#TechForUkraine
Explore other dev related sites in this ring. If you find this idea useful click here to join.
devring.club Previous Random Next

linksfor.dev(s)

Posts for 'cryptography'

  1. 97%Protect your AWS Webservers from Port Scanning attacks
  2. 97%On the CrowdStrike Incident
  3. 96%how to pwn a billion dollar vc firm using inspect element - eva's site
  4. 99%NuGetAudit 2.0: Elevating Security and Trust in Package Management - The NuGet Blog
  5. 95%Engineering a New PDU from the Ground Up
  6. 99%Writing GUI apps doesn't have to be painful
  7. 98%Building a WoW server in Elixir
  8. 98%The Experience of Deploying Next.js Apps on Cloudflare
  9. 99%Exploring TLS certificates and their limits
  10. 98%Family Values
  11. 95%Machine Learning and the triumph of GOFAI
  12. 99%Ente - Private cloud for your photos, videos and more
  13. 98%Batteries: how cheap can they get?
  14. 98%Ladybird
  15. 98%Ladybird
  16. 89%The Great MEV Heist
  17. 99%My .gitconfig file dissected | Kiran Rao
  18. 97%Inside the tiny chip that powers Montreal subway tickets
  19. 98%Ladybird browser spreads its wings [LWN.net]
  20. 96%What You Get After Running an SSH Honeypot for 30 Days
  21. 78%The Australian Securities Exchange CHESS blockchain: seven years of sunk cost fallacy
  22. 95%cr.yp.to: 2024.06.12: Bibliography keys
  23. 98%Group chats rule the world
  24. 99%Solene'% : OpenBSD extreme privacy setup
  25. 98%The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
  26. 99%password authentication – smudge.ai blog
  27. 99%Towards Federated Key Transparency - Dhole Moments
  28. 99%Bouncy Castle Cryptography Library for .NET - Code Maze
  29. 97%In Search of the Lost Web
  30. 98%Encryption At Rest: Whose Threat Model Is It Anyway?
  31. 98%Attacking NIST SP 800-108
  32. 99%Encryption At Rest: Whose Threat Model Is It Anyway?
  33. 99%Length Extension Attacks | Tiago Neto
  34. 76%We Already Have a Digital Currency | Kev Quirk
  35. 77%internetarchive (@internetarchive@mastodon.archive.org)
  36. 99%Mutual TLS (mTLS): building a client using the system keystore
  37. 83%I've figured out why some crypto rounds are way too big
  38. 73%Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
  39. 97%Mathematics and literature, really?
  40. 99%Adding Multiple Flutter Applications to Single Window on Web
  41. 95%Known Purpose and Trusted Potential.
  42. 80%Paying People in Equity and Dividends
  43. 97%16 years of CVE-2008-0166 - Debian OpenSSL Bug
  44. 99%using golang's crypto/aes and crypto/cipher packages
  45. 98%Protecting Next.js Apps Against Cross-Site Request Forgery
  46. 99%Deniable Encryption
  47. 94%Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
  48. 99%Deniable Encryption
  49. 96%Traditional Publishing is Great, Actually
  50. 98%Online Cryptography Course by Dan Boneh
  51. 99%Reverse engineering BeReal
  52. 99%Verifying Slack Requests in Phoenix
  53. 96%Lateral Thinking: examples of creative solutions
  54. 99%What Computers Cannot Do: The Consequences of Turing-Completeness
  55. 98%The Moore-Nakamoto plain
  56. 98%Fully Decentralized Forum With 60 Lines of Code
  57. 86%AI - SkyNet Is Not Coming to Kill You
  58. 99%What is the Metropolis algorithm?
  59. 98%Good Ideas in Computer Science
  60. 99%0.12.0 Release Notes ⚡ The Zig Programming Language
  61. 97%How do electronic passports work? | Burak Can's Blog
  62. 99%PuTTY vulnerability vuln-p521-bias
  63. 94%T-Mobile Employees Across The Country Receive Cash Offers To Illegally Swap SIMs
  64. 97%Fixing Typos and Breaching Microsoft’s Perimeter 
  65. 86%The golden rule of PR reviews
  66. 85%GCC version 14 coming soon – and will drop Itanium support
  67. 98%How I improved my crypto trading bot’s exit strategy - cryptomaton
  68. 98%Nightmare on Lemmy Street (A Fediverse GDPR Horror Story) - Michael Altfield's Tech Blog
  69. 99%Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
  70. 97%How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
  71. 99%Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
  72. 98%OpenBSD 7.5
  73. 99%XDP for Game Programmers
  74. 99%Automatic differentiation with dual numbers
  75. 96%What we know about the xz Utils backdoor that almost infected the world
  76. 99%GitHub - proposal-signals/proposal-signals: A proposal to add signals to JavaScript.
  77. 70%Technologist vs spy: the xz backdoor debate
  78. 91%Tell the LLM the business context
  79. 98%“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
  80. 99%Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
  81. 99%What Computers Cannot Do: The Consequences of Turing-Completeness
  82. 99%Protect your ASP.NET site using WebAuthn Passkeys
  83. 99%GitHub - janmojzis/tinyssh: TinySSH is small server (less than 100000 words of code)
  84. 96%What is Naimint?
  85. 98%101 things I would tell my self from 10 years ago
  86. 97%Senior Security Analyst, Threat Intelligence in Remote, United States | GitHub, Inc.
  87. 99%JIT WireGuard
  88. 99%A Primer On Randomness
  89. 82%Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
  90. 97%Lasso-based SNARK for non-uniform computation
  91. 95%Windows Subsystem for Android™️
  92. 97%The Nature of Technology Book Review
  93. 94%David Wong (@cryptodavidw) on Threads
  94. 97%An Overview Of Quantum Computing's Possible Impact On Cryptography
  95. 99%Mocking authorization tokens with WireMock.NET
  96. 95%The Linux CNA – Red Flags Since 2022
  97. 87%Bcrypt Hash Generator & Verifier
  98. 99%Exploring Next.js Forms with Server Actions
  99. 63%The Unbundling of Venture Capital
  100. 98%How Does BlueSky Work?
  101. 99%Language Checklist
  102. 99%System.IO.Hashing 8.0.0
  103. 97%Building a deep learning rig | part-1
  104. 97%The eBook for 'Why Cryptocurrencies?' is now available for free
  105. 98%Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
  106. 99%Using Azure Key Vault for signing and encrypting JSON Web Tokens
  107. 97%Is client side security dead - or a crucial part of the future?
  108. 99%Using a CSP nonce in Blazor Web
  109. 86%AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
  110. 86%How to feel when your startup feels easy
  111. 72%Climbing out of the rabbit hole
  112. 97%The Selfish GPU
  113. 99%Hello world, and the future for PyO3
  114. 99%Sign and Verify Messages with HMAC Using the Web Crypto API
  115. 95%FastPay: High-Performance Byzantine Fault Tolerant Settlement
  116. 68%Ransomware Hit $1 Billion in 2023
  117. 72%Does it matter where you live?
  118. 98%Reverse engineering Skylanders' Toys-to-life mechanics
  119. 97%The Noise Protocol Framework
  120. 98%Go 1.22 Release Notes - The Go Programming Language
  121. 99%Hacking a Smart Home Device
  122. 76%A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
  123. 85%GitHub - vitoplantamura/HackerNewsRemovals: List of stories removed from the Hacker News Front Page, updated in real time.
  124. 83%The end of my childhood
  125. 99%The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
  126. 88%41 Years in UX: A Career Retrospective
  127. 99%Crypto is not cryptocurrency
  128. 90%Crypto is not cryptocurrency
  129. 97%Want to learn more about zkBitcoin? I've made some videos
  130. 50%Position Paper on Quantum Key Distribution
  131. 96%On Climbing the Stat Arb (CEX/DEX) Leaderboard, Comparative Advantage and Careers, and My Future in Crypto - Daniel D. McKinnon
  132. 71%2023 letter | Dan Wang
  133. 99%Public Key Encryption with the JavaScript Web Crypto API
  134. 99%Learn to code. Or don’t.
  135. 95%Nethermind client: 3 Experimental Approaches to State Database Change
  136. 99%Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
  137. 99%RSA is deceptively simple (and fun)
  138. 99%High-speed 10Gbps full-mesh network based on USB4 for just $47.98
  139. 99%Authenticating a .NET GitHub App using a JSON Web Token (JWT) - Steve Gordon - Code with Steve
  140. 70%Your washing machine could be sending 3.7 GB of data a day — LG washing machine owner disconnected his device from Wi-Fi after noticing excessive outgoing daily data traffic
  141. 99%Storing WebAuthn challenge values without a database in Elixir
  142. 95%What's out there for ECDSA threshold signatures
  143. 99%JSON Web Tokens are actually great, just not for sessions
  144. 97%Binius: a Hardware-Optimized SNARK
  145. 89%Spot Bitcoin ETF receives official approval from the SEC
  146. 99%runtime/src/libraries/System.Net.WebSockets/src/System/Net/WebSockets/WebSocket.cs at 1d5f483fa4344328fb85fd67fc482b70b31e6c4d · dotnet/runtime
  147. 99%GitHub Quick Reviews
  148. 99%Format ChatGPT results with PydanticOutputParser - LangChain #2
  149. 97%Worse than SolarWinds: Three Steps to  Hack Blockchains, GitHub, and ML through GitHub Actions
  150. 96%Add sample of integrating client apps (WinForms & WPF) into an Aspire app by DamianEdwards · Pull Request #78 · dotnet/aspire-samples
  151. 92%RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
  152. 99%.NET 8 — New Randomness Methods
  153. 59%Good News For Tether
  154. 99%Hacking a CTF: Do not use ECB mode for encryption
  155. 95%2024 Predictions by @ttunguz
  156. 99%Aleo completes security audits of snarkOS & snarkVM
  157. 99%How to Format a String as Base64 in CSharp – Beginner’s Guide
  158. 88%Why blog in an (AI) apocalypse?
  159. 93%Tech Predictions for 2024
  160. 99%commit signing in 2023 is kinda wack
  161. 84%Blockchain dev's wallet emptied in "job interview" using npm package
  162. 98%Security at Startup
  163. 97%Update in Thrussh: the SSH Terrapin attack
  164. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  165. 99%Announcing the Aleo Foundation
  166. 99%Mastering Spring Boot with H2 Database Integration: A Step-by-Step Gui
  167. 68%Making God · EmilyGorcenski.com
  168. 99%Colliding Secure Hashes | Blog
  169. 99%Bricked Xmas
  170. 98%ZFS Profiling on Arch Linux | Bin Wang
  171. 98%Announcing the first Arecibo release
  172. 99%Bluesky and Blazor Migration
  173. 96%Good Docs Take Great Effort
  174. 92%Data Windowing in PostgreSQL: Harnessing SQL for Advanced Analytics
  175. 99%GNU ASCII armor: send encrypted data in plain text
  176. 96%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  177. 99%zkLogin | Sui Documentation
  178. 99%The UX of UUIDs | Unkey
  179. 99%Unveiling secrets of the ESP32: creating an open-source MAC Layer
  180. 99%Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
  181. 94%Pollard's p-1 factorization algorithm
  182. 99%Monocypher 4: The Clean Break
  183. 98%Vicyyn - Simple Obsidian System for 99% of Your Needs
  184. 94%construct0, the first steps of an organisation with great aspirations.
  185. 94%My techno-optimism
  186. 97%Trying simple tree-search techniques for LLM token sampling
  187. 99%Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
  188. 82%Hackers Claim Attack on General Electric, Leak Data Samples
  189. 82%The Bond villain compliance strategy
  190. 87%6 year stream anniversary! C#, Postgres, and more
  191. 90%Investing Behavioral Hacks - The Big Picture
  192. 99%Moderation Features with C#, JavaScript, and ASP.NET
  193. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  194. 95%Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
  195. 95%Monkey Conf 2023
  196. 80%Cryptographers Solve Decades-Old Privacy Problem
  197. 99%Fiat-Shamir security of FRI and related SNARKs — Part 1
  198. 99%Making a nice API of Amtrak's ugly API
  199. 96%CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
  200. 99%Frameworks Cover Up Skill Issues, And That's a Good Thing | jakelazaroff.com
  201. 94%HSG: Funded PhD student in Applied Cryptography & Privacy-preserving authentication (m/f/d) (m/w/d)
  202. 94%Blockchains and the Future of AI
  203. 99%Hare aims to become a 100-year programming language
  204. 96%Regulating Intelligence is Dumb
  205. 92%What Happened to the New Internet?
  206. 95%Article 45 Will Roll Back Web Security by 12 Years
  207. 99%GitHub Quick Reviews
  208. 97%2023-11-04 nuclear safety
  209. 99%GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
  210. 73%Why I Ran Away from Philosophy Because of Sam Bankman-Fried
  211. 94%Your Loved Ones Are Prisoners, and You Made the Chain
  212. 99%Visual Studio, Web Development and maybe even a little mobile with MAUI
  213. 85%Last Chance to fix eIDAS
  214. 95%Using WebAuthn for non-repudiation
  215. 52%The beautiful mind of Sam Bankman-Fried
  216. 97%Android and RISC-V: What you need to know to be ready
  217. 98%Intel N100: A Challenge to ARM - bret.dk
  218. 97%An Open Letter to Cryptographers: Please Work Together
  219. 99%Have I Been Pwned: API v3
  220. 68%Firstborn
  221. 99%My 2023 all-flash ZFS NAS (Network Storage) build
  222. 99%.NET 8 Top 10 New Features - NDepend Blog
  223. 95%Using Tailscale Custom OIDC with Authelia and Carpal
  224. 96%Why is there a hash of a weak password in the Windows cryptographic libraries? - The Old New Thing
  225. 98%Protecting Auth Tokens
  226. 99%An Analysis of Signal's PQXDH
  227. 98%Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
  228. 97%Advice on early-stage fundraising
  229. 98%AppSec loves Agile
  230. 99%Debugging a kdump kernel crash
  231. 99%EI036: Schema Processing Service (Part 2)
  232. 99%Some concerns with OpenPubKey
  233. 98%'OpenBSD 7.4 released -- Oct 16, 2023'
  234. 98%Security: The Impact of Time
  235. 96%The Present Should Be Signed
  236. 99%Learn Live - Create methods in C# console applications
  237. 98%Drivechains: A Detailed Analysis
  238. 88%Weekly Update 369
  239. 94%An Intuitive Explanation Of Hashing
  240. 97%Unpopular Opinion: It’s harder than ever to be a good software engineer
  241. 91%Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
  242. 99%Polylang – Polylang by Polybase Labs
  243. 91%funding rate manipulation shenanigans on ftx
  244. 89%“We’ll call it AI to Sell it, Machine Learning to Build it”
  245. 99%A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
  246. 98%things i just don't like about git
  247. 99%Bitwise and Shift Operators in C#: A Deep Dive
  248. 95%Uncensored Thoughts on Product Management, [Fin]Tech Markets, and VC as I Look for my Next Adventure
  249. 98%How many times do you need to call `Math.random()` to get a collision? (Firefox will tell you, Chrome may not!)
  250. 94%Announcing the $12k NIST Elliptic Curves Seeds Bounty
  251. 96%Store ssh keys inside the TPM: ssh-tpm-agent
  252. 96%The inability to count correctly
  253. 90%Why I no longer get writer's block
  254. 99%Succinct Proofs and Linear Algebra
  255. 99%Rolling Forward to Major Versions in .NET
  256. 99%A journey into zero-knowledge proofs
  257. 96%Reclaim Successfully Passed the ZK Circuit Security Audit
  258. 98%Public report of Reclaim protocol's ChaCha20 circuit
  259. 85%Return to Office Is Bullshit And Everyone Knows It - Dhole Moments
  260. 96%Wifi without internet on a Marabu flight – marx.wtf
  261. 99%What the Birthday Paradox Teaches Us About Protecting Patron Privacy
  262. 89%Stoic philosophy, finding a meaningful life, and the cancer treatment struggle
  263. 79%How I failed to find a job in London 2023.
  264. 99%Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
  265. 88%Welcome to Birthday Week 2023
  266. 99%DON'T use this EF Core Performance trick #shorts
  267. 84%How To Opt Out Of The Career Ladder
  268. 97%Signal Messenger: Speak Freely
  269. 93%Unlimited Kagi searches for $10 per month
  270. 98%Matrix 2.0: The Future of Matrix
  271. 99%Quantum Resistance and the Signal Protocol
  272. 53%The Pirate Bay Celebrates Its 20th Anniversary * TorrentFreak
  273. 96%Investment Strategy for the apocalypse
  274. 77%The Blind Men and the Coin - Part I | Boaz Sobrado's Website
  275. 97%Onboarding Made Simple with zkLogin
  276. 98%When MFA isn't actually MFA
  277. 88%Upgraded Plans & Extra Features
  278. 99%.NET 7 💥 - Intro to Background Services (Hangfire) with ASP.NET Core Web Api 🔥🔥🔥🔥🔥🔥
  279. 99%Enable passkeys in .NET with Bitwarden Passwordless.dev | Bitwarden Blog
  280. 99%How to Write a Secure JWT Library If You Absolutely Must
  281. 96%Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
  282. 99%Reviewing Bad C# Advice | Q&A | .NET & C# 🔴 LIVE
  283. 77%Visa Expands Stablecoin Settlement Capabilities to Merchant Acquirers
  284. 82%Introducing our summer '23 research seminars
  285. 93%Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
  286. 99%Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
  287. 98%Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
  288. 99%GitHub - starkware-libs/stone-prover
  289. 98%Announcing my new blog · Higashi.blog
  290. 98%Xamarin Forms - Create a Navigation System Without Frameworks
  291. 92%Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  292. 99%End-to-end encryption with Proton Mail
  293. 92%Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  294. 89%Listen to us on zeroknowledge.fm
  295. 95%What do I think about Community Notes?
  296. 98%Cool & Unique Cryptography Features for Modern Sui DApps
  297. 96%Blockchain Applications Stanford Summit
  298. 93%An introduction to Decentralized Identity
  299. 88%Fiat-Shamir Security of FRI and Related SNARKs
  300. 99%How SNARKs fall short for FHE
  301. 95%Delendum-SBC Research Meetup
  302. 99%An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful) · Graham Helton
  303. 99%Storing passkeys in password managers is okay, actually
  304. 99%Breaking The Mutant Language's "Encryption"
  305. 99%Understanding Lasso and Jolt, from theory to code
  306. 99%Beautiful UI Controls for .NET MAUI with Telerik UI
  307. 99%Hono + htmx + Cloudflare is a new stack - Yusuke Wada
  308. 96% The lost generation of young founders
  309. 99%part 1 — blog documentation
  310. 99%My bug finding chronicles (and how to earn money through vulnerability research)
  311. 99%The BEST Moq Alternatives: NSubstitute vs FakeItEasy
  312. 99%Backward Compatibility, Go 1.21, and Go 2 - The Go Programming Language
  313. 86%Reflections on Ten Years Past the Snowden Revelations
  314. 99%On Moq & SponsorLink: Some thoughts
  315. 97%Introducing per hostname TLS settings — security fit to your needs
  316. 97%Efficient Elliptic Curve Arithmetic in OpenSSL — Store Halfword Byte-Reverse Indexed
  317. 99%Go 1.21 Release Notes - The Go Programming Language
  318. 99%Humble Tech Book Bundle: Math for Programmers 2023 by Manning
  319. 99%Removing Randomness with LLDB
  320. 91%Accidentally found a vulnerability in a crypto wallet and made $1,000
  321. 99%Verifiable encryption on the Blockchain
  322. 99%0.11.0 Release Notes ⚡ The Zig Programming Language
  323. 99%🚨 PSA: Skiff.com is lying about being open source!
  324. 92%Skill, Luck, and Imitation [Did Elon Musk get lucky?] - Luca Dellanna
  325. 86%Shamir Secret Sharing
  326. 98%Understanding Python Numeric Data Types | Pro Code Guide
  327. 99%Building a BitTorrent client in Elixir
  328. 58%Worldcoin isn’t as bad as it sounds: It’s worse
  329. 56%Vermoedelijk grootste Nederlandse gebruiker van de Genesis Market aangehouden
  330. 84%OpenAI Quietly Shuts Down Its AI Detection Tool - Decrypt
  331. 97%What We Know About LLMs (Primer)
  332. 98%Common pitfalls in Go benchmarking
  333. 84%Women in Cryptography
  334. 99%Have I Been Pwned: API v3
  335. 99%Performance Improvements in .NET Core - .NET Blog
  336. 99%Announcing the .NET Framework 4.8 - .NET Blog
  337. 99%Announcing the .NET Framework 4.7 General Availability - .NET Blog
  338. 99%Announcing .NET Core 2.1 - .NET Blog
  339. 99%Announcing the .NET Framework 4.7 - .NET Blog
  340. 98%1 Introduction · Real-World Cryptography
  341. 97%The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations | Eyal Ronen
  342. 96%Best crypto blog posts of 2017
  343. 93%Libsodium Audit Results
  344. 79%Non-crypto Cryptographer Meetup · Luma
  345. 95%Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
  346. 98%DeFi Le pouvoir de la finance décentralisé - Doumer's Blog
  347. 99%Store age identities inside the TPM: age-plugin-tpm
  348. 66%From subprime crisis to the newly prime crisis | Boaz Sobrado's Website
  349. 96%Base64 Class (System.Buffers.Text)
  350. 99%GPT might be an information virus – Non_Interactive – Software & ML
  351. 98%.NET Framework July 2023 Security and Quality Rollup Updates - .NET Blog
  352. 99%Euclidean Algorithm
  353. 95%Staff Developer Advocate
  354. 92%Why Privacy Is Overrated
  355. 98%Exploring how Magic Link works
  356. 98%Kyle - Builder of stuff
  357. 97%Programming Languages Going Above and Beyond
  358. 99%Using encryption to verify a license key
  359. 98%Episode 125 - Mixed Reality, the Metaverse, and Making Magic Happen with Simon Jackson
  360. 83%’Tis the season to write the “bitcoin goes up!” post again
  361. 98%Revisiting the Nova Proof System on a Cycle of Curves
  362. 53%Former RAIDforums member “DataBox” sentenced to prison
  363. 97%Inside of the WASP's nest: deep dive into PyPI-hosted malware
  364. 99%Reset passwords in ASP.NET Core using delegated permissions and Microsoft Graph
  365. 98%Building Crypto Predictions Tracker: architecture and challenges
  366. 99%Working With Guid in C# - Code Maze
  367. 99%Dapr v1.11 is now available
  368. 91%What happened to Tandem (virtual office)
  369. 99%Reset user account passwords using Microsoft Graph and application permissions in ASP.NET Core
  370. 98%Impagliazzo's Five Worlds
  371. 99%Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
  372. 95%On The “Enshittification” of Platforms: Technology is Only Human After All
  373. 99%ZK app developers should be able to see down to the constraints
  374. 99%zkSecurity
  375. 99%Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
  376. 98%Generating income from open source
  377. 89%The Anoma Foundation Announces the 3rd Fundraise for Anoma
  378. 99%ZK programmability adds a whole new layer to worry about
  379. 98%Privacy Enhancing Technologies: An Introduction for Technologists
  380. 97%Private delegated computation is here, and there will be bugs!
  381. 80%Coin flips and most significant bits.
  382. 72%Lies, Damned Lies, & A16Z's Statistics
  383. 98%PGP signatures on PyPI: worse than useless
  384. 99%SELM: Symmetric Encryption with Language Models
  385. 99%Understanding Passkeys
  386. 99%State of Node.js Performance 2023
  387. 98%The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication
  388. 99%Experimenting with multi-factor encryption
  389. 97%Infrastructure from mining makes sense for scientific computing
  390. 99%Fast hashing, it's not that simple
  391. 92%How to be a Unicorn Person
  392. 88%The Platypus In The Room
  393. 94%Story: Redis and its creator antirez
  394. 99%Collision, Randomization and Welzl's Algorithm
  395. 93%Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
  396. 99%Real-time charts with Blazor, SignalR and ApexCharts
  397. 98%Generic Efficient Accumulation/Folding for Special Sound Protocols
  398. 83%Crypto: My Part In Its Downfall
  399. 97%Create a multilingual a to z list in C#
  400. 99%Introduction to ASP.NET Core Minimal APIs | The .NET Tools Blog
  401. 98%Funds of every wallet created with the Trust Wallet browser extension could have been stolen without any user interaction
  402. 99%The Most Annoying Math Problem
  403. 99%Recursive arguments for customizable constraint systems
  404. 99%Local license key verification - Theory
  405. 99%The Importance of TLS with SQL Server
  406. 87%The Suicidal Founder
  407. 98%Remaining relevant as a small language model
  408. 96%Tech Independence | Derek Sivers
  409. 96%Forex Trading for Fun and Luckily Profit
  410. 84%Make It Memory Safe: Adapting curl to use Rustls
  411. 97%mjg59 | Booting modern Intel CPUs
  412. 99%5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
  413. 97%Curiously Confused
  414. 84%Nethermind's Shapella Livestream
  415. 92%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  416. 88%Money is backed by everything - jaysoncoomer.com
  417. 80%Linux and Baikal Electronics: Why Postgres Should not Follow that Path
  418. 94%Overconfidence, and Executives as Personality Defect — Ludicity
  419. 72%Nairachan
  420. 99%Archiving a vBulletin forum using HTTrack and Netlify | Blaubart.com software engineering
  421. 96%Sponsored ISO standards for PDF technology
  422. 94%How Linus Tech Tips Got Hacked
  423. 92%Outperforming Warren Buffet
  424. 94%Startup Attempts and Failures, 2021 – 2023
  425. 90%I Didn't Read 17 Books So You Don't Have To 😩
  426. 98%Paillier's cryptosystem - Addtive homomorphic encryption
  427. 99%GitHub Quick Reviews
  428. 93%Permutation-based Cryptography 2023 – Lyon, France
  429. 95%Permutation-based Cryptography 2023 – Lyon, France
  430. 98%Le Metaverse - Doumer's Blog
  431. 94%Breaking a PRNG: Is it Called Xor Shift or Xor Shit?
  432. 98%InfoQ Software Architecture & Design Trends 2023
  433. 98%There's a 90% chance TikTok will be banned in the US unless it goes through with an IPO or gets bought out by mega-cap tech, Wedbush says
  434. 90%New for Devs in SQL Server 2022: Ledger for Blockchain-Backed Security -- Visual Studio Magazine
  435. 97%A note to my former self: You're not supposed to take care of everything
  436. 98%When a date breaks booting the kernel — Store Halfword Byte-Reverse Indexed
  437. 91%How a $725M VC Judges Your Engineering Team w/ Redpoint Ventures’ Jason Warner
  438. 85% We asked the SEC for reasonable crypto rules for Americans. We got legal threats instead.
  439. 99%Implementing and Exploiting Cryptography
  440. 94%The Randomness Summit 2023 · Luma
  441. 99%Loading RSA Keys in .NET
  442. 99%Distributed Application Runtime (Dapr) v1.10 Released
  443. 99%The missing re-frame quick start (with tutorial)
  444. 99%GitHub - jsuarezruiz/dotnet-maui-showcase: A curated list of awesome .NET MAUI samples
  445. 98%HaveIBeenPwned, DevSecOps, and Other Security Things with Troy Hunt
  446. 92%Head of Marketing
  447. 95%Le Jargon Web3 expliqué - Doumer's Blog
  448. 92%Web3 Terms Explained (Crypto, Wallet, Blockchain...) - Doumer's Blog
  449. 96%Jonas Hietala: Battling burnout
  450. 99%Microsoft.Bcl.Cryptography 8.0.0-preview.2.23128.3
  451. 97%Sunsetting Aztec Connect
  452. 95%Keeping Your Cash Safe after the Silicon Valley Bank Collapse | aakash.io
  453. 98%Losing Signal
  454. 72%Software Engineering Report Ranks TypeScript Among Top Skills to Learn/Know -- Visual Studio Magazine
  455. 98%Cryptography without Security - Cronokirby
  456. 98%zk-SNARK Concepts Explained Like You’re 15
  457. 96%A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
  458. 96%Digital Market Act workshop in Brussels
  459. 99%zkVMs are cool, but have you heard of zkCPUs?
  460. 85%The Fake Product Market Fit
  461. 99%Database Cryptography Fur the Rest of Us - Dhole Moments
  462. 98%Dealing with the unknown
  463. 98%5 Secteurs d'Activité que le Web3 Révolutionne en Ce Moment - Doumer's Blog
  464. 97%5 Disruptive Web3 Innovations The Blockchain Brought Us - Doumer's Blog
  465. 94%Scrooge: Analyzing Yahoo Financial Data In DuckDB
  466. 98%Cryptography 101 - PHINUG Online Dev Sessions 2023.03
  467. 89%Real-World Cryptography, a bit more than a year later
  468. 99%Bun v0.5.7 | Bun Blog
  469. 94%Developer Relations
  470. 92%Cryptography Attacks and Defenses, Reloaded
  471. 95%The 2023 MAD (Machine Learning, Artificial Intelligence & Data) Landscape
  472. 99%Writing Javascript without a build system
  473. 98%Defensibility & Competition
  474. 93%What does it mean for there to be “excess liquidity sloshing around the financial system”?
  475. 95%How is the Web3 useful to humanity - Doumer's Blog
  476. 98%En quoi le Web3 est-il utile à l'humanité - Doumer's Blog
  477. 91%Why I came to hate tokenomics
  478. 98%core-js/2023-02-14-so-whats-next.md at master · zloirock/core-js
  479. 74%Keeping up with The Thiel Fellows
  480. 94%Important message from Crypto Dave
  481. 99%The unsafe language doom principle
  482. 97%The Joy Of Duplexes
  483. 63%NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
  484. 99%[Apply by 02/15] Future Computing Research Workshop
  485. 92%ChatGPT, Bard, and the battle to become the "everything app"
  486. 63%Yes, Crypto is ALL a Scam
  487. 99%Challenges 7-12: Implementing and breaking AES ECB
  488. 98%The KZG/Kate Polynomial Commitment Scheme
  489. 99%Reversing UK mobile rail tickets
  490. 91%Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
  491. 98%Le Web3 et sa Révolution - Doumer's Blog
  492. 99%Can GPT-3 Solve CTF Problems?
  493. 90%MIT Reality Hack 2023 Blog Day 1
  494. 99%Encrypting Data in the Browser Using WebAuthn
  495. 92%Blazor United prototype
  496. 99%password-purgatory-logger/index.js at master · troyhunt/password-purgatory-logger
  497. 99%How You Respond to Security Researchers Says Everything About You - Dhole Moments
  498. 99%An incomplete guide to stealth addresses
  499. 99%zkalc: a cryptographic calculator | EF Cryptography Research
  500. 99%Some thoughts on the ETH's Threema Analysis
  501. 99%What's the deal with zkapps?
  502. 99%Implementing secure Microsoft Graph application clients in ASP.NET Core
  503. 99%Encrypting and Decrypting a String in C# - Code Maze
  504. 99%Profiling .NET on Linux with BenchmarkDotNet
  505. 94%Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
  506. 96%Process JSON files with SQL Server
  507. 99%Cryptography Implementations in .NET - Code Maze
  508. 96%Is it worth encrypting? | Matthew Linkous
  509. 99%Using client side encrypted fields in RavenDB
  510. 99%On PBKDF2 iterations
  511. 99%Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
  512. 99%Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
  513. 90%Vitalik Buterin's website
  514. 94%I am not a supplier
  515. 98%Hardware-friendliness of HyperPlonk - HackMD
  516. 98%HTTPS explained with carrier pigeons
  517. 91%RE: False Rumors on API Leaks or Exposure of our Database
  518. 97%Growing Your Book Of Business
  519. 93%I'm selling my name...
  520. 98%Your Pa$$word doesn't matter
  521. 88%What Can We Learn from Barnes & Noble's Surprising Turnaround?
  522. 98%There is no secure software supply-chain.
  523. 86%The Year Solana Blew Up
  524. 75%How I spent two months doing nothing
  525. 97%The Matrix Holiday Update 2022 | Matrix.org
  526. 99%The Service and the Beast: Building a Windows Service that Does Not Fail to Restart
  527. 98%20 Best Cryptography Algorithms Books of All Time
  528. 86%Hacker claims to be selling Twitter data of 400 million users
  529. 96%is there a way to opt out? (#121) · Issues · lib.rs / Lib.rs 🔰 main project · GitLab
  530. 94%IncrementalHash Class (System.Security.Cryptography)
  531. 99%Ignore the noise. Keep building.
  532. 99%Nix on the Steam Deck — Determinate Systems
  533. 96%Soatok Dreamseeker (@soatok@furry.engineer)
  534. 99%Yubikeys & PKI: What Are They For? | Charlton's Blog
  535. 76%Blockchain Blasphemy and the Technological Antichrist
  536. 97%How to Name a Startup
  537. 99%Virtual Studio Special - see how it's made!
  538. 82%Hackers leak personal info allegedly stolen from 5.7M Gemini users
  539. 91%Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
  540. 94%Is San Francisco “back”? I audited its parties to find out
  541. 97%Important CoinTracker security update
  542. 92%Technical Writer
  543. 89%The limited utility of the phrase “GNU/Linux”
  544. 99%Playing with ActivityPub
  545. 99%Real-World Cryptography
  546. 99%ChatGPT - Current state for .NET - and in general
  547. 96%Apple iCloud, and why encrypted backup is the only issue
  548. 99%GitHub - betaveros/noulith: *slaps roof of [programming language]* this bad boy can fit so much [syntax sugar] into it
  549. 88%The Breakout Tech Company Of 2022
  550. 73%SBF is Crypto Personified
  551. 95%Pratyush Mishra
  552. 98%Real-World Cryptography: Wong, David + Free Shipping
  553. 83%Bitcoin’s last stand
  554. 93%[Apply by 12/08] Introducing our fellowship program
  555. 93%Digital 2022: April Global Statshot Report — DataReportal – Global Digital Insights
  556. 94%No Thanks, Crypto, UPI Already Solved Digital Payments
  557. 90%Can We Build Safe Countries That Fund Themselves?
  558. 99%Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
  559. 96%The Art of (Not) Caring About Domain Names - andre.schweighofer
  560. 82%ongoing by Tim Bray · AWS and Blockchain
  561. 98%Why CVE-2022-3602 was not detected by fuzz testing
  562. 96% Dear Crypto & Fiat Bros - An open letter to the confused and dismissive. | dergigi.com
  563. 57%The Underlying Technology Shibboleth
  564. 97%SNARK Design Part III with Justin Thaler | a16z crypto research talks
  565. 97%SNARK Design Part III with Justin Thaler | a16z crypto research talks
  566. 99%GitHub - teslamotors/liblithium: A lightweight and portable cryptography library.
  567. 99%Mina Launches zkApps Era
  568. 99%A Certificate was Revoked by Its Issuer: How to Fix It
  569. 94%The Curse of Intelligence
  570. 98%Weil Pairing and the MOV attack on Elliptic Curve Cryptography
  571. 95%The intuition behind the sum-check protocol in 5 minutes
  572. 95%Too Much Crypto
  573. 93%Changing times (or, why is every layoff 10-15%?)
  574. 99%Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
  575. 97%StarkNetCC Lisbon Main Stage
  576. 99%Generate Random Numbers with .NET 6
  577. 99%validating SSL certificates in non-browser software
  578. 99%0.10.0 Release Notes ⚡ The Zig Programming Language
  579. 99%Improving Git protocol security on GitHub | The GitHub Blog
  580. 99%Encrypt and Decrypt Text Values in .NET
  581. 95%Real-World Cryptography: Wong, David + Free Shipping
  582. 99%Debating VPN options - anarcat
  583. 98%You should prepare for the OpenSSL 3.x secvuln
  584. 99%We Must Professionalize Programming to Preserve Society and Computing Freedom
  585. 94%Jett Hays
  586. 98%OpenBSD 7.2
  587. 99%Separation of Concerns in Node.js
  588. 99%Friends From First Principles — Simon Berens
  589. 78%Celestia raises $55M to launch modular blockchain network
  590. 99%What's the deal with zkapps?
  591. 99%LiteDB - A .NET embedded NoSQL database
  592. 99%Node.js 19 is now available! | Node.js
  593. 98%Delivering consistency and transparency for cloud hardware security
  594. 96%✂️ The ideal blockchain
  595. 96%What to know about Zero Knowledge
  596. 98%Lucid Multi-Key Deputies Require Commitment
  597. 97%Let's watch videos with David - HackMD
  598. 98%The magic words are squeamish ossifrage
  599. 99%OAuth client authentication - more than just client secrets
  600. 99%Muhammad Azeez - Working remotely from Iraq as a Software Developer
  601. 98%Threshold ECDSA in Excessive Detail
  602. 86%Machine Identity Management Summit 2022
  603. 85%Machine Identity Management Summit 2022
  604. 98%Total TLS: one-click TLS for every hostname you have
  605. 99%Shamir's Secret Sharing Visualised — Blog — Evervault
  606. 99%GitHub Quick Reviews
  607. 97%Amazon Best Sellers: Best Computer Cryptography
  608. 99%extending Go backward compatibility · Discussion #55090 · golang/go
  609. 90%Your 'Forgotten' Blockchain Account Needing Reactivation? It's a Scam
  610. 99%Scoreboard Hacking Part 2 - Getting the AES Key
  611. 98%age and Authenticated Encryption
  612. 99%Evaluating New Tools
  613. 99%ImperialViolet - Passkeys
  614. 98%0xPARC
  615. 93%What is security?
  616. 93%CK's Cold Dive
  617. 97%How hashing and cryptography made the internet possible | Red Hat Developer
  618. 94%The SEC fines Morgan Stanley $35M for an “astonishing” failure to protect information of ~15M customers by auctioning off machines with five years of their data
  619. 97%IN/"juels; ari" in US Patent Collection
  620. 99%Password-protected resources on static-site webhosters
  621. 99%Release CoreWCF v1.2.0 · CoreWCF/CoreWCF
  622. 99%Push notification two-factor auth considered harmful
  623. 97%A few thoughts about Uber's breach
  624. 97%Location independent jobs in Programming, Marketing, Sales, Design, and more.
  625. 95%Hunting YouTube Crypto Scams - addshore
  626. 84%Visual Cryptography For Physical Keyrings
  627. 99%It pays to be Circomspect
  628. 92%Coinbase updates its app to let US users see a scorecard that evaluates members of Congress on crypto policy issues, register to vote, and find political events
  629. 84%Coinbase is getting political, adding features to evaluate crypto policy issues
  630. 91%Ethereum activates The Merge as it shifts to proof of stake
  631. 99%Attacking the Android kernel using the Qualcomm TrustZone
  632. 98%Basic Cryptography Without Fluff - Cronokirby
  633. 99%Announcing .NET 7 Release Candidate 1
  634. 99%githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
  635. 74%Offshore Information Services Ltd.
  636. 96%Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
  637. 99%Ed25519 Deep Dive Addendum
  638. 95%learning about zero-knowledge apps and circuits using the noname educational DSL
  639. 96%Regulating email providers
  640. 96%Security of ZK Systems
  641. 99%An overview of Node.js: architecture, APIs, event loop, concurrency
  642. 99%GitHub - immich-app/immich: Self-hosted photo and video backup solution directly from your mobile phone.
  643. 95%Two And A Half Coins episode 5: More on Bitcoin: 51% attacks and Merkle trees!
  644. 98%On Security Against Time Traveling Adversaries
  645. 89%What Is A Blockchain
  646. 94%30 thoughts on turning 30
  647. 99%Formal Verification of ZK Constraint Systems
  648. 94%Binance boute les stablecoins concurrents du $BUSD hors de son royaume
  649. 96%GitHub - mimoo/noname: Noname: a programming language to write zkapps
  650. 97%Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
  651. 99%Comment déployer un noeud validateur Mina et déléguer vos MINA : le tuto complet
  652. 93%Announcing the Open Sourcing of Paranoid's Library
  653. 97%Security of ZK Systems
  654. 98%Kagi status update: First three months
  655. 98%Problem statements to solve for a retail investor in DeFi
  656. 94%The silent majority
  657. 87%Experts warn of the first known phishing attack against PyPI
  658. 92%We Are All Nerds: The Literary Works of Neal Stephenson
  659. 98%Cryptography R&D Security Engineer
  660. 99%Cryptographic Agility and Superior Alternatives - Dhole Moments
  661. 92%Deep dives & how the Internet works
  662. 99%How SQLite Scales Read Concurrency
  663. 95%Ask Cryptography
  664. 92%Is Game Development a Dream Job?
  665. 98%Option protocols in DeFi
  666. 99%GitHub - bootdotdev/curriculum: A roadmap for Boot.dev's CS curriculum for backend developers
  667. 98%What is Lattice-based Cryptography?
  668. 98%The Paper that Keeps Showing Up
  669. 97%Understanding JSON Web Encryption (JWE)
  670. 95%How Many Effective Altruist Billionaires Five Years from Now?
  671. 99%Scheduled Tweets With Cloudflare Workers
  672. 99%Managing the most dangerous constructor ever
  673. 99%GitHub - oasislinux/oasis: a small statically-linked linux system
  674. 94%There aren't that many uses for blockchains
  675. 97%zkEVMs: Not a Panacea
  676. 94%How to design a referral program at andrewchen
  677. 97%Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
  678. 90%NSA, NIST, and post-quantum cryptography
  679. 97%MPC In The Head Special
  680. 91%NSA, NIST, and post-quantum cryptography
  681. 97%Why Is the Web So Monotonous? Google. :: Reasonably Polymorphic
  682. 99%Experiment with post-quantum cryptography today
  683. 97%BrainSTARK, Part 0: Introduction
  684. 99%Go 1.19 Release Notes - The Go Programming Language
  685. 99%The Castryck-Decru Attack on SIDH
  686. 85%Post-quantum encryption contender is taken out by single-core PC and 1 hour
  687. 83%What happened to the inventors?
  688. 93%Raspberry Pi Zero vs MangoPi MQ Pro Benchmarks
  689. 97%Breaking supersingular isogeny Diffie-Hellman (SIDH)
  690. 98%Are You an Effective Engineer?
  691. 98%What I'm frustrated by in crypto
  692. 96%An efficient key recovery attack on SIDH (preliminary version)
  693. 95%The many flavors of hashing
  694. 85%CFF22 trip report
  695. 97%The dangers of Microsoft Pluton – Gabriel Sieben
  696. 97%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  697. 82%Celsius Network LLC, et al.
  698. 92%Understanding the L1 Race: zkEVMs and other Common L1 Features
  699. 95%An intro to Open Telemetry in .NET - James World
  700. 81%100 Days to Mainnet
  701. 99%GitHub - MystenLabs/narwhal: Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform
  702. 98%Using Apache Kafka to process 1 trillion messages
  703. 89%Catering to Desktop & Mobile with .NET MAUI
  704. 99%prose.sh
  705. 91%We Need Non-Interactive Post-Quantum KEMs
  706. 95%The biggest sin in software engineering.
  707. 99%The Explicit Choice by the SEC Not to Regulate Crypto
  708. 98%ASP.NET Core updates in .NET 7 Preview 6
  709. 56%Pump-and-Dump Schemes
  710. 98%System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
  711. 98%ASP.NET Core updates in .NET 7 Preview 6
  712. 98%ASP.NET Core updates in .NET 7 Preview 6
  713. 98%ASP.NET Core updates in .NET 7 Preview 6
  714. 78%Alan Howard-Backed Cryptography Investor Geometry Emerges From Stealth
  715. 94%Issues in Replacing OpenSSL – Security Poodle
  716. 89%Security Incident at Our Email Vendor
  717. 96%GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
  718. 91%NIST’s pleasant post-quantum surprise
  719. 95%Sam Jaques
  720. 88%Web3, why? – Gautam Dhameja
  721. 95%How to get a job in a new industry without experience | Jason Tu
  722. 66%NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
  723. 92%ideas/main-vs-310.rst at main · faster-cpython/ideas
  724. 91%A rollup-centric ethereum roadmap - Fellowship of Ethereum Magicians
  725. 90%Dual EC or the NSA's Backdoor: Explanations
  726. 94%Making Page Shield malicious code alerts more actionable
  727. 66%On the use of a life
  728. 92%Composability of Data
  729. 96%The best books for cryptography apprentices
  730. 89%Web3: What they are not telling you! – Gautam Dhameja
  731. 63%Institute for the Study of War
  732. 91%Using Graphs to Search for Code · Nick Gregory
  733. 97%Attacker Floods npm With Crypto-Mining Packages that Mine Monero When Installed with Default Configuration | Mend
  734. 97%Telerik UI for .NET MAUI Goes GA: 50+ Controls!
  735. 94%Testimonials | The F# Software Foundation
  736. 91%Uno Platform Does WebAssembly Threading Months Ahead of .NET 7 -- Visual Studio Magazine
  737. 98%GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
  738. 94%What every new software developer should know
  739. 95%Thomas H. Ptacek
  740. 82%Huobi Global Lists Mina Protocol
  741. 89%Undefined behavior in C is a reading error. – keeping simple
  742. 96%dYdX V4 - The dYdX Chain
  743. 84%What I'm excited for this build cycle
  744. 94%SnarkyJS Week 2022 - Crowdcast
  745. 77%My 40-liter backpack travel guide
  746. 96%Master the Event Loop in Node.js
  747. 69%Join Us For the First Ever SnarkyJS Week
  748. 97%The Animated Elliptic Curve
  749. 91%Some ways to use ZK-SNARKs for privacy
  750. 98%find an anon friendly job today
  751. 91%Eurocrypt 2022 program
  752. 97%Cheat Sheet For If I'm Gone
  753. 62%Tether’s actual peg
  754. 66%Class-groups – USF Crypto
  755. 98%Hertzbleed Attack
  756. 99%core/known-issues.md at main · dotnet/core
  757. 70%Real World Cryptography Study Group
  758. 79%A message from Coinbase CEO and Cofounder, Brian Armstrong
  759. 76%Why I became a Solo Founder | Bold Data
  760. 94%Foreword — ZK Jargon Decoder
  761. 75%Specifying Spring '83
  762. 97%The Web PKI 2.0
  763. 98%Hands-on: X25519 Key Exchange
  764. 87%In defense of crypto(currency)
  765. 97%Linux on A7-A8X
  766. 99%Several Improvements on BKZ Algorithm
  767. 94%About the security of passkeys
  768. 81%The Fermi Paradox of Venture Capital
  769. 99%Performance Improvements in .NET MAUI
  770. 62%This is not normal
  771. 97%Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
  772. 66%Episode 232: Cutting Edge ZK Research with Mary Maller - ZK Podcast
  773. 51%Update on Hiring Plans
  774. 68%Countering the Crypto Lobbyists
  775. 98%Welcoming Rocket.Chat to Matrix! | Matrix.org
  776. 75%Ghost in the Shellcode
  777. 92%GitHub - JumpCrypto/crypto-reading-list
  778. 99%Preliminary Learning ON Kimchi: PLONK
  779. 78%Keep the Web Free, Say No to Web3
  780. 73%We’re discontinuing the Stablegains service. Please withdraw your remaining funds.
  781. 58%Tether Required Recapitalization In May 2022
  782. 60%This "amateur" programmer fought cancer with 50 Nvidia Geforce 1080Ti
  783. 58%No permission needed 🚀
  784. 96%Proof of Stake and our next experiments in web3
  785. 99%25 Gbit/s HTTP and HTTPS download speeds
  786. 90%Some Cryptography Books I Like
  787. 53%Idea machines
  788. 94%Practical bruteforce of AES-1024 military grade encryption
  789. 52%The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.
  790. 90%Announcing Pub/Sub: Programmable MQTT-based Messaging
  791. 81%Important notice for all customers | BitPrime
  792. 65%What backs a currency? Terra Luna drops nearly 100% - Economics - Intercoin
  793. 99%C# Method to Check if a Number is Prime
  794. 58%European Commission prefers breaking privacy to protecting kids
  795. 87%1,930 Remote Companies | Himalayas
  796. 68%Dutch digital identity system crisis — nico.rikken’s blog
  797. 53%Job Posting: Reddit Research Czar
  798. 97%Bridging Web 2 and Web 3: an identity perspective - Blog by Damian Schenkelman
  799. 97%Themes from Real World Crypto 2022
  800. 93%A vision for Decentraland's next 5 years
  801. 88%Learn to code. Or don't.
  802. 99%Implementing a ZK-focused authenticated-encryption scheme
  803. 88%Senior Product Security Engineer
  804. 92%Announcing Bolt & Forte partnership
  805. 91%Explaining Yao's Garbled Circuits - Cronokirby
  806. 94%Zaplib post-mortem - Zaplib docs
  807. 90%Real World Cryptography Conference 2022
  808. 95%Increasing the surface area of blogging
  809. 72%Cloudflare blocks 15M rps HTTPS DDoS attack
  810. 75%All Roads Lead to Rome: The Machine Learning Job Market in 2022
  811. 97%Announcing the Hare programming language
  812. 54%How easy is it in 2022 to find a SHA1 collision?
  813. 90%Canetti et al's Paradoxical Encryption Scheme
  814. 96%How SHA-256 Works Step-By-Step
  815. 90%Magic Beans
  816. 90%Physical Threshold Encryption
  817. 99%The 10 Commandments .NET Developers Must apply for Secure Applications
  818. 94%Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
  819. 93%CVE-2022-21449: Psychic Signatures in Java
  820. 60%Fintech and Practical Utopianism
  821. 96%Taxonomy Of In-The-Wild Exploitation
  822. 88%VCs Fund Ideas, Not Execution - Manish R Jain
  823. 89%Startup trends to not look for in 2030 – Mr. Steinberg
  824. 99%GitHub - freenet/locutus: Declare your digital independence
  825. 99%Assume your devices are compromised
  826. 72%The games Nintendo didn't want you to play: Tengen
  827. 99%THCon 2k22 CTF - "Local Card Maker" Writeup - Guy Lewin's Blog
  828. 86%An inherent source of correlation in the crypto market
  829. 86%Ethereum Has Issues
  830. 73%A Web Renaissance
  831. 87%Let’s Encrypt Receives the Levchin Prize for Real-World Cryptography
  832. 96%Watch People Doing the Thing
  833. 83%Requests for comment/Stop accepting cryptocurrency donations - Meta
  834. 69%Why Airbnb Will Take Over The World With Remote Work
  835. 78%Your brand needs to be easily summarizable
  836. 87%The Complete Argument Against Crypto
  837. 81%Dear Traveller,
  838. 99%Random Class in C# - Code Maze
  839. 60%de-eth-ed.csv
  840. 94%O(1) Labs
  841. 77%Coinbase Lists Mina Protocol
  842. 93%The (r)Evolution of FHE
  843. 95%Early Security for Startups
  844. 99%placeholder
  845. 90%Random number generator enhancements for Linux 5.17 and 5.18
  846. 86%Web3 and the democratization of Digital Assets
  847. 90%Troubleshooting HTTP/3 in http.sys
  848. 87%Some interesting malware I found — Bobbie Chen
  849. 96%Essential Cryptography for JavaScript Developers | With Blue Ink
  850. 85%Sofía Celi - cryptographer
  851. 59%PKC Test-of-Time Award
  852. 92%Lead Application Engineer
  853. 90%Future-proofing SaltStack
  854. 99%A Deep dive into Ed25519 Signatures
  855. 93%Introducing Caddy-SSH
  856. 95%Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
  857. 74%BAT: a Fast and Small Key Encapsulation Mechanism
  858. 99%[Crypto] Cracking Diffie–Hellman key exchange using CADO-NFS + Logjam SSL/TLS attack
  859. 92%Year in Review: 2020 laid the groundwork for zero knowledge proofs
  860. 88%2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
  861. 53%The (Edited) Latecomer's Guide to Crypto
  862. 83%Decentralized Identity: The Basics of Decentralized Identity
  863. 98%Implementing a toy version of TLS 1.3
  864. 95%If you’re not using SSH certificates you’re doing SSH wrong
  865. 80%What Epic's purchase of Bandcamp means for music
  866. 67%NSA algorithm for PX-1000 broken
  867. 90%Web3 is centralized (and inefficient!)
  868. 92%Announcing Sui
  869. 99%Using RavenDB from Serverless applications
  870. 98%Using RSA Securely in 2022 - Dhole Moments
  871. 98%Decrypting your own HTTPS traffic with Wireshark – Trickster Dev
  872. 90%Passkeys: How multi-device FIDO credentials can replace passwords
  873. 95%Create your own Cryptocurrency, it is easier than you might think – Andrianina Rabakoson
  874. 96%Moonwell.fi: DeFi's liquidity well
  875. 85%Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
  876. 91%Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
  877. 58%$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
  878. 61%Be a part of the world's lightest blockchain.
  879. 95%O(1) Labs
  880. 96%Roll your own crypto, then smoke it.
  881. 93%Announcing the Cloudflare API Gateway
  882. 96%Go 1.18 Release Notes - The Go Programming Language
  883. 92%The Aptos Vision
  884. 66%Coal to crypto: The gold rush bringing bitcoin miners to Kentucky
  885. 99%ssh package - golang.org/x/crypto/ssh - pkg.go.dev
  886. 98%The code is the specification? Introducing cargo spec
  887. 62%The Downfall of Reddit – Why Reddit Sucks, and How to Fix It
  888. 94%A Comprehensive Primer · Michael Straka
  889. 99%GitHub - facebookresearch/narwhal: Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus.
  890. 76%s11e09: A short conversation with a bank
  891. 98%Cooking with credentials - pepper - Eric Mann's Blog
  892. 77%I can probably hack your password in MINUTES!
  893. 89%Reintroducing Snapps as zkApps
  894. 61%Technology vs Tools
  895. 91%An Illustrated Guide to Elliptic Curve Cryptography Validation
  896. 86%Global payment solutions for Web3
  897. 95%Open Banking for OAuth Developers
  898. 82%We Cannot Live Without Cryptography!
  899. 81%The technological case against Bitcoin and blockchain
  900. 99%Telenot Complex: Insecure AES Key Generation
  901. 98%Part 2: Improving crypto code in Rust using LLVM’s optnone
  902. 98%Part 1: The life of an optimization barrier
  903. 95%The Controversy Surrounding Hybrid Cryptography - Dhole Moments
  904. 95%Blockchain Cryptography | Gary Woodfine
  905. 92%Plagiarism as a patent amplifier
  906. 84%GNU Taler Documentation — GNU Taler 0.8.2 documentation
  907. 98%Transport Layer Security (5/6)
  908. 89%Fuzzing for wolfSSL
  909. 96%The post-quantum future: challenges and opportunities
  910. 97%Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
  911. 97%25 Malicious JavaScript Libraries Distributed via Official NPM Package Repository
  912. 95%HPKE: Standardizing public-key encryption (finally!)
  913. 85%[COSE] Why you shouldn't have your crypto designed by a CEO
  914. 97%GitHub Previews Faster Codespaces Creation with Prebuilds -- Visual Studio Magazine
  915. 92%Building Confidence in Cryptographic Protocols
  916. 99%Badly implementing encryption: Part X-Additional data
  917. 97%zkSync 2.0: Public Testnet is Live!
  918. 97%Why the OAuth mTLS spec is more interesting than you might think
  919. 99%Badly implementing encryption: Part IX–SIV
  920. 95%Making protocols post-quantum
  921. 98%Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
  922. 99%Do not recommend: User Provided Primary Keys
  923. 99%Convoy Crackdown
  924. 83%Badly implementing encryption: Part VIII–timings attacks and side channels
  925. 97%Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
  926. 87%How bad it is using the same IV twice with AES/GCM?
  927. 96%The Post-Quantum State: a taxonomy of challenges
  928. 99%Badly implementing encryption: Part VII–implementing authenticated encryption
  929. 97%Programming things that have gotten easier
  930. 94%Is Datalog a good language for authorization?
  931. 94%Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
  932. 77%Spam Accounts in 2022
  933. 88%Decentralization Is a Quality
  934. 83%Detecting Magecart-Style Attacks With Page Shield
  935. 98%Badly implementing encryption: Part VI–malleable encryption
  936. 76%The Journey That Led Me to Write a Book on Analog Zettelkästen
  937. 87%r/crypto - Linux RNG switches from SHA1 to BLAKE2s
  938. 55%Cryptology ePrint Archive: Report 2021/1641
  939. 99%Badly implementing encryption: Part IV–keyed hash function
  940. 82%Learn Privacy-Enhancing Techniques with Cryptographic Games
  941. 72%Badly implementing encryption: Part III–breaking your encryption apart
  942. 96%How I research any topic
  943. 96%Security of BLS batch verification - Cryptography - Ethereum Research
  944. 99%Badly implementing encryption: Part II–breaking the code
  945. 97%Android 13 virtualization lets Pixel 6 run Windows 11, Linux distributions - CNX Software
  946. 94%Wifi Signal Mapping with WiFiman - Using Augmented Reality!
  947. 98%00
  948. 77%Crypto Reading
  949. 62%The Factorio Mindset
  950. 60%In Praise of 'Line Goes Up'
  951. 71%Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
  952. 98%Kimchi: The latest update to Mina’s proof system
  953. 99%Badly implementing encryption: Part I
  954. 89%Attacking an Ethereum L2 with Unbridled Optimism
  955. 89%BeyondCorp is dead, long live BeyondCorp
  956. 93%Our User-Mode WireGuard Year
  957. 84%GitHub Quick Reviews
  958. 99%Crypto Tracker App with Telerik .NET MAUI Controls
  959. 68%John Battelle's Search Blog On Building A Better Web: The Marlinspike Threads
  960. 91%Crypto-name
  961. 78%The Federal Reserve Bank of Boston and Massachusetts Institute of Technology release technological research on a central bank digital currency
  962. 93%Educated Guesswork
  963. 63%Wormhole Incident Report — 02/02/22
  964. 85%CS 251 Cryptocurrencies and Blockchain Technologies: Syllabus
  965. 87%Estimating the Bit Security of Pairing-Friendly Curves
  966. 92%How I Discovered Thousands of Open Databases on AWS
  967. 98%Visual Studio 2022 - with Kendra Havens
  968. 89%RWC 2022 program
  969. 72%My most meaningful work of 2021 – not falling down
  970. 98%.NET R&D Digest (January, 2022)
  971. 92%How I Discovered Thousands of Open Databases on AWS
  972. 99%Basic cryptography - the Vigenere cipher - Eric Mann's Blog
  973. 98%Fold inbox crypto into one assembly by bartonjs · Pull Request #64307 · dotnet/runtime
  974. 52%It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
  975. 83%Piped
  976. 83%Trying to vlog #crypto #vlog #shorts
  977. 97%Cryptocurrency exchange BTC-Alpha confirms ransomware attack
  978. 58%PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
  979. 93%Consequences Create Complexity
  980. 91%Hey Ethereum, Let's Break Solidity's Composability!
  981. 93%bbenchoff.github.io by bbenchoff
  982. 75%Make Free Stuff
  983. 98%My Terminal Has SUPER POWERS! (My New FAVORITE Terminal Plugin)
  984. 54% 2022 Tech Predictions · Ted Neward's Blog
  985. 97%Biscuit 2.0 release
  986. 99%Modern Web Applications with SAFE Stack
  987. 78%On Leaving Facebook
  988. 71%Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
  989. 60%Free Postgres Databases
  990. 99%Web Wednesday - Talking ASP.NET with Jon Galloway
  991. 65%Crypto.com Security Report & Next Steps
  992. 89%David Wong
  993. 89%David Wong
  994. 85%Bulletproof SSL and TLS | Feisty Duck
  995. 99%CC #9: A Wild ECDSA Appears!
  996. 59%TC Conf – Transylvania Crypto Conference
  997. 92%You're running untrusted code!
  998. 70%An Anatomy of Bitcoin Price Manipulation
  999. 90%Clear communication
  1000. 89%An extremely casual code review of MetaMask’s crypto
  1001. 76%Charles Hoskinson on Some thoughts about the Mina Protocol Ouroboros+Snarks=22kb size
  1002. 79%Working With Market Data Using Time Series in RavenDB
  1003. 68%Blockchain-based systems are not what they say they are
  1004. 79%CryptoHack – Home
  1005. 95%ANSIWAVE - Make the "semantic web" web 3.0 again -
  1006. 72%Opinion: Is Web3 a Scam? - Stack Diary
  1007. 94%Introducing Plonky2 — Polygon | Blog
  1008. 91%My first impressions of web3
  1009. 81%Real-World Cryptography by David Wong Book Review
  1010. 60%The Cryptography of Orphan Annie and Captain Midnight
  1011. 98%The ultimate SQLite extension set
  1012. 97%PagerDuty’s Security Training for Engineers! Part Deux
  1013. 92%Breaking change: Partial and zero-byte reads in DeflateStream, GZipStream, and CryptoStream - .NET
  1014. 77%The Case Against Crypto
  1015. 64%A New Year's Letter from the President | SQUARE ENIX HOLDINGS
  1016. 99%The Modern Guide to OAuth
  1017. 99%.NET's Cryptographic One-Shots
  1018. 94%Server Thief Bait - catch them red handed!
  1019. 82%Fintech firm hit by Log4j hack refuses to pay $5 million ransom
  1020. 99%Fix stack overflow with X509Certificate FriendlyName by vcsjones · Pull Request #63179 · dotnet/runtime
  1021. 60%“Play-to-earn” and Bullshit Jobs
  1022. 81%[Last Week in .NET #74] – Automated Legal Problems
  1023. 94%GitHub - trailofbits/zkdocs
  1024. 97%GitHub - dani-garcia/vaultwarden: Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
  1025. 98%Introduction
  1026. 90%Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
  1027. 96%What Problem Blockchains Actually Solve
  1028. 98%How did the Enigma Machine work?
  1029. 94%The bulldozer vs vetocracy political axis
  1030. 51%BusKill: The USB Laptop Kill Cord
  1031. 92%Cryptology ePrint Archive: Report 2021/1621
  1032. 96%Meet Kryptology: Coinbase’s Open Source Cryptography Library
  1033. 85%Web3 is going just great
  1034. 98%Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
  1035. 76%What If I Told You: Money Isn't Real
  1036. 95%Testing constant-timeness using Valgrind: case of the NSS library
  1037. 91%Cloud Computing Facts – 10 Reasons Intel Is Best for Cloud
  1038. 98%Solene'% : What are the VPN available on OpenBSD
  1039. 56%The Problem with Finance APIs
  1040. 85%Blockchainism
  1041. 88%Redefining Scalability
  1042. 58%Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
  1043. 81%Post-Quantum Signatures in TLS will be challenging | Bulletproof TLS Newsletter
  1044. 97%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1045. 99%‎Security. Cryptography. Whatever.: WireGuard, feat. Jason Donenfeld on Apple Podcasts
  1046. 73%Web3? I have my DAOts
  1047. 93%Introducing Mysten Labs: Building Foundational Infra for Web3
  1048. 50%Why your cloud infrastructure should be immutable
  1049. 59%Blockchains don't solve problems that are interesting to me
  1050. 91%Security | 2021 | The Web Almanac by HTTP Archive
  1051. 98%Understanding HKDF - Dhole Moments
  1052. 84%Pure Fungibility on the Blockchain
  1053. 86%Understanding Zero-knowledge proofs through simple examples
  1054. 86%Understanding Zero-knowledge proofs through simple examples
  1055. 67%On the Use of Pedersen Commitments for Confidential Payments
  1056. 89%Troy Hunt's Weekly Update Podcast
  1057. 84%The Internet's Casino Boats
  1058. 73%This shouldn't have happened: A vulnerability postmortem
  1059. 69%Why I have settled on XChaCha20+Blake3 as the AE suite of choice for my projects
  1060. 76%The Solution Space
  1061. 54%The Token Disconnect
  1062. 87%Proof of stake is a scam and the people promoting it are scammers
  1063. 90%Build software better, together
  1064. 89%Bank transfers as a payment method
  1065. 95%Bitslicing for Constant Time Cryptography
  1066. 90%Why does Web 3.0 Exist? - Web3 Oversimplified
  1067. 94%Notebook on nbviewer
  1068. 88%#50 Mina: Use Cases for Snapps & Snarketplace Dynamics
  1069. 95%An intensive introduction to cryptography: index
  1070. 97%From Edge 96 onwards local files can get edited in Visual Studio Code and DevTools changes sync live
  1071. 85%The Handwavy Technobabble Nothingburger
  1072. 89%Net Conf 2021 Québec : Introduction à NET 6.0
  1073. 91%An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
  1074. 84%Coin Vol-II Hedging your BTC/ETH - The basics
  1075. 92%RSA vs ECDSA for DNSSEC | APNIC Blog
  1076. 59%Speculative Autobiographies
  1077. 72%we like the runners
  1078. 96%The Joy of Cryptography
  1079. 98%GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
  1080. 99%hacspec [![hacspec chat][chat-image]][chat-link]
  1081. 50%Crypto Wash Trading
  1082. 98%12 features coming in C# 11, potentially
  1083. 54%Get Rich Offsetting Carbon
  1084. 96%ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
  1085. 98%Talking to SerenityOS Contributors About Scratch-build C++ Developer’s Playground in Modern C++ | The CLion Blog
  1086. 70%The Metaverse: Is It Already Here?
  1087. 94%Writing new system software
  1088. 97%restic · Backups done right!
  1089. 68%It's Now Possible To Sign Arbitrary Data With Your SSH Keys
  1090. 84%No one knows what's coming next
  1091. 79%How I use Notion · Reasonable Deviations
  1092. 89%Fixing Recent Validation Vulnerabilities in OctoRPKI
  1093. 87%Threshold Digital Signatures
  1094. 92%How to create a tech startup - Vlad Mihalcea
  1095. 99%The Surreal Horror of PAM
  1096. 64%Libra Shrugged — Chapter 15: Central bank digital currencies
  1097. 99%Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
  1098. 80%The Intellectual Incoherence of Cryptoassets
  1099. 69%Matter Labs Announces $50M in New Funding for zkSync
  1100. 95%Sizing Up Post-Quantum Signatures
  1101. 79%an inside look into the illicit ad industry
  1102. 90%Signal is losing
  1103. 88%Re-Organizing the World’s Information: Why we need more Boutique… — Mirror
  1104. 99%GitHub - axelarnetwork/tofn: A threshold cryptography library in Rust
  1105. 95%Random Oracles in Cryptography
  1106. 99%So you want to Scrape like the Big Boys? 🚀
  1107. 84%Breaking changes in .NET 6 - .NET
  1108. 98%Threema: Three Strikes, You’re Out
  1109. 98%How (Not) to Design a Hash Function
  1110. 91%PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
  1111. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1112. 82%The Strange Path of Accepting How Your Brain Works · Caffeinspiration
  1113. 96%Pairings in CIRCL
  1114. 95%Please change your mind about your announced release plans
  1115. 92%Pipelines - Runs for runtime
  1116. 98%Handshake Encryption: Endgame (an ECH update)
  1117. 97%Privacy Pass v3: the new privacy bits
  1118. 98%mazzo.li — Backing up WhatsApp data through the multi-device web client
  1119. 87%Malware Found in UA-Parser-JS NPM Library
  1120. 87%Fake npm Roblox API Package Installs Ransomware and has a Spooky Surprise
  1121. 97%Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
  1122. 60%50 First Levers (How to start building Leverage) — Eric Jorgenson
  1123. 99%HTTPS Everywhere plug-in no longer needed | Bulletproof TLS Newsletter
  1124. 87%Privacy is a Human Right | Tor Blog
  1125. 97%Choosing a cache
  1126. 98%Looking into convergent encryption
  1127. 75%Ciphertext Compression #1: NTRU Strikes Back
  1128. 98%Modifying the Acorn CLE-215+ FPGA into a PCILeech DMA attack device
  1129. 98%GitHub - mthom/scryer-prolog: A modern Prolog implementation written mostly in Rust.
  1130. 99%SRP is Now Deprecated - TobTu
  1131. 98%The secret of stunning OSS contributions! I've changed my life for Hanami!
  1132. 97%Why Nano
  1133. 97%A Critique [The Call of the Open Sidewalk]
  1134. 96%A Graduate Course in Applied Cryptography
  1135. 97%Episode 17: Breaking Wi-Fi With Frame Attacks!
  1136. 93%On the Word “Nonce” in Cryptography and the UK
  1137. 98%JSON Web Token (JWT) Implementation Using Node.js
  1138. 98%It's time for the Permanent Web
  1139. 98%Introducing Nuntius - Cronokirby
  1140. 76%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1141. 84%Good Riddance: Steam Bans Games That Feature Crypto And NFTs
  1142. 95%Geo Key Manager: Setting up a service for scale
  1143. 99%How to use certificates in ASP.NET Core
  1144. 95%Signatures From Identification Schemes - Cronokirby
  1145. 99%Privacy-Preserving Compromised Credential Checking
  1146. 78%Ted Cruz says bitcoin will stabilize Texas electric grid—here’s why he’s wrong
  1147. 97%Stripe: Job Openings
  1148. 99%Cloudflare and the IETF
  1149. 99%Canonicalization Attacks Against MACs and Signatures
  1150. 95%ongoing by Tim Bray · Worst Case
  1151. 99%You're Doing IoT RNG
  1152. 98%Malwarebytes' privacy VPN is Mullvad in a shady trenchcoat
  1153. 98%Announcing Cloudflare Research Hub
  1154. 97%HD wallets and the Legendrery PRF in MPC - HackMD
  1155. 98%Cloudflare Research: Two Years In
  1156. 97%Web3 Architecture and How It Compares to Traditional Web Apps - The New Stack
  1157. 91%The Poly Network Hack Explained
  1158. 99%Privacy is sexy 🍑🍆 - Enforce privacy & security on Windows and macOS
  1159. 88%Is the SEC forcing Crypto Devs into Illegality and Anonymity?
  1160. 99%A PKI-less secure communication channel: Error handling at the protocol level
  1161. 90%Lightning Round
  1162. 99%A PKI-less secure communication channel: Implementing the record stream
  1163. 93%Bitcoin is a Ponzi
  1164. 96%Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!
  1165. 99%A PKI-less secure communication channel: Coding the handshake
  1166. 72%Forward Party | Not Left. Not Right. Forward.
  1167. 99%A PKI-less secure communication channel: The record layer
  1168. 97%Cloudflare just disrupted 3 industries in 1 week
  1169. 99%Implicit Overflow Considered Harmful (and how to fix it)
  1170. 97%Product bundles and jobs to be done
  1171. 99%A PKI-less secure communication channel: The record layer
  1172. 96%Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
  1173. 99%A PKI-less secure communication channel: design
  1174. 90%NFT Projects are just MLMs for Tech Elites
  1175. 96%What every IT person needs to know about OpenBSD
  1176. 98%Automatic cipher suite ordering in crypto/tls
  1177. 76%Twitter accelerates again with Bitcoin tips, NFTs, recorded Spaces, creator fund and more – TechCrunch
  1178. 95%Snapps on Mina with Emre and Izaak – ZK Podcast
  1179. 99%CSAW Quals 2021 Bits
  1180. 98%The Bi-Symmetric Encryption Fraud
  1181. 94%Avalanche (AVAX) is launching on Coinbase Pro
  1182. 62%A World Without Sci-Hub
  1183. 94%How to defeat Ed25519 and EdDSA using faults
  1184. 97%How I bricked then recovered my reMarkable 2
  1185. 96%Chrome 94 released with controversial Idle Detection API
  1186. 99%Postmortem: Partial RavenDB Cloud outage
  1187. 98%The Mom Test - How to talk to customers. A Summary
  1188. 93%Q6 How do you manage your time? How do you allocate your time between work and other things?
  1189. 76%This Is All Exactly What It Looks Like | Defector
  1190. 85%Patreon
  1191. 85%That Time I Told My Wife I Wanted to Quit My Job
  1192. 99%ECDSA and Custom XML Signatures in .NET
  1193. 99%How to sign XML using RSA in .NET
  1194. 75%Library Genesis
  1195. 83%One Bitcoin Transaction Generates Two iPhones Worth of E-Waste
  1196. 70%Dear Mom, I’m Dropping Out — Simon Berens
  1197. 96%How I made $50K in 3 days with NFTs
  1198. 92%The long-term consequences of maintainers’ actions – Ariadne's Space
  1199. 97%Top 5 LED Strip Lighting Projects - Dave's Garage
  1200. 99%If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
  1201. 82%CityMayor | Dapp.com - MarbleCards | OpenSea
  1202. 99%Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications
  1203. 95%r/crypto - What are the most overrated cryptographic schemes, protocols, conferences, etc.?
  1204. 96%Why Monero
  1205. 98%Welcome to Speed Week and a Waitless Internet
  1206. 97%Write code that's easy to delete, and easy to debug too.
  1207. 99%Constant-time code verification with Memory Sanitizer
  1208. 99%Sylvain Kerkour
  1209. 96%AWS SIGv4 and SIGv4A — shufflesharding.com
  1210. 91%Q6 How do you manage your time? How do you allocate your time between work and other things?
  1211. 97%OWASP Top 10
  1212. 92%About
  1213. 98%Maintain it With Zig
  1214. 86%The SEC has told us it wants to sue us over Lend. We don’t know why.
  1215. 95%How to be a Certificate Authority, feat. Ryan Sleevi - Security. Cryptography. Whatever.
  1216. 98%Welcome · Real-World Cryptography MEAP V14
  1217. 87%The Crypto-Carry Trade
  1218. 96%Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
  1219. 99%Saving a restic backup the hard way
  1220. 92%NO STARTTLS
  1221. 98%certreq.cs
  1222. 86%Should Zcash switch from Proof of Work to Proof of Stake? - Electric Coin Company
  1223. 55%Money Ain't A Thang
  1224. 98%Refactor symmetric one-shots for improved performance by vcsjones · Pull Request #58270 · dotnet/runtime
  1225. 99%How I re-over-engineered my home network for privacy and security
  1226. 79%NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  1227. 74%zkMesh: Aug 2021 recap
  1228. 99%Improving Git protocol security on GitHub
  1229. 89%You’re Not Too Late
  1230. 96%NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
  1231. 99%Every Web Browser Absolutely Sucks. – Luke Smith
  1232. 99%Aggregatable Distributed Key Generation
  1233. 99%Converting PFX format to PEM via OpenSSL programmatically
  1234. 98%Cryptography Engineer
  1235. 99%Programmers Don’t Understand Hash Functions
  1236. 98%API Tokens: A Tedious Survey
  1237. 96%Principal Technical Product Manager, Amazon Corretto - Virtual Location (Level 7)
  1238. 96%r/DataHoarder - Twitter starts to require login to view tweets
  1239. 99%The Linux Kernel Module Programming Guide
  1240. 82%38M Records Were Exposed Online—Including Contact-Tracing Info
  1241. 88%Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
  1242. 99%Loading Elliptic Curve (EC) Keys in .NET
  1243. 99%GitHub - JetBrains/projector-installer: Install, configure and run JetBrains IDEs with Projector Server on Linux or in WSL
  1244. 97%How does PLONK work? Part 11: Our final protocol! (Without the copy constraints)
  1245. 93%Thinking of the children
  1246. 97%How does PLONK work? Part 10: The Kate polynomial commitment scheme
  1247. 98%How ephemeral keys validate possession of a static key
  1248. 98%Safer Illinois, Isn’t
  1249. 97%How does PLONK work? Part 9: What's a polynomial commitment scheme (PCS)?
  1250. 99%Auditing Cryptography: #Zcon2Lite
  1251. 97%How does PLONK work? Part 8: A polynomial dance
  1252. 97%How does PLONK work? Part 7: A sketch protocol with our polynomial
  1253. 97%How does PLONK work? Part 5: From arithmetic circuits to constraint systems
  1254. 98%How does PLONK work? Part 6: From constraint systems to polynomials
  1255. 98%Go 1.17 is released - The Go Blog
  1256. 93%Thinking of the children
  1257. 98%Introducing Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field - Cryptography - Ethereum Research
  1258. 95%Stewardship of Ourselves
  1259. 99%Exploring the password policy rabbit hole — Sun Knudsen
  1260. 99%‎Security. Cryptography. Whatever.: The Great "Roll Your Own Crypto" Debate, feat. Filippo Valsorda on Apple Podcasts
  1261. 97%What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
  1262. 97%More devices, fewer CAPTCHAs, happier users
  1263. 92%The Problem with Ethereum
  1264. 99%Implementing ‘le chiffre indéchiffrable’ in Scheme
  1265. 97%Apple’s Mistake
  1266. 98%One Bad Apple - The Hacker Factor Blog
  1267. 98%Hey Signal! Great Encryption Needs Great Authentication
  1268. 72%Apple to scan U.S. iPhones for images of child sexual abuse
  1269. 80%Apple explains how iPhones will scan photos for child-sexual-abuse images
  1270. 96%Episode 18: Optimizing Cryptography for Microcontrollers!
  1271. 91%Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
  1272. 97%The Drunken Bishop Algorithm – Barely Functional Theories
  1273. 98%Self-Hosting a Blog Mailing List
  1274. 97%Startups Trends vs 4 years ago | Soheil Yasrebi's Blog
  1275. 99%designs/blazor-wasm-crypto.md at main · dotnet/designs
  1276. 99%GitHub - veorq/cryptocoding: Guidelines for low-level cryptography software
  1277. 98%[ANNOUNCE] WireGuardNT, a high-performance WireGuard implementation for the Windows kernel
  1278. 99%Verkle trees
  1279. 96%NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
  1280. 99%Comparing dotnet:main...vcsjones:16df4edc7215a9521eda2c7a8aa3fa5f1bcecfef · dotnet/runtime
  1281. 98%Positions, Profit and Loss
  1282. 99%OpenSSL 3.0 Release Candidate - OpenSSL Blog
  1283. 82%The Future of Work at Cloudflare
  1284. 68%Reconnected — Real Life
  1285. 97%The mermaid is taking over Google search in Norway - ALEXSKRA
  1286. 98%How to Build Multi-Platform Apps with Uno Platform and Blockchain
  1287. 75%The Nature of Venture
  1288. 88%"In the age of information, ignorance is a choice." Or is it?
  1289. 99%Dynamic import with HTTP URLs in Node.js
  1290. 98%Should web apps use PAKEs?
  1291. 87%NFTs are coming for Instagram and other social media platforms
  1292. 97%Public CDNs Are Useless and Dangerous
  1293. 96%How the blockchain will break up Big Tech
  1294. 95%TLS - The Cloudflare Blog
  1295. 99%Is TLS Fast Yet?
  1296. 98%ongoing by Tim Bray · Algorithm Agility?
  1297. 97%Security Analysis of Telegram (Symmetric Part)
  1298. 99%Pa(dding rtitioning) oracles, and another hot take on PAKEs
  1299. 97%Building a Trustless and Private Internet for Everyone
  1300. 95%Cryptography @ Google
  1301. 99%dotnet/apireviews
  1302. 94%Optimizing Inputs and becoming Indistractable
  1303. 96%You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries
  1304. 97%r/crypto - My breakdown on Partition Oracle Attacks
  1305. 97%Crypto and Monetization
  1306. 99%Announcing Arti, a pure-Rust Tor implementation | Tor Blog
  1307. 99%Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
  1308. 92%VS Code's 'Workspace Trust' Can Restrict Automatic Code Execution -- Visual Studio Magazine
  1309. 98%Workspace Trust in Visual Studio Code
  1310. 98%Workspace Trust in Visual Studio Code
  1311. 99%CouleeApps/git-power
  1312. 99%Decrypt Secrets Into ASP.NET Core MVC Action Arguments Using Action Filters
  1313. 99%How SHA-256 Works Step-By-Step - Qvault
  1314. 97%More Secret Codes: A History of Cryptography (Part 2)
  1315. 92%Episode 15: Bringing Secure Multiparty Computation to the Real World!
  1316. 99%Kaspersky Password Manager: All your passwords are belong to us
  1317. 84%BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
  1318. 98%Episode 16: Contact Discovery in Mobile Messengers!
  1319. 99%Constant-Time Big Numbers: An Introduction
  1320. 98%Explaining blockchains to developers
  1321. 99%Coding, Cloud & Technology | An In Depth Look into Random Number Generation in .NET
  1322. 96%An Elixir Adoption Success Story
  1323. 97%Will deep understanding still be valuable?
  1324. 96%NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
  1325. 95%What Alex Becker Can Teach Us About YouTube Marketing - Jianchor
  1326. 86%SafeDollar ‘stablecoin’ drops to $0 following $248,000 DeFi exploit on Polygon
  1327. 94%Hormones + Insecurity = $4 billion USD
  1328. 98%Production Threshold Signing Service
  1329. 99%Avoiding complexity with systemd
  1330. 98%Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
  1331. 98%TPM recommendations (Windows 10) - Microsoft 365 Security
  1332. 99%MichalStrehovsky/bflat
  1333. 97%Taking the (quantum) leap with go
  1334. 98%The Era Of Customized Blockchains Is Rising Because Smart Contracts Aren’t Really ‘Smart’
  1335. 74%Episode 18: Optimizing Cryptography for Microcontrollers!
  1336. 94%Zero Knowledge from the Discrete Logarithm Problem
  1337. 98%A from-scratch tour of Bitcoin in Python
  1338. 94%Your CPU May Have Slowed Down on Wednesday
  1339. 98%Ignoring extra words in Meili Search
  1340. 97%CDPH Digital Vaccine Record
  1341. 98%Hacker's guide to deep-learning side-channel attacks: the theory
  1342. 99%dsprenkels/sss
  1343. 99%Croc Full Plaintext Recovery - CVE-2021-31603
  1344. 97%Brave, the false sensation of privacy
  1345. 99%Announcing .NET 6 Preview 5 | .NET Blog
  1346. 98%Cryptographic shuffle | Brain on Fire
  1347. 94%The Meltdown of IRON
  1348. 99%Announcing .NET 6 Preview 5 | .NET Blog
  1349. 99%Representing SHA-256 Hashes As Avatars
  1350. 99%Cryptography updates in OCaml and MirageOS
  1351. 97%Cryptology ePrint Archive: Report 2021/819
  1352. 98%Welcome · Real-World Cryptography MEAP V14
  1353. 99%Conversation about networking | .NET Blog
  1354. 98%[Cryptography] Apple's iCloud+ "VPN"
  1355. 93%Cryptology ePrint Archive: Report 2021/507
  1356. 99%log_view_painter.js - Chromium Code Search
  1357. 98%Answering Community Questions and What’s Ahead for Mina
  1358. 99%From KEMs to protocols
  1359. 98%Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  1360. 99%ALPACA Attack
  1361. 98%Kerckhoffs’s Law for Security Engineers
  1362. 96%Lessons from Reading 10,000 AngelList Applications
  1363. 96%The ARM processor (Thumb-2), part 7: Bitwise operations | The Old New Thing
  1364. 98%Certificates Confuse Everything
  1365. 99%Jonas Hietala: The T-34 keyboard layout
  1366. 99%The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams
  1367. 99%Cryptology ePrint Archive: Report 2021/428
  1368. 95%about:joel
  1369. 94%Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  1370. 93%Secret Codes: A History of Cryptography (Part 1)
  1371. 99%0.8.0 Release Notes ⚡ The Zig Programming Language
  1372. 99%Kate polynomial commitments
  1373. 99%Stanford CS Curriculum - Google Drive
  1374. 72%Episode 14: Schnorr, Factoring and Lattices!
  1375. 99%The best cryptographic protocol ever!
  1376. 89%My co-founder and I broke up. Here's a post-mortem.
  1377. 91%Google says it will allow ads for cryptocurrency exchanges and wallets in the US that meet certain requirements and are certified by Google starting August 3
  1378. 78%Norton 360 antivirus now lets you mine Ethereum cryptocurrency
  1379. 93%Vinod Vaikuntanathan - Real World Cryptographers Podcast
  1380. 86%Lightweight Cryptography Standardization: Finalists Announced
  1381. 99%Conversation about .NET interop | .NET Blog
  1382. 98%The Roslyn analyzers I use in my projects - Gérald Barré
  1383. 89%‎CloudSkills.fm: 097: Programming in Go with Michael Levan on Apple Podcasts
  1384. 97%Some recent papers in isogeny crypto
  1385. 97%Digital currencies, DeFi and the impact of the next Carrington event
  1386. 98%Elliptic Curve Cryptography Explained
  1387. 98%QUIC Version 1 is live on Cloudflare
  1388. 98%A UDP-Based Multiplexed and Secure Transport
  1389. 98%The state of tooling for verifying constant-timeness of cryptographic implementations
  1390. 98%Blockchain voting is overrated among uninformed people but underrated among informed people
  1391. 98%Chris's Wiki :: blog/programming/RustInOurFuture
  1392. 99%Building real-time games using Workers, Durable Objects, and Unity
  1393. 98%magic-wormhole/magic-wormhole
  1394. 98%Cryptography from the Ground Up
  1395. 97%Ingrid's Space
  1396. 99%Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  1397. 99%Permit to Cloud – Land with Confidence in Azure w/ Mike Benkovich
  1398. 99%Secure Search Over Encrypted Data
  1399. 98%Factoring in logarithmic time: a mathemagic trick
  1400. 99%Authenticated Encryption in .NET with AES-GCM
  1401. 99%SecureString obsoletions and shrouded buffer proposal by GrabYourPitchforks · Pull Request #147 · dotnet/designs
  1402. 99%Tink  |  Google Developers
  1403. 94%Avoiding the Frigid Hellscape of Online Marketing
  1404. 96%Welcoming Linux to the 1Password Family | 1Password
  1405. 99%zkSessions: The ZK Languages Roundup - May 19 | Hopin
  1406. 99%Multiplayer Doom on Cloudflare Workers
  1407. 98%Are you a victim of terrible API documentation? - Note Canvas
  1408. 90%Zcon2Lite
  1409. 94%How to prevent crypto mining abuse on GitLab.com SaaS
  1410. 93%Because I am bored ...
  1411. 96%Software Drag Racing: Threadripper vs Ryzen 5950X
  1412. 96%A day at work
  1413. 97%Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  1414. 99%BLS12-381 For The Rest Of Us - HackMD
  1415. 78%The Full Coinbase - David Demaree
  1416. 99%OrGY: My Personal Technology Stack
  1417. 97%Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  1418. 99%Erlang/OTP 24 Highlights
  1419. 97%Cloudflare on the Edge
  1420. 98%JWT should not be your default for sessions
  1421. 99%Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  1422. 92%Here's How 'Everything Bubbles' Pop
  1423. 95%Dear EU: Please Don't Ruin the Root - Articles
  1424. 98%Realizing the Mina vision in Rust
  1425. 99%Why does Cryptography use Polynomial Modular Arithmetic in Finite Fields?
  1426. 99%Understanding Extended-Nonce Constructions
  1427. 99%SharpLab
  1428. 98%Introduction to JSON Web Tokens (JWT)
  1429. 99%Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
  1430. 92%Clarifying the "blockchain"
  1431. 53%Threats | No Mercy / No Malice
  1432. 92%ZK languages with Alex Ozdemir
  1433. 98%.NET API browser
  1434. 96%I Didn’t Buy Safemoon And You Can’t Either
  1435. 99%OpenBSD 6.9
  1436. 92%Cryptology ePrint Archive: Report 2021/323
  1437. 97%What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  1438. 99%Mixed Boolean Arithmetic Obfuscation
  1439. 87%Getting Started With Chia: SSD & Hard Disk Crytpo-Currency Mining/Farming
  1440. 98%Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  1441. 94%Cryptocurrency is an abject disaster
  1442. 95%Dabbling in Cryptography
  1443. 99%Crypto miners are killing free CI
  1444. 96%[PATCH 000/190] Revertion of all of the umn.edu commits [LWN.net]
  1445. 99%irtf-cfrg-argon2-13 - The memory-hard Argon2 password hash and proof-of-work function
  1446. 99%IDE > Language > Protocol
  1447. 97%What's cooking on SourceHut? April 2021
  1448. 99%Node.js 16 available now
  1449. 92%Rust and cryptographic code | Bulletproof TLS Newsletter
  1450. 99%Adventures with RSA Blind Signing
  1451. 75%A Full Circle Journey: Introducing Cloudflare Canada
  1452. 94%100 million more IoT devices are exposed—and they won’t be the last – Ars Technica
  1453. 96%Problems | Project Lovelace
  1454. 56%Nassim Taleb: Bitcoin failed as a currency and became a speculative ponzi scheme - Digest Time
  1455. 99%Getting Started With Radare2
  1456. 98%Making MsQuic Blazing Fast
  1457. 98%What on Earth is this Encryption Scheme?
  1458. 99%The FreeBSD Project | FreeBSD 13.0-RELEASE Release Notes
  1459. 99%Digital After Life
  1460. 91%Beating security fatigue with Troy Hunt, Chloé Messdaghi, and Tanya Janca: Lock and Code S02E06 - Malwarebytes Labs
  1461. 99%Serving up zero-knowledge proofs
  1462. 71%Illyriad Powers of the Kingdom Marketplace on OpenSea: Buy, sell, and explore digital assets
  1463. 97%Yuval Ishai - Real World Cryptographers Podcast
  1464. 95%In defense of Signal
  1465. 86%It’s Not Better If It’s Also Worse
  1466. 99%mratsim/constantine
  1467. 99%Creating MicroService with .Net 5
  1468. 94%16 Where cryptography fails and final words · Real-World Cryptography MEAP V12
  1469. 78%Bitcoin could break everything
  1470. 99%WTF are these security chips?
  1471. 98%An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best?
  1472. 99%Goodbye OpenSSL, and Hello To Google Tink
  1473. 95%Cryptology ePrint Archive: Report 2021/442
  1474. 99%MPC-Over-Signal
  1475. 97%Update on git.php.net incident - Externals
  1476. 82%Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  1477. 98%Portable Internet Behavior Bond
  1478. 99%Breaking GitHub Private Pages for $35k
  1479. 97%Cryptology ePrint Archive: Report 2021/123
  1480. 64%The Sonic (Entrepreneurship) Boom | No Mercy / No Malice
  1481. 97%Obvious and possible software innovations nobody does
  1482. 89%GitHub investigating crypto-mining campaign abusing its server infrastructure | The Record by Recorded Future
  1483. 96%Cryptology ePrint Archive: Report 2021/418
  1484. 99%A categorized list of all Java and JVM features since JDK 8 to 16
  1485. 99%Cryptography and assembly code
  1486. 82%AES was worth $250 billion dollars
  1487. 99%The Cost of Proof of Work
  1488. 79%Tether produces a new attestation — it says nothing useful
  1489. 95%Inside a viral website
  1490. 92%Time-lock encryption · Gwern.net
  1491. 99%Recovering a full PEM Private Key when half of it is redacted
  1492. 89%Humans are eating the world...
  1493. 96%Incognito Wallet - Anonymous Crypto Wallet App
  1494. 99%SSL/TLS connection issue troubleshooting test tools
  1495. 98%OpenPGP Message Format
  1496. 96%Bitcoin is not a Battery — it is a Sink
  1497. 93%Financial Management of a Digital Nomad
  1498. 98%Do Microsoft Devs Secretly Use Linux?
  1499. 99%Setting up Cardano Relays using Kubernetes/microk8s
  1500. 98%It doesn't work | Frank DENIS random thoughts.
  1501. 82%Buffer overruns, license violations, and bad code: FreeBSD 13’s close call
  1502. 69%News & Events - Release of draft Applied Cryptography knowledge area for public consultation
  1503. 94%The Solution of the Zodiac Killer’s 340-Character Cipher—Wolfram Blog
  1504. 98%On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  1505. 99%Easy generation of fake/dummy data in C# with Faker.Net
  1506. 97%suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  1507. 97%mratsim/constantine
  1508. 99%r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  1509. 99%Hybrid encryption and the KEM/DEM paradigm
  1510. 99%The missing explanation of ZK-SNARKs: Part 1
  1511. 98%Can we talk about client-side certificates?
  1512. 74%Visa Plans to Enable Bitcoin Payments at 70 Million Merchants
  1513. 87%In-kernel WireGuard is on its way to FreeBSD and the pfSense router
  1514. 99%Add and manage TLS/SSL certificates - Azure App Service
  1515. 77%The internet didn’t kill counterculture—you just won’t find it on Instagram
  1516. 99%r/crypto - What kind of careers can I pursue with a PhD?
  1517. 99%Key Exchange Standards
  1518. 99%Becoming physically immune to brute-force attacks
  1519. 96%ARMs Race: Ampere Altra takes on the AWS Graviton2
  1520. 99%Block Cipher Structures: Ranked
  1521. 98%A flamegraph of Real-World Cryptography
  1522. 98%Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!
  1523. 96%Did Schnorr destroy RSA? Show me the factors.
  1524. 77%Shiny Stock Syndrome
  1525. 97%Cryptology ePrint Archive: Report 2021/015
  1526. 98%February 2021 - Killing Turbotax
  1527. 98%Semantic Versioning Will Not Save You
  1528. 99%SSH and User-mode IP WireGuard
  1529. 94% Bitcoin Is Time | dergigi.com
  1530. 94%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1531. 98%Weird architectures weren't supported to begin with
  1532. 99%How I cut GTA Online loading times by 70%
  1533. 85%Format Replacement cycles
  1534. 99%The security of the "Pass" password manager
  1535. 89%Every thought about personal finance I've ever had, as concisely as possible
  1536. 99%Cryptology ePrint Archive: Report 2020/1610
  1537. 98%March 31, 2020 - Minimal March concludes - .NET and Blazor at the Command Line
  1538. 98%Librsvg, Rust, and non-mainstream architectures
  1539. 98%[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  1540. 92%Cryptology ePrint Archive: Report 2020/1608
  1541. 98%March 22, 2020 - Minimal March - Linux and Blazor. PRs, Finishing the FormView, C#, HTML
  1542. 99%Cryptography Interface Design is a Security Concern
  1543. 95%Document
  1544. 95%The Coming Era of Tokenized Essays
  1545. 92%How I heat my home by mining crypto currencies
  1546. 99%Add static PBKDF2 one-shot methods · dotnet/runtime@0c47471
  1547. 92%Cryptology ePrint Archive: Report 2020/1581
  1548. 93%Ethereum isn't fun anymore
  1549. 95%The problem of CryptoArt
  1550. 98%Double-Odd Elliptic Curves - Double-Odd Elliptic Curves
  1551. 98%Cryptology ePrint Archive: Report 2020/1533
  1552. 98%Using HPKE to Encrypt Request Payloads
  1553. 99%Urbit :: the good, the bad, and the insane
  1554. 94%Prediction Markets: Tales from the Election
  1555. 79%Nvidia to cripple Etherum mining on GeForce RTX 3060 cards to deter crypto bods from nabbing all the gear
  1556. 98%Cryptology ePrint Archive: Report 2020/1535
  1557. 99%Go 1.16 Release Notes - The Go Programming Language
  1558. 98%Cryptology ePrint Archive: Report 2020/1541
  1559. 97%Implement ECC APIs on Android using Android-built-in Crypto APIs by jkoritzinsky · Pull Request #48348 · dotnet/runtime
  1560. 98%Multi-asset shielded pool project (MASP)
  1561. 89%A Billion Mockingbirds: The Role of Journalists in Destroyed Civilization
  1562. 98%ratfactor/ziglings
  1563. 92%Securing the post-quantum world
  1564. 97%Our Solo v2 launch is official!
  1565. 93%Nouriel Roubini: ‘Tether is a criminal enterprise,’ SEC should probe Elon Musk’s bitcoin tweets
  1566. 99%Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  1567. 92%Quantum cryptography network spans 4600 km in China – Physics World
  1568. 98%An Incomplete Field Guide to Crypto Adoption
  1569. 98%Good-bye ESNI, hello ECH!
  1570. 91%PemEncoding Class (System.Security.Cryptography)
  1571. 92%Crackpot Cryptography and Security Theater
  1572. 97%Why should I give you my ID card
  1573. 97%10 Reasons to Love Passwordless #2: NIST Compliance
  1574. 94%My opinion on blockchain
  1575. 98%What's an SPF Record? - Ultimate Guide to Email
  1576. 97%Protect your accounts from data breaches with Password Checkup
  1577. 98%Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  1578. 99%A Simple and Succinct Zero Knowledge Proof
  1579. 88%My product is my garden
  1580. 92%Threshold Cryptography with Omer Shlomovits from ZenGo
  1581. 97%Cryptology ePrint Archive: Report 2020/1506
  1582. 99%Cryptology ePrint Archive: Report 2006/069
  1583. 97%Episode 10: Exploiting Authenticated Encryption Key Commitment!
  1584. 98%The Secret History of Windows Bluescreens by Davepl
  1585. 99%Neural Networks Explained from Scratch using Python
  1586. 99%The Subtle Hazards of Real-World Cryptography
  1587. 86%Transfer Stocks Out Of Your Robinhood Account | Robinhood
  1588. 99%pascalw/kindle-dash
  1589. 94%Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  1590. 99%No, Java is not a Secure Programming Language
  1591. 99%berty/berty
  1592. 95%What it means to be a cryptographer
  1593. 75%survey.pdf
  1594. 99%ThreadPool Blocking Mitigation by benaadams · Pull Request #47366 · dotnet/runtime
  1595. 99%Write Crypto Code! Don't publish it!
  1596. 92%50,000th Subscriber Extravaganza! LiveStream TONITE 7PM PST!
  1597. 99%pavlobu/deskreen
  1598. 98%s-51: Ask Me Anything (AMA), with Joan Daemen
  1599. 99%So, You Want to CTF? (A Beginner’s Guide to CTFing)
  1600. 94%Cryptography 101 with Oso's Dr. Sam Scott | Hanselminutes with Scott Hanselman
  1601. 99%Please Stop Encrypting with RSA Directly
  1602. 94%Meet Raspberry Silicon: Raspberry Pi Pico now on sale at $4 - Raspberry Pi
  1603. 97%An Opinionated Introduction to Urbit
  1604. 99%Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  1605. 99%Mesmerizing Chameleon Signatures
  1606. 99%How I develop web apps in 2021
  1607. 99%Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  1608. 98%Pirates, Crypto, and the Secret History of Windows Product Activation
  1609. 99%A history of end-to-end encryption and the death of PGP
  1610. 87%Portugal - The Most Crypto-Friendly Nation in Europe | Jean Galea
  1611. 99%Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  1612. 99%KEMTLS: Post-quantum TLS without signatures
  1613. 99%Fully Homomorphic Encryption Part One: A Gentle Intro
  1614. 96%Becoming Silicon Valley
  1615. 98%VeriCrypt: An Introduction to Tools for Verified Cryptography
  1616. 98%jukefoxer/Signal-Android
  1617. 73%Pirated Academic Database Sci-Hub Is Now on the ‘Uncensorable Web’
  1618. 99%An introduction to the Data Protection system in ASP.NET Core
  1619. 98%Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen
  1620. 79%Death to the document
  1621. 90%Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  1622. 98%David Wong - What is Applied Cryptography? #121 - Develomentor
  1623. 98%David Wong – What is Applied Cryptography? #121
  1624. 86%The Tether Press and Bitcoin's Speculative Mania - Trolly McTrollface's Blog
  1625. 94%Cryptology ePrint Archive: Report 2020/1390
  1626. 97%Steam's login method is kinda interesting
  1627. 99%.NET Rocks! vNext
  1628. 84%Episode‌ ‌8:‌ ‌Breaking‌ ‌Elliptic-Curve‌ ‌Signatures‌ ‌With‌ ‌LadderLeak!‌
  1629. 98%Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  1630. 59%Episode 9: Off-the-Record Messaging and PKI Implementations!
  1631. 98%Cryptology ePrint Archive: Report 2020/1456
  1632. 98%s-18: FSE 2020 Rump session
  1633. 86%[Cryptography] Bitcoin is a disaster.
  1634. 97%Resetting Zcash: its about privacy, not scale, econ, dev funds, or governance
  1635. 99%Colin Stebbins Gordon
  1636. 96%Year in Review: 2020
  1637. 97%zkSNARKS and Cryptographic Accumulators
  1638. 93%Tal Rabin - Real World Cryptographers Podcast
  1639. 96%I am Filippo Valsorda, Go cryptography lead and tool author, Ask Me Anything
  1640. 97%A tour of std.crypto in Zig 0.7.0 - Frank Denis
  1641. 51%A Christmas Gift for Ledger Users – Death Threats - BeInCrypto
  1642. 97%Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  1643. 97%Introduction to quantum computing with Q# – Part 12, Bell’s inequality
  1644. 99%2-adic Logarithms and Fast Exponentiation
  1645. 98%Last Week in .NET #23 – Solarwinds gets hacked; Microsoft goes on the Attack
  1646. 93%Counterfactual communication and intimidation
  1647. 90%Path to my financial independence
  1648. 97%Episode 5: Isogeny-Based Cryptography For Dummies!
  1649. 98%Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security
  1650. 91%Bouncy Castle crypto authentication bypass vulnerability revealed
  1651. 99%Cryptography Dispatches: Re-Deriving the edwards25519 Decoding Formulas
  1652. 99%jwasham/coding-interview-university
  1653. 98%Files and directories to exclude from antivirus scanning for Orion Platform products (AV exceptions and exclusions)
  1654. 97%Cryptohack: A Fun Platform For Learning Modern Cryptography
  1655. 98%Last Week in .NET #22 – Microsoft Parrots Google
  1656. 96%Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
  1657. 92%The Fraying of the US Global Currency Reserve System
  1658. 97%Ecc 2020 Panel "recent Trends In (Ecc) Crypto
  1659. 97%Privacy and Compliance Reading List
  1660. 96%Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  1661. 85%How to Build a Global Network that Complies with Local Law
  1662. 96%#104 – David Wong: Many Layers of Complexity
  1663. 99%Cryptography Improvements in .NET 5 - Support for PEM
  1664. 98%OPAQUE: The Best Passwords Never Leave your Device
  1665. 94%The Future I Believe In
  1666. 95%Nicola Bortignon - We need more platforms in our lifes
  1667. 96%#104 – David Wong: Many Layers of Complexity
  1668. 92%Privacy needs to be built into the Internet
  1669. 99%Understand The .NET 5 Runtime Environment
  1670. 97%Workshop On Elliptic Curve Cryptography Ecc 2020 (Videos)
  1671. 97%Fake Tweet Screenshot Proliferation
  1672. 97%Cryptologie | International Olympiad In Cryptography
  1673. 99%The Cryptopals Crypto Challenges
  1674. 98%Radicle - Peer-to-peer code collaboration
  1675. 97%Pyecsca: Python Elliptic Curve Cryptography Side-Channel Analysis Toolkit
  1676. 88%Crypto Dictionary
  1677. 98%How do people find bugs?
  1678. 94%What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  1679. 97%zkSummit 6 | Hopin
  1680. 97%The book is finished, well sort of...
  1681. 99%A Taste of OCaml's Predictable Performance - Dev.Poga
  1682. 92%Go standard library benchmarks - Intel vs M1
  1683. 99%Haskell - All Hail Geometric Algebra!
  1684. 80%Atari Token: Turbocharging Classic Games With Crypto - Decrypt
  1685. 95%Api diff between net5.0 and netcoreapp3.1 & netstandard2.1 by Anipik · Pull Request #5610 · dotnet/core
  1686. 97%Episode 2: Breaking Lightweight Symmetric Cryptography!
  1687. 97%Ok Google: please publish your DKIM secret keys
  1688. 96%Can’t open apps on macOS: an OCSP disaster waiting to happen
  1689. 99%Going Bark: A Furry’s Guide to End-to-End Encryption
  1690. 97%Your Computer Isn't Yours
  1691. 97%Cryptologie | High-Assurance Crypto Software
  1692. 98%Generate a Service Bus SAS Token and Manage Token renewal using Azure Runbooks | Developer Support
  1693. 99%Etebase - Your end-to-end encrypted backend
  1694. 97%Cryptologie | The End Of Crypto
  1695. 97%What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  1696. 97%net5-contrib.diff
  1697. 85%Don’t outsource your thinking — Avthar Sewrathan
  1698. 97%Cryptologie | The Joy Of Cryptography
  1699. 99%The missing explanation of zk-SNARKs: Part 2
  1700. 97%Fall 2020 RPKI Update
  1701. 95%Spending political capital
  1702. 99%janos/compromised
  1703. 97%A Brief Introduction to Deniability
  1704. 97%Cryptography Dispatches: Reconstruct Instead Of Validating
  1705. 97%Isogeny-Based Cryptography: Past, Present, And Future
  1706. 97%Adi Shamir 2002 Acm A.m. Turing Award Lecture, "cryptography: State Of The Science"
  1707. 99%Putting JSON in a block chain? First decide what your JSON is…
  1708. 99%.NET libraries and the art of backward compatibility – Part 3
  1709. 96%How software eats money
  1710. 93%mimoo/crypto_blogs
  1711. 94%Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  1712. 98%Chris Ball » Announcing GitTorrent: A Decentralized GitHub
  1713. 97%Should I buy the dip?
  1714. 97%1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  1715. 98%X509Certificate2.CreateFromPem(ReadOnlySpan<Char>, ReadOnlySpan<Char>) Method (System.Security.Cryptography.X509Certificates)
  1716. 99%dotnet/runtime
  1717. 99%Home
  1718. 98%Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  1719. 99%Breaking changes, version 3.1 to 5.0 - .NET Core
  1720. 97%Cryptography Dispatches: Nacl Is Not A High-Level Api
  1721. 98%JDK 15 Security Enhancements
  1722. 94%The End of Crypto
  1723. 99%XChaCha20-Poly1305: A Primer with Examples in .NET
  1724. 95%Decentralized Finance will reshape (or eat?) Centralized Finance
  1725. 96%A follow up to Coinbase as a “mission focused” company
  1726. 97%Cryptography Dispatches: Reconstruct Instead of Validating
  1727. 98%Consensus is Harder Than It Looks
  1728. 99%It’s 255:19AM. Do you know what your validation criteria are?
  1729. 91%The passion economy and the future of finance
  1730. 97%Robots, Oracles And Protocols; Breaking Cryptography Through Information Leakage
  1731. 99%LLVM provides no side-channel resistance
  1732. 99%ASP.NET Core breaking changes
  1733. 99%The Kyber/Dilithium NTT
  1734. 88%The Coinbase post was 100% right. Here's what you can do about it
  1735. 66%Coinbase offers exit package to those uncomfortable with new direction
  1736. 99%A categorized list of all Java and JVM features since JDK 8 to 15
  1737. 93%Advisory: security issues in AWS KMS and AWS Encryption SDKs
  1738. 96%Bypassing Android MDM using Electromagnetic Fault Injection by a Gas Lighter for $1.5
  1739. 98%Using Azure RBAC with Azure Key Vault
  1740. 97%Top 10 .NET 5.0 new APIs - NDepend
  1741. 99%Why not rust for security?
  1742. 94%On the use of a life
  1743. 98%Introducing Precursor « bunnie's blog
  1744. 97%A Thanksgiving Carol
  1745. 97%GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  1746. 89%Your Phone Is Your Castle – Purism
  1747. 94%Support ECDiffieHellman on X509Certificate2 by vcsjones · Pull Request #42180 · dotnet/runtime
  1748. 97%coin_artist – 34700 $coin Puzzle Write-Up ($20,000)
  1749. 97%Security by Obscurity is Underrated
  1750. 92%Oracle Developer Live—Java
  1751. 98%Preventing Insecure Network Connections | Apple Developer Documentation
  1752. 99%Key exchange standards - Manning
  1753. 99%Key exchange standards - Manning
  1754. 96%A history of elliptic curves in tweets
  1755. 98%Everything You Need to Know to Get Started with Deno
  1756. 99%Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  1757. 98%Why I’m Writing A Book On Cryptography
  1758. 99%Soatok’s Guide to Side-Channel Attacks
  1759. 98%Taking a look at Gerät 32620 — The Postface
  1760. 97%Cryptologie | Links
  1761. 98%Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  1762. 99%So you want to roll your own crypto?
  1763. 97%Call For Presentations – PasswordsCon
  1764. 94%Providers | PrivacyTools
  1765. 92%Saving the Web With Very Small Amounts of Money
  1766. 99%Cross-platform cryptography in .NET Core and .NET 5
  1767. 99%NuGet and long file name support · Issue #3324 · NuGet/Home
  1768. 82%Cryptography Dispatches
  1769. 99%Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  1770. 97%N O D E
  1771. 98%reMarkable microSD
  1772. 99%Obfuscating your email on the web
  1773. 99%Symmetric and Asymmetric Encryption in .NET Core
  1774. 98%JWTs: Which Signing Algorithm Should I Use?
  1775. 96%Introduction to quantum computing with Q# – Part 6, No-cloning theorem
  1776. 93%IBM Reveals Next-Generation IBM POWER10 Processor
  1777. 97%Hiding messages in x86 binaries using semantic duals
  1778. 96%Stateful Hash-Based Signatures | CSRC | CSRC
  1779. 97%The “Easiest” Paths to Product Management
  1780. 85%If the NSA has been hacking everything, how has nobody seen them coming?
  1781. 90%From stock market email newsletter side project to micro SaaS
  1782. 96%The Five P Framework for Product Discovery
  1783. 96%terrajobst/HarvestPlatformSupport
  1784. 98%Proof of X
  1785. 96%WASM: Add MD5 and SHA* hash functions by akoeplinger · Pull Request #40486 · dotnet/runtime
  1786. 98%1Password for Linux development preview
  1787. 99%The .NET Core Journey at Criteo
  1788. 90%David Wong Portfolio
  1789. 90%David Wong
  1790. 96%Announcing Windows 10 Insider Preview Build 20170 | Windows Experience Blog
  1791. 84%The Haskell Elephant in the Room
  1792. 91%Addressing the July 2020 e-commerce and marketing data breach -- A Message From Ledger’s Leadership | Ledger
  1793. 98%Small Mailserver Best Current Practices
  1794. 98%p410n3 blog
  1795. 99%Add CBOR property-based tests by eiriktsarpalis · Pull Request #39828 · dotnet/runtime
  1796. 98%Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  1797. 99%Exploring Fully Homomorphic Encryption
  1798. 98%Creating Elliptical Curve Keys using OpenSSL
  1799. 93%Cryptography Dispatches: DSA Is Past Its Prime
  1800. 83%Made 13 Dollars with Brave and Basic Attention token
  1801. 99%Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  1802. 99%dotnet/designs
  1803. 97%Poor feedback from readers
  1804. 99%pimbrouwers/Falco
  1805. 99%How SHA-2 Works Step-By-Step (SHA-256)
  1806. 98%Hacking Reolink cameras for fun and profit
  1807. 99%DRBG: rename the DRBG taxonomy. · openssl/openssl@ce3080e
  1808. 95%Data Structures & Algorithms I Actually Used Working at Tech Companies
  1809. 95%All .Net Exceptions List
  1810. 99%A few thoughts about Signal’s Secure Value Recovery
  1811. 98%[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  1812. 97%braver-browser/braver-browser
  1813. 99%Youtube DELETED Jordan Pier's Electronics Repair Channel!
  1814. 99%Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  1815. 97%Why I’m Writing A Book On Cryptography
  1816. 99%Bitcoin From Scratch - Part 1
  1817. 97%How CDNs Generate Certificates
  1818. 99%How to get the best out of your Yubikey with GPG
  1819. 98%Why AES-GCM Sucks
  1820. 90%There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  1821. 95%Path Building vs Path Verifying: The Chain of Pain
  1822. 96%How is NSA breaking so much crypto?
  1823. 97%Teach Yourself Computer Science
  1824. 90%How I Got My 7 Person Startup Featured In Entrepreneur Magazine - David Kemmerer
  1825. 99%Let's Encrypt: Senior Software Engineer
  1826. 98%11 User Authentication · Real-World Cryptography MEAP V07
  1827. 99%Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  1828. 98%Reasoning by Lego: The wrong way to think about cryptography.
  1829. 99%jbp.io :: Third-party audit of rustls
  1830. 93%A collection of free books from Springer
  1831. 91%Never Hertz to Ask
  1832. 98%Getting Started with Nix
  1833. 99%ECDSA: Handle with Care
  1834. 99%dotnet/pinvoke
  1835. 98%25 Years of PHP History
  1836. 90%After 10 Years in Tech Isolation, I'm Now Outsider to Things I Once Had Mastered
  1837. 99%Container technologies at Coinbase
  1838. 76%Why Is Grayscale Buying 100% Of The Mined Bitcoins Since Halving - Hamad Dar's Blog
  1839. 92%Ladies and Gentlemen… Cloudflare TV!
  1840. 99%Byzantine and non-Byzantine distributed systems
  1841. 99%mimoo/disco
  1842. 99%(Very) Basic Intro To Elliptic Curve Cryptography
  1843. 99%The radix 2^51 trick
  1844. 99%Node v12.17.0 (LTS) | Node.js
  1845. 96%Home automation and Bitcoin?
  1846. 98%NIST Special Publication 800-63-3
  1847. 98%User authentication with passwords, What’s SRP?
  1848. 99%OpenBSD 6.7
  1849. 99%ACME End User Client and Code Signing Certificates
  1850. 98%Cryptology ePrint Archive: Report 2020/572
  1851. 99%The Janet Programming Language
  1852. 99%Replacing JWTs with Branca and PASETO in .NET Core
  1853. 99%Credential Loading and the AWS SDK for .NET (Deep Dive) - Steve Gordon
  1854. 98%Lockdown Course: Introduction to Cryptography - James Grime
  1855. 88%Zoom buys Keybase to help it build end-to-end encryption
  1856. 98%Archive
  1857. 99%Alternatives to PGP
  1858. 95%Keybase joins Zoom
  1859. 99%Create a .NET Core Deamon app that calls MSGraph with a certificate
  1860. 98%OpenPGP Message Format
  1861. 99%Why not "Why not WireGuard?"
  1862. 95%Vietnam's contact tracing app broadcasting a fixed ID
  1863. 98%Barbie typewriter
  1864. 99%Build a C# App with CockroachDB and the .NET Npgsql Driver
  1865. 97%This is what end-to-end encryption should look like! - Jitsi
  1866. 99%Engineering code quality in the Firefox browser: A look at our tools and challenges – Mozilla Hacks - the Web developer blog
  1867. 99%Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
  1868. 98%500 Free Computer Science Courses from the World’s Top CS Universities
  1869. 98%Is BGP safe yet? · Cloudflare
  1870. 92%‎TF Podcast on Apple Podcasts
  1871. 99%0.6.0 Release Notes · The Zig Programming Language
  1872. 99%Using Certificates from Azure Key Vault in ASP.NET Core
  1873. 96%This is what end-to-end encryption should look like! - Jitsi
  1874. 99%The limitations of Android N Encryption
  1875. 97%The Power of Prolog
  1876. 99%Transport Layer Security (TLS) best practices with the .NET Framework
  1877. 97%Welcome · Real-World Cryptography MEAP V05
  1878. 80%FLOPPY DISK OVERDRIVE, by MASTER BOOT RECORD
  1879. 96%How we recovered over $300K of Bitcoin
  1880. 93%Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  1881. 98%Perspectives & gaps between theory, practice & industry research in cryptography
  1882. 99%A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero
  1883. 99%.NET R&D Digest (March, 2020)
  1884. 96%Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by default - Microsoft Edge Blog
  1885. 89%US Government Wages War on Encryption
  1886. 96%Linux 5.6 - Linus Torvalds
  1887. 56%patents in crypto
  1888. 99%Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  1889. 99%Speeding up Linux disk encryption
  1890. 99%A categorized list of all Java and JVM features since JDK 8 to 14
  1891. 98%Deploying security.txt: how Cloudflare’s security team builds on Workers
  1892. 98%.NET Platforms Feature Comparison | Premier Developer
  1893. 99%A Quick Garbled Circuits Primer
  1894. 99%How Tailscale works
  1895. 91%EARN IT bill is aiming at destroying encryption. We must take action now.
  1896. 90%gentilkiwi Shop | Redbubble
  1897. 94%MakerDAO gets stress tested as ETH price plummets
  1898. 95%Pylon Validation Services
  1899. 99%What's a key exchange?
  1900. 97%Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  1901. 86%Keybase
  1902. 97%MYBP (Maybe You’ve Been Pwned)
  1903. 98%Existence is random [JavaScript code to efficiently generate a random (version 4) UUID]
  1904. 93%WireGuard Gives Linux a Faster, More Secure VPN
  1905. 95%Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  1906. 98%Stack Exchange Data Explorer
  1907. 99%The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  1908. 86%Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months
  1909. 97%If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  1910. 99%Am I generating email link tokens correctly?
  1911. 99%Hash functions and security | Manning
  1912. 60%Ivan On Tech on Programming in Solidity, C++, and Javascript - Cryptographic Asset
  1913. 65%home | CFAIL
  1914. 99%Provisioning X.509 Devices for Azure IoT Hub using .NET Core
  1915. 99%Cryptologie
  1916. 97%X25519 in Web Cryptography · Issue #271 · mozilla/standards-positions
  1917. 99%February 2020 SDK Release
  1918. 99%Hash functions and security | Manning
  1919. 98%Latacora - Stop Using Encrypted Email
  1920. 81%Peter Lawrence Montgomery, 1947-2020
  1921. 98%Real-World Cryptography
  1922. 97%google/tink
  1923. 98%This Goes to Eleven (Part. 2/∞)
  1924. 90%London Crypto Day 2020
  1925. 99%Create Certificates for IdentityServer4 signing using .NET Core
  1926. 99%Creating Certificates for X.509 security in Azure IoT Hub using .NET Core
  1927. 96%Serious Cryptography | No Starch Press
  1928. 97%Authentication, What The Fuck?
  1929. 86%Permutation-based Cryptography 2020 – Zagreb, Croatia
  1930. 99%Showtime | BenchmarkDotNet
  1931. 99%NorthSec 2020
  1932. 99%Workshops | Insomni'Hack
  1933. 99%Whose Curve Is It Anyway
  1934. 91%Critical Windows 10 vulnerability used to Rickroll the NSA and Github
  1935. 94%18.783 Home
  1936. 96%Real World Crypto 2020
  1937. 98%Supersingular Isogeny Key Exchange for Not-Quite Beginners
  1938. 98%SHA-1 is a Shambles
  1939. 97%FROST — Flexible Round-Optimized Schnorr Threshold Signatures | Cryptography, Security, and Privacy (CrySP) | University of Waterloo
  1940. 99%The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  1941. 99%The Hidden Number Problem – kel.bz
  1942. 83%$1000 TCR hashing competition
  1943. 99%Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  1944. 98%On Linux's Random Number Generation
  1945. 99%Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  1946. 99%tmds/Tmds.Ssh
  1947. 85%VPN Service for Serious Privacy & Security | IVPN
  1948. 92%GateHub Investigation - Final Statement
  1949. 95%Stop surveillance and preserve your privacy with IVPN
  1950. 98%TPM-FAIL Attack
  1951. 98%Isogeny crypto
  1952. 90%Homepage | ZKProof Standards
  1953. 98%Maintaining cryptographic library for 12 languages
  1954. 96%Facebook Libra is Architecturally Unsound
  1955. 93%NordVPN users’ passwords exposed in mass credential-stuffing attacks
  1956. 99%cfrg/pake-selection
  1957. 96%TLS Post-Quantum Experiment
  1958. 99%Have I Been Pwned: API v3
  1959. 99%Creating Random Numbers With .NET Core
  1960. 97%cr.yp.to: 2019.10.24: Why EdDSA held up better than ECDSA against Minerva
  1961. 98%Meet Algo, the VPN that works
  1962. 97%Writing a book is hard
  1963. 99%Ed25519 Keys | Brian Warner
  1964. 93%Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  1965. 95%The Insecure Elephant in the Room - CA Security Council
  1966. 99%Grant Types — IdentityServer4 1.0.0 documentation
  1967. 92%Algorand's cryptographic sortition
  1968. 99%novotnyllc/NuGetKeyVaultSignTool
  1969. 97%What's my birthday?
  1970. 88%CryptographicException on .NET Core 3, Windows only "The specified RSA parameters are not valid; both Exponent and Modulus are required fields." · Issue #30914 · dotnet/runtime
  1971. 99%Cutter
  1972. 99%What's new in .NET Core 3.0
  1973. 99%draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  1974. 96%September 10, 2019—KB4515384 (OS Build 18362.356)
  1975. 98%awslabs/s2n
  1976. 99%OWASP/CheatSheetSeries
  1977. 99%10 Personal Finance Lessons for Technology Professionals
  1978. 99%OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  1979. 99%cr.yp.to: 2017.07.23: Fast-key-erasure random-number generators
  1980. 99%jedisct1/dsvpn
  1981. 58%Major Crypto Brokerage Coinmama Reports 450,000 Users Affected by Data Breach
  1982. 98%Padloc - A Modern Password Manager For Individuals And Teams
  1983. 99%Please do not use the .NET 2.0 HMACSHA512 and HMACSHA384 Classes
  1984. 98%!(Spotting the promising cryptography-related start ups)
  1985. 99%Random Thoughts
  1986. 99%JDK 13 Security Enhancements
  1987. 93%Pwnie Awards
  1988. 98%Security Engineering - A Guide to Building Dependable Distributed Systems
  1989. 99%Sometimes valid RSA signatures in .NET
  1990. 95%Manning Publications
  1991. 97%CRYPTO-LAB
  1992. 99%Deprecation errors compiling native projects on macOS Catalina · Issue #30109 · dotnet/runtime
  1993. 98%Real-World Cryptography
  1994. 99%Using Chained Certificates for Certificate Authentication in ASP.NET Core 3.1
  1995. 90%Kraken
  1996. 69%Cryptocurrency in Every Wallet™ | Best Place To Buy Sell Store Crypto | Crypto.com
  1997. 97%Archive
  1998. 98%POSIX close(2) is broken
  1999. 99%Add methods to convert between hexadecimal strings and bytes · Issue #17837 · dotnet/runtime
  2000. 97%The Ultra Secure Crypto Storage & Communication Device
  2001. 97%A book in preparation
  2002. 98%Security advisory 2019-06-13 | Yubico
  2003. 99%Certificate Authentication in ASP.NET Core 3.1
  2004. 70%Apple's 'Find My' Feature Uses Some Very Clever Cryptography
  2005. 98%Apple CryptoKit | Apple Developer Documentation
  2006. 98%Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  2007. 99%How Hackers Get your Password? | Dr. Erdal Ozkaya Personal Blog
  2008. 82%Cryptography Dispatches • Buttondown
  2009. 97%JED Server Security Incident Report
  2010. 98%SMS for 2FA: What Are Your Security Options? - Authy
  2011. 99%Enable C# mode command line diff by terrajobst · Pull Request #1196 · dotnet/standard
  2012. 87%Kik and the SEC: What’s Going On and What Does It Mean for Crypto? - Andreessen Horowitz
  2013. 93%[Cryptography] Bitcoin - closing the coin
  2014. 98%Why 2f+1
  2015. 77%Seven Trends in Blockchain Computing (Spring 2019)
  2016. 97%nothings/single_file_libs
  2017. 91%dotnet/extensions
  2018. 99%RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  2019. 96%microsoft/SymCrypt
  2020. 99%JDK 12 Security Enhancements
  2021. 87%Five Open Problems for the Blockchain Computer - Andreessen Horowitz
  2022. 98%proposal: crypto/tls: Expose maps for cipher suite IDs/names · Issue #30325 · golang/go
  2023. 80%Dream Market Shuts Down: Has the DEA Claimed Another Darknet Victim?
  2024. 99%Cryptologie
  2025. 99%Lies, darn lies and sampling bias
  2026. 99%Verified cryptographic provider a triple threat
  2027. 98%.NET API browser
  2028. 99%ITHare/obf
  2029. 99%A Go implementation of Poly1305 that makes sense
  2030. 98%Archive
  2031. 99%BoringTun, a userspace WireGuard implementation in Rust
  2032. 99%Possible bug with RSACng hash verification · Issue #29061 · dotnet/runtime
  2033. 97%The WhibOx Contest Edition 2 - CYBERCRYPT
  2034. 99%On the S-Box of Streebog and Kuznyechik
  2035. 94%Understanding STIR/SHAKEN
  2036. 99%Include System.Security.Cryptography.RandomNumberGenerator.GetInt32 · Issue #1101 · dotnet/standard
  2037. 99%Go 1.12 Release Notes - The Go Programming Language
  2038. 97%Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  2039. 98%We need to talk about Session Tickets
  2040. 92%Cybersecurity for the Public Interest - Schneier on Security
  2041. 92%Added Range Manipulation APIs to Collection<T> and ObservableCollection<T> by ahoefling · Pull Request #35772 · dotnet/corefx
  2042. 93%Past, Present, Future: From Co-ops to Cryptonetworks - Andreessen Horowitz
  2043. 97%Data Leakage from Encrypted Databases - Schneier on Security
  2044. 74%a16z Podcast: Voting, Security, and Governance in Blockchains - Andreessen Horowitz
  2045. 84%Introducing Anchorage, the world’s first crypto-native custodian
  2046. 97%What comes after open source?
  2047. 89%Blockchain Can Wrest the Internet From Corporations' Grasp
  2048. 70%Crypto, Beyond Silk Road - Andreessen Horowitz
  2049. 81%Crypto, the Future of Trust
  2050. 93%Beyond Cryptocurrencies - Andreessen Horowitz
  2051. 97%4 eras of blockchain computing: degrees of composability
  2052. 98%The Four Horsemen of Centralization, by Ali Yahya
  2053. 98%Centralization vs Decentralization - AVC
  2054. 93%Presentation: The End of the Beginning — Benedict Evans
  2055. 98%The Myth of The Infrastructure Phase | Union Square Ventures
  2056. 98%a16z Crypto - Andreessen Horowitz
  2057. 98%a16z Crypto - Andreessen Horowitz
  2058. 98%a16z Crypto - Andreessen Horowitz
  2059. 98%a16z Crypto - Andreessen Horowitz
  2060. 98%a16z Podcast: Scaling Companies (and Tech Trends) - Andreessen Horowitz
  2061. 98%a16z Crypto - Andreessen Horowitz
  2062. 93%SEC.gov | Digital Asset Transactions: When Howey Met Gary (Plastic)
  2063. 79%A #CryptoIntro — Resources & Wrap Up
  2064. 73%Welcome Balaji Srinivasan, Coinbase’s new Chief Technology Officer
  2065. 99%Crypto Canon - Andreessen Horowitz
  2066. 97%a16z Podcast: Mental Models for Understanding Crypto Tokens - Andreessen Horowitz
  2067. 98%Vitalik Buterin, Creator Of Ethereum, On The Big Guy Vs. The Little Guy - Unchained Podcast
  2068. 86%Our Top 16+ Podcasts of 2017 - Andreessen Horowitz
  2069. 80%The Future of Tech, with Chris Dixon – [Invest Like the Best, EP.69]
  2070. 78%dYdX raises seed round led by Andreessen Horowitz and Polychain Capital
  2071. 55%Welcome Asiff Hirji: Coinbase’s New President & Chief Operating Officer
  2072. 97%Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  2073. 97%Keybase launches encrypted git
  2074. 87%a16z Podcast: Why Crypto Tokens Matter - Andreessen Horowitz
  2075. 98%Bitcoin's Academic Pedigree - ACM Queue
  2076. 98%Blockchains don’t scale. Not today, at least. But there’s hope.
  2077. 79%How Information Got Re-Invented - Issue 51: Limits - Nautilus
  2078. 88%Traditional Asset Tokenization
  2079. 88%Traditional Asset Tokenization
  2080. 94%Digital currency reading list
  2081. 97%Computer Logic with Chris Dixon - Software Engineering Daily
  2082. 99%Details on Recent DNS Hijacking - Schneier on Security
  2083. 95%Reconstructing SIGSALY - Schneier on Security
  2084. 98%Blockchain and Trust - Schneier on Security
  2085. 98%Hacking the GCHQ Backdoor - Schneier on Security
  2086. 95%Friday Squid Blogging: Squid Lollipops - Schneier on Security
  2087. 98%Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  2088. 93%Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  2089. 95%New Australian Backdoor Law - Schneier on Security
  2090. 84%Back Issues of the NSA's Cryptolog - Schneier on Security
  2091. 92%Security Risks of Chatbots - Schneier on Security
  2092. 92%The DoJ's Secret Legal Arguments to Break Cryptography - Schneier on Security
  2093. 86%Friday Squid Blogging: Squid Sculptures - Schneier on Security
  2094. 98%oss-security - MatrixSSL stack buffer overflow
  2095. 99%Modern Alternatives to PGP
  2096. 99%Go 1.12 Release Notes - The Go Programming Language
  2097. 96%Archive
  2098. 98%proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  2099. 75%Real World Crypto 2019 - Day 1 - Session 1 - Morning - part 1
  2100. 92%crypto/x509: root_cgo_darwin and root_nocgo_darwin omit some system certs · Issue #24652 · golang/go
  2101. 96%crypto/tls: add support for TLS 1.3 · Issue #9671 · golang/go
  2102. 76%CBC 2019
  2103. 98%Real World Crypto 2019
  2104. 93%The year in post-quantum crypto
  2105. 95%Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  2106. 98%ImperialViolet - CECPQ2
  2107. 89%SPY --- Surveillance, Privacy, and You
  2108. 92%Quantum algorithms for analysis of public-key crypto | American Inst. of Mathematics
  2109. 99%Mathematics of Public Key Cryptography
  2110. 81%CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  2111. 86%Programme
  2112. 98%PQCRYPTO ICT-645622
  2113. 92%D. J. Bernstein / Talks
  2114. 97%djbsort: Intro
  2115. 88%Security in Times of Surveillance
  2116. 51%Round 1 Submissions - Post-Quantum Cryptography | CSRC
  2117. 88%Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  2118. 88%Eurocrypt 2018 rump session
  2119. 82%Classic McEliece: Talks
  2120. 90%NIST PQCrypto Classic McEliece submission
  2121. 89%PQCrypto 2018 Conference : Florida Atlantic University - Charles E. Schmidt College of Science
  2122. 98%libpqcrypto: Intro
  2123. 88%Security in Times of Surveillance
  2124. 99%Introducing HacSpec
  2125. 74%Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  2126. 88%Post-Quantum Cryptography
  2127. 97%CBC Workshop 2018 : Florida Atlantic University - Charles E. Schmidt College of Science
  2128. 87%SPHINCS+
  2129. 99%The ROBOT Attack
  2130. 92%NTRU Prime: NIST submission
  2131. 99%dalek-cryptography/ed25519-dalek
  2132. 70%The CCC: Men Who Hate Women
  2133. 92%Mersenne Prime Discovery - 2^82589933-1 is Prime!
  2134. 99%RUB-NDS/TLS-Padding-Oracles
  2135. 92%Cryptologie | Links
  2136. 99%crypto/tls: enable TLS 1.3 and update tests · golang/go@30cc978
  2137. 97%Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  2138. 98%Database Encryption
  2139. 97%Kerckhoffs’ principles – Why should I make my cipher public?
  2140. 93%Proxy re-encryption and FHE with NuCypher
  2141. 92%Cryptologie | Links
  2142. 98%Attack of the week: searchable encryption and the ever-expanding leakage function
  2143. 99%Archive
  2144. 98% Introducing Adiantum: Encryption for the Next Billion Users
  2145. 98%Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  2146. 89%Stanford Blockchain Conference 2019 - Day 1
  2147. 99%arXiv.org e-Print archive
  2148. 95%DEF CON® 27 Hacking Conference - Call For Papers
  2149. 86%Earn BAT while trying out the blockchain-friendly Brave browser
  2150. 99%Meow Hash
  2151. 99%Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  2152. 95%Manning Publications
  2153. 99%Software Tokens Won't Save You