speak Freely
Unlimited Kagi searches for $10 per month
Matrix 2.0: The Future of Matrix
Quantum Resistance and the Signal Protocol
The Pirate Bay Celebrates Its 20th Anniversary * TorrentFreak
Investment Strategy for the apocalypse
The Blind Men and the Coin - Part I | Boaz Sobrado's Website
Onboarding Made Simple with zkLogin
When MFA isn't actually MFA
Upgraded Plans & Extra Features
.NET 7 💥 - Intro to Background Services (Hangfire) with ASP.NET Core Web Api 🔥🔥🔥🔥🔥🔥
Enable passkeys in .NET with Bitwarden Passwordless.dev | Bitwarden Blog
How to Write a Secure JWT Library If You Absolutely Must
Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
Reviewing Bad C# Advice | Q&A | .NET & C# 🔴 LIVE
Visa Expands Stablecoin Settlement Capabilities to Merchant Acquirers
Introducing our summer '23 research seminars
Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
GitHub - starkware-libs/stone-prover
Announcing my new blog · Higashi.blog
Xamarin Forms - Create a Navigation System Without Frameworks
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
End-to-end encryption with Proton Mail
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
Listen to us on zeroknowledge.fm
EI023: AI Processing Services (Part 12)
What do I think about Community Notes?
Cool & Unique Cryptography Features for Modern Sui DApps
Blockchain Applications Stanford Summit
An introduction to Decentralized Identity
Fiat-Shamir Security of FRI and Related SNARKs
How SNARKs fall short for FHE
Delendum-SBC Research Meetup
An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful) · Graham Helton
Storing passkeys in password managers is okay, actually
Breaking The Mutant Language's "Encryption"
Understanding Lasso and Jolt, from theory to code
Beautiful UI Controls for .NET MAUI with Telerik UI
Hono + htmx + Cloudflare is a new stack - Yusuke Wada
The lost generation of young founders
part 1 — blog documentation
My bug finding chronicles (and how to earn money through vulnerability research)
The BEST Moq Alternatives: NSubstitute vs FakeItEasy
Backward Compatibility, Go 1.21, and Go 2 - The Go Programming Language
Reflections on Ten Years Past the Snowden Revelations
On Moq & SponsorLink: Some thoughts
Introducing per hostname TLS settings — security fit to your needs
Efficient Elliptic Curve Arithmetic in OpenSSL — Store Halfword Byte-Reverse Indexed
Go 1.21 Release Notes - The Go Programming Language
Humble Tech Book Bundle: Math for Programmers 2023 by Manning
Removing Randomness with LLDB
Accidentally found a vulnerability in a crypto wallet and made $1,000
Verifiable encryption on the Blockchain
0.11.0 Release Notes ⚡ The Zig Programming Language
🚨 PSA: Skiff.com is lying about being open source!
Skill, Luck, and Imitation [Did Elon Musk get lucky?] - Luca Dellanna
Shamir Secret Sharing
Understanding Python Numeric Data Types | Pro Code Guide
Building a BitTorrent client in Elixir
Worldcoin isn’t as bad as it sounds: It’s worse
Vermoedelijk grootste Nederlandse gebruiker van de Genesis Market aangehouden
OpenAI Quietly Shuts Down Its AI Detection Tool - Decrypt
What We Know About LLMs (Primer)
Common pitfalls in Go benchmarking
Women in Cryptography
Have I Been Pwned: API v3
Performance Improvements in .NET Core - .NET Blog
Announcing the .NET Framework 4.8 - .NET Blog
Announcing the .NET Framework 4.7 General Availability - .NET Blog
Announcing .NET Core 2.1 - .NET Blog
Announcing the .NET Framework 4.7 - .NET Blog
1 Introduction · Real-World Cryptography
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations | Eyal Ronen
Best crypto blog posts of 2017
Libsodium Audit Results
Non-crypto Cryptographer Meetup · Luma
Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
DeFi Le pouvoir de la finance décentralisé - Doumer's Blog
Store age identities inside the TPM: age-plugin-tpm
From subprime crisis to the newly prime crisis | Boaz Sobrado's Website
Base64 Class (System.Buffers.Text)
GPT might be an information virus – Non_Interactive – Software & ML
.NET Framework July 2023 Security and Quality Rollup Updates - .NET Blog
Euclidean Algorithm
Staff Developer Advocate
Why Privacy Is Overrated
Exploring how Magic Link works
Kyle - Builder of stuff
Programming Languages Going Above and Beyond
Using encryption to verify a license key
Episode 125 - Mixed Reality, the Metaverse, and Making Magic Happen with Simon Jackson
’Tis the season to write the “bitcoin goes up!” post again
Revisiting the Nova Proof System on a Cycle of Curves
Former RAIDforums member “DataBox” sentenced to prison
Inside of the WASP's nest: deep dive into PyPI-hosted malware
Reset passwords in ASP.NET Core using delegated permissions and Microsoft Graph
Building Crypto Predictions Tracker: architecture and challenges
Working With Guid in C# - Code Maze
Dapr v1.11 is now available
What happened to Tandem (virtual office)
Reset user account passwords using Microsoft Graph and application permissions in ASP.NET Core
Impagliazzo's Five Worlds
Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
On The “Enshittification” of Platforms: Technology is Only Human After All
ZK app developers should be able to see down to the constraints
zkSecurity
Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
Generating income from open source
The Anoma Foundation Announces the 3rd Fundraise for Anoma
ZK programmability adds a whole new layer to worry about
Privacy Enhancing Technologies: An Introduction for Technologists
Private delegated computation is here, and there will be bugs!
Coin flips and most significant bits.
Lies, Damned Lies, & A16Z's Statistics
PGP signatures on PyPI: worse than useless
SELM: Symmetric Encryption with Language Models
Understanding Passkeys
State of Node.js Performance 2023
The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication
Experimenting with multi-factor encryption
Infrastructure from mining makes sense for scientific computing
Fast hashing, it's not that simple
How to be a Unicorn Person
The Platypus In The Room
Story: Redis and its creator antirez
Collision, Randomization and Welzl's Algorithm
Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
Real-time charts with Blazor, SignalR and ApexCharts
Generic Efficient Accumulation/Folding for Special Sound Protocols
Crypto: My Part In Its Downfall
Create a multilingual a to z list in C#
Introduction to ASP.NET Core Minimal APIs | The .NET Tools Blog
Funds of every wallet created with the Trust Wallet browser extension could have been stolen without any user interaction
The Most Annoying Math Problem
Recursive arguments for customizable constraint systems
Local license key verification - Theory
The Importance of TLS with SQL Server
The Suicidal Founder
Remaining relevant as a small language model
Tech Independence | Derek Sivers
Forex Trading for Fun and Luckily Profit
Make It Memory Safe: Adapting curl to use Rustls
mjg59 | Booting modern Intel CPUs
5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
Curiously Confused
Nethermind's Shapella Livestream
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
Money is backed by everything - jaysoncoomer.com
Linux and Baikal Electronics: Why Postgres Should not Follow that Path
Overconfidence, and Executives as Personality Defect — Ludicity
Nairachan
Archiving a vBulletin forum using HTTrack and Netlify | Blaubart.com software engineering
Sponsored ISO standards for PDF technology
How Linus Tech Tips Got Hacked
Outperforming Warren Buffet
Startup Attempts and Failures, 2021 – 2023
I Didn't Read 17 Books So You Don't Have To 😩
Paillier's cryptosystem - Addtive homomorphic encryption
GitHub Quick Reviews
Permutation-based Cryptography 2023 – Lyon, France
Permutation-based Cryptography 2023 – Lyon, France
Le Metaverse - Doumer's Blog
Breaking a PRNG: Is it Called Xor Shift or Xor Shit?
InfoQ Software Architecture & Design Trends 2023
There's a 90% chance TikTok will be banned in the US unless it goes through with an IPO or gets bought out by mega-cap tech, Wedbush says
New for Devs in SQL Server 2022: Ledger for Blockchain-Backed Security -- Visual Studio Magazine
A note to my former self: You're not supposed to take care of everything
When a date breaks booting the kernel — Store Halfword Byte-Reverse Indexed
How a $725M VC Judges Your Engineering Team w/ Redpoint Ventures’ Jason Warner
We asked the SEC for reasonable crypto rules for Americans. We got legal threats instead.
Implementing and Exploiting Cryptography
The Randomness Summit 2023 · Luma
Loading RSA Keys in .NET
Distributed Application Runtime (Dapr) v1.10 Released
The missing re-frame quick start (with tutorial)
GitHub - jsuarezruiz/dotnet-maui-showcase: A curated list of awesome .NET MAUI samples
HaveIBeenPwned, DevSecOps, and Other Security Things with Troy Hunt
Head of Marketing
Le Jargon Web3 expliqué - Doumer's Blog
Web3 Terms Explained (Crypto, Wallet, Blockchain...) - Doumer's Blog
Jonas Hietala: Battling burnout
Microsoft.Bcl.Cryptography 8.0.0-preview.2.23128.3
Sunsetting Aztec Connect
Keeping Your Cash Safe after the Silicon Valley Bank Collapse | aakash.io
Losing Signal
Software Engineering Report Ranks TypeScript Among Top Skills to Learn/Know -- Visual Studio Magazine
Cryptography without Security - Cronokirby
zk-SNARK Concepts Explained Like You’re 15
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
Digital Market Act workshop in Brussels
zkVMs are cool, but have you heard of zkCPUs?
The Fake Product Market Fit
Database Cryptography Fur the Rest of Us - Dhole Moments
Dealing with the unknown
5 Secteurs d'Activité que le Web3 Révolutionne en Ce Moment - Doumer's Blog
5 Disruptive Web3 Innovations The Blockchain Brought Us - Doumer's Blog
Scrooge: Analyzing Yahoo Financial Data In DuckDB
Cryptography 101 - PHINUG Online Dev Sessions 2023.03
Real-World Cryptography, a bit more than a year later
Bun v0.5.7 | Bun Blog
Developer Relations
Cryptography Attacks and Defenses, Reloaded
The 2023 MAD (Machine Learning, Artificial Intelligence & Data) Landscape
Writing Javascript without a build system
Defensibility & Competition
What does it mean for there to be “excess liquidity sloshing around the financial system”?
How is the Web3 useful to humanity - Doumer's Blog
En quoi le Web3 est-il utile à l'humanité - Doumer's Blog
Why I came to hate tokenomics
core-js/2023-02-14-so-whats-next.md at master · zloirock/core-js
Keeping up with The Thiel Fellows
Important message from Crypto Dave
The unsafe language doom principle
The Joy Of Duplexes
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
[Apply by 02/15] Future Computing Research Workshop
ChatGPT, Bard, and the battle to become the "everything app"
Yes, Crypto is ALL a Scam
Challenges 7-12: Implementing and breaking AES ECB
The KZG/Kate Polynomial Commitment Scheme
Reversing UK mobile rail tickets
Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
Le Web3 et sa Révolution - Doumer's Blog
Can GPT-3 Solve CTF Problems?
MIT Reality Hack 2023 Blog Day 1
Encrypting Data in the Browser Using WebAuthn
Blazor United prototype
password-purgatory-logger/index.js at master · troyhunt/password-purgatory-logger
How You Respond to Security Researchers Says Everything About You - Dhole Moments
An incomplete guide to stealth addresses
zkalc: a cryptographic calculator | EF Cryptography Research
Some thoughts on the ETH's Threema Analysis
What's the deal with zkapps?
Implementing secure Microsoft Graph application clients in ASP.NET Core
Encrypting and Decrypting a String in C# - Code Maze
Profiling .NET on Linux with BenchmarkDotNet
Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
Process JSON files with SQL Server
Cryptography Implementations in .NET - Code Maze
Is it worth encrypting? | Matthew Linkous
Using client side encrypted fields in RavenDB
On PBKDF2 iterations
Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
Vitalik Buterin's website
I am not a supplier
Hardware-friendliness of HyperPlonk - HackMD
HTTPS explained with carrier pigeons
RE: False Rumors on API Leaks or Exposure of our Database
Growing Your Book Of Business
I'm selling my name...
Your Pa$$word doesn't matter
What Can We Learn from Barnes & Noble's Surprising Turnaround?
There is no secure software supply-chain.
The Year Solana Blew Up
How I spent two months doing nothing
The Matrix Holiday Update 2022 | Matrix.org
The Service and the Beast: Building a Windows Service that Does Not Fail to Restart
20 Best Cryptography Algorithms Books of All Time
Hacker claims to be selling Twitter data of 400 million users
is there a way to opt out? (#121) · Issues · lib.rs / Lib.rs 🔰 main project · GitLab
IncrementalHash Class (System.Security.Cryptography)
Ignore the noise. Keep building.
Nix on the Steam Deck — Determinate Systems
Soatok Dreamseeker (@soatok@furry.engineer)
Yubikeys & PKI: What Are They For? | Charlton's Blog
Blockchain Blasphemy and the Technological Antichrist
How to Name a Startup
Virtual Studio Special - see how it's made!
Hackers leak personal info allegedly stolen from 5.7M Gemini users
Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
Is San Francisco “back”? I audited its parties to find out
Important CoinTracker security update
Technical Writer
The limited utility of the phrase “GNU/Linux”
Playing with ActivityPub
Real-World Cryptography
ChatGPT - Current state for .NET - and in general
Apple iCloud, and why encrypted backup is the only issue
GitHub - betaveros/noulith: *slaps roof of [programming language]* this bad boy can fit so much [syntax sugar] into it
The Breakout Tech Company Of 2022
SBF is Crypto Personified
Pratyush Mishra
Real-World Cryptography: Wong, David + Free Shipping
Bitcoin’s last stand
[Apply by 12/08] Introducing our fellowship program
Digital 2022: April Global Statshot Report — DataReportal – Global Digital Insights
No Thanks, Crypto, UPI Already Solved Digital Payments
Can We Build Safe Countries That Fund Themselves?
Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
The Art of (Not) Caring About Domain Names - andre.schweighofer
ongoing by Tim Bray · AWS and Blockchain
Why CVE-2022-3602 was not detected by fuzz testing
Dear Crypto & Fiat Bros - An open letter to the confused and dismissive. | dergigi.com
The Underlying Technology Shibboleth
SNARK Design Part III with Justin Thaler | a16z crypto research talks
SNARK Design Part III with Justin Thaler | a16z crypto research talks
GitHub - teslamotors/liblithium: A lightweight and portable cryptography library.
Mina Launches zkApps Era
A Certificate was Revoked by Its Issuer: How to Fix It
The Curse of Intelligence
Weil Pairing and the MOV attack on Elliptic Curve Cryptography
The intuition behind the sum-check protocol in 5 minutes
Too Much Crypto
Changing times (or, why is every layoff 10-15%?)
Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
StarkNetCC Lisbon Main Stage
Generate Random Numbers with .NET 6
validating SSL certificates in non-browser software
0.10.0 Release Notes ⚡ The Zig Programming Language
Improving Git protocol security on GitHub | The GitHub Blog
Encrypt and Decrypt Text Values in .NET
Real-World Cryptography: Wong, David + Free Shipping
Debating VPN options - anarcat
You should prepare for the OpenSSL 3.x secvuln
We Must Professionalize Programming to Preserve Society and Computing Freedom
Jett Hays
OpenBSD 7.2
Separation of Concerns in Node.js
Friends From First Principles — Simon Berens
Celestia raises $55M to launch modular blockchain network
What's the deal with zkapps?
LiteDB - A .NET embedded NoSQL database
Node.js 19 is now available! | Node.js
Delivering consistency and transparency for cloud hardware security
✂️ The ideal blockchain
What to know about Zero Knowledge
Lucid Multi-Key Deputies Require Commitment
Let's watch videos with David - HackMD
The magic words are squeamish ossifrage
OAuth client authentication - more than just client secrets
Muhammad Azeez - Working remotely from Iraq as a Software Developer
Threshold ECDSA in Excessive Detail
Machine Identity Management Summit 2022
Machine Identity Management Summit 2022
Total TLS: one-click TLS for every hostname you have
Shamir's Secret Sharing Visualised — Blog — Evervault
GitHub Quick Reviews
Amazon Best Sellers: Best Computer Cryptography
extending Go backward compatibility · Discussion #55090 · golang/go
Your 'Forgotten' Blockchain Account Needing Reactivation? It's a Scam
Scoreboard Hacking Part 2 - Getting the AES Key
age and Authenticated Encryption
Evaluating New Tools
ImperialViolet - Passkeys
0xPARC
What is security?
CK's Cold Dive
How hashing and cryptography made the internet possible | Red Hat Developer
The SEC fines Morgan Stanley $35M for an “astonishing” failure to protect information of ~15M customers by auctioning off machines with five years of their data
IN/"juels; ari" in US Patent Collection
Password-protected resources on static-site webhosters
Release CoreWCF v1.2.0 · CoreWCF/CoreWCF
Push notification two-factor auth considered harmful
A few thoughts about Uber's breach
Location independent jobs in Programming, Marketing, Sales, Design, and more.
Hunting YouTube Crypto Scams - addshore
Visual Cryptography For Physical Keyrings
It pays to be Circomspect
Coinbase updates its app to let US users see a scorecard that evaluates members of Congress on crypto policy issues, register to vote, and find political events
Coinbase is getting political, adding features to evaluate crypto policy issues
Ethereum activates The Merge as it shifts to proof of stake
Attacking the Android kernel using the Qualcomm TrustZone
Basic Cryptography Without Fluff - Cronokirby
Announcing .NET 7 Release Candidate 1
githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
Offshore Information Services Ltd.
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
Ed25519 Deep Dive Addendum
learning about zero-knowledge apps and circuits using the noname educational DSL
Regulating email providers
Security of ZK Systems
An overview of Node.js: architecture, APIs, event loop, concurrency
GitHub - immich-app/immich: Self-hosted photo and video backup solution directly from your mobile phone.
Two And A Half Coins episode 5: More on Bitcoin: 51% attacks and Merkle trees!
On Security Against Time Traveling Adversaries
What Is A Blockchain
30 thoughts on turning 30
Formal Verification of ZK Constraint Systems
Binance boute les stablecoins concurrents du $BUSD hors de son royaume
GitHub - mimoo/noname: Noname: a programming language to write zkapps
Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
Comment déployer un noeud validateur Mina et déléguer vos MINA : le tuto complet
Announcing the Open Sourcing of Paranoid's Library
Security of ZK Systems
Kagi status update: First three months
Problem statements to solve for a retail investor in DeFi
The silent majority
Experts warn of the first known phishing attack against PyPI
We Are All Nerds: The Literary Works of Neal Stephenson
Cryptography R&D Security Engineer
Cryptographic Agility and Superior Alternatives - Dhole Moments
Deep dives & how the Internet works
How SQLite Scales Read Concurrency
Ask Cryptography
Is Game Development a Dream Job?
Option protocols in DeFi
GitHub - bootdotdev/curriculum: A roadmap for Boot.dev's CS curriculum for backend developers
What is Lattice-based Cryptography?
The Paper that Keeps Showing Up
Understanding JSON Web Encryption (JWE)
How Many Effective Altruist Billionaires Five Years from Now?
Scheduled Tweets With Cloudflare Workers
Managing the most dangerous constructor ever
GitHub - oasislinux/oasis: a small statically-linked linux system
There aren't that many uses for blockchains
zkEVMs: Not a Panacea
How to design a referral program at andrewchen
Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
NSA, NIST, and post-quantum cryptography
MPC In The Head Special
NSA, NIST, and post-quantum cryptography
Why Is the Web So Monotonous? Google. :: Reasonably Polymorphic
Experiment with post-quantum cryptography today
BrainSTARK, Part 0: Introduction
Go 1.19 Release Notes - The Go Programming Language
The Castryck-Decru Attack on SIDH
Post-quantum encryption contender is taken out by single-core PC and 1 hour
What happened to the inventors?
Raspberry Pi Zero vs MangoPi MQ Pro Benchmarks
Breaking supersingular isogeny Diffie-Hellman (SIDH)
Are You an Effective Engineer?
What I'm frustrated by in crypto
An efficient key recovery attack on SIDH (preliminary version)
The many flavors of hashing
CFF22 trip report
The dangers of Microsoft Pluton – Gabriel Sieben
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Celsius Network LLC, et al.
Understanding the L1 Race: zkEVMs and other Common L1 Features
An intro to Open Telemetry in .NET - James World
100 Days to Mainnet
GitHub - MystenLabs/narwhal: Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform
Using Apache Kafka to process 1 trillion messages
Catering to Desktop & Mobile with .NET MAUI
prose.sh
We Need Non-Interactive Post-Quantum KEMs
The biggest sin in software engineering.
The Explicit Choice by the SEC Not to Regulate Crypto
ASP.NET Core updates in .NET 7 Preview 6
Pump-and-Dump Schemes
System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
ASP.NET Core updates in .NET 7 Preview 6
ASP.NET Core updates in .NET 7 Preview 6
ASP.NET Core updates in .NET 7 Preview 6
Alan Howard-Backed Cryptography Investor Geometry Emerges From Stealth
Issues in Replacing OpenSSL – Security Poodle
Security Incident at Our Email Vendor
GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
NIST’s pleasant post-quantum surprise
Sam Jaques
Web3, why? – Gautam Dhameja
How to get a job in a new industry without experience | Jason Tu
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
ideas/main-vs-310.rst at main · faster-cpython/ideas
A rollup-centric ethereum roadmap - Fellowship of Ethereum Magicians
Dual EC or the NSA's Backdoor: Explanations
Making Page Shield malicious code alerts more actionable
On the use of a life
Composability of Data
The best books for cryptography apprentices
Web3: What they are not telling you! – Gautam Dhameja
Institute for the Study of War
Using Graphs to Search for Code · Nick Gregory
Attacker Floods npm With Crypto-Mining Packages that Mine Monero When Installed with Default Configuration | Mend
Telerik UI for .NET MAUI Goes GA: 50+ Controls!
Testimonials | The F# Software Foundation
Uno Platform Does WebAssembly Threading Months Ahead of .NET 7 -- Visual Studio Magazine
GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
What every new software developer should know
Thomas H. Ptacek
Huobi Global Lists Mina Protocol
Undefined behavior in C is a reading error. – keeping simple
dYdX V4 - The dYdX Chain
What I'm excited for this build cycle
SnarkyJS Week 2022 - Crowdcast
My 40-liter backpack travel guide
Master the Event Loop in Node.js
Join Us For the First Ever SnarkyJS Week
The Animated Elliptic Curve
Some ways to use ZK-SNARKs for privacy
find an anon friendly job today
Eurocrypt 2022 program
Cheat Sheet For If I'm Gone
Tether’s actual peg
Class-groups – USF Crypto
Hertzbleed Attack
core/known-issues.md at main · dotnet/core
Real World Cryptography Study Group
A message from Coinbase CEO and Cofounder, Brian Armstrong
Why I became a Solo Founder | Bold Data
Foreword — ZK Jargon Decoder
Specifying Spring '83
The Web PKI 2.0
Hands-on: X25519 Key Exchange
In defense of crypto(currency)
Linux on A7-A8X
Several Improvements on BKZ Algorithm
About the security of passkeys
The Fermi Paradox of Venture Capital
Performance Improvements in .NET MAUI
This is not normal
Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
Episode 232: Cutting Edge ZK Research with Mary Maller - ZK Podcast
Update on Hiring Plans
Countering the Crypto Lobbyists
Welcoming Rocket.Chat to Matrix! | Matrix.org
Ghost in the Shellcode
GitHub - JumpCrypto/crypto-reading-list
Preliminary Learning ON Kimchi: PLONK
Keep the Web Free, Say No to Web3
We’re discontinuing the Stablegains service. Please withdraw your remaining funds.
Tether Required Recapitalization In May 2022
This "amateur" programmer fought cancer with 50 Nvidia Geforce 1080Ti
No permission needed 🚀
Proof of Stake and our next experiments in web3
25 Gbit/s HTTP and HTTPS download speeds
Some Cryptography Books I Like
Idea machines
Practical bruteforce of AES-1024 military grade encryption
The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.
Announcing Pub/Sub: Programmable MQTT-based Messaging
Important notice for all customers | BitPrime
What backs a currency? Terra Luna drops nearly 100% - Economics - Intercoin
C# Method to Check if a Number is Prime
European Commission prefers breaking privacy to protecting kids
1,930 Remote Companies | Himalayas
Dutch digital identity system crisis — nico.rikken’s blog
Job Posting: Reddit Research Czar
Bridging Web 2 and Web 3: an identity perspective - Blog by Damian Schenkelman
Themes from Real World Crypto 2022
A vision for Decentraland's next 5 years
Learn to code. Or don't.
Implementing a ZK-focused authenticated-encryption scheme
Senior Product Security Engineer
Announcing Bolt & Forte partnership
Explaining Yao's Garbled Circuits - Cronokirby
Zaplib post-mortem - Zaplib docs
Real World Cryptography Conference 2022
Increasing the surface area of blogging
Cloudflare blocks 15M rps HTTPS DDoS attack
All Roads Lead to Rome: The Machine Learning Job Market in 2022
Announcing the Hare programming language
How easy is it in 2022 to find a SHA1 collision?
Canetti et al's Paradoxical Encryption Scheme
How SHA-256 Works Step-By-Step
Magic Beans
Physical Threshold Encryption
The 10 Commandments .NET Developers Must apply for Secure Applications
Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
CVE-2022-21449: Psychic Signatures in Java
Fintech and Practical Utopianism
Taxonomy Of In-The-Wild Exploitation
VCs Fund Ideas, Not Execution - Manish R Jain
Startup trends to not look for in 2030 – Mr. Steinberg
GitHub - freenet/locutus: Declare your digital independence
Assume your devices are compromised
The games Nintendo didn't want you to play: Tengen
THCon 2k22 CTF - "Local Card Maker" Writeup - Guy Lewin's Blog
An inherent source of correlation in the crypto market
Ethereum Has Issues
A Web Renaissance
Let’s Encrypt Receives the Levchin Prize for Real-World Cryptography
Watch People Doing the Thing
Requests for comment/Stop accepting cryptocurrency donations - Meta
Why Airbnb Will Take Over The World With Remote Work
Your brand needs to be easily summarizable
The Complete Argument Against Crypto
Dear Traveller,
Random Class in C# - Code Maze
de-eth-ed.csv
O(1) Labs
Coinbase Lists Mina Protocol
The (r)Evolution of FHE
Early Security for Startups
placeholder
Random number generator enhancements for Linux 5.17 and 5.18
Web3 and the democratization of Digital Assets
Troubleshooting HTTP/3 in http.sys
Some interesting malware I found — Bobbie Chen
Essential Cryptography for JavaScript Developers | With Blue Ink
Sofía Celi - cryptographer
PKC Test-of-Time Award
Lead Application Engineer
Future-proofing SaltStack
A Deep dive into Ed25519 Signatures
Introducing Caddy-SSH
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
BAT: a Fast and Small Key Encapsulation Mechanism
[Crypto] Cracking Diffie–Hellman key exchange using CADO-NFS + Logjam SSL/TLS attack
Year in Review: 2020 laid the groundwork for zero knowledge proofs
2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
The (Edited) Latecomer's Guide to Crypto
Decentralized Identity: The Basics of Decentralized Identity
Implementing a toy version of TLS 1.3
If you’re not using SSH certificates you’re doing SSH wrong
What Epic's purchase of Bandcamp means for music
NSA algorithm for PX-1000 broken
Web3 is centralized (and inefficient!)
Announcing Sui
Using RavenDB from Serverless applications
Using RSA Securely in 2022 - Dhole Moments
Decrypting your own HTTPS traffic with Wireshark – Trickster Dev
Passkeys: How multi-device FIDO credentials can replace passwords
Create your own Cryptocurrency, it is easier than you might think – Andrianina Rabakoson
Moonwell.fi: DeFi's liquidity well
Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
Be a part of the world's lightest blockchain.
O(1) Labs
Roll your own crypto, then smoke it.
Announcing the Cloudflare API Gateway
Go 1.18 Release Notes - The Go Programming Language
The Aptos Vision
Coal to crypto: The gold rush bringing bitcoin miners to Kentucky
ssh package - golang.org/x/crypto/ssh - pkg.go.dev
The code is the specification? Introducing cargo spec
The Downfall of Reddit – Why Reddit Sucks, and How to Fix It
A Comprehensive Primer · Michael Straka
GitHub - facebookresearch/narwhal: Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus.
s11e09: A short conversation with a bank
Cooking with credentials - pepper - Eric Mann's Blog
I can probably hack your password in MINUTES!
Reintroducing Snapps as zkApps
Technology vs Tools
An Illustrated Guide to Elliptic Curve Cryptography Validation
Global payment solutions for Web3
Open Banking for OAuth Developers
We Cannot Live Without Cryptography!
The technological case against Bitcoin and blockchain
Telenot Complex: Insecure AES Key Generation
Part 2: Improving crypto code in Rust using LLVM’s optnone
Part 1: The life of an optimization barrier
The Controversy Surrounding Hybrid Cryptography - Dhole Moments
Blockchain Cryptography | Gary Woodfine
Plagiarism as a patent amplifier
GNU Taler Documentation — GNU Taler 0.8.2 documentation
Transport Layer Security (5/6)
Fuzzing for wolfSSL
The post-quantum future: challenges and opportunities
Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
25 Malicious JavaScript Libraries Distributed via Official NPM Package Repository
HPKE: Standardizing public-key encryption (finally!)
[COSE] Why you shouldn't have your crypto designed by a CEO
GitHub Previews Faster Codespaces Creation with Prebuilds -- Visual Studio Magazine
Building Confidence in Cryptographic Protocols
Badly implementing encryption: Part X-Additional data
zkSync 2.0: Public Testnet is Live!
Why the OAuth mTLS spec is more interesting than you might think
Badly implementing encryption: Part IX–SIV
Making protocols post-quantum
Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
Do not recommend: User Provided Primary Keys
Convoy Crackdown
Badly implementing encryption: Part VIII–timings attacks and side channels
Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
How bad it is using the same IV twice with AES/GCM?
The Post-Quantum State: a taxonomy of challenges
Badly implementing encryption: Part VII–implementing authenticated encryption
Programming things that have gotten easier
Is Datalog a good language for authorization?
Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
Spam Accounts in 2022
Decentralization Is a Quality
Detecting Magecart-Style Attacks With Page Shield
Badly implementing encryption: Part VI–malleable encryption
The Journey That Led Me to Write a Book on Analog Zettelkästen
r/crypto - Linux RNG switches from SHA1 to BLAKE2s
Cryptology ePrint Archive: Report 2021/1641
Badly implementing encryption: Part IV–keyed hash function
Learn Privacy-Enhancing Techniques with Cryptographic Games
Badly implementing encryption: Part III–breaking your encryption apart
How I research any topic
Security of BLS batch verification - Cryptography - Ethereum Research
Badly implementing encryption: Part II–breaking the code
Android 13 virtualization lets Pixel 6 run Windows 11, Linux distributions - CNX Software
Wifi Signal Mapping with WiFiman - Using Augmented Reality!
00
Crypto Reading
The Factorio Mindset
In Praise of 'Line Goes Up'
Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
Kimchi: The latest update to Mina’s proof system
Badly implementing encryption: Part I
Attacking an Ethereum L2 with Unbridled Optimism
BeyondCorp is dead, long live BeyondCorp
Our User-Mode WireGuard Year
GitHub Quick Reviews
Crypto Tracker App with Telerik .NET MAUI Controls
John Battelle's Search Blog On Building A Better Web: The Marlinspike Threads
Crypto-name
The Federal Reserve Bank of Boston and Massachusetts Institute of Technology release technological research on a central bank digital currency
Educated Guesswork
Wormhole Incident Report — 02/02/22
CS 251 Cryptocurrencies and Blockchain Technologies: Syllabus
Estimating the Bit Security of Pairing-Friendly Curves
How I Discovered Thousands of Open Databases on AWS
Visual Studio 2022 - with Kendra Havens
RWC 2022 program
My most meaningful work of 2021 – not falling down
.NET R&D Digest (January, 2022)
How I Discovered Thousands of Open Databases on AWS
Basic cryptography - the Vigenere cipher - Eric Mann's Blog
Fold inbox crypto into one assembly by bartonjs · Pull Request #64307 · dotnet/runtime
It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
Piped
Trying to vlog #crypto #vlog #shorts
Cryptocurrency exchange BTC-Alpha confirms ransomware attack
PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
Consequences Create Complexity
Hey Ethereum, Let's Break Solidity's Composability!
bbenchoff.github.io by bbenchoff
Make Free Stuff
My Terminal Has SUPER POWERS! (My New FAVORITE Terminal Plugin)
2022 Tech Predictions · Ted Neward's Blog
Biscuit 2.0 release
Modern Web Applications with SAFE Stack
On Leaving Facebook
Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
Free Postgres Databases
Web Wednesday - Talking ASP.NET with Jon Galloway
Crypto.com Security Report & Next Steps
David Wong
David Wong
Bulletproof SSL and TLS | Feisty Duck
CC #9: A Wild ECDSA Appears!
TC Conf – Transylvania Crypto Conference
You're running untrusted code!
An Anatomy of Bitcoin Price Manipulation
Clear communication
An extremely casual code review of MetaMask’s crypto
Charles Hoskinson on Some thoughts about the Mina Protocol Ouroboros+Snarks=22kb size
Working With Market Data Using Time Series in RavenDB
Blockchain-based systems are not what they say they are
CryptoHack – Home
ANSIWAVE - Make the "semantic web" web 3.0 again -
Opinion: Is Web3 a Scam? - Stack Diary
Introducing Plonky2 — Polygon | Blog
My first impressions of web3
Real-World Cryptography by David Wong Book Review
The Cryptography of Orphan Annie and Captain Midnight
The ultimate SQLite extension set
PagerDuty’s Security Training for Engineers! Part Deux
Breaking change: Partial and zero-byte reads in DeflateStream, GZipStream, and CryptoStream - .NET
The Case Against Crypto
A New Year's Letter from the President | SQUARE ENIX HOLDINGS
The Modern Guide to OAuth
.NET's Cryptographic One-Shots
Server Thief Bait - catch them red handed!
Fintech firm hit by Log4j hack refuses to pay $5 million ransom
Fix stack overflow with X509Certificate FriendlyName by vcsjones · Pull Request #63179 · dotnet/runtime
“Play-to-earn” and Bullshit Jobs
[Last Week in .NET #74] – Automated Legal Problems
GitHub - trailofbits/zkdocs
GitHub - dani-garcia/vaultwarden: Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
Introduction
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
What Problem Blockchains Actually Solve
How did the Enigma Machine work?
The bulldozer vs vetocracy political axis
BusKill: The USB Laptop Kill Cord
Cryptology ePrint Archive: Report 2021/1621
Meet Kryptology: Coinbase’s Open Source Cryptography Library
Web3 is going just great
Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
What If I Told You: Money Isn't Real
Testing constant-timeness using Valgrind: case of the NSS library
Cloud Computing Facts – 10 Reasons Intel Is Best for Cloud
Solene'% : What are the VPN available on OpenBSD
The Problem with Finance APIs
Blockchainism
Redefining Scalability
Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
Post-Quantum Signatures in TLS will be challenging | Bulletproof TLS Newsletter
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Security. Cryptography. Whatever.: WireGuard, feat. Jason Donenfeld on Apple Podcasts
Web3? I have my DAOts
Introducing Mysten Labs: Building Foundational Infra for Web3
Why your cloud infrastructure should be immutable
Blockchains don't solve problems that are interesting to me
Security | 2021 | The Web Almanac by HTTP Archive
Understanding HKDF - Dhole Moments
Pure Fungibility on the Blockchain
Understanding Zero-knowledge proofs through simple examples
Understanding Zero-knowledge proofs through simple examples
On the Use of Pedersen Commitments for Confidential Payments
Troy Hunt's Weekly Update Podcast
The Internet's Casino Boats
This shouldn't have happened: A vulnerability postmortem
Why I have settled on XChaCha20+Blake3 as the AE suite of choice for my projects
The Solution Space
The Token Disconnect
Proof of stake is a scam and the people promoting it are scammers
Build software better, together
Bank transfers as a payment method
Bitslicing for Constant Time Cryptography
Why does Web 3.0 Exist? - Web3 Oversimplified
Notebook on nbviewer
#50 Mina: Use Cases for Snapps & Snarketplace Dynamics
An intensive introduction to cryptography: index
From Edge 96 onwards local files can get edited in Visual Studio Code and DevTools changes sync live
The Handwavy Technobabble Nothingburger
Net Conf 2021 Québec : Introduction à NET 6.0
An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
Coin Vol-II Hedging your BTC/ETH - The basics
RSA vs ECDSA for DNSSEC | APNIC Blog
Speculative Autobiographies
we like the runners
The Joy of Cryptography
GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
hacspec [![hacspec chat][chat-image]][chat-link]
Crypto Wash Trading
12 features coming in C# 11, potentially
Get Rich Offsetting Carbon
ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
Talking to SerenityOS Contributors About Scratch-build C++ Developer’s Playground in Modern C++ | The CLion Blog
The Metaverse: Is It Already Here?
Writing new system software
restic · Backups done right!
It's Now Possible To Sign Arbitrary Data With Your SSH Keys
No one knows what's coming next
How I use Notion · Reasonable Deviations
Fixing Recent Validation Vulnerabilities in OctoRPKI
Threshold Digital Signatures
How to create a tech startup - Vlad Mihalcea
The Surreal Horror of PAM
Libra Shrugged — Chapter 15: Central bank digital currencies
Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
The Intellectual Incoherence of Cryptoassets
Matter Labs Announces $50M in New Funding for zkSync
Sizing Up Post-Quantum Signatures
an inside look into the illicit ad industry
Signal is losing
Re-Organizing the World’s Information: Why we need more Boutique… — Mirror
GitHub - axelarnetwork/tofn: A threshold cryptography library in Rust
Random Oracles in Cryptography
So you want to Scrape like the Big Boys? 🚀
Breaking changes in .NET 6 - .NET
Threema: Three Strikes, You’re Out
How (Not) to Design a Hash Function
PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
The Strange Path of Accepting How Your Brain Works · Caffeinspiration
Pairings in CIRCL
Please change your mind about your announced release plans
Pipelines - Runs for runtime
Handshake Encryption: Endgame (an ECH update)
Privacy Pass v3: the new privacy bits
mazzo.li — Backing up WhatsApp data through the multi-device web client
Malware Found in UA-Parser-JS NPM Library
Fake npm Roblox API Package Installs Ransomware and has a Spooky Surprise
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
50 First Levers (How to start building Leverage) — Eric Jorgenson
HTTPS Everywhere plug-in no longer needed | Bulletproof TLS Newsletter
Privacy is a Human Right | Tor Blog
Choosing a cache
Looking into convergent encryption
Ciphertext Compression #1: NTRU Strikes Back
Modifying the Acorn CLE-215+ FPGA into a PCILeech DMA attack device
GitHub - mthom/scryer-prolog: A modern Prolog implementation written mostly in Rust.
SRP is Now Deprecated - TobTu
The secret of stunning OSS contributions! I've changed my life for Hanami!
Why Nano
A Critique [The Call of the Open Sidewalk]
A Graduate Course in Applied Cryptography
Episode 17: Breaking Wi-Fi With Frame Attacks!
On the Word “Nonce” in Cryptography and the UK
JSON Web Token (JWT) Implementation Using Node.js
It's time for the Permanent Web
Introducing Nuntius - Cronokirby
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Good Riddance: Steam Bans Games That Feature Crypto And NFTs
Geo Key Manager: Setting up a service for scale
How to use certificates in ASP.NET Core
Signatures From Identification Schemes - Cronokirby
Privacy-Preserving Compromised Credential Checking
Ted Cruz says bitcoin will stabilize Texas electric grid—here’s why he’s wrong
Stripe: Job Openings
Cloudflare and the IETF
Canonicalization Attacks Against MACs and Signatures
ongoing by Tim Bray · Worst Case
You're Doing IoT RNG
Malwarebytes' privacy VPN is Mullvad in a shady trenchcoat
Announcing Cloudflare Research Hub
HD wallets and the Legendrery PRF in MPC - HackMD
Cloudflare Research: Two Years In
Web3 Architecture and How It Compares to Traditional Web Apps - The New Stack
The Poly Network Hack Explained
Privacy is sexy 🍑🍆 - Enforce privacy & security on Windows and macOS
Is the SEC forcing Crypto Devs into Illegality and Anonymity?
A PKI-less secure communication channel: Error handling at the protocol level
Lightning Round
A PKI-less secure communication channel: Implementing the record stream
Bitcoin is a Ponzi
Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!
A PKI-less secure communication channel: Coding the handshake
Forward Party | Not Left. Not Right. Forward.
A PKI-less secure communication channel: The record layer
Cloudflare just disrupted 3 industries in 1 week
Implicit Overflow Considered Harmful (and how to fix it)
Product bundles and jobs to be done
A PKI-less secure communication channel: The record layer
Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
A PKI-less secure communication channel: design
NFT Projects are just MLMs for Tech Elites
What every IT person needs to know about OpenBSD
Automatic cipher suite ordering in crypto/tls
Twitter accelerates again with Bitcoin tips, NFTs, recorded Spaces, creator fund and more – TechCrunch
Snapps on Mina with Emre and Izaak – ZK Podcast
CSAW Quals 2021 Bits
The Bi-Symmetric Encryption Fraud
Avalanche (AVAX) is launching on Coinbase Pro
A World Without Sci-Hub
How to defeat Ed25519 and EdDSA using faults
How I bricked then recovered my reMarkable 2
Chrome 94 released with controversial Idle Detection API
Postmortem: Partial RavenDB Cloud outage
The Mom Test - How to talk to customers. A Summary
Q6 How do you manage your time? How do you allocate your time between work and other things?
This Is All Exactly What It Looks Like | Defector
Patreon
That Time I Told My Wife I Wanted to Quit My Job
ECDSA and Custom XML Signatures in .NET
How to sign XML using RSA in .NET
Library Genesis
One Bitcoin Transaction Generates Two iPhones Worth of E-Waste
Dear Mom, I’m Dropping Out — Simon Berens
How I made $50K in 3 days with NFTs
The long-term consequences of maintainers’ actions – Ariadne's Space
Top 5 LED Strip Lighting Projects - Dave's Garage
If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
CityMayor | Dapp.com - MarbleCards | OpenSea
Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications
r/crypto - What are the most overrated cryptographic schemes, protocols, conferences, etc.?
Why Monero
Welcome to Speed Week and a Waitless Internet
Write code that's easy to delete, and easy to debug too.
Constant-time code verification with Memory Sanitizer
Sylvain Kerkour
AWS SIGv4 and SIGv4A — shufflesharding.com
Q6 How do you manage your time? How do you allocate your time between work and other things?
OWASP Top 10
About
Maintain it With Zig
The SEC has told us it wants to sue us over Lend. We don’t know why.
How to be a Certificate Authority, feat. Ryan Sleevi - Security. Cryptography. Whatever.
Welcome · Real-World Cryptography MEAP V14
The Crypto-Carry Trade
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
Saving a restic backup the hard way
NO STARTTLS
certreq.cs
Should Zcash switch from Proof of Work to Proof of Stake? - Electric Coin Company
Money Ain't A Thang
Refactor symmetric one-shots for improved performance by vcsjones · Pull Request #58270 · dotnet/runtime
How I re-over-engineered my home network for privacy and security
NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
zkMesh: Aug 2021 recap
Improving Git protocol security on GitHub
You’re Not Too Late
NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
Every Web Browser Absolutely Sucks. – Luke Smith
Aggregatable Distributed Key Generation
Converting PFX format to PEM via OpenSSL programmatically
Cryptography Engineer
Programmers Don’t Understand Hash Functions
API Tokens: A Tedious Survey
Principal Technical Product Manager, Amazon Corretto - Virtual Location (Level 7)
r/DataHoarder - Twitter starts to require login to view tweets
The Linux Kernel Module Programming Guide
38M Records Were Exposed Online—Including Contact-Tracing Info
Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
Loading Elliptic Curve (EC) Keys in .NET
GitHub - JetBrains/projector-installer: Install, configure and run JetBrains IDEs with Projector Server on Linux or in WSL
How does PLONK work? Part 11: Our final protocol! (Without the copy constraints)
Thinking of the children
How does PLONK work? Part 10: The Kate polynomial commitment scheme
GitHub - public-api-lists/public-api-lists: A collective list of free APIs for use in software and web development 🚀
How ephemeral keys validate possession of a static key
Safer Illinois, Isn’t
How does PLONK work? Part 9: What's a polynomial commitment scheme (PCS)?
Auditing Cryptography: #Zcon2Lite
How does PLONK work? Part 8: A polynomial dance
How does PLONK work? Part 7: A sketch protocol with our polynomial
How does PLONK work? Part 5: From arithmetic circuits to constraint systems
How does PLONK work? Part 6: From constraint systems to polynomials
Go 1.17 is released - The Go Blog
Thinking of the children
Introducing Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field - Cryptography - Ethereum Research
Stewardship of Ourselves
Exploring the password policy rabbit hole — Sun Knudsen
Security. Cryptography. Whatever.: The Great "Roll Your Own Crypto" Debate, feat. Filippo Valsorda on Apple Podcasts
What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
More devices, fewer CAPTCHAs, happier users
The Problem with Ethereum
Implementing ‘le chiffre indéchiffrable’ in Scheme
Apple’s Mistake
One Bad Apple - The Hacker Factor Blog
Hey Signal! Great Encryption Needs Great Authentication
Apple to scan U.S. iPhones for images of child sexual abuse
Apple explains how iPhones will scan photos for child-sexual-abuse images
Episode 18: Optimizing Cryptography for Microcontrollers!
Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
The Drunken Bishop Algorithm – Barely Functional Theories
Self-Hosting a Blog Mailing List
Startups Trends vs 4 years ago | Soheil Yasrebi's Blog
designs/blazor-wasm-crypto.md at main · dotnet/designs
GitHub - veorq/cryptocoding: Guidelines for low-level cryptography software
[ANNOUNCE] WireGuardNT, a high-performance WireGuard implementation for the Windows kernel
Verkle trees
NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
Comparing dotnet:main...vcsjones:16df4edc7215a9521eda2c7a8aa3fa5f1bcecfef · dotnet/runtime
Positions, Profit and Loss
OpenSSL 3.0 Release Candidate - OpenSSL Blog
The Future of Work at Cloudflare
Reconnected — Real Life
The mermaid is taking over Google search in Norway - ALEXSKRA
How to Build Multi-Platform Apps with Uno Platform and Blockchain
The Nature of Venture
"In the age of information, ignorance is a choice." Or is it?
Dynamic import with HTTP URLs in Node.js
Should web apps use PAKEs?
NFTs are coming for Instagram and other social media platforms
Public CDNs Are Useless and Dangerous
How the blockchain will break up Big Tech
TLS - The Cloudflare Blog
Is TLS Fast Yet?
ongoing by Tim Bray · Algorithm Agility?
Security Analysis of Telegram (Symmetric Part)
Pa(dding rtitioning) oracles, and another hot take on PAKEs
Building a Trustless and Private Internet for Everyone
Cryptography @ Google
dotnet/apireviews
Optimizing Inputs and becoming Indistractable
You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries
r/crypto - My breakdown on Partition Oracle Attacks
Crypto and Monetization
Announcing Arti, a pure-Rust Tor implementation | Tor Blog
Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
VS Code's 'Workspace Trust' Can Restrict Automatic Code Execution -- Visual Studio Magazine
Workspace Trust in Visual Studio Code
Workspace Trust in Visual Studio Code
CouleeApps/git-power
Decrypt Secrets Into ASP.NET Core MVC Action Arguments Using Action Filters
How SHA-256 Works Step-By-Step - Qvault
More Secret Codes: A History of Cryptography (Part 2)
Episode 15: Bringing Secure Multiparty Computation to the Real World!
Kaspersky Password Manager: All your passwords are belong to us
BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
Episode 16: Contact Discovery in Mobile Messengers!
Constant-Time Big Numbers: An Introduction
Explaining blockchains to developers
Coding, Cloud & Technology | An In Depth Look into Random Number Generation in .NET
An Elixir Adoption Success Story
Will deep understanding still be valuable?
NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
What Alex Becker Can Teach Us About YouTube Marketing - Jianchor
SafeDollar ‘stablecoin’ drops to $0 following $248,000 DeFi exploit on Polygon
Hormones + Insecurity = $4 billion USD
Production Threshold Signing Service
Avoiding complexity with systemd
Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
TPM recommendations (Windows 10) - Microsoft 365 Security
MichalStrehovsky/bflat
Taking the (quantum) leap with go
The Era Of Customized Blockchains Is Rising Because Smart Contracts Aren’t Really ‘Smart’
Episode 18: Optimizing Cryptography for Microcontrollers!
Zero Knowledge from the Discrete Logarithm Problem
A from-scratch tour of Bitcoin in Python
Your CPU May Have Slowed Down on Wednesday
Ignoring extra words in Meili Search
CDPH Digital Vaccine Record
Hacker's guide to deep-learning side-channel attacks: the theory
dsprenkels/sss
Croc Full Plaintext Recovery - CVE-2021-31603
Brave, the false sensation of privacy
Announcing .NET 6 Preview 5 | .NET Blog
Cryptographic shuffle | Brain on Fire
The Meltdown of IRON
Announcing .NET 6 Preview 5 | .NET Blog
Representing SHA-256 Hashes As Avatars
Cryptography updates in OCaml and MirageOS
Cryptology ePrint Archive: Report 2021/819
Welcome · Real-World Cryptography MEAP V14
Conversation about networking | .NET Blog
[Cryptography] Apple's iCloud+ "VPN"
Cryptology ePrint Archive: Report 2021/507
log_view_painter.js - Chromium Code Search
Answering Community Questions and What’s Ahead for Mina
From KEMs to protocols
Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
ALPACA Attack
Kerckhoffs’s Law for Security Engineers
Lessons from Reading 10,000 AngelList Applications
The ARM processor (Thumb-2), part 7: Bitwise operations | The Old New Thing
Certificates Confuse Everything
Jonas Hietala: The T-34 keyboard layout
The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams
Cryptology ePrint Archive: Report 2021/428
about:joel
Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
Secret Codes: A History of Cryptography (Part 1)
0.8.0 Release Notes ⚡ The Zig Programming Language
Kate polynomial commitments
Stanford CS Curriculum - Google Drive
Episode 14: Schnorr, Factoring and Lattices!
The best cryptographic protocol ever!
My co-founder and I broke up. Here's a post-mortem.
Google says it will allow ads for cryptocurrency exchanges and wallets in the US that meet certain requirements and are certified by Google starting August 3
Norton 360 antivirus now lets you mine Ethereum cryptocurrency
Vinod Vaikuntanathan - Real World Cryptographers Podcast
Lightweight Cryptography Standardization: Finalists Announced
Conversation about .NET interop | .NET Blog
The Roslyn analyzers I use in my projects - Gérald Barré
CloudSkills.fm: 097: Programming in Go with Michael Levan on Apple Podcasts
Some recent papers in isogeny crypto
Digital currencies, DeFi and the impact of the next Carrington event
Elliptic Curve Cryptography Explained
QUIC Version 1 is live on Cloudflare
A UDP-Based Multiplexed and Secure Transport
The state of tooling for verifying constant-timeness of cryptographic implementations
Blockchain voting is overrated among uninformed people but underrated among informed people
Chris's Wiki :: blog/programming/RustInOurFuture
Building real-time games using Workers, Durable Objects, and Unity
magic-wormhole/magic-wormhole
Cryptography from the Ground Up
Ingrid's Space
Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
Permit to Cloud – Land with Confidence in Azure w/ Mike Benkovich
Secure Search Over Encrypted Data
Factoring in logarithmic time: a mathemagic trick
Authenticated Encryption in .NET with AES-GCM
SecureString obsoletions and shrouded buffer proposal by GrabYourPitchforks · Pull Request #147 · dotnet/designs
Tink | Google Developers
Avoiding the Frigid Hellscape of Online Marketing
Welcoming Linux to the 1Password Family | 1Password
zkSessions: The ZK Languages Roundup - May 19 | Hopin
Multiplayer Doom on Cloudflare Workers
Are you a victim of terrible API documentation? - Note Canvas
Zcon2Lite
How to prevent crypto mining abuse on GitLab.com SaaS
Because I am bored ...
Software Drag Racing: Threadripper vs Ryzen 5950X
A day at work
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
BLS12-381 For The Rest Of Us - HackMD
The Full Coinbase - David Demaree
OrGY: My Personal Technology Stack
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
Erlang/OTP 24 Highlights
Cloudflare on the Edge
JWT should not be your default for sessions
Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
Here's How 'Everything Bubbles' Pop
Dear EU: Please Don't Ruin the Root - Articles
Realizing the Mina vision in Rust
Why does Cryptography use Polynomial Modular Arithmetic in Finite Fields?
Understanding Extended-Nonce Constructions
SharpLab
Introduction to JSON Web Tokens (JWT)
Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
Clarifying the "blockchain"
Threats | No Mercy / No Malice
ZK languages with Alex Ozdemir
.NET API browser
I Didn’t Buy Safemoon And You Can’t Either
OpenBSD 6.9
Cryptology ePrint Archive: Report 2021/323
What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
Mixed Boolean Arithmetic Obfuscation
Getting Started With Chia: SSD & Hard Disk Crytpo-Currency Mining/Farming
Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
Cryptocurrency is an abject disaster
Dabbling in Cryptography
Crypto miners are killing free CI
[PATCH 000/190] Revertion of all of the umn.edu commits [LWN.net]
irtf-cfrg-argon2-13 - The memory-hard Argon2 password hash and proof-of-work function
IDE > Language > Protocol
What's cooking on SourceHut? April 2021
Node.js 16 available now
Rust and cryptographic code | Bulletproof TLS Newsletter
Adventures with RSA Blind Signing
A Full Circle Journey: Introducing Cloudflare Canada
100 million more IoT devices are exposed—and they won’t be the last – Ars Technica
Problems | Project Lovelace
Nassim Taleb: Bitcoin failed as a currency and became a speculative ponzi scheme - Digest Time
Getting Started With Radare2
Making MsQuic Blazing Fast
What on Earth is this Encryption Scheme?
The FreeBSD Project | FreeBSD 13.0-RELEASE Release Notes
Digital After Life
Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca: Lock and Code S02E06 - Malwarebytes Labs
Serving up zero-knowledge proofs
Illyriad Powers of the Kingdom Marketplace on OpenSea: Buy, sell, and explore digital assets
Yuval Ishai - Real World Cryptographers Podcast
In defense of Signal
It’s Not Better If It’s Also Worse
mratsim/constantine
Creating MicroService with .Net 5
16 Where cryptography fails and final words · Real-World Cryptography MEAP V12
Bitcoin could break everything
WTF are these security chips?
An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best?
Goodbye OpenSSL, and Hello To Google Tink
Cryptology ePrint Archive: Report 2021/442
MPC-Over-Signal
Update on git.php.net incident - Externals
Signal Adds Payments—With a Privacy-Focused Cryptocurrency
Portable Internet Behavior Bond
Breaking GitHub Private Pages for $35k
Cryptology ePrint Archive: Report 2021/123
The Sonic (Entrepreneurship) Boom | No Mercy / No Malice
Obvious and possible software innovations nobody does
GitHub investigating crypto-mining campaign abusing its server infrastructure | The Record by Recorded Future
Cryptology ePrint Archive: Report 2021/418
A categorized list of all Java and JVM features since JDK 8 to 16
Cryptography and assembly code
AES was worth $250 billion dollars
The Cost of Proof of Work
Tether produces a new attestation — it says nothing useful
Inside a viral website
Time-lock encryption · Gwern.net
Recovering a full PEM Private Key when half of it is redacted
Humans are eating the world...
Incognito Wallet - Anonymous Crypto Wallet App
SSL/TLS connection issue troubleshooting test tools
OpenPGP Message Format
Bitcoin is not a Battery — it is a Sink
Financial Management of a Digital Nomad
Do Microsoft Devs Secretly Use Linux?
Setting up Cardano Relays using Kubernetes/microk8s
It doesn't work | Frank DENIS random thoughts.
Buffer overruns, license violations, and bad code: FreeBSD 13’s close call
News & Events - Release of draft Applied Cryptography knowledge area for public consultation
The Solution of the Zodiac Killer’s 340-Character Cipher—Wolfram Blog
On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
Easy generation of fake/dummy data in C# with Faker.Net
suite - Privacy-Enhancing Cryptography | CSRC | CSRC
mratsim/constantine
r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
Hybrid encryption and the KEM/DEM paradigm
The missing explanation of ZK-SNARKs: Part 1
Can we talk about client-side certificates?
Visa Plans to Enable Bitcoin Payments at 70 Million Merchants
In-kernel WireGuard is on its way to FreeBSD and the pfSense router
Add and manage TLS/SSL certificates - Azure App Service
The internet didn’t kill counterculture—you just won’t find it on Instagram
r/crypto - What kind of careers can I pursue with a PhD?
Key Exchange Standards
Becoming physically immune to brute-force attacks
ARMs Race: Ampere Altra takes on the AWS Graviton2
Block Cipher Structures: Ranked
A flamegraph of Real-World Cryptography
Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!
Did Schnorr destroy RSA? Show me the factors.
Shiny Stock Syndrome
Cryptology ePrint Archive: Report 2021/015
February 2021 - Killing Turbotax
Semantic Versioning Will Not Save You
SSH and User-mode IP WireGuard
Bitcoin Is Time | dergigi.com
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Weird architectures weren't supported to begin with
How I cut GTA Online loading times by 70%
Format Replacement cycles
The security of the "Pass" password manager
Every thought about personal finance I've ever had, as concisely as possible
Cryptology ePrint Archive: Report 2020/1610
March 31, 2020 - Minimal March concludes - .NET and Blazor at the Command Line
Librsvg, Rust, and non-mainstream architectures
[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
Cryptology ePrint Archive: Report 2020/1608
March 22, 2020 - Minimal March - Linux and Blazor. PRs, Finishing the FormView, C#, HTML
Cryptography Interface Design is a Security Concern
Document
The Coming Era of Tokenized Essays
How I heat my home by mining crypto currencies
Add static PBKDF2 one-shot methods · dotnet/runtime@0c47471
Cryptology ePrint Archive: Report 2020/1581
Ethereum isn't fun anymore
The problem of CryptoArt
Double-Odd Elliptic Curves - Double-Odd Elliptic Curves
Cryptology ePrint Archive: Report 2020/1533
Using HPKE to Encrypt Request Payloads
Urbit :: the good, the bad, and the insane
Prediction Markets: Tales from the Election
Nvidia to cripple Etherum mining on GeForce RTX 3060 cards to deter crypto bods from nabbing all the gear
Cryptology ePrint Archive: Report 2020/1535
Go 1.16 Release Notes - The Go Programming Language
Cryptology ePrint Archive: Report 2020/1541
Implement ECC APIs on Android using Android-built-in Crypto APIs by jkoritzinsky · Pull Request #48348 · dotnet/runtime
Multi-asset shielded pool project (MASP)
A Billion Mockingbirds: The Role of Journalists in Destroyed Civilization
ratfactor/ziglings
Securing the post-quantum world
Our Solo v2 launch is official!
Nouriel Roubini: ‘Tether is a criminal enterprise,’ SEC should probe Elon Musk’s bitcoin tweets
Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
Quantum cryptography network spans 4600 km in China – Physics World
An Incomplete Field Guide to Crypto Adoption
Good-bye ESNI, hello ECH!
PemEncoding Class (System.Security.Cryptography)
Crackpot Cryptography and Security Theater
Why should I give you my ID card
10 Reasons to Love Passwordless #2: NIST Compliance
My opinion on blockchain
What's an SPF Record? - Ultimate Guide to Email
Protect your accounts from data breaches with Password Checkup
Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
A Simple and Succinct Zero Knowledge Proof
My product is my garden
Threshold Cryptography with Omer Shlomovits from ZenGo
Cryptology ePrint Archive: Report 2020/1506
Cryptology ePrint Archive: Report 2006/069
Episode 10: Exploiting Authenticated Encryption Key Commitment!
The Secret History of Windows Bluescreens by Davepl
Neural Networks Explained from Scratch using Python
The Subtle Hazards of Real-World Cryptography
Transfer Stocks Out Of Your Robinhood Account | Robinhood
pascalw/kindle-dash
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
No, Java is not a Secure Programming Language
berty/berty
What it means to be a cryptographer
survey.pdf
ThreadPool Blocking Mitigation by benaadams · Pull Request #47366 · dotnet/runtime
Write Crypto Code! Don't publish it!
50,000th Subscriber Extravaganza! LiveStream TONITE 7PM PST!
pavlobu/deskreen
s-51: Ask Me Anything (AMA), with Joan Daemen
So, You Want to CTF? (A Beginner’s Guide to CTFing)
Cryptography 101 with Oso's Dr. Sam Scott | Hanselminutes with Scott Hanselman
Please Stop Encrypting with RSA Directly
Meet Raspberry Silicon: Raspberry Pi Pico now on sale at $4 - Raspberry Pi
An Opinionated Introduction to Urbit
Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
Mesmerizing Chameleon Signatures
How I develop web apps in 2021
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
Pirates, Crypto, and the Secret History of Windows Product Activation
A history of end-to-end encryption and the death of PGP
Portugal - The Most Crypto-Friendly Nation in Europe | Jean Galea
Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
KEMTLS: Post-quantum TLS without signatures
Fully Homomorphic Encryption Part One: A Gentle Intro
Becoming Silicon Valley
VeriCrypt: An Introduction to Tools for Verified Cryptography
jukefoxer/Signal-Android
Pirated Academic Database Sci-Hub Is Now on the ‘Uncensorable Web’
An introduction to the Data Protection system in ASP.NET Core
Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen
Death to the document
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
David Wong - What is Applied Cryptography? #121 - Develomentor
David Wong – What is Applied Cryptography? #121
The Tether Press and Bitcoin's Speculative Mania - Trolly McTrollface's Blog
Cryptology ePrint Archive: Report 2020/1390
Steam's login method is kinda interesting
.NET Rocks! vNext
Episode 8: Breaking Elliptic-Curve Signatures With LadderLeak!
Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
Episode 9: Off-the-Record Messaging and PKI Implementations!
Cryptology ePrint Archive: Report 2020/1456
s-18: FSE 2020 Rump session
[Cryptography] Bitcoin is a disaster.
Resetting Zcash: its about privacy, not scale, econ, dev funds, or governance
Colin Stebbins Gordon
Year in Review: 2020
zkSNARKS and Cryptographic Accumulators
Tal Rabin - Real World Cryptographers Podcast
I am Filippo Valsorda, Go cryptography lead and tool author, Ask Me Anything
A tour of std.crypto in Zig 0.7.0 - Frank Denis
A Christmas Gift for Ledger Users – Death Threats - BeInCrypto
Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
Introduction to quantum computing with Q# – Part 12, Bell’s inequality
2-adic Logarithms and Fast Exponentiation
Last Week in .NET #23 – Solarwinds gets hacked; Microsoft goes on the Attack
Counterfactual communication and intimidation
Path to my financial independence
Episode 5: Isogeny-Based Cryptography For Dummies!
Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security
Bouncy Castle crypto authentication bypass vulnerability revealed
Cryptography Dispatches: Re-Deriving the edwards25519 Decoding Formulas
jwasham/coding-interview-university
Files and directories to exclude from antivirus scanning for Orion Platform products (AV exceptions and exclusions)
Cryptohack: A Fun Platform For Learning Modern Cryptography
Last Week in .NET #22 – Microsoft Parrots Google
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
The Fraying of the US Global Currency Reserve System
Ecc 2020 Panel "recent Trends In (Ecc) Crypto
Privacy and Compliance Reading List
Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
How to Build a Global Network that Complies with Local Law
#104 – David Wong: Many Layers of Complexity
Cryptography Improvements in .NET 5 - Support for PEM
OPAQUE: The Best Passwords Never Leave your Device
The Future I Believe In
Nicola Bortignon - We need more platforms in our lifes
#104 – David Wong: Many Layers of Complexity
Privacy needs to be built into the Internet
Understand The .NET 5 Runtime Environment
Workshop On Elliptic Curve Cryptography Ecc 2020 (Videos)
Fake Tweet Screenshot Proliferation
Cryptologie | International Olympiad In Cryptography
The Cryptopals Crypto Challenges
Radicle - Peer-to-peer code collaboration
Pyecsca: Python Elliptic Curve Cryptography Side-Channel Analysis Toolkit
Crypto Dictionary
How do people find bugs?
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
zkSummit 6 | Hopin
The book is finished, well sort of...
A Taste of OCaml's Predictable Performance - Dev.Poga
Go standard library benchmarks - Intel vs M1
Haskell - All Hail Geometric Algebra!
Atari Token: Turbocharging Classic Games With Crypto - Decrypt
Api diff between net5.0 and netcoreapp3.1 & netstandard2.1 by Anipik · Pull Request #5610 · dotnet/core
Episode 2: Breaking Lightweight Symmetric Cryptography!
Ok Google: please publish your DKIM secret keys
Can’t open apps on macOS: an OCSP disaster waiting to happen
Going Bark: A Furry’s Guide to End-to-End Encryption
Your Computer Isn't Yours
Cryptologie | High-Assurance Crypto Software
Generate a Service Bus SAS Token and Manage Token renewal using Azure Runbooks | Developer Support
Etebase - Your end-to-end encrypted backend
Cryptologie | The End Of Crypto
What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
net5-contrib.diff
Don’t outsource your thinking — Avthar Sewrathan
Cryptologie | The Joy Of Cryptography
The missing explanation of zk-SNARKs: Part 2
Fall 2020 RPKI Update
Spending political capital
janos/compromised
A Brief Introduction to Deniability
Cryptography Dispatches: Reconstruct Instead Of Validating
Isogeny-Based Cryptography: Past, Present, And Future
Adi Shamir 2002 Acm A.m. Turing Award Lecture, "cryptography: State Of The Science"
Putting JSON in a block chain? First decide what your JSON is…
.NET libraries and the art of backward compatibility – Part 3
How software eats money
mimoo/crypto_blogs
Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
Chris Ball » Announcing GitTorrent: A Decentralized GitHub
Should I buy the dip?
1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
X509Certificate2.CreateFromPem(ReadOnlySpan<Char>, ReadOnlySpan<Char>) Method (System.Security.Cryptography.X509Certificates)
dotnet/runtime
Home
Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
Breaking changes, version 3.1 to 5.0 - .NET Core
Cryptography Dispatches: Nacl Is Not A High-Level Api
JDK 15 Security Enhancements
The End of Crypto
XChaCha20-Poly1305: A Primer with Examples in .NET
Decentralized Finance will reshape (or eat?) Centralized Finance
A follow up to Coinbase as a “mission focused” company
Cryptography Dispatches: Reconstruct Instead of Validating
Consensus is Harder Than It Looks
It’s 255:19AM. Do you know what your validation criteria are?
The passion economy and the future of finance
Robots, Oracles And Protocols; Breaking Cryptography Through Information Leakage
LLVM provides no side-channel resistance
ASP.NET Core breaking changes
The Kyber/Dilithium NTT
The Coinbase post was 100% right. Here's what you can do about it
Coinbase offers exit package to those uncomfortable with new direction
A categorized list of all Java and JVM features since JDK 8 to 15
Advisory: security issues in AWS KMS and AWS Encryption SDKs
Bypassing Android MDM using Electromagnetic Fault Injection by a Gas Lighter for $1.5
Using Azure RBAC with Azure Key Vault
Top 10 .NET 5.0 new APIs - NDepend
Why not rust for security?
On the use of a life
Introducing Precursor « bunnie's blog
A Thanksgiving Carol
GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
Your Phone Is Your Castle – Purism
Support ECDiffieHellman on X509Certificate2 by vcsjones · Pull Request #42180 · dotnet/runtime
coin_artist – 34700 $coin Puzzle Write-Up ($20,000)
Security by Obscurity is Underrated
Oracle Developer Live—Java
Preventing Insecure Network Connections | Apple Developer Documentation
Key exchange standards - Manning
Key exchange standards - Manning
A history of elliptic curves in tweets
Everything You Need to Know to Get Started with Deno
Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
Why I’m Writing A Book On Cryptography
Soatok’s Guide to Side-Channel Attacks
Taking a look at Gerät 32620 — The Postface
Cryptologie | Links
Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
So you want to roll your own crypto?
Call For Presentations – PasswordsCon
Providers | PrivacyTools
Saving the Web With Very Small Amounts of Money
Cross-platform cryptography in .NET Core and .NET 5
NuGet and long file name support · Issue #3324 · NuGet/Home
Cryptography Dispatches
Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
N O D E
reMarkable microSD
Obfuscating your email on the web
Symmetric and Asymmetric Encryption in .NET Core
JWTs: Which Signing Algorithm Should I Use?
Introduction to quantum computing with Q# – Part 6, No-cloning theorem
IBM Reveals Next-Generation IBM POWER10 Processor
Hiding messages in x86 binaries using semantic duals
Stateful Hash-Based Signatures | CSRC | CSRC
The “Easiest” Paths to Product Management
If the NSA has been hacking everything, how has nobody seen them coming?
From stock market email newsletter side project to micro SaaS
The Five P Framework for Product Discovery
terrajobst/HarvestPlatformSupport
Proof of X
WASM: Add MD5 and SHA* hash functions by akoeplinger · Pull Request #40486 · dotnet/runtime
1Password for Linux development preview
The .NET Core Journey at Criteo
David Wong Portfolio
David Wong
Announcing Windows 10 Insider Preview Build 20170 | Windows Experience Blog
The Haskell Elephant in the Room
Addressing the July 2020 e-commerce and marketing data breach -- A Message From Ledger’s Leadership | Ledger
Small Mailserver Best Current Practices
p410n3 blog
Add CBOR property-based tests by eiriktsarpalis · Pull Request #39828 · dotnet/runtime
Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
Exploring Fully Homomorphic Encryption
Creating Elliptical Curve Keys using OpenSSL
Cryptography Dispatches: DSA Is Past Its Prime
Made 13 Dollars with Brave and Basic Attention token
Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
dotnet/designs
Poor feedback from readers
pimbrouwers/Falco
How SHA-2 Works Step-By-Step (SHA-256)
Hacking Reolink cameras for fun and profit
DRBG: rename the DRBG taxonomy. · openssl/openssl@ce3080e
Data Structures & Algorithms I Actually Used Working at Tech Companies
All .Net Exceptions List
A few thoughts about Signal’s Secure Value Recovery
[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
braver-browser/braver-browser
Youtube DELETED Jordan Pier's Electronics Repair Channel!
Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
Why I’m Writing A Book On Cryptography
Bitcoin From Scratch - Part 1
How CDNs Generate Certificates
How to get the best out of your Yubikey with GPG
Why AES-GCM Sucks
There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
Path Building vs Path Verifying: The Chain of Pain
How is NSA breaking so much crypto?
Teach Yourself Computer Science
How I Got My 7 Person Startup Featured In Entrepreneur Magazine - David Kemmerer
Let's Encrypt: Senior Software Engineer
11 User Authentication · Real-World Cryptography MEAP V07
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
Reasoning by Lego: The wrong way to think about cryptography.
jbp.io :: Third-party audit of rustls
A collection of free books from Springer
Never Hertz to Ask
Getting Started with Nix
ECDSA: Handle with Care
dotnet/pinvoke
25 Years of PHP History
After 10 Years in Tech Isolation, I'm Now Outsider to Things I Once Had Mastered
Container technologies at Coinbase
Why Is Grayscale Buying 100% Of The Mined Bitcoins Since Halving - Hamad Dar's Blog
Ladies and Gentlemen… Cloudflare TV!
Byzantine and non-Byzantine distributed systems
mimoo/disco
(Very) Basic Intro To Elliptic Curve Cryptography
The radix 2^51 trick
Node v12.17.0 (LTS) | Node.js
Home automation and Bitcoin?
NIST Special Publication 800-63-3
User authentication with passwords, What’s SRP?
OpenBSD 6.7
ACME End User Client and Code Signing Certificates
Cryptology ePrint Archive: Report 2020/572
The Janet Programming Language
Replacing JWTs with Branca and PASETO in .NET Core
Credential Loading and the AWS SDK for .NET (Deep Dive) - Steve Gordon
Lockdown Course: Introduction to Cryptography - James Grime
Zoom buys Keybase to help it build end-to-end encryption
Archive
Alternatives to PGP
Keybase joins Zoom
Create a .NET Core Deamon app that calls MSGraph with a certificate
OpenPGP Message Format
Why not "Why not WireGuard?"
Vietnam's contact tracing app broadcasting a fixed ID
Barbie typewriter
Build a C# App with CockroachDB and the .NET Npgsql Driver
This is what end-to-end encryption should look like! - Jitsi
Engineering code quality in the Firefox browser: A look at our tools and challenges – Mozilla Hacks - the Web developer blog
Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
500 Free Computer Science Courses from the World’s Top CS Universities
Is BGP safe yet? · Cloudflare
TF Podcast on Apple Podcasts
0.6.0 Release Notes · The Zig Programming Language
Using Certificates from Azure Key Vault in ASP.NET Core
This is what end-to-end encryption should look like! - Jitsi
The limitations of Android N Encryption
The Power of Prolog
Transport Layer Security (TLS) best practices with the .NET Framework
Welcome · Real-World Cryptography MEAP V05
FLOPPY DISK OVERDRIVE, by MASTER BOOT RECORD
How we recovered over $300K of Bitcoin
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
Perspectives & gaps between theory, practice & industry research in cryptography
A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero
.NET R&D Digest (March, 2020)
Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by default - Microsoft Edge Blog
US Government Wages War on Encryption
Linux 5.6 - Linus Torvalds
patents in crypto
Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
Speeding up Linux disk encryption
A categorized list of all Java and JVM features since JDK 8 to 14
Deploying security.txt: how Cloudflare’s security team builds on Workers
.NET Platforms Feature Comparison | Premier Developer
A Quick Garbled Circuits Primer
How Tailscale works
EARN IT bill is aiming at destroying encryption. We must take action now.
gentilkiwi Shop | Redbubble
MakerDAO gets stress tested as ETH price plummets
Pylon Validation Services
What's a key exchange?
Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
Keybase
MYBP (Maybe You’ve Been Pwned)
Existence is random [JavaScript code to efficiently generate a random (version 4) UUID]
WireGuard Gives Linux a Faster, More Secure VPN
Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
Stack Exchange Data Explorer
The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months
If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
Am I generating email link tokens correctly?
Hash functions and security | Manning
Ivan On Tech on Programming in Solidity, C++, and Javascript - Cryptographic Asset
home | CFAIL
Provisioning X.509 Devices for Azure IoT Hub using .NET Core
Cryptologie
X25519 in Web Cryptography · Issue #271 · mozilla/standards-positions
February 2020 SDK Release
Hash functions and security | Manning
Latacora - Stop Using Encrypted Email
Peter Lawrence Montgomery, 1947-2020
Real-World Cryptography
google/tink
This Goes to Eleven (Part. 2/∞)
London Crypto Day 2020
Create Certificates for IdentityServer4 signing using .NET Core
Creating Certificates for X.509 security in Azure IoT Hub using .NET Core
Serious Cryptography | No Starch Press
Authentication, What The Fuck?
Permutation-based Cryptography 2020 – Zagreb, Croatia
Showtime | BenchmarkDotNet
NorthSec 2020
Workshops | Insomni'Hack
Whose Curve Is It Anyway
Critical Windows 10 vulnerability used to Rickroll the NSA and Github
18.783 Home
Real World Crypto 2020
Supersingular Isogeny Key Exchange for Not-Quite Beginners
SHA-1 is a Shambles
FROST — Flexible Round-Optimized Schnorr Threshold Signatures | Cryptography, Security, and Privacy (CrySP) | University of Waterloo
The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
The Hidden Number Problem – kel.bz
$1000 TCR hashing competition
Vim cryptmethod is not authenticated · Issue #638 · vim/vim
On Linux's Random Number Generation
Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
tmds/Tmds.Ssh
VPN Service for Serious Privacy & Security | IVPN
GateHub Investigation - Final Statement
Stop surveillance and preserve your privacy with IVPN
TPM-FAIL Attack
Isogeny crypto
Homepage | ZKProof Standards
Maintaining cryptographic library for 12 languages
Facebook Libra is Architecturally Unsound
NordVPN users’ passwords exposed in mass credential-stuffing attacks
cfrg/pake-selection
TLS Post-Quantum Experiment
Have I Been Pwned: API v3
Creating Random Numbers With .NET Core
cr.yp.to: 2019.10.24: Why EdDSA held up better than ECDSA against Minerva
Meet Algo, the VPN that works
Writing a book is hard
Ed25519 Keys | Brian Warner
Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
The Insecure Elephant in the Room - CA Security Council
Grant Types — IdentityServer4 1.0.0 documentation
Algorand's cryptographic sortition
novotnyllc/NuGetKeyVaultSignTool
What's my birthday?
CryptographicException on .NET Core 3, Windows only "The specified RSA parameters are not valid; both Exponent and Modulus are required fields." · Issue #30914 · dotnet/runtime
Cutter
What's new in .NET Core 3.0
draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
September 10, 2019—KB4515384 (OS Build 18362.356)
awslabs/s2n
OWASP/CheatSheetSeries
10 Personal Finance Lessons for Technology Professionals
OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
cr.yp.to: 2017.07.23: Fast-key-erasure random-number generators
jedisct1/dsvpn
Major Crypto Brokerage Coinmama Reports 450,000 Users Affected by Data Breach
Padloc - A Modern Password Manager For Individuals And Teams
Please do not use the .NET 2.0 HMACSHA512 and HMACSHA384 Classes
!(Spotting the promising cryptography-related start ups)
Random Thoughts
JDK 13 Security Enhancements
Pwnie Awards
Security Engineering - A Guide to Building Dependable Distributed Systems
Sometimes valid RSA signatures in .NET
Manning Publications
CRYPTO-LAB
Deprecation errors compiling native projects on macOS Catalina · Issue #30109 · dotnet/runtime
Real-World Cryptography
Using Chained Certificates for Certificate Authentication in ASP.NET Core 3.1
Kraken
Cryptocurrency in Every Wallet™ | Best Place To Buy Sell Store Crypto | Crypto.com
Archive
POSIX close(2) is broken
Add methods to convert between hexadecimal strings and bytes · Issue #17837 · dotnet/runtime
The Ultra Secure Crypto Storage & Communication Device
A book in preparation
Security advisory 2019-06-13 | Yubico
Certificate Authentication in ASP.NET Core 3.1
Apple's 'Find My' Feature Uses Some Very Clever Cryptography
Apple CryptoKit | Apple Developer Documentation
Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
How Hackers Get your Password? | Dr. Erdal Ozkaya Personal Blog
Cryptography Dispatches • Buttondown
JED Server Security Incident Report
SMS for 2FA: What Are Your Security Options? - Authy
Enable C# mode command line diff by terrajobst · Pull Request #1196 · dotnet/standard
Kik and the SEC: What’s Going On and What Does It Mean for Crypto? - Andreessen Horowitz
[Cryptography] Bitcoin - closing the coin
Why 2f+1
Seven Trends in Blockchain Computing (Spring 2019)
nothings/single_file_libs
dotnet/extensions
RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
microsoft/SymCrypt
JDK 12 Security Enhancements
Five Open Problems for the Blockchain Computer - Andreessen Horowitz
proposal: crypto/tls: Expose maps for cipher suite IDs/names · Issue #30325 · golang/go
Dream Market Shuts Down: Has the DEA Claimed Another Darknet Victim?
Cryptologie
Lies, darn lies and sampling bias
Verified cryptographic provider a triple threat
.NET API browser
ITHare/obf
A Go implementation of Poly1305 that makes sense
Archive
BoringTun, a userspace WireGuard implementation in Rust
Possible bug with RSACng hash verification · Issue #29061 · dotnet/runtime
The WhibOx Contest Edition 2 - CYBERCRYPT
On the S-Box of Streebog and Kuznyechik
Understanding STIR/SHAKEN
Include System.Security.Cryptography.RandomNumberGenerator.GetInt32 · Issue #1101 · dotnet/standard
Go 1.12 Release Notes - The Go Programming Language
Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
We need to talk about Session Tickets
Cybersecurity for the Public Interest - Schneier on Security
Added Range Manipulation APIs to Collection<T> and ObservableCollection<T> by ahoefling · Pull Request #35772 · dotnet/corefx
Past, Present, Future: From Co-ops to Cryptonetworks - Andreessen Horowitz
Data Leakage from Encrypted Databases - Schneier on Security
a16z Podcast: Voting, Security, and Governance in Blockchains - Andreessen Horowitz
Introducing Anchorage, the world’s first crypto-native custodian
What comes after open source?
Blockchain Can Wrest the Internet From Corporations' Grasp
Crypto, Beyond Silk Road - Andreessen Horowitz
Crypto, the Future of Trust
Beyond Cryptocurrencies - Andreessen Horowitz
4 eras of blockchain computing: degrees of composability
The Four Horsemen of Centralization, by Ali Yahya
Centralization vs Decentralization - AVC
Presentation: The End of the Beginning — Benedict Evans
The Myth of The Infrastructure Phase | Union Square Ventures
a16z Crypto - Andreessen Horowitz
a16z Crypto - Andreessen Horowitz
a16z Crypto - Andreessen Horowitz
a16z Crypto - Andreessen Horowitz
a16z Podcast: Scaling Companies (and Tech Trends) - Andreessen Horowitz
a16z Crypto - Andreessen Horowitz
SEC.gov | Digital Asset Transactions: When Howey Met Gary (Plastic)
A #CryptoIntro — Resources & Wrap Up
Welcome Balaji Srinivasan, Coinbase’s new Chief Technology Officer
Crypto Canon - Andreessen Horowitz
a16z Podcast: Mental Models for Understanding Crypto Tokens - Andreessen Horowitz
Vitalik Buterin, Creator Of Ethereum, On The Big Guy Vs. The Little Guy - Unchained Podcast
Our Top 16+ Podcasts of 2017 - Andreessen Horowitz
The Future of Tech, with Chris Dixon – [Invest Like the Best, EP.69]
dYdX raises seed round led by Andreessen Horowitz and Polychain Capital
Welcome Asiff Hirji: Coinbase’s New President & Chief Operating Officer
Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
Keybase launches encrypted git
a16z Podcast: Why Crypto Tokens Matter - Andreessen Horowitz
Bitcoin's Academic Pedigree - ACM Queue
Blockchains don’t scale. Not today, at least. But there’s hope.
How Information Got Re-Invented - Issue 51: Limits - Nautilus
Traditional Asset Tokenization
Traditional Asset Tokenization
Digital currency reading list
Computer Logic with Chris Dixon - Software Engineering Daily
Details on Recent DNS Hijacking - Schneier on Security
Reconstructing SIGSALY - Schneier on Security
Blockchain and Trust - Schneier on Security
Hacking the GCHQ Backdoor - Schneier on Security
Friday Squid Blogging: Squid Lollipops - Schneier on Security
Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
Friday Squid Blogging: New Giant Squid Video - Schneier on Security
New Australian Backdoor Law - Schneier on Security
Back Issues of the NSA's Cryptolog - Schneier on Security
Security Risks of Chatbots - Schneier on Security
The DoJ's Secret Legal Arguments to Break Cryptography - Schneier on Security
Friday Squid Blogging: Squid Sculptures - Schneier on Security
oss-security - MatrixSSL stack buffer overflow
Modern Alternatives to PGP
Go 1.12 Release Notes - The Go Programming Language
Archive
proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
Real World Crypto 2019 - Day 1 - Session 1 - Morning - part 1
crypto/x509: root_cgo_darwin and root_nocgo_darwin omit some system certs · Issue #24652 · golang/go
crypto/tls: add support for TLS 1.3 · Issue #9671 · golang/go
CBC 2019
Real World Crypto 2019
The year in post-quantum crypto
Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
ImperialViolet - CECPQ2
SPY --- Surveillance, Privacy, and You
Quantum algorithms for analysis of public-key crypto | American Inst. of Mathematics
Mathematics of Public Key Cryptography
CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
Programme
PQCRYPTO ICT-645622
D. J. Bernstein / Talks
djbsort: Intro
Security in Times of Surveillance
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
Eurocrypt 2018 rump session
Classic McEliece: Talks
NIST PQCrypto Classic McEliece submission
PQCrypto 2018 Conference : Florida Atlantic University - Charles E. Schmidt College of Science
libpqcrypto: Intro
Security in Times of Surveillance
Introducing HacSpec
Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
Post-Quantum Cryptography
CBC Workshop 2018 : Florida Atlantic University - Charles E. Schmidt College of Science
SPHINCS+
The ROBOT Attack
NTRU Prime: NIST submission
dalek-cryptography/ed25519-dalek
The CCC: Men Who Hate Women
Mersenne Prime Discovery - 2^82589933-1 is Prime!
RUB-NDS/TLS-Padding-Oracles
Cryptologie | Links
crypto/tls: enable TLS 1.3 and update tests · golang/go@30cc978
Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
Database Encryption
Kerckhoffs’ principles – Why should I make my cipher public?
Proxy re-encryption and FHE with NuCypher
Cryptologie | Links
Attack of the week: searchable encryption and the ever-expanding leakage function
Archive
Introducing Adiantum: Encryption for the Next Billion Users
Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
Stanford Blockchain Conference 2019 - Day 1
arXiv.org e-Print archive
DEF CON® 27 Hacking Conference - Call For Papers
Earn BAT while trying out the blockchain-friendly Brave browser
Meow Hash
Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
Manning Publications
Software Tokens Won't Save You