Explore other dev related sites in this ring. If you find this idea useful click here to join.
devring.club Previous Random Next

linksfor.dev(s)

Posts for 'encryption'

  1. Geometry of Motion
  2. Achieving period-correct graphics in personal computer emulators — Part 1: The Amiga
  3. The Demonization of DeepSeek
  4. A Thing or Two About RSA
  5. The UK Is Still Trying to Backdoor Encryption for Apple Users
  6. Why Data is the New Gold
  7. Fun With HyperLogLog and SIMD
  8. Signal Protocol and Post-Quantum Ratchets
  9. The RAG Obituary: Killed by Agents, Buried by Context Windows
  10. cr.yp.to: 2025.09.30: Surreptitious surveillance
  11. Building Software Faster with LLMs: Part 1 - The Pain Points
  12. Cognitive Capital: Assets That Think
  13. In the economy of user effort, be a bargain, not a scam • Lea Verou
  14. I'll quit my job and buy a farm - Alin Panaitiu
  15. There is no reachable chess position with more than 218 moves.
  16. Evanston orders Flock to remove reinstalled cameras - Evanston RoundTable
  17. Notes on RL Environments
  18. ChatControl wants to scan all your private messages
  19. PostgreSQL 18 Released!
  20. 100,000,000 CROWPOWER and no horses on the moon
  21. John Kristoff - Journeys in Hosting 1/x
  22. Frontend complexity and the HTML renaissance
  23. Tell the EU: Don’t Break Encryption with Chat Control
  24. DXGI debugging: Microsoft put me on a list
  25. Bringing Metal to a crypto backdoor fight! Exploiting the GPU and the 90s crypto wars to crack the APT Down code signing keys
  26. How do LLMs work?
  27. Fight Chat Control (@chatcontrol@mastodon.social)
  28. From Spaghetti to Simplicity - Kool Codez
  29. How I Would Have Built Laravel Cloud
  30. Fight Chat Control (@chatcontrol@mastodon.social)
  31. ARM is great, ARM is terrible (and so is RISC-V)
  32. GrapheneOS and forensic extraction of data - GrapheneOS Discussion Forum
  33. Performance Improvements in .NET 10 - .NET Blog
  34. The Case for Cowboy Coding
  35. The Business Consultant — Quarter Mile
  36. Chat Control Must Be Stopped, Act Now!
  37. The Method of Least Squares for Software Developers
  38. A look at a P2P camera (LookCam app)
  39. Introducing Signal Secure Backups
  40. What to do with an old iPad
  41. Secret Storage in OCI
  42. reMarkable Paper Pro Move
  43. The maths you need to start understanding LLMs
  44. I Should Have Loved Electrical Engineering · Tony Tong
  45. Cloud tech makes sense on-prem too
  46. "This telegram must be closely paraphrased before being communicated to anyone." Why?
  47. 5 Vibe Coding Failures That Prove AI Can't Replace Developers Yet
  48. Music to Break Models By
  49. Replacing developers with GPUs
  50. How I Setup Nginx as a Reverse Proxy
  51. Remote Code Execution with LLM Agents | Aleksandr Hovhannisyan
  52. Project MiniNAS | Jadarma's Blog
  53. Piloting Claude for Chrome
  54. The Bubble That Knows It’s a Bubble
  55. The Day I Logged in With a Hash
  56. It’s not wrong that "🤦🏼‍♂️".length == 7
  57. Away from Gmail | etcetera
  58. io_uring, kTLS and Rust for zero syscall HTTPS server
  59. How I built my first side project: Tubee, in 2017
  60. I gave Claude Code a folder of tax documents and used it as a professional tax agent
  61. Frank Chimero · Time is On My Side
  62. BFF in ASP.NET Core #7 - Introducing the Duende BFF Library
  63. Intel Outside: Hacking every Intel employee and various internal websites
  64. RAG-Shot Learning - Joseph Cooper
  65. Streaming Data using OCI Streams and .NET
  66. Setting up RabbitMQ on OCI
  67. How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
  68. A Case for Digital National Parks
  69. I’m sorry, but the solution to Online Safety Act Age-Verification age-gating & censorship blocks is *not* to call on platforms to “ban the UK”; here I shall respectfully explain why…
  70. Reflections on my founder journey
  71. Game Math 101, Writing your Own 2D Math in C++
  72. Building a web search engine from scratch in two months with 3 billion neural embeddings
  73. From GPT-2 to gpt-oss: Analyzing the Architectural Advances
  74. Fight Chat Control - Protect Digital Privacy in the EU
  75. The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
  76. The 5 Most Common API Design Mistakes (and How to Avoid Them)
  77. Linear sent me down a local-first rabbit hole | Bytemash
  78. The Untapped Power of Veteran Engineers: Why Companies Are Overlooking Their Most Valuable Assets – Part 3
  79. Getting Started with Cloudflare Tunnel | David Ma
  80. When to Hire a Computer Performance Engineering Team (2025) part 1 of 2
  81. 😶‍🌫️ Controlling the weather 🌦️ » Firesphere.dev
  82. The hollow universe
  83. The Math Is Haunted — overreacted
  84. Avoid IaaS Lock-In With a SAML Proxy
  85. Popping the AGI Bubble
  86. Linux 6.16 brings faster file systems, improved confidential memory support, and more Rust support
  87. thoughts on “do 100 thing” - Tasshin
  88. LLMs can now identify public figures in images
  89. Don't use external CSS: (Maurycy's blog)
  90. How I hacked my washing machine - Nex's Blog
  91. When We Get Komooted
  92. How Not to Translate a Videogame (2025 ver.)
  93. English Writes Numbers Backwards
  94. The Promised LAN
  95. The Elements of Artificial Intelligence - Brady Gerber
  96. Cops say criminals use a Google Pixel with GrapheneOS — I say that’s freedom
  97. More than you wanted to know about how Game Boy cartridges work
  98. Amazon Ring Cashes in on Techno-Authoritarianism and Mass Surveillance
  99. Death by AI
  100. How I Fixed Ruby's Most Annoying Problem: 60-Second Gem Installs"
  101. My Ultimate Self-hosting Setup
  102. Zugzwang - Building Tomorrow's Software Today
  103. Fully Homomorphic Encryption and the Dawn of A Truly Private Internet
  104. API Auth Is Deeper Than It Looks | Nango Blog
  105. How AI Vibe Coding Is Destroying Junior Developers' Careers
  106. Haven Blog: Age Assurance and Bluesky
  107. What I'm working on – at work and on the side
  108. Zig's New Async I/O
  109. GitHub - MoonshotAI/Kimi-K2: Kimi K2 is the large language model series developed by Moonshot AI team
  110. Why I changed my mind on t-addresses in Zcash
  111. The Case for Secrets as Code: Stop Click-Managing Secrets
  112. One Year With a Framework Laptop 16 and Fedora KDE Plasma Desktop
  113. GitHub - jackjackbits/bitchat: bluetooth mesh chat, IRC vibes
  114. GitHub - BlueFalconHD/apple_generative_model_safety_decrypted: Decrypted Generative Model safety files for Apple Intelligence containing filters
  115. Stop Hiding My Controls: Hidden Interface Controls Are Affecting Usability | IX Magazine Issue XXXII.4 July - August 2025
  116. Predicting Average IMDb Movie Ratings Using Text Embeddings of Movie Metadata
  117. Not being federated and E2E as an advantage | Die wunderbare Welt von Isotopp
  118. Opening up ‘Zero-Knowledge Proof’ technology to promote privacy in age assurance
  119. PyTorch in One Hour: From Tensors to Training Neural Networks on Multiple GPUs
  120. Exploiting the IKKO Activebuds "AI powered" earbuds, running DOOM, stealing their OpenAI API key and customer data.
  121. What is automatable and who is replaceable? Thoughts from my morning commute
  122. I Shipped a macOS App Built Entirely by Claude Code
  123. Writing Code Was Never The Bottleneck
  124. How I Used a Market Basket Analysis to Get a Job Offer - The Heasman
  125. Daniel's Blog · Agent Lineage Evolution: A Novel Framework for Managing LLM Agent Degradation
  126. The Nature of Lisp, Code Generation and Wieldable Programming Power
  127. Getting an LLM to Set Its Own Temperature
  128. Makefile Tutorial by Example
  129. grokking NAT and packet mangling in linux
  130. Setting up a landline phone for kids - Chris Hardie's Tech and Software Blog
  131. zk: The Most Beautiful Form of Privacy
  132. Quitting Comfort: I'm attending Recurse — frankchiarulli.com
  133. matrix is cooked
  134. Start your own Internet Resiliency Club – Bow Shock Systems Consulting
  135. A2A Is For UI
  136. Endometriosis is an incredibly interesting disease
  137. Telegram is indistinguishable from an FSB honeypot
  138. The confluence
  139. The EU Commission refuses to disclose the orchestrators behind its mass surveillance proposal, which would effectively end citizens’ online privacy.
  140. Transform Years of Content Into a Conversational Knowledge Base
  141. The Truth: What It Really Takes to Build an SaaS
  142. Chester: Reimagining LLM Benchmarking Through Programming Language Design | Aditya Bhattacharya | Blogs Website
  143. How to store data on paper?
  144. Beating the kCTF PoW with AVX512IFMA for $51k
  145. GitHub - Olow304/memvid: Video-based AI memory library. Store millions of text chunks in MP4 files with lightning-fast semantic search. No database needed.
  146. Private Money: Part 1
  147. AI: Accelerated Incompetence
  148. Exploring z.sh 🕵️ Part 1 - Storing data
  149. 10X Your AI Code Output: The Context Strategy That Beats Outdated LLM Knowledge.
  150. Why Algebraic Effects?
  151. Just fucking code.
  152. Introducing Claude 4
  153. Why Use Bayesian Methods for A/B Testing | Briefer
  154. Microsoft's ICC blockade: digital dependence comes at a cost
  155. DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
  156. Why We Think
  157. "We would be less confidential than Google" – Proton threatens to quit Switzerland over new surveillance law
  158. Reverse Engineering the Renpho App
  159. RAG’s big blindspot
  160. Gradients are the new intervals
  161. What is work?
  162. Fitting models from noisy heuristic labels - Emir's blog
  163. The Junior Developer Crisis: Why Entry-Level Coders Are Struggling and What’s at Stake
  164. Mycoria
  165. The Pocket Dimension: Motivation Now & Post AGI · Philipp Cannons
  166. Best PDF Editor | Edit, Sign, Merge & Secure
  167. How to live an intellectually rich life
  168. Vibe Coding for Existential Dread and Bankrupcy
  169. Jeeps, Ferraris, and Other Engineers
  170. How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground
  171. Michael Tsai - Blog - Revisiting ZFS for Mac
  172. Knowledge-based society, my ass
  173. How I Got Exploited At My First Startup
  174. Building the Internet of the 2030's
  175. What the heck is AEAD again?
  176. An end to all this prostate trouble?
  177. Your Quick Guide to Learn JWT - Coding Sonata
  178. From Hello World to Hello Customers: Why Programs Aren’t Products
  179. What If We Could Rebuild Kafka From Scratch?
  180. My Billion Dollar Idea (Seedless Torrents) is dead
  181. Lode Coding
  182. This blog is hosted on a Nintendo Wii
  183. The World Is Ending. Welcome to the Spooner Revolution.
  184. Better error handling
  185. Part 6: How OneNote Storage works, in-depth | Daniel Sada Caraveo | Developer Productivity & Culture
  186. Writing an LLM from scratch, part 11 -- batches
  187. In-memory free-text search is a super-power for LLMs | sgnt.ai
  188. What We Mean When We Say “Think”
  189. Love your competitors
  190. Two Years of Rust
  191. LLMs Don’t Reward Originality, They Flatten It
  192. Implementing AES Encryption in .NET - EXPLAINED
  193. Hallucinations in LLMs: A Side Effect of Being Trained to Be Right?
  194. So, I Wrote a Book
  195. My day in 2035
  196. Cyc – Yuxi on the Wired
  197. The YAML Engineer
  198. This website is available without encryption, and yours should be too
  199. Gmail E2E is as terrible as expected
  200. Why I'm Building a Climbing App (and Why Knowing Your Community Actually Matters)
  201. The Golden Age of Modularity
  202. Garmin Connect+ and the Beginning of the End
  203. Stop syncing everything
  204. Building a search engine from scratch, in Rust: introduction
  205. Ente Photos v1
  206. I'm an American software developer and the "broligarchs" don't speak for me
  207. Don't Walk with Rocks in Your Shoes
  208. OTP in Your Password Manager Is Not 2FA
  209. Post Apocalyptic Computing
  210. Breaking and Fixing Content-Defined Chunking
  211. Improving Recommendation Systems & Search in the Age of LLMs
  212. Don’t use Telegram, but if you have to, at least use Partisan Telegram
  213. "Vibe Coding" vs Reality
  214. I made an app for competitive hot air balloon pilots
  215. A Win for Encryption: France Rejects Backdoor Mandate
  216. Vibe Coding is a Dangerous Fantasy
  217. Does unsafe undermine Rust's guarantees?
  218. Comptime Zig ORM
  219. Redundancy
  220. .NET 10 Preview 2 is now available! - .NET Blog
  221. Michael Tsai - Blog - Rotten
  222. AI on Windows: Detecting NPU - Nick's .NET Travels
  223. Rotten for a while now
  224. Model Merging
  225. Browse No More
  226. Timothy J. Baek - my true purpose
  227. Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data Leak
  228. 📗 On Testing Hypotheses Instead of Setting Goals
  229. Engineering reasoning LLMs: Notes and Observations
  230. Truth Functional Logic for Hackers - Part One
  231. Kratix for Database Management: A Step-by-Step Guide to Amazon RDS Deployment
  232. How Language Models Understand Nullability
  233. The ESP32 "backdoor" that wasn't | Dark Mentor LLC
  234. Everything You Think You Know About DeltaChat Is Wrong – Makefile.feld
  235. GitHub - vxfemboy/purrcrypt: A fur-ociously secure encryption tool that encodes your secrets as adorable cat and dog sounds, using real elliptic curve cryptography with a playful disguise.
  236. Synchronising files across machines – The Dan MacKinlay stable of variably-well-consider’d enterprises
  237. Why Local-First Software Is the Future and its Limitations | RxDB - JavaScript Database
  238. Differentiable Logic Cellular Automata: From Game of Life to pattern generation with learned recurrent circuits
  239. Age and cognitive skills: Use it or lose it
  240. Terraform Power-Ups: The Best Tools to Supercharge Your IaC Workflow - Chris Woody Woodruff
  241. Apple takes UK to court over 'backdoor' order
  242. ARC-AGI Without Pretraining
  243. Use Firefox in 2025
  244. Prosthetics that don't betray
  245. LLMs, Game Theory, and Market Dynamics
  246. Introduction to Dapr for .NET Developers
  247. Coffee and Open Source Conversation - Key Jefferys
  248. The Raster Tragedy in Skia
  249. Benchoff Design Portfolio
  250. App over file
  251. There Isn’t Much Point to HTTP/2 Past The Load Balancer
  252. Lock It Down: Security Ideas for Terraform Deployments - Chris Woody Woodruff
  253. How I Saved $1,900 by Ditching Kajabi and Building My Own Learning Platform on Replit
  254. How the UK is Weakening Safety Worldwide
  255. A Minimal Hash-Based Symmetric Encryption Protocol
  256. The Infinite Game Meets Azure Security with Bojan Magušić
  257. Magma: A Foundation Model for Multimodal AI Agents
  258. Is Hallucination a Vehicle for Creativity?
  259. Nuclear fusion: WEST beats the world record for plasma duration!
  260. XOR
  261. Direnv - and reinventing the wheel with envloader
  262. The State of Terraform: Keeping Your Cloud Empire in Check - Chris Woody Woodruff
  263. The 20 year old PSP can now connect to WPA2 Wifi Networks - Wololo.net
  264. League of Legends data scraping the hard and tedious way for fun
  265. Par Part 2: Linear Logic
  266. GitHub - Grubre/smol-gpu: An rv32i inspired ISA, SIMT GPU implementation in system-verilog.
  267. In 1920s Quantum Physics, True Particles Do Not Exist
  268. Linear Relationships in the Transformer’s Positional Encoding
  269. Static analysis of the DeepSeek Android App
  270. Understanding Reasoning LLMs
  271. The future belongs to idea guys who can just do things
  272. Understanding Reasoning LLMs
  273. Infosec 101 for Activists
  274. Optimizing with Novel Calendrical Algorithms
  275. Are reasoning benchmarks today actually reliable? Introducing the JustLogic benchmark
  276. There is still plenty of low-hanging fruit in science
  277. Best Simple System for Now
  278. ryanbuening.com | Bits of Wisdom
  279. Avoid ISP routers - RouterSecurity.org
  280. What is SwiGLU?
  281. Falsehoods programmers believe about null pointers
  282. The First Ten Years
  283. The GenAI Product Manager
  284. Lessons on Creative Work | Daniel Saewitz
  285. Antiqua et nova. Note on the Relationship Between Artificial Intelligence and Human Intelligence (28 January 2025)
  286. A few words about indie app business – Charlie Monroe
  287. How To Avoid Malware Rabbitholes
  288. Eric Chiang | Confidential Compute and GPUs
  289. 17-445 Machine Learning in Production
  290. The Illustrated DeepSeek-R1
  291. How we built Ellipsis (or: Lessons from 27 months building LLM coding agents) - Ellipsis.dev | Automated code reviews
  292. The Protesters' Guide to Smartphone Security
  293. But But, You Were Supposed to Be a GPT Wrapper?!
  294. Implementing AES Encryption With C#
  295. TechThreads · Secrets Management w/ Firebase App Hosting and NextJS
  296. next.js: an honest review
  297. The Closed Web
  298. Paul Romer
  299. Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
  300. Reverse Engineering Call Of Duty Anti-Cheat
  301. Testing a handful of sensors for your next DIY project
  302. Investigating an "evil" RJ45 dongle
  303. Private Keys in the Fortigate Leak
  304. UofTCTF 2025: An AES Timing Side-Channel
  305. The documentation problem in development
  306. structured decoding, a guide for the impatient
  307. Beating cuBLAS in Single-Precision General Matrix Multiplication
  308. End-to-end encrypted email is bad for you
  309. Tracking and Personalizing Connections – Chris Woody Woodruff
  310. Don't use cosine similarity carelessly - Piotr Migdał
  311. The 2025 AI Engineering Reading List
  312. How I Use LLMs for Coding and Writing
  313. Password Cracking 101: From DES to ZIP
  314. How outdated information hides in LLM token generation probabilities and creates logical inconsistencies
  315. Deniable Knowledge
  316. Creating a simple free website in 2025
  317. Zero to One Hundred Thousand Tests
  318. Üllar Maasik - Learning Laravel by building a postal code finder
  319. What Makes a Good Automated Test?
  320. Efficiently factoring RSA modulus from public private keys
  321. Beyond the Random Class: Cryptographic Randomness in .NET 6+
  322. Why is Open Source important? And is it free?
  323. What LLMs mean for EBITDA margins | Notes
  324. Do it in jeans first
  325. How Websockets are Scaled
  326. How we speed up filtered vector search with ACORN | Weaviate
  327. There's no good reason for signing webhooks
  328. Programming a GPU on bare metal
  329. Generative AI is not going to build your engineering team for you - Stack Overflow
  330. mjg59 | The GPU, not the TPM, is the root of hardware DRM
  331. Blockchain-as-a-Backend
  332. The Backstory of Backpropagation – Yuxi on the Wired
  333. What changed in Rails this year?
  334. Jonot's Blog
  335. Intro
  336. Getting gpt-4o-mini to perform like gpt-4o
  337. Passkey technology is elegant, but it’s most definitely not usable security
  338. Improving RAG Pipelines with Hybrid Search
  339. Apple Photos phones home on iOS 18 and macOS 15
  340. MonKafka: Building a Kafka Broker from Scratch with Zero Dependencies (So Far)
  341. Notes on China
  342. Write your Own Virtual Machine
  343. GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
  344. String Matching. Beginning
  345. Tech Trends 2025 - scapellato.dev
  346. Dec 22: Why we use our own hardware at Fastmail
  347. Finally, a Replacement for BERT: Introducing ModernBERT
  348. How types make hard problems easy
  349. Failing Randomly: Linux Seccomp and Kernel Hacking
  350. No, You can’t bet on everything (and that’s okay)
  351. Breaking into Vision
  352. Parallel vector graphics rasterization on CPU.
  353. GitHub - markmoxon/elite-source-code-commodore-64: Fully documented and annotated source code for Elite on the Commodore 64
  354. Bluesky and Decentralization -- Dustycloud Brainstorms
  355. Terraform Rules of Thumb
  356. VC will be the best way finance learning
  357. Sharing new research, models, and datasets from Meta FAIR
  358. Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag | Evan Pratten
  359. All Your Codebase
  360. Google Announces Quantum Chip - Willow
  361. Zero to CMake | Fred's Blog
  362. Intel on the Brink of Death | Culture Rot, Product Focus Flawed, Foundry Must Survive
  363. Becoming (more) Afraid To Post Online
  364. nrdlg | From Nix to Eos
  365. Librebooting the ThinkPad T480
  366. Strategy is Not War; It’s Gardening
  367. Lies I was Told About Collaborative Editing, Part 1: Algorithms for offline editing / Moment devlog
  368. meta-llama/Llama-3.3-70B-Instruct · Hugging Face
  369. How I Built the World's Largest Database of LEGO Minifigure Ratings
  370. Teaching Elderly People to Use Android - Lessons Learned
  371. Procedural Knowledge in Pretraining Drives LLM Reasoning
  372. GitHub - privastead/privastead
  373. Weaponizing SSO for profit - Raz Blog
  374. A Vanity VNC server (or Joke over RFB) - ache
  375. 100 Bushels of Corn, Revisited – R Works
  376. Solving LeetCode™ problems with Racket
  377. How decentralized is Bluesky really? -- Dustycloud Brainstorms
  378. How to Build a Chess Engine and Fail
  379. Reverse Engineering iOS 18 Inactivity Reboot
  380. fleetwood.dev
  381. What To Use Instead of PGP - Dhole Moments
  382. The fallacies of distributed systems
  383. ‘Reflections on Trusting Trust’, but completely by accident this time
  384. Why I Quit Google to Work for Myself
  385. Escape the Surveillance Web with Gemini
  386. What I learned from 130 hours in a Waymo
  387. Traceroute Isn't Real
  388. Former Bayesian captain offers insight
  389. Our First Generalist Policy
  390. House of Nettles • A Non-Technical Intro to Webmentions
  391. Authenticating People With Certificate Chains
  392. Matrix 2.0 Is Here!
  393. delroth's homepage - One weird trick to get the whole planet to send abuse complaints to your best friend(s)
  394. llama-recipes/recipes/quickstart/NotebookLlama at main · meta-llama/llama-recipes
  395. Managing Secrets in NixOS Home Manager with SOPS
  396. Challenges deploying PostgreSQL (9.2) for high availability · Dave Pacheco's Blog
  397. OpenZFS deduplication is good now and you shouldn't use it
  398. Vulnerabilities of Realtek SD card reader driver, part 1
  399. A decade of WiFi
  400. Betting on Bali: My Journey Into the Offshoring Business
  401. I got dysentery so you don’t have to
  402. Clone your building key fob
  403. Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
  404. BearerToken: The new Authentication handler in ASP.NET Core 8
  405. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
  406. Improving ASP.NET Core Security By Putting Your Cookies On A Diet
  407. Exploring what is inside the ASP.NET Core cookies
  408. Improving ASP.NET Core Security By Putting Your Cookies On A Diet
  409. Exploring what is inside the ASP.NET Core cookies
  410. Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
  411. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
  412. BearerToken: The new Authentication handler in ASP.NET Core 8
  413. HTML Whitespace is Broken - Devel without a Cause
  414. The Stallman report
  415. Turn your old laptop into low-end gaming machine
  416. UDP, A Disclaimer, And QUIC
  417. Large language models reduce public knowledge sharing on online Q&A platforms
  418. Every bug/quirk of the Windows resource compiler (rc.exe), probably
  419. Taste and Tradeoffs
  420. Seven for a secret never to be told
  421. Can You Get Root With Only a Cigarette Lighter?
  422. Beware UserDefaults: a tale of hard to find bugs, and lost data
  423. Getting my daily news from a dot matrix printer
  424. Why I Prefer Errors to Exceptions
  425. Reverse Engineering and Dismantling Kekz Headphones
  426. Why laptop support, why now: FreeBSD’s strategic move toward broader adoption | FreeBSD Foundation
  427. Evaluating the Effectiveness of LLM-Evaluators (aka LLM-as-Judge)
  428. How Mobile Networks Work
  429. A friendly introduction to assembly for high-level programmers — Conditionals
  430. “Bad Romance”: How Kaspersky Lab Failed to Conquer the Western Cybersecurity Market
  431. Digital signatures and how to avoid them
  432. Using YouTube to steal your files
  433. Warning: macOS Sequoia 15 may bypass DNS encryption
  434. macOS Sequoia is available today
  435. Solene'% : I moved my emails to Proton Mail
  436. Notes on OpenAI’s new o1 chain-of-thought models
  437. Arrays of Wisdom of the Ancients
  438. The Integration of Hardware, Software and Services
  439. Making a game for my friend's retro console — Nick Girardo
  440. Kafka protocol practical guide - Ivan Yurchenko
  441. Managing dotfiles with chezmoi | Daniel Stoddart
  442. Keyhole | MAS
  443. By request from the jobs thread: why my job is to watch dreams die.
  444. Effective Spaced Repetition
  445. Programming ZKPs: From Zero to Hero
  446. To Nerves from Elixir
  447. We've Been Lied To About Work
  448. Exploring inner workings of a random free android VPN
  449. How I’d Set Up My Tech If I Were Tate: Ensuring the Police Have Zero Evidence
  450. Danny O'Brien's Oblomovka » Blog Archive
  451. Why should anyone boot you up?
  452. Why Solid?
  453. Emulating the early Macintosh floppy drive
  454. Is Telegram really an encrypted messaging app?
  455. "What is marketing all about?" - Thoughts on marketing from a developer and rookie marketer
  456. Continuous reinvention: A brief history of block storage at AWS
  457. An unordered list of hidden gems inside NixOS — kokada
  458. Running an LLM on a simple Raspberry Pi
  459. .:: Phrack Magazine ::.
  460. Cache Grab: How Much Are You Leaving on the Table? – CSS Wizardry
  461. VHS to Digital
  462. An underrated software engineering interview question – Jake Zimmerman
  463. That's the Sound of Devs Working on the Chain Gang
  464. Why I am stuck using Dropbox?
  465. Vector Stores Are Dumb - Tim Kellogg
  466. Hacking a VoIP Phone
  467. CrowdStrike: Risk assessment is better off at the sharp end
  468. Dual-Boot NetBSD And Archlinux
  469. Tony Hawk's Pro Strcpy
  470. 1fps.video - Hassle-free Screen Sharing
  471. LLM-centric Software Paradigms
  472. A primer on how End-to-End Encryption IS NOT PREVENTING policing, arrest, or conviction of the rioters in the UK race riots (HT @shashj @DmitryOpines @AntiRacismDay @arusbridger)
  473. Linux backup workflow for hackers with restic, rclone, Backblaze B2
  474. Create your own DIY Password Manager with Vim and Syncthing
  475. You Can't Spell WebRTC without RCE - Part 1
  476. Against XMPP+OMEMO - Dhole Moments
  477. Netninja.com
  478. Advice to Young Engineers - Robotic Sea Bass
  479. 2024-07-31 just disconnect the internet
  480. On software as an "in-discipline"
  481. Why are open source nonprofits so weird?
  482. Windows resiliency: Best practices and the path forward
  483. Why can't I stop eating?
  484. The New Internet
  485. LiteCluster: Replicated, leaderless, ACID compliant & high availability SQLite
  486. Quantifying Prospective Jobs
  487. Panic! at the Tech Job Market
  488. Software is more like a garden
  489. ComplexType vs JSON Columns: Choosing the Right Data Storage Approach
  490. Samsung Galaxy NX: a decade's review
  491. Not so Secret: Analysis of KakaoTalk's Secret Chat E2EE Feature
  492. Pretty pictures, bootable floppy disks, and the first Canon Cat demo?
  493. The Tragedies of Reality Are Coming for You
  494. Using aerc-mail with Outlook
  495. Announcing SSMS 20.2 ... and getting feedback for SSMS 21
  496. gRPC Over HTTP/3
  497. Extrinsic Hallucinations in LLMs
  498. How LLMs Learn: What We Know, What We Don't (Yet) Know, and What Comes Next
  499. 17 vulnerabilities in Sharp Multi-Function Printers
  500. I Have No Constructor, and I Must Initialize
  501. Proton launches its own version of Google Docs
  502. Binary Classification Using LightGBM -- Visual Studio Magazine
  503. Amateur Mathematicians Find Fifth ‘Busy Beaver’ Turing Machine | Quanta Magazine
  504. Ladybird
  505. Creating hashes in .NET
  506. Ladybird
  507. Automating my gate door
  508. Do a firmware update for your AirPods – now – Jonas’ Blog
  509. Mako - Mako is Now Open Source
  510. Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
  511. A Eulogy for DevOps
  512. Rabbit hole full of hardcoded credentials by Mārtiņš Irbe
  513. Skip and Kotlin Multiplatform
  514. On Claude 3.5 Sonnet
  515. Y292B bug
  516. Training a 70B model from scratch: open-source tools, evaluation datasets, and learnings
  517. Cognitive Architectures for Business Decision Making in Supply Chain Management
  518. Why I attack
  519. Profiling with Ctrl-C
  520. How I Organize My Work As a Solo Founder
  521. Why strand.spreen.co is Now Offline
  522. How to Build a Fullstack Webapp with F#
  523. How my weekend project turned into a 3 years journey
  524. Inside the tiny chip that powers Montreal subway tickets
  525. quackland.kr
  526. Exploring How Cache Memory Really Works
  527. EU Council has withdrawn the vote on Chat Control
  528. Why and how to run your own FreeBSD package cache.
  529. Chat Control: The EU's CSEM scanner proposal
  530. What is HSTS and why is it in my ASP.NET Core app?
  531. Chat Control Must Be Stopped – Now!
  532. Chat control: incompatible with fundamental rights
  533. GitHub - nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
  534. Update on the Recall preview feature for Copilot+ PCs
  535. Land value tax in online games and virtual worlds: A how-to guide
  536. My experience crafting an interpreter with Rust
  537. cr.yp.to: 2024.06.12: Bibliography keys
  538. How To Encrypt ASP.NET Core Route Parameters
  539. Solene'% : OpenBSD extreme privacy setup
  540. Blog - Private Cloud Compute: A new frontier for AI privacy in the cloud - Apple Security Research
  541. From Chaos to Clarity: My Journey with Obsidian
  542. The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
  543. So You Want To Build A Browser Engine
  544. 12 years of the com.lihaoyi Scala Platform
  545. 0.13.0 Release Notes ⚡ The Zig Programming Language
  546. When I Realized I Was Not That Guy
  547. What is PID 0? · blog.dave.tf
  548. Towards Federated Key Transparency - Dhole Moments
  549. A Picture is Worth 170 Tokens: How Does GPT-4o Encode Images? - OranLooney.com
  550. Bouncy Castle Cryptography Library for .NET - Code Maze
  551. From Scratch - Generative Adversarial Networks
  552. Blazor in .NET 9 Takes Shape (Preview 4 Highlights)
  553. Encryption At Rest: Whose Threat Model Is It Anyway?
  554. Attacking NIST SP 800-108
  555. Even more Opentelemetry!
  556. Rationalizing Latency Competition in High-Frequency Trading – Headlands Technologies LLC Blog
  557. Encryption At Rest: Whose Threat Model Is It Anyway?
  558. Setting up a local reverse proxy on Proxmox with Traefik and Cloudflare
  559. Majority for chat control possible – Users who refuse scanning to be prevented from sharing photos and links
  560. Lizzy Banks. This story must be heard.
  561. Make Chrome go brrrrrr....
  562. htmx: Simplicity in an Age of Complicated Solutions
  563. Moving Beyond Type Systems | Vhyrro's Digital Garden
  564. Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
  565. What We've Learned From A Year of Building with LLMs
  566. Things you wish you didn't need to know about S3
  567. Building a serverless secured dead drop
  568. Startup Risk
  569. Opinion: Ottawa wants the power to create secret backdoors in our networks to allow for surveillance
  570. re: Secure Drop protocol
  571. Web App Security—Broken Authentication vs Session Management
  572. Demystifying Golang Slices
  573. Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs
  574. Understanding Coupling in Software Development
  575. Windows Recall sounds like a privacy nightmare – here's why I'm worried
  576. Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
  577. The Decorator Pattern in Modern C# [2024]
  578. Designing a Scalable OCPP server - Siddharth Sabron
  579. The WAF Swiss-Knife – Pomba Labs
  580. Thinking out loud about 2nd-gen Email – Gabriel Sieben
  581. Stuff I know about ZIP | orchid.pink
  582. New in .NET 8: ASP.NET Core Identity and How to Implement It
  583. 100 Exercises To Learn Rust
  584. BashFu - Open X11 window with netcat, echo, pipes and file system
  585. Localizing a .NET console or desktop application
  586. Wolverine’s HTTP Model Does More For You
  587. PeaZip free archiver utility, open extract RAR TAR ZIP files
  588. Dancing on the Shoulders of Giants
  589. using golang's crypto/aes and crypto/cipher packages
  590. Disaster recovery with ZFS and zrepl
  591. Proton Mail Discloses User Data Leading to Arrest in Spain
  592. CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
  593. Deniable Encryption
  594. Conservative codomain conjecture
  595. Using age with org-journal
  596. Hallucination-Free RAG: Making LLMs Safe for Healthcare
  597. My Home Server Journey - From Raspberry Pi to Ryzen
  598. No, I don’t want to fill out your contact form
  599. Deniable Encryption
  600. Woodworking as an escape from the absurdity of software
  601. Multi-Class Classification Using LightGBM -- Visual Studio Magazine
  602. Online Cryptography Course by Dan Boneh
  603. The Disappearance of Lived Time
  604. Direct Preference Optimization Explained In-depth
  605. 1000x the telemetry at 0.01x the cost
  606. the Stabilizer Problem
  607. The Simplest Thing In The World: Modifing Keymaps in Wayland
  608. Harry Chapin and RATM: the problem with bleeding interests
  609. Anneal autopsy
  610. C isn’t a Hangover; Rust isn’t a Hangover Cure
  611. open letter to the NixOS foundation
  612. Id30 – magnushoff.com
  613. Why you shouldn't run a BSD on a PC
  614. Why Everything is Becoming a Game
  615. 10x Engineers vs -10x Burdens
  616. GoFetch: Will people ever learn?
  617. How do electronic passports work? | Burak Can's Blog
  618. Basic Things Mar 22, 2024
  619. Diffusion Models for Video Generation
  620. I launched a new startup and shut it down in two weeks - Andrew Miracle
  621. Big Integer in Zig
  622. #ChatControl: EU ministers want to exempt themselves
  623. Is Attention All You Need?
  624. PuTTY vulnerability vuln-p521-bias
  625. The Making of Side 7 | GUNDAM EVOLUTION Private Server Project
  626. Building a GPS Receiver, Part 1: Hearing Whispers
  627. Responses to Rabble on ActivityPub
  628. My useless philosophical ramblings about the ecology of programming languages (and OOP is not Java)
  629. Kaspersky analysis of the backdoor in XZ
  630. Common pitfalls of digital health startups & advice on how to avoid them
  631. Our Response to Hashicorp's Cease and Desist Letter | OpenTofu
  632. Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
  633. Extracting curve coordinates from a bitmap
  634. Habitually - I’ve Been Tracking Everything in My Life for A Year
  635. How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
  636. What it’s like to run HTMX in Production
  637. Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
  638. smeso - MIPS stacktrace: an unexpected journey
  639. How to securely reverse-proxy ASP.NET Core web apps
  640. 'If this one guy got hit by a bus, the world's software would fall apart.'
  641. Generative transformer from first principles in Julia - Lior Sinai
  642. OpenBSD 7.5
  643. LLM Task-Specific Evals that Do & Don't Work
  644. Performance insights: Engineering for high performance
  645. XZ Backdoor: Not the End of Open Source
  646. What we know about the xz Utils backdoor that almost infected the world
  647. LLaMA Now Goes Faster on CPUs
  648. Refurb weekend: Data General/One (and the worst LCD in the world)
  649. Mental Health in Software Engineering
  650. Filippo Valsorda (@filippo.abyssdomain.expert)
  651. Solving the “Are You a Millionaire?” Problem with ZK certificates
  652. Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
  653. Malicious email .ics attachments
  654. Sealed: Custom Wax Seal NFC Tags
  655. My 12 Favorite Problems
  656. Roll your own ZFS NAS
  657. Knee Deep in tree-sitter Queries
  658. A better jittering approach for discretization acknowledgment in density estimation
  659. The Linux Desktop Is Finally Great (both Ubuntu and Firefox)
  660. IP Geolocation Is Twenty-Five Years Old
  661. How I Built a Bootstrapped Consulting Company: From Zero To 60k€ Revenue
  662. All the fallacies in the world
  663. Functional foundations ⚙️
  664. Securing WebSocket Channels in Local Development: A Guide with Soketi and Laravel Valet - AhmadYousefDev
  665. Conversational Spaced Repetition | David Bieber
  666. Building For Builders - deven.codes
  667. Cloning a laptop over NVME TCP
  668. Plugin Architecture in C# for Improved Software Design
  669. C and C++ Prioritize Performance over Correctness
  670. ZK Taipei #5: ZK Day · Luma
  671. S06E12 - nanoFramework: Unleashing the Power of C# in Embedded Systems and IoT with José Simões
  672. Make your own E-Mail server - FreeBSD, OpenSMTPD, Rspamd and Dovecot included - Part 1
  673. Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
  674. The Pile
  675. Parallel Zero-knowledge Virtual Machine
  676. Azure Cosmos DB — Getting Started and Creating a NoSQL Database
  677. An Overview Of Quantum Computing's Possible Impact On Cryptography
  678. The Case Against Geometric Algebra
  679. Ente - Private cloud for your photos, videos and more
  680. List of 2024 Leap Day Bugs
  681. CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
  682. GitHub - microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
  683. How law firms and corporations are dealing with USPTO’s non-DOCX penalty
  684. Why I use Firefox
  685. Nintendo is suing the creators of Switch emulator Yuzu
  686. Gemini server for 0ut3r.space
  687. Writing is hard, so I got help
  688. The Effect Existence, Its Magnitude, and the Goals
  689. GitHub - zksecurity/zkBank: zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!
  690. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault – Tore Nestenius
  691. ARCHITECTURE.md
  692. ESP32 based voice assistant with wake word – Tristam
  693. OK-Robot: What Really Matters in Integrating Open-Knowledge Models for Robotics
  694. After 14 years in the industry, I still find programming difficult
  695. The Billion Row Challenge (1BRC) - Step-by-step from 71s to 1.7s
  696. ZK Mini Summit · Luma
  697. What is Scrum and is Scrum good for startups? — todo.space blog
  698. Large Language Models Are Drunk at the Wheel
  699. Atuin - Magical Shell History
  700. Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
  701. Open Source: Current State and Future Hopes
  702. Using Azure Key Vault for signing and encrypting JSON Web Tokens
  703. Introducing Safecat
  704. How Google is killing independent sites like ours - HouseFresh
  705. Diseconomies of scale in fraud, spam, support, and moderation
  706. Share a private key without using passwords
  707. Plus and Times Set Free
  708. AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
  709. Tech Support Stories Part 2
  710. How I did the layout for my self-published book
  711. Climbing out of the rabbit hole
  712. E2EE on the web: is the web really that bad?
  713. varoa.net | Galo Navarro
  714. A love letter to the Internet
  715. Synthetic Data for Finetuning: Distillation and Self-Improvement
  716. Secure Yo Self
  717. European Court of Human Rights bans weakening of secure end-to-endencryption - the end of EU‘s chat control CSAR mass surveillance plans?
  718. Engineering Practices for LLM Application Development
  719. I worry our Copilot is leaving some passengers behind
  720. Sign and Verify Messages with HMAC Using the Web Crypto API
  721. Lunar reflections during SLIM landing – Daniel Estévez
  722. Episode 485 - Copilot for Azure
  723. Ransomware Hit $1 Billion in 2023
  724. 'Prompt Engineering' Jokes Abound when GitHub Asks Devs for Tips -- Visual Studio Magazine
  725. How to Get the Number of Files in a Folder With C# - Code Maze
  726. .NET Rocks! gRPC Update with Irina Scurtu
  727. How to Use Dapper in Your .NET Projects
  728. From Zero to .NET MAUI: Seeking One Codebase to Run Everywhere -- Visual Studio Magazine
  729. Reverse engineering Skylanders' Toys-to-life mechanics
  730. The Noise Protocol Framework
  731. (Mis)estimation – why estimation does not work
  732. Introducing Citrea: Bitcoin’s First ZK Rollup
  733. Finding New Mountains to Climb
  734. Tools and Best Practices for Secret Management in .NET - Code Maze
  735. Hacking a Smart Home Device
  736. Remaking the app store — Benedict Evans
  737. Issue 46: Is Being Well Read Actually a Thing? Pt III: The Well-Read Archetypes
  738. A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
  739. Infrastructure: From Zero to Enterprise
  740. Reverse-engineering the Synacor Challenge
  741. Embracing Functional Programming in C#
  742. Your Security Program Is Shit
  743. The end of my childhood
  744. The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
  745. I think Notion Calendar is brilliant. Not the features, though. - Tuấn Mon
  746. Snowpipe Streaming Deep Dive
  747. Self-hosted media center
  748. Playing with Nom and parser combinators
  749. Error categories and category errors
  750. Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
  751. Crypto is not cryptocurrency
  752. Unleashing the Cloud: A Historical Odyssey of Cloud Storage
  753. Rclone syncs your files to cloud storage
  754. What I Learned from Indie Consulting - jxnl.co
  755. Ruby on Rails load testing habits
  756. zkBitcoin: Zero-Knowledge Applications for Bitcoin
  757. GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  758. 2023 letter | Dan Wang
  759. Corax, Lucene, Benchmarks and lies!
  760. The ZK update conflict issue in multi-user applications
  761. Zero-knowledge proofs in stateful applications
  762. Public Key Encryption with the JavaScript Web Crypto API
  763. Being Intentional in 2024
  764. zero-knowledge proof apps on Bitcoin
  765. Improving ASP.NET Core Security By Putting Your Cookies On A Diet – Tore Nestenius
  766. Learn to code. Or don’t.
  767. There is still cool stuff on the internet
  768. Ceph: A Journey to 1 TiB/s - Ceph
  769. GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  770. Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
  771. RSA is deceptively simple (and fun)
  772. OpenAI drops ban on military tools to partner with the Pentagon | Semafor
  773. Postgres password encryption without leaking credentials
  774. NixOS on Hetzner Dedicated - mhu.dev
  775. Exploring .NET frozen segments
  776. asmBB Forum "What is AsmBB?"
  777. The Slow Frontier of Genetic Choice
  778. What's out there for ECDSA threshold signatures
  779. </> htmx ~ Is htmx Just Another JavaScript Framework?
  780. The ZK update conflict issue in multi-user applications
  781. JSON Web Tokens are actually great, just not for sessions
  782. Outlook is Microsoft’s new data collection service | Proton
  783. Binius: a Hardware-Optimized SNARK
  784. Language Modeling Reading List (to Start Your Paper Club)
  785. Gmail And Yahoo Inbox Updates & What They Mean For Senders | Mailgun
  786. Released: Security updates for Microsoft.Data.SqlClient and System.Data.SqlClient
  787. Tokenization, or How I Learned to Stop Worrying and Love the Vault
  788. What Is Linux Mobile
  789. Nino
  790. 1BRC in .NET · gunnarmorling/1brc · Discussion #44
  791. Questionable Advice: “My boss says we don’t need any engineering managers. Is he right?”
  792. Artificial Knowledge Creation
  793. RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
  794. Hacking a CTF: Do not use ECB mode for encryption
  795. How to Speak the Language of the Internet: A Introduction to the Most Common Network Protocols
  796. Major performance (I/O?) issue in /mnt/* and in ~ (home) · Issue #873 · microsoft/WSL
  797. Mozilla CEO wants business to pick up the pace
  798. Trustlessness and the left
  799. Aleo completes security audits of snarkOS & snarkVM
  800. How to Format a String as Base64 in CSharp – Beginner’s Guide
  801. Compiling Success: My Aspirations for a Transformative Year Ahead - Chris Woodruff's Blog
  802. How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT
  803. The Art of HPC
  804. Linux Boomers
  805. What if I paid for all my free software?
  806. EP 38 : How to use Guard Clauses in C#
  807. "Attention", "Transformers", in Neural Network "Large Language Models"
  808. Update in Thrussh: the SSH Terrapin attack
  809. Don’t Believe Your Eyes - A WhatsApp Clickjacking Vulnerability
  810. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  811. Beeper - Moving Forward
  812. Announcing the Aleo Foundation
  813. New capabilities help simplify and streamline the experience with Microsoft Dev Box
  814. Empirically sup code review best practices
  815. Steering at the Frontier: Extending the Power of Prompting - Microsoft Research
  816. ZFS Profiling on Arch Linux | Bin Wang
  817. Announcing the first Arecibo release
  818. How to Get an Access Token from HttpContext in ASP.NET Core
  819. Kubernetes v1.29: Mandala
  820. Adopting Rust: the missing playbook for managers and CTOs - Mainmatter
  821. Architecting Observability in a Cloud-Native World With eBPF
  822. Demystifying OpenID Connect’s State and Nonce Parameters in ASP.NET Core – Tore Nestenius
  823. Good Docs Take Great Effort
  824. GNU ASCII armor: send encrypted data in plain text
  825. Beeper Mini Is Back
  826. RFC 9330: Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture
  827. 6 lessons from building 6 projects, while nomading for 6 months - Dmitry Kudryavtsev
  828. zkLogin | Sui Documentation
  829. GitHub - openbao/openbao at development
  830. Why Team Leaders Give Up
  831. 💸 Sending a file in 2017 | Zack Scholl
  832. iMessage, explained
  833. Beeper Mini - iMessage on Android
  834. bips/bip-0341.mediawiki at master · bitcoin/bips
  835. I Hacked Magic the Gathering: Arena for a 100% Winrate
  836. Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
  837. I Started With Nix, NixOS, Home Manager and Flakes
  838. Monocypher 4: The Clean Break
  839. Remote collaboration fuses fewer breakthrough ideas? Probably not.
  840. EP rejects mass scanning of private messages - European Digital Rights (EDRi)
  841. Y Combinator's Future in the Software Slowdown
  842. I got top 20 on my first product hunt launch by doing a homework assignment
  843. How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
  844. Restic Backups on Backblaze B2 with NixOS
  845. Exploring Generative AI
  846. My Personal Data Backup Pipeline – Justin Paulin
  847. Matrix vs. XMPP | Luke's Webpage
  848. My techno-optimism
  849. Demystifying Web Push Notifications
  850. Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
  851. Communication Ministry studying report of IndiHome data leak - ANTARA News
  852. Discover the Magic of .NET 8 and Beyond!
  853. Docker Security Principles Overview - Simple Talk
  854. Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
  855. Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
  856. “Shift left”—wtf does it mean?
  857. Sqids (formerly Hashids) · Generate Short IDs from Numbers
  858. The Bond villain compliance strategy
  859. All that Infocom interpreter code
  860. Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
  861. How STARKs work if you don't care about FRI
  862. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  863. Things Programmers Can Do in One Week | Blog | build-your-own.org
  864. What Is Refactoring And Understanding Why You Need It
  865. Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
  866. Back up your Bitwarden vault in a future-proof and secure way
  867. Exploring macOS private frameworks
  868. Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
  869. Things Programmers Can Do in One Week | Blog | build-your-own.org
  870. ConcurrentStack in C# - Code Maze
  871. Cryptographers Solve Decades-Old Privacy Problem
  872. Sunbird Security Isn’t Nothing
  873. Sunbird / ‘Nothing Chats’ is Not Secure.
  874. All of the writing I did in a week as a software engineer
  875. Every software is messy and has skeletons
  876. Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
  877. Mainframe and midrange modernization - Azure Logic Apps
  878. Built a bunch of apps, here's what I learned
  879. Privacy is Priceless, but Signal is Expensive
  880. Fiat-Shamir security of FRI and related SNARKs — Part 1
  881. The OSI Model Revisited
  882. Making a nice API of Amtrak's ugly API
  883. Data-as-a-Product: the keystone of the data-mesh
  884. Is the Reversal Curse Real?
  885. CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
  886. Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
  887. Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
  888. Read the docs like a book - Aaron Francis
  889. Building an occupancy sensor with an ESP32 and a serverless DB
  890. OpenAI Platform
  891. Data Oriented Blogging
  892. An important step towards secure and interoperable messaging
  893. Blockchains and the Future of AI
  894. Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
  895. Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
  896. A clarification on the multithreading constraints of the Encrypt­Message function - The Old New Thing
  897. Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
  898. Article 45 Will Roll Back Web Security by 12 Years
  899. Seeing like a Bank
  900. Live Coding a containerized web app for event management
  901. Social Networking
  902. GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
  903. Why I Ran Away from Philosophy Because of Sam Bankman-Fried
  904. Getting our focus back
  905. Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
  906. Mechanistic interpretability of LLM analogy-making
  907. Giopler | Easy C++ Profile Debug Trace
  908. Why I Am a Pluralist
  909. How To Rob a Bank
  910. General Knowledge Poker — Drawn In Perspective
  911. An Open Letter to Cryptographers: Please Work Together
  912. .NET 8 Top 10 New Features - NDepend Blog
  913. Lifespan extension: separating fact from fiction
  914. Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
  915. Azure: the cloud platform that is changing the world
  916. From CSS madness to CSS Hooks
  917. An Analysis of Signal's PQXDH
  918. A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
  919. Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
  920. Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
  921. Hampton Blog
  922. How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
  923. GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
  924. Nobody knows what a good password looks like
  925. SQL Server Security Primer - Simple Talk
  926. Encrypt. Now. — blog.tripu.info
  927. Creating a Variable Color Font From Scratch
  928. Memory alignment of doubles in C#
  929. Security: The Impact of Time
  930. SSH Hardening with ssh-audit
  931. Intercepting Allocations with the Global Allocator
  932. GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
  933. Massive input and/or spaced repetition
  934. LSP could have been better
  935. Radical Energy Abundance
  936. How I built a MVP in 14 hours
  937. Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
  938. Polylang – Polylang by Polybase Labs
  939. Strikeout (ꓘ) Blog - Security Researcher
  940. How to Perform Case-Insensitive Substring Search in C#
  941. Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
  942. Building an Anomaly Detection System with Recurrent Neural Networks
  943. A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
  944. Observing OSIRIS-REx during the capsule reentry – Daniel Estévez
  945. How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
  946. Understand Linear regression through many facets
  947. Store ssh keys inside the TPM: ssh-tpm-agent
  948. Why HTTP/3 is eating the world | APNIC Blog
  949. Converting a Hexadecimal String to a Byte Array in C# - Code Maze
  950. Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
  951. Security Tradeoffs: Privacy
  952. How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
  953. I don't want to know IPs: encryption in TORRENTDYNE
  954. A journey into zero-knowledge proofs
  955. Reclaim Successfully Passed the ZK Circuit Security Audit
  956. Buy wisely
  957. Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
  958. Public report of Reclaim protocol's ChaCha20 circuit
  959. Free Open source disk encryption with strong security for the Paranoid
  960. Mozilla and the burning need for clients for power users
  961. Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
  962. zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
  963. Security in the cloud: Whose responsibility is it?
  964. Finding Bathroom Faucets with Embeddings
  965. On the future of cloud services and BYOC — Jack Vanlightly
  966. Binding Sigmas in Circuits for Fast Curve Operations
  967. Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
  968. t3chn0tix - Your Source for the Latest Tech News
  969. Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
  970. Nintendo 3DS Architecture | A Practical Analysis
  971. Signal Messenger: Speak Freely
  972. S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
  973. What link previews leak | aaron blog
  974. Matrix 2.0: The Future of Matrix
  975. Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users 
  976. 64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
  977. Inside New Query Engine of MongoDB
  978. Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
  979. Quantum Resistance and the Signal Protocol
  980. Exploring Generative AI
  981. ESXi on SolidRun V3000
  982. SimulaVR
  983. Exploring The Halo 1 System Link Protocol
  984. Nuclear Propulsion | Charles Pellegrino
  985. How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
  986. Book notes & reflections: An Elegant Puzzle
  987. Mario Zechner (@badlogic@mastodon.gamedev.place)
  988. ZK Security meetup with the Succinct Labs folks! · Luma
  989. Kopia
  990. Dymocks - Customer Notices
  991. Onboarding Made Simple with zkLogin
  992. Role Of Algorithms
  993. Getting to Know Dapr with Mark Fussell and Yaron Schneider
  994. Techniques for Checking Floating-Point Equality in C# - Code Maze
  995. GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
  996. How AES Is Implemented
  997. Notes on Self-hosted Transactional Email
  998. The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
  999. GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
  1000. Learn the Basics of HTTP Web API - Coding Sonata
  1001. why not matrix?
  1002. How to Use Basic Authentication With HttpClient? - Code Maze
  1003. Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
  1004. Designing a 3D Printed Toy for My Son
  1005. A (Post-Pandemic) World Without Email
  1006. Mullvad on Tailscale: Privately browse the web
  1007. Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
  1008. The future headwinds
  1009. Dunghill Anti-Pattern - Why utility classes and modules smell?
  1010. How to Write a Secure JWT Library If You Absolutely Must
  1011. Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
  1012. U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
  1013. The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
  1014. Android 14 blocks all modification of system certificates, even as root
  1015. Deploying a Dapr Sidecar to Azure Container Instances
  1016. What 0 to 6 Months of Photography Has Taught Me
  1017. Support for custom headers for handshake · Issue #16 · whatwg/websockets
  1018. Introducing our summer '23 research seminars
  1019. Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
  1020. Explaining The Postgres Meme
  1021. Wii Architecture | A Practical Analysis
  1022. Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  1023. The History of Data with Ted Neward
  1024. End-to-end encryption with Proton Mail
  1025. Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  1026. Listen to us on zeroknowledge.fm
  1027. Measuring Unicode String Lengths with C#
  1028. Choosing Apache Kafka For A New Project – A Questionnaire
  1029. Automata Part 1: Understanding Position Automata
  1030. BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
  1031. Zero-Knowledge Proof Research | Berkeley RDI
  1032. Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
  1033. Vacation Study Ideas
  1034. How to debug linux kernel API (syscalls issues)?
  1035. The Tale of a Corrupt Backup
  1036. Introducing ChatGPT Enterprise
  1037. Demodulation of the 5G NR downlink – Daniel Estévez
  1038. Cool & Unique Cryptography Features for Modern Sui DApps
  1039. You Should Be Working On Hardware
  1040. Blockchain Applications Stanford Summit
  1041. You like Circom but you find it confusing? Introducing Circomscribe
  1042. Detecting boomerang values in zero-knowledge circuits using tag analysis
  1043. Fiat-Shamir Security of FRI and Related SNARKs
  1044. How SNARKs fall short for FHE
  1045. Getting our focus back
  1046. Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
  1047. Delendum-SBC Research Meetup
  1048. Penumbra Security Audits Q3 2023
  1049. Ergaster - Syncing Notes with Obsidian
  1050. Max Goodhart (@chromakode@mastodon.social)
  1051. Raspberry Pi x OpenWRT Travel Router – Tristam
  1052. Unlocking Discord Nitro Features for Free
  1053. Storing passkeys in password managers is okay, actually
  1054. Backing Up Personal Files with rclone
  1055. Exploring Generative AI
  1056. Exploring Generative AI
  1057. About GitHub Copilot for Individuals - GitHub Docs
  1058. Breaking The Mutant Language's "Encryption"
  1059. How Surround Sound for Headphones Works
  1060. Understanding Lasso and Jolt, from theory to code
  1061. North Korean Hackers Suspected in New Wave of Malicious npm Packages
  1062. Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
  1063. How the Nintendo Wii Security Was Defeated
  1064. Short session expiration does not help security
  1065. EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
  1066. Unity 4D #2: Extending Unity to 4D - Alan Zucconi
  1067. Bare Metal Space Invaders
  1068. The BEST Moq Alternatives: NSubstitute vs FakeItEasy
  1069. Self-Discipline Examples That Don't Suck
  1070. Software Engineering at Google
  1071. Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
  1072. Azure Storage Account: Best Practices for Efficient and Secure Storage
  1073. Chris James - Practical ways to shift QA left
  1074. Reflections on Ten Years Past the Snowden Revelations
  1075. Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
  1076. State-Issued Identifiers aren’t generally good passwords
  1077. Tailscale vs. Narrowlink | Narrowlink
  1078. GitHub - id-Software/quake2-rerelease-dll
  1079. Do Machine Learning Models Memorize or Generalize?
  1080. Introducing per hostname TLS settings — security fit to your needs
  1081. Android 14 introduces first-of-its-kind cellular connectivity security features
  1082. Removing Randomness with LLDB
  1083. Everyday Scientist » Replace Peer Review with “Peer Replication”
  1084. Verifiable encryption on the Blockchain
  1085. My experience at the k-space hackerspace hackathon
  1086. Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
  1087. Patterns for Building LLM-based Systems & Products
  1088. The Worst API Ever Made
  1089. Shamir Secret Sharing
  1090. I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
  1091. Why do consultants invent words?
  1092. Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
  1093. The U.K. Government Is Very Close To Eroding Encryption Worldwide 
  1094. Worldcoin isn’t as bad as it sounds: It’s worse
  1095. Introducing GitHub Copilot X
  1096. Where are all the women?
  1097. The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
  1098. What We Know About LLMs (Primer)
  1099. Pre 2013 Data Breach - Forum Thread
  1100. How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
  1101. RSA
  1102. Sharing encrypted data over short-form mediums
  1103. Attention Is Off By One
  1104. Zenbleed
  1105. Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  1106. Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
  1107. Plane - The open source project management tool
  1108. What does a CTO actually do?
  1109. What Happened to Dolphin on Steam?
  1110. 1 Introduction · Real-World Cryptography
  1111. Best crypto blog posts of 2017
  1112. Why Frustum Culling Matters, and Why It's Not Important
  1113. Tutorial 1: Hello World | Mina Documentation
  1114. ZK Security X Delendum (farewell SBC) · Luma
  1115. Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
  1116. Sharing code between Deno and Node where Bun and ts-node failed
  1117. Distributed Trust with Service-to-Service Authentication
  1118. Why the “Null” Lifetime Does Not Exist
  1119. Store age identities inside the TPM: age-plugin-tpm
  1120. Setting up PostgreSQL with Ansible
  1121. I don't know how I feel about email
  1122. Bypassing Internet Censorship Using SSH
  1123. An Alternative Approach to Deep Tech VC
  1124. Jeremy Mikkola - What makes developers productive?
  1125. Fun with DNS TXT Records
  1126. PhpMyAdmin and Azure Database for MySQL server
  1127. Living Life as a B- Student
  1128. ZK Security meetup @ Lightspeed · Luma
  1129. Episode 467 - OneStream's plans for becoming more cloud native on Azure
  1130. 17 misconceptions about SNARKs (and why they hold us back)
  1131. Cycles of curves: what are they and do we need them?
  1132. Regex Isn't Hard - Tim Kellogg
  1133. Put a Pin on That
  1134. Hacking LangChain For Fun and Profit - I
  1135. Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
  1136. How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
  1137. Experiments with eBPF: Snitchrs
  1138. A slack clone in 5 lines of bash
  1139. GitHub - zksecurity/noname: Noname: a programming language to write zkapps
  1140. The zero-knowledge attack of the year might just have happened, or how Nova got broken
  1141. bips/bip-0042.mediawiki at master · bitcoin/bips
  1142. Exploring how Magic Link works
  1143. VerusCoin, Everything that Ethereum Isn’t
  1144. Running on a high-speed rail
  1145. Backend development is more than writing endpoints for frontend
  1146. Alpha
  1147. Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  1148. How to do templates properly
  1149. Getting Started with API Management: A Beginner's Guide for Developers
  1150. Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
  1151. Open at Microsoft: Dapr
  1152. Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
  1153. Blocking, covariate adjustment and optimal experiment design - Emir's blog
  1154. Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
  1155. My journey into Microsoft – Unstructed.tech
  1156. Using encryption to verify a license key
  1157. Red-Teaming Explained: How does it reduce toxicity in LLMs?
  1158. Based-30b
  1159. You don't take enough risks to be lucky
  1160. How (not) to compare 2D scatter plots
  1161. How to deploy your deep learning side project on a budget
  1162. The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
  1163. Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
  1164. Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
  1165. Interesting links of the week 2023-24 (#76)
  1166. Announcing .NET 8 Preview 5 - .NET Blog
  1167. Introducing the defensive statistics | Andrey Akinshin
  1168. Latest Updates for Azure App Service Presented at Microsoft Build 2023
  1169. Casey Reeves (@xogium@tech.lgbt)
  1170. /home/halosghost/blog
  1171. Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
  1172. Memory Management in DBMS
  1173. Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
  1174. Understanding the Tech Right
  1175. Stages of Survival
  1176. ZK app developers should be able to see down to the constraints
  1177. zkSecurity
  1178. Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
  1179. Generating income from open source
  1180. ZK programmability adds a whole new layer to worry about
  1181. Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
  1182. Open at Microsoft - Dapr
  1183. The Prickly Case of JavaScript Proxies
  1184. Privacy Enhancing Technologies: An Introduction for Technologists
  1185. Private delegated computation is here, and there will be bugs!
  1186. Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
  1187. On being paid to learn
  1188. Using Nix with Dockerfiles
  1189. Building a baseline JIT for Lua automatically
  1190. Finding your weak spots
  1191. How to Use SFTP For Secure File Upload in .NET - Code Maze
  1192. Why we're bad at CSS
  1193. Free VPN Service SuperVPN Exposes 360 Million User Records
  1194. What's New for Azure App Service at Build 2023
  1195. backups (public)
  1196. How to get (micro) acquired?
  1197. Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
  1198. SELM: Symmetric Encryption with Language Models
  1199. Two Immortals
  1200. This Week In Security: .zip Domains, Zip Scanning
  1201. Malleable software in the age of LLMs
  1202. How to Unleash the Power of Multithreading in JavaScript with Web Workers
  1203. Assembling Community OS
  1204. Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
  1205. Experimenting with multi-factor encryption
  1206. How to Understand Abstract Art
  1207. transparent polynomial commitment scheme with constant opening proof size and verifier time
  1208. Level up your GPT game with prompt engineering - .NET Blog
  1209. Fast hashing, it's not that simple
  1210. Testing a new encrypted messaging app's extraordinary claims
  1211. Is .NET Still a Legitimate Technology in 2023?
  1212. API Security Checklist: How to Protect Your APIs
  1213. Savoring Complexity. Embracing the Infinite
  1214. PV consumption optimization – the power of software defined devices
  1215. Using The Decorator Design Pattern in .NET
  1216. Why should we read Azure Security?
  1217. Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
  1218. What is Type-Level Programming? - sulami's blog
  1219. How to design your first Solution Architecture Diagram?
  1220. Crypto: My Part In Its Downfall
  1221. The right to encrypt
  1222. Radical Incrementalism
  1223. Do We Still Need Journals?
  1224. Why is OAuth still hard in 2023? | Nango Blog
  1225. Dometrain - Homepage
  1226. Bea Stollnitz - How GPT models work
  1227. The Most Annoying Math Problem
  1228. SLP: a new DDoS amplification vector in the wild
  1229. Local license key verification - Theory
  1230. Internexit?
  1231. The Importance of TLS with SQL Server
  1232. Playing devil's advocate on claims made in VPN adverts
  1233. Why I joined Cloudflare as Chief Security Officer
  1234. Current Issues With The Qt Project - From The Outside Looking In
  1235. Get your app to Mars!
  1236. Message-Driven Architecture: Promoting Efficient and Scalable Communication
  1237. mjg59 | PSA: upgrade your LUKS key derivation function
  1238. Nintendo Switch game modding is illegal. – Gabriel Sieben
  1239. Hot Takes on the Modern Data Stack
  1240. Data Driven Detection Engineering
  1241. What do Solution Architects do?
  1242. (The Futility of) Keeping Secrets from Yourself
  1243. How I fix flaky tests - Code with Jason
  1244. 5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
  1245. Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
  1246. Prompt Engineering vs. Blind Prompting
  1247. TLS 1.3—What is It and Why Use It?
  1248. Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
  1249. Recipes For Product Failure: Obsess Over Competitors
  1250. Sponge API for Field Elements
  1251. ‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
  1252. Experimenting with LLMs to Research, Reflect, and Plan
  1253. Climate Tech Checklist
  1254. Rethinking Type I/II error rates
  1255. 11 API Security Best Practices to Secure Your Business
  1256. My Love/Hate Relationship with Cloud Custodian
  1257. GPT Voyage: Part 2
  1258. Linux and Baikal Electronics: Why Postgres Should not Follow that Path
  1259. Do Less, Better (with leverage!)
  1260. What We Learnt Building the Largest GPT-Telegram Bot
  1261. If It's So Good, Why Isn't Everyone Doing It?
  1262. Towards a Nova-based ZK VM
  1263. Outperforming Warren Buffet
  1264. irhum.github.io - Tensor Parallelism with jax.pjit
  1265. I Quit Programming (or did I?)
  1266. I Didn't Read 17 Books So You Don't Have To 😩
  1267. Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
  1268. Unlimited Powers
  1269. Ben Howdle - Software Engineering Consultant and Advisor
  1270. Paillier's cryptosystem - Addtive homomorphic encryption
  1271. Paillier's cryptosystem - Addtive homomorphic encryption
  1272. Paillier's additively homomorphic cryptosystem
  1273. Paillier's cryptosystem - Addtive homomorphic encryption
  1274. So, You Want To Build A DBaaS
  1275. How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
  1276. Nobody’s on the ball on AGI alignment
  1277. ChatGPT's Plugin System Poses an Existential Risk to the Open Web
  1278. Synology NAS Backups with Minimal Bus Factor
  1279. Education - Mutable Instruments Documentation
  1280. Zig And Rust Mar 26, 2023
  1281. Sparks of Artificial General Intelligence (AGI) in GPT-4
  1282. Building a DOS ChatGPT client in 2023
  1283. The Artificial in AI - Pravesh Koirala
  1284. Just update rules between neurons
  1285. Symbolic vs Connectionist Machine Learning
  1286. (PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
  1287. Let’s Talk About TikTok - Black Hills Information Security
  1288. No more custom domains in Microsoft Outlook?
  1289. mjg59 | We need better support for SSH host certificates
  1290. None of Your Business - Why, I Wonder?
  1291. zkSummit - Zero Knowledge Summit
  1292. fhur
  1293. Notes on FFTs: for users
  1294. Loading RSA Keys in .NET
  1295. Aria: A Fast and Practical Deterministic OLTP Database
  1296. Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
  1297. Head of Marketing
  1298. Geometry in Text-to-Image Diffusion Models
  1299. Boosting password security! Pwned Passwords, zxcvbn, and more!
  1300. 9 years of open-source database development
  1301. How I burnt out in FAANG, but it is not what you think
  1302. Is OpenBSD for you? - Marián Mižik
  1303. Sunsetting Aztec Connect
  1304. Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
  1305. cURL, the omnipresent data tool, is getting a 25th birthday party this month
  1306. QR Code Generator in Laravel 10 Tutorial
  1307. My Backup Strategy
  1308. The Kids are Not Okay
  1309. Tech Notes: Polymorphic shellcode
  1310. Announcing new security and observability features in Azure Database for PostgreSQL
  1311. Were We All Gaslit About Content Being King?
  1312. Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
  1313. Warnings-as-errors friction
  1314. I made JSON.parse() 2x faster
  1315. Caveat Implementor! Key Recovery Attacks on MEGA
  1316. TimeSpan in C# - Code Maze
  1317. Cryptography without Security - Cronokirby
  1318. Quantum computing shorts
  1319. zk-SNARK Concepts Explained Like You’re 15
  1320. Block Breakers
  1321. ChatGPT Explained: A Normie's Guide To How It Works
  1322. Use GNU Emacs The Plain Text Computing Environment
  1323. Digital Market Act workshop in Brussels
  1324. Overview | Mina Documentation
  1325. zkVMs are cool, but have you heard of zkCPUs?
  1326. How To Deploy EF Database Migrations
  1327. Database Cryptography Fur the Rest of Us - Dhole Moments
  1328. On mindsets, mind shifts and wins
  1329. Thief in the car
  1330. LattePanda V1 - my experience with a Raspberry Pi alternative
  1331. Zero-knowledge proof composition and recursion. Part 7: Deferred values
  1332. Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
  1333. Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
  1334. On Relearning to Code as an Adult
  1335. Zero-knowledge proof composition and recursion. Part 6: cycles of curves
  1336. Convert a File to a Byte Array in C# - Code Maze
  1337. Cryptography 101 - PHINUG Online Dev Sessions 2023.03
  1338. A new series of videos on zero-knowledge proof composition and recursion (part 1)
  1339. Real-World Cryptography, a bit more than a year later
  1340. 87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
  1341. Cryptography Attacks and Defenses, Reloaded
  1342. Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
  1343. Asking ChatGPT to Design Its Next Generation, ChatGPT 2
  1344. Sangria: a Folding Scheme for PLONK - Geometry Research
  1345. Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
  1346. How Safe is the Cloud? What Businesses Need to Know
  1347. Lessons Learned from Re-rolling 60+ Production Credentials
  1348. Gamebert: a Game Boy emulator built by Robert | Robert Heaton
  1349. <div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
  1350. Google’s Fully Homomorphic Encryption Compiler — A Primer
  1351. Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
  1352. Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
  1353. CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
  1354. My most important email filter that helps me control my chaos
  1355. The Joy Of Duplexes
  1356. NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
  1357. Challenges 7-12: Implementing and breaking AES ECB
  1358. Contributing to open source projects and about learning zero-knowledge proofs
  1359. Ian Norris - Blog - Understanding the limits of large language models
  1360. .NET Security Headers: A Senior Developer’s Guide✨
  1361. Reversing UK mobile rail tickets
  1362. Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
  1363. Python’s “Disappointing” Superpowers
  1364. Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
  1365. Anker admits to lying about Eufy security camera encryption; describes future plans
  1366. The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  1367. Various Ways of Sending Mail via SMTP
  1368. My first recession
  1369. Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
  1370. Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
  1371. Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
  1372. Making sense of TypeScript using set theory
  1373. Encrypting Data in the Browser Using WebAuthn
  1374. Introducing Zero to Nix — Determinate Systems
  1375. How to debug
  1376. Bitwarden design flaw: Server side iterations
  1377. Degrees of Open Source
  1378. 1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
  1379. How to Implement Google Authentication in Next with NextAuth
  1380. Implementing Zero Trust: A Guide to Securing Your Data
  1381. An incomplete guide to stealth addresses
  1382. Securely store secrets in Git using SOPS and Azure Key Vault
  1383. Breaking EA Desktop's pathetic Encryption
  1384. How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
  1385. Zero Knowledge Proofs MOOC
  1386. Some thoughts on the ETH's Threema Analysis
  1387. The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  1388. zkIgnite, Cohort 1 Program Overview
  1389. What's the deal with zkapps?
  1390. The PLONK zero-knowledge proof system
  1391. How to Secure Your .NET Application Against Common Threats
  1392. Terraform Industries Whitepaper 2.0
  1393. .NET 7 Brings Networking Improvements
  1394. Encrypting and Decrypting a String in C# - Code Maze
  1395. Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
  1396. Machine Learning in .NET with F# and ML.NET 2.0
  1397. What is Zero Trust and is it the Future of Cybersecurity?
  1398. ZK System Benchmarking
  1399. Writing a TLA⁺ tree-sitter grammar
  1400. Large Transformer Model Inference Optimization
  1401. Cryptography Implementations in .NET - Code Maze
  1402. MINA zkApp staking pool - HackMD
  1403. How I went from 0 to Hacking in SF as a high-schooler
  1404. Is it worth encrypting? | Matthew Linkous
  1405. Using client side encrypted fields in RavenDB
  1406. GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
  1407. On PBKDF2 iterations
  1408. Renato Athaydes
  1409. Debugging Architects
  1410. Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
  1411. Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
  1412. Ancient Apocalypse reviewed
  1413. Machine Learning in .NET with F# and ML.NET 2.0
  1414. Forming the habit of analog journaling - Why the digital format did not work for me
  1415. David Wong
  1416. Join Mina's zkIgnite, Cohort 1
  1417. Fast Accumulation on Streams (2018) - bkase
  1418. Vitalik Buterin's website
  1419. Raspberry Pi security alarm — the basics
  1420. HTTPS explained with carrier pigeons
  1421. RE: False Rumors on API Leaks or Exposure of our Database
  1422. Your Pa$$word doesn't matter
  1423. Lastpass Breach - Everything you need to know
  1424. The Matrix Holiday Update 2022 | Matrix.org
  1425. 20 Best Cryptography Algorithms Books of All Time
  1426. 2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
  1427. AI assistants help developers produce code that's insecure
  1428. Nix on the Steam Deck — Determinate Systems
  1429. LastPass users: Your info and password vault data are now in hackers’ hands
  1430. Notice of Recent Security Incident - The LastPass Blog
  1431. Password requirements: myths and madness
  1432. Not Getting Hacked
  1433. Personal backups and file archival
  1434. Implementing the MySQL server protocol for fun and profit
  1435. Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
  1436. Yubikeys & PKI: What Are They For? | Charlton's Blog
  1437. Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
  1438. Why Current Wormhole Research is So Important
  1439. Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
  1440. How Cloudflare advocates for a better Internet
  1441. Why you can’t build a web browser and why you should anyway.
  1442. Technical Writer
  1443. Real-World Cryptography
  1444. ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
  1445. Dev environments in the cloud are a half-baked solution
  1446. Apple iCloud, and why encrypted backup is the only issue
  1447. Apple advances user security with powerful new data protections
  1448. Installing Guix on a 10th gen Thinkpad X1 — dthompson
  1449. Making an RC Roomba
  1450. SBF is Crypto Personified
  1451. What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
  1452. Notice of Recent Security Incident - The LastPass Blog
  1453. Choosing your chat application
  1454. Be less scared of overconfidence
  1455. Real-World Cryptography: Wong, David + Free Shipping
  1456. Mutual Contact Discovery
  1457. [Apply by 12/08] Introducing our fellowship program
  1458. Autonomy, packet size, friction, fanout, and velocity
  1459. Episode 111 - RavenDB with Oren Eini
  1460. zkapp-cli
  1461. How I over-engineered a Fast Fourier Transform for Arduino.
  1462. Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
  1463. OpenIddict
  1464. Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
  1465. The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
  1466. Cloud-Native Application Security - DZone Refcardz
  1467. Quest for my perfect watch.
  1468. zero to connection string
  1469. 4 Strategies for Dealing with Bad Code
  1470. Example: Oracle | Mina Documentation
  1471. Mina Launches zkApps Era
  1472. Authorization and Authentication in Minimal APIs
  1473. Why take and make notes
  1474. Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
  1475. S1 Ep2: Data Breaches, DNA & the Future of Privacy
  1476. My take on self-hosting
  1477. Intro to Zero-knowledge & Building zkApps w/Mina Protocol
  1478. Live system DD backup, with encryption and compression!
  1479. GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
  1480. Too Much Crypto
  1481. NSA urges orgs to use memory-safe programming languages
  1482. Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
  1483. Brave New Trusted Boot World
  1484. End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
  1485. How to contribute to Kimchi
  1486. Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
  1487. Mina zkApp Developers Meetup - San Francisco
  1488. Zero to App Store in 7 weeks
  1489. Neural Network Pruning Explained
  1490. Wii U Architecture | A Practical Analysis
  1491. 0.10.0 Release Notes ⚡ The Zig Programming Language
  1492. Improving Git protocol security on GitHub | The GitHub Blog
  1493. Encrypt and Decrypt Text Values in .NET
  1494. Real-World Cryptography: Wong, David + Free Shipping
  1495. Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
  1496. Encryption
  1497. Example: Anonymous Message Board Tutorial | Mina Documentation
  1498. We Must Professionalize Programming to Preserve Society and Computing Freedom
  1499. Running a law firm on Linux - a year or so in
  1500. Jett Hays
  1501. How I built and sold a successful startup with fractional hires
  1502. 10 essentials to mitigating API security risks | Red Hat Developer
  1503. In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
  1504. What's the deal with zkapps?
  1505. LiteDB - A .NET embedded NoSQL database
  1506. Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
  1507. ✂️ The ideal blockchain
  1508. Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  1509. Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  1510. What to know about Zero Knowledge
  1511. Jira Pricing - Monthly and Annual Subscription Cost per User
  1512. Lucid Multi-Key Deputies Require Commitment
  1513. Let's watch videos with David - HackMD
  1514. Microsoft Office 365 email encryption could expose message content
  1515. How observability-driven development creates elite performers
  1516. The Rails SaaS Conference
  1517. Seven years in the life of Hypergiants' off-nets
  1518. How does the key exchange in HTTPS work?
  1519. Threshold ECDSA in Excessive Detail
  1520. Comparing Semgrep and CodeQL · Doyensec's Blog
  1521. E-commerce platform Bhinneka.com reported to be latest target of data theft
  1522. Yubikey Madness
  1523. Privacy is a business imperative
  1524. .NET R&D Digest (September, 2022)
  1525. Scoreboard Hacking Part 2 - Getting the AES Key
  1526. The Lens Of Asymmetry
  1527. age and Authenticated Encryption
  1528. Episode 107 - Unstructured Data With Kirk Marple
  1529. Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
  1530. Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
  1531. The many problems with implementing Single Sign-On
  1532. 'Berkeley' Testnet Alpha Participation Guide
  1533. Outdated vs. Complete
  1534. RegEx match open tags except XHTML self-contained tags
  1535. the sad state of debug performance in c++
  1536. Aging programmer
  1537. Help people in Iran reconnect to Signal – a request to our community
  1538. 06 SnarkyJS
  1539. How does PLONK work? Part 1: What's PLONK?
  1540. What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
  1541. 0xPARC
  1542. Introducing LiteFS
  1543. How hashing and cryptography made the internet possible | Red Hat Developer
  1544. An Introduction to Ansible Inventory
  1545. IN/"juels; ari" in US Patent Collection
  1546. A few thoughts about Uber&#39;s breach
  1547. How I manage my passwords
  1548. FileSystemWatcher in C# - Code Maze
  1549. noname developer updates: structs are working!
  1550. 35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
  1551. Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
  1552. Visual Cryptography For Physical Keyrings
  1553. It pays to be Circomspect
  1554. Ethereum activates The Merge as it shifts to proof of stake
  1555. A beginner’s guide to regular expressions with grep | Red Hat Developer
  1556. Enstil Postmortem
  1557. githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
  1558. 6 Simple and Useful PostgreSQL Features that I wish I knew when I started
  1559. Narrative driven development
  1560. GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
  1561. Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
  1562. Ed25519 Deep Dive Addendum
  1563. learning about zero-knowledge apps and circuits using the noname educational DSL
  1564. Security of ZK Systems
  1565. An overview of Node.js: architecture, APIs, event loop, concurrency
  1566. Predict steel quality with Azure AutoML in manufacturing
  1567. On Security Against Time Traveling Adversaries
  1568. Someone’s Been Messing With My Subnormals!
  1569. Perfect Notes or My Journey to Obsidian
  1570. Replicant: Reproducing a Fault Injection Attack on the Trezor One
  1571. fxhash - Lessons Learned from Implementing "Wave Function Collapse"
  1572. One Year With the Framework Laptop and NixOS
  1573. Cloudflare named a Leader by Gartner
  1574. Episode 437 - Azure CXP CRE Low Code Automation
  1575. Formal Verification of ZK Constraint Systems
  1576. Top 10 skills every programmer should know
  1577. Implement a GRPC API with OpenIddict and the OAuth client credentials flow
  1578. GitHub - mimoo/noname: Noname: a programming language to write zkapps
  1579. Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
  1580. Security of ZK Systems
  1581. Kagi status update: First three months
  1582. What Every Programmer Should Know About Optical Fiber
  1583. Review: The This by Adam Roberts
  1584. My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
  1585. We Are All Nerds: The Literary Works of Neal Stephenson
  1586. Technical Evaluation of a Startup
  1587. What You Should Learn Before Building a zkApp
  1588. champonthis | dev/rand/lack-of-attention
  1589. 2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
  1590. Performance isolation in a multi-tenant database environment
  1591. Raytracing and Raycasting with Signed Distance Functions
  1592. Cryptographic Agility and Superior Alternatives - Dhole Moments
  1593. Define “better”
  1594. Deep dives & how the Internet works
  1595. Should You Buy an EV?
  1596. Ask Cryptography
  1597. “10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
  1598. ASP.NET validation revisited
  1599. How much customer service is too much? - Joydeep's Corner
  1600. GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
  1601. What is Lattice-based Cryptography?
  1602. The Paper that Keeps Showing Up
  1603. Understanding JSON Web Encryption (JWE)
  1604. How I Learned to Stop Worrying and Love Macros
  1605. Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
  1606. 6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
  1607. How Did I Become Database Engineer at 23
  1608. Workshop at SBC'22 | Tse Lab at Stanford University
  1609. GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
  1610. Brute Force Development · Matt Layman
  1611. Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
  1612. SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
  1613. zkEVMs: Not a Panacea
  1614. GitHub - filecoin-project/neptune: Rust Poseidon implementation.
  1615. The quick and practical "MSI" hash table
  1616. How does PLONK work? Part 1: What's PLONK?
  1617. Module Three – ZK Whiteboard Sessions
  1618. On Giving Technical Guidance to Others
  1619. NSA, NIST, and post-quantum cryptography
  1620. MPC In The Head Special
  1621. Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
  1622. NSA, NIST, and post-quantum cryptography
  1623. Home Network Part 1 - DIY Home Router with NixOS
  1624. Experiment with post-quantum cryptography today
  1625. An intro to Open Telemetry in .NET - James World
  1626. BrainSTARK, Part 0: Introduction
  1627. ZK Whiteboard Sessions
  1628. Post-quantum encryption contender is taken out by single-core PC and 1 hour
  1629. Microsoft Previews Azure Premium SSD V2 Disk Storage
  1630. Use One Big Server - Speculative Branches
  1631. Document Scanner with OpenCV Using Video Footage
  1632. What I'm frustrated by in crypto
  1633. Recommended settings for Wi-Fi routers and access points
  1634. Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
  1635. The many flavors of hashing
  1636. x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
  1637. Total Fleet Visibility with Kolide
  1638. GitHub - o1-labs/proof-systems: The proof systems used by Mina
  1639. When the window is not fully open, your TCP stack is doing more than you think
  1640. CFF22 trip report
  1641. The dangers of Microsoft Pluton – Gabriel Sieben
  1642. I quit my business to start an open-source dev tool
  1643. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1644. How I Hacked my Car
  1645. British recycle old arguments for bypassing E2E encryption
  1646. What are zkVMs? And what's the difference with a zkEVM?
  1647. The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
  1648. Authentication is Difficult
  1649. GitHub - chip-red-pill/MicrocodeDecryptor
  1650. Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
  1651. The First Secret Problem
  1652. Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
  1653. Commercial music media, a tier list · brhfl.com
  1654. I've started using Mozilla Firefox and now I can never go back to Google Chrome
  1655. Mina zkApp Developers Meetup - Paris
  1656. Get Compliant with Kolide
  1657. GitHub - nalinbhardwaj/zordle
  1658. We Need Non-Interactive Post-Quantum KEMs
  1659. Checklist For Evaluating Cloud Backup Services
  1660. Compiler and Composability in ZKP
  1661. FizzBuzz is FizzBuzz years old (and still a powerful tool)
  1662. System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
  1663. Dmitry.GR: Projects
  1664. AWS Summit - Virtual EMEA Recap
  1665. Statements Vs. Expressions
  1666. mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
  1667. CS101 Introduction to Computing Principles
  1668. NIST’s pleasant post-quantum surprise
  1669. Introducing: the ZK Whiteboard Sessions! - ZK Podcast
  1670. How to get a job in a new industry without experience | Jason Tu
  1671. NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
  1672. The PeerTube instance tube.hamnet.io on HAMNET
  1673. The best books for cryptography apprentices
  1674. Bookchor data breach of over 5 lakh users: What we know so far
  1675. Advanced Dashes
  1676. Why I left Android Development after 10 years and became a Backend Developer
  1677. CloudFormation is Dead, Long Live Terraform
  1678. Italy declares Google Analytics illegal
  1679. GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
  1680. Thomas H. Ptacek
  1681. Huobi Global Lists Mina Protocol
  1682. Undefined behavior in C is a reading error. – keeping simple
  1683. MEGA: Malleable Encryption Goes Awry
  1684. Introducing Tailscale SSH
  1685. What I'm excited for this build cycle
  1686. SnarkyJS Week 2022 - Crowdcast
  1687. Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
  1688. Facebook Says Apple is Too Powerful. They're Right.
  1689. Join Us For the First Ever SnarkyJS Week
  1690. Matrix notes - anarcat
  1691. My other database is a compiler
  1692. Some ways to use ZK-SNARKs for privacy
  1693. Eurocrypt 2022 program
  1694. The hunt for the cluster-killer Erlang bug
  1695. New UUID Formats
  1696. Foreword — ZK Jargon Decoder
  1697. The Web PKI 2.0
  1698. Hands-on: X25519 Key Exchange
  1699. Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
  1700. In defense of crypto(currency)
  1701. HTTP/3 becomes a standard, at last
  1702. On BFT Consensus Evolution: From Monolithic to DAG
  1703. GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
  1704. What Makes a Good Research Proposal?
  1705. What's OpenIddict?
  1706. A new portal for Project Galileo participants
  1707. GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
  1708. Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
  1709. HTTP/3 From A To Z: Core Concepts — Smashing Magazine
  1710. RFC 9113: HTTP/2
  1711. This is not normal
  1712. How Effective Abstractions Are Opinionated | 8th Light
  1713. Cloudflare observations of Confluence zero day (CVE-2022-26134)
  1714. Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
  1715. Zero-Day Exploitation of Atlassian Confluence | Volexity
  1716. A concise summary of amazing and great ideas · johnpfeiffer
  1717. Countering the Crypto Lobbyists
  1718. A Gentle(-ish) Introduction to Worst-Case Optimal Joins
  1719. Why Seafile is unique among file sync solutions
  1720. Security in MySQL: Part Two - Simple Talk
  1721. Welcoming Rocket.Chat to Matrix! | Matrix.org
  1722. Losing your cookies
  1723. Using WebTransport
  1724. Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
  1725. Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
  1726. Cloudflare’s approach to handling BMC vulnerabilities
  1727. PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
  1728. A Kernel Hacker Meets Fuchsia OS
  1729. The power of tech debt
  1730. Patch: Zoom chat messages can infect devices with malware
  1731. Create AWS resources with Kubernetes and Operators | Red Hat Developer
  1732. Preliminary Learning ON Kimchi: PLONK
  1733. Cryptology ePrint Archive: Report 2022/621
  1734. Site Reliability Engineering – Monitoring Distributed Systems
  1735. RustDesk | Open source remote desktop software
  1736. Why wireguard is NOT safe, and you should NOT use it.
  1737. Automating Well-Architected Principles
  1738. Features of the Windows Process Activation Service (WAS)
  1739. 50 shades of .NET on AWS
  1740. Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
  1741. Monitoring our monitoring: how we validate our Prometheus alert rules
  1742. Laurence Tratt: Static Integer Types
  1743. Quick comparison of pricing of Simple Storage Services
  1744. ‎KDE Connect
  1745. 25 Gbit/s HTTP and HTTPS download speeds
  1746. Some Cryptography Books I Like
  1747. Introducing Lurk: A programming language for recursive zk-SNARKs
  1748. Laptopia
  1749. Support for custom headers for handshake · Issue #16 · whatwg/websockets
  1750. Practical bruteforce of AES-1024 military grade encryption
  1751. Announcing Pub/Sub: Programmable MQTT-based Messaging
  1752. European Commission prefers breaking privacy to protecting kids
  1753. A Beginner's Guide to Application Security
  1754. Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
  1755. Cryptology ePrint Archive: Report 2022/566
  1756. GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
  1757. Cryptology ePrint Archive: Report 2016/163
  1758. Building a Stack Overflow browser as a VS extension
  1759. Fitting Everything Together
  1760. Patenting Your Perpetual Motion Machine
  1761. Multiplying polynomials with Fast Fourier Transform
  1762. The Two Generals Problem
  1763. Topographical Maps in Unity: Edge Detection - Alan Zucconi
  1764. Themes from Real World Crypto 2022
  1765. When Negotiating a Price, Never Bid with a Round Number
  1766. Darlings of the self-hosted, open-source world
  1767. Learn to code. Or don't.
  1768. Implementing a ZK-focused authenticated-encryption scheme
  1769. What's two-adicity?
  1770. Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
  1771. Announcing Bolt & Forte partnership
  1772. Explaining Yao's Garbled Circuits - Cronokirby
  1773. Why the fediverse is stuck.
  1774. Seeking good work-life balance and avoiding burnout
  1775. A File Format to Aid in Security Vulnerability Disclosure
  1776. Lies we tell ourselves to keep using Golang
  1777. Real World Cryptography Conference 2022
  1778. Secret Management with HashiCorp Vault
  1779. Secret Management with HashiCorp Vault
  1780. Personal Knowledge Management is Bullshit
  1781. Building many private virtual networks through Cloudflare Zero Trust
  1782. Monolith in Cloud
  1783. Announcing the Hare programming language
  1784. Why LSP?
  1785. Canetti et al's Paradoxical Encryption Scheme
  1786. A list of all my projects - Patrick Zhong
  1787. Production postmortem: The encrypted database that was too big to replicate
  1788. I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
  1789. Physical Threshold Encryption
  1790. Linearization in Plonk and Kimchi. Why?
  1791. The 10 Commandments .NET Developers Must apply for Secure Applications
  1792. Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
  1793. Things I would like to see in a computer algebra system
  1794. Production postmortem: Misleading security and other production snafus
  1795. Exponentially Better Rotations
  1796. Using dotnet format Command to Format the C#/.NET Code - Code Maze
  1797. The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
  1798. Episode 96 - The Programmer's Brain with Felienne Hermans
  1799. An overview of my threat model
  1800. Requests for comment/Stop accepting cryptocurrency donations - Meta
  1801. Impressions from a first-time Mac user
  1802. Git Credential Manager: authentication for everyone | The GitHub Blog
  1803. zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
  1804. Random Class in C# - Code Maze
  1805. This Week in Matrix 2022-04-08 | Matrix.org
  1806. Private Classification · The Decentralized Robot
  1807. O(1) Labs
  1808. Coinbase Lists Mina Protocol
  1809. The (r)Evolution of FHE
  1810. Optimizing for Luck
  1811. How to run a Digital Platform at Scale
  1812. placeholder
  1813. zkHappyHour with Mina Protocol
  1814. What I learned as a hired consultant for autodidact physicists | Aeon Ideas
  1815. In response to Moxie's doubts on web3, and about ultra light clients
  1816. Introduction
  1817. Essential Cryptography for JavaScript Developers | With Blue Ink
  1818. Episode 95 - Avalonia UI with Dan Walmsley
  1819. PKC Test-of-Time Award
  1820. Webinar next week: Clean Architecture with RavenDB
  1821. Future-proofing SaltStack
  1822. Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
  1823. BAT: a Fast and Small Key Encapsulation Mechanism
  1824. It Looks Like You’re Trying To Take Over The World · Gwern.net
  1825. Year in Review: 2020 laid the groundwork for zero knowledge proofs
  1826. 2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
  1827. The (Edited) Latecomer's Guide to Crypto
  1828. Postico – a modern PostgreSQL client for the Mac
  1829. Ridiculously easy to use Tunnels
  1830. Implementing a toy version of TLS 1.3
  1831. The Problem With Note-Taking - More To That
  1832. The Projects That Matter The Most To Me Are Small
  1833. NSA algorithm for PX-1000 broken
  1834. James Stanley - Librem 5: first impressions
  1835. Using RSA Securely in 2022 - Dhole Moments
  1836. Windows Needs a Change in Priorities
  1837. The first Asahi Linux Alpha Release is here! - Asahi Linux
  1838. Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
  1839. Zotero Blog » Blog Archive
  1840. Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
  1841. $92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
  1842. Roll your own crypto, then smoke it.
  1843. FTC Takes Action Against CafePress for Data Breach Cover Up
  1844. WAF for everyone: protecting the web from high severity vulnerabilities
  1845. The code is the specification? Introducing cargo spec
  1846. How not to build a secure plugins architecture | Crafting Privacy
  1847. Rocky Jaiswal | Fun with function composition
  1848. Recording: Database Security in a Hostile World
  1849. How to Write a Golang App Remotely on a Raspberry Pi Using Atom
  1850. ...A Farm Upstate Where He Can Run and Run
  1851. In praise of opinionated frameworks
  1852. Why should you use a random testing library in C#? · Anthony Lloyd
  1853. A Comprehensive Primer · Michael Straka
  1854. Reintroducing Snapps as zkApps
  1855. Search results – Add-ons for Firefox (en-US)
  1856. EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
  1857. Things I hate about Rust, redux
  1858. How Cloudflare verifies the code WhatsApp Web serves to users
  1859. Request for comments: Removing graph queries from RavenDB
  1860. Deep Learning Is Hitting a Wall
  1861. Optimizing code by understanding usage
  1862. Put an io_uring on it: Exploiting the Linux Kernel - Blog
  1863. Announcing experimental DDR in 1.1.1.1
  1864. Use a message envelope
  1865. We Cannot Live Without Cryptography!
  1866. Webinar: Database Security in a Hostile World
  1867. Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
  1868. The technological case against Bitcoin and blockchain
  1869. Telenot Complex: Insecure AES Key Generation
  1870. Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
  1871. Introducing Native Matrix VoIP with Element Call!
  1872. Never Change Your Password - TidBITS
  1873. The Controversy Surrounding Hybrid Cryptography - Dhole Moments
  1874. Recording: RavenDB–a really boring database
  1875. iCloud Private Relay: information for Cloudflare customers
  1876. Blockchain Cryptography | Gary Woodfine
  1877. Security for package maintainers
  1878. Plagiarism as a patent amplifier
  1879. Using the .NET JIT to reduce abstraction overhead
  1880. Performance optimizations in production
  1881. Transport Layer Security (5/6)
  1882. Security | Fleet handbook
  1883. Introducing the OpenIddict client
  1884. Zig Build System Internals
  1885. Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
  1886. RavenDB: Domain Modeling and Data Persistency
  1887. HPKE: Standardizing public-key encryption (finally!)
  1888. Badly implementing encryption: Part X-Additional data
  1889. Badly implementing encryption: Part IX–SIV
  1890. Making protocols post-quantum
  1891. Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
  1892. Migrating from Redis-64 to Memurai
  1893. GitHub - brouberol/marcel: Le docker français
  1894. Badly implementing encryption: Part VIII–timings attacks and side channels
  1895. Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
  1896. How bad it is using the same IV twice with AES/GCM?
  1897. Sign up for weekly tips
  1898. The Post-Quantum State: a taxonomy of challenges
  1899. Badly implementing encryption: Part VII–implementing authenticated encryption
  1900. AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
  1901. 7 Improvements You Might Have Missed in .NET 6
  1902. Why learn Racket? A student's perspective - Micah Cantor
  1903. Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
  1904. Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
  1905. Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
  1906. Badly implementing encryption: Part VI–malleable encryption
  1907. How to capture book notes and turn those into smart notes
  1908. Improving the US financial system
  1909. Badly implementing encryption: Part V–nonce reuse
  1910. on training
  1911. 1Password for SSH & Git (Beta) | 1Password Developer Documentation
  1912. Badly implementing encryption: Part IV–keyed hash function
  1913. Pure-Impure Segregation Principle | Oleksii Holub
  1914. The right thing for the wrong reasons: FLOSS doesn't imply security
  1915. Learn Privacy-Enhancing Techniques with Cryptographic Games
  1916. Badly implementing encryption: Part III–breaking your encryption apart
  1917. How Perl Saved the Human Genome Project
  1918. Badly implementing encryption: Part II–breaking the code
  1919. 00
  1920. DNS Security, Part VII: Blockchain-based Name Systems and Transparency
  1921. Staking
  1922. Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
  1923. Kimchi: The latest update to Mina’s proof system
  1924. Badly implementing encryption: Part I
  1925. Key Senators Have Voted For The Anti-Encryption EARN IT Act
  1926. BeyondCorp is dead, long live BeyondCorp
  1927. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
  1928. How we optimized Python API server code 100x
  1929. Dolphin Progress Report: November and December 2021, January 2022
  1930. BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
  1931. r/hearthstone - How I hacked Hearthstone
  1932. A Developer's Guide to Dogfooding
  1933. Chat Control
  1934. It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
  1935. Estimating the Bit Security of Pairing-Friendly Curves
  1936. Jay's Blog
  1937. Why and how I got my own ASN!
  1938. Remote Pair Programming - Demir Delic
  1939. The GNU Name System
  1940. PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
  1941. Basic cryptography - the Vigenere cipher - Eric Mann's Blog
  1942. Knowledge Base - your company’s undervalued asset
  1943. I finally understand Declarative Programming 🍀
  1944. It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
  1945. Tor Browser: a legacy of advancing private browsing innovation | Tor Project
  1946. Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
  1947. LTO Tape data storage for Linux nerds
  1948. BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
  1949. PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
  1950. Testnet #4: Shielded Staking Is Here
  1951. Run Ordinary Rails Apps Globally
  1952. The State of Zero Knowledge
  1953. Landscape of API Traffic
  1954. 2022 Tech Predictions · Ted Neward's Blog
  1955. The Curse of NixOS
  1956. [Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
  1957. GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
  1958. Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
  1959. Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
  1960. Don’t assume the result of read()
  1961. Securing Sensitive Data in an Event Driven Architecture
  1962. Why is the Nuclear Power Industry Stagnant?
  1963. CC #9: A Wild ECDSA Appears!
  1964. Bitwarden Open Source Password Manager
  1965. FBI document shows what data can be obtained from encrypted messaging apps
  1966. No Place to Hide
  1967. You should probably be building a web app
  1968. Arm A64 Instruction Set Architecture
  1969. Let's Encrypt SSL certificate overview
  1970. Some Techniques to Enhance Your Terraform Proficiency
  1971. Switching from macOS to Pop!_OS
  1972. GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
  1973. Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
  1974. SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
  1975. Music industry is suing youtube-dl hosters
  1976. Publishing and consuming ECMAScript modules via packages – the big picture
  1977. When NOT to write an Abstraction Layer
  1978. Tips for More Efficient .NET Logs
  1979. Introduction to Model Predictive Control · Arnav's Weblog
  1980. Introducing Plonky2 — Polygon | Blog
  1981. XMPP: the secure communication protocol that respects privacy
  1982. Make the Internet Yours Again With an Instant Mesh Network
  1983. dmca/2022-01-04-readium.md at master · github/dmca
  1984. Donald Knuth - The Patron Saint of Yak Shaves
  1985. Hashing is not encryption - Eric Mann's Blog
  1986. In response to Moxie's doubts on web3
  1987. XML Encryption Syntax and Processing
  1988. Real-World Cryptography by David Wong Book Review
  1989. 6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
  1990. The Relativity of Wrong by Isaac Asimov
  1991. Coming Clean
  1992. The Cryptography of Orphan Annie and Captain Midnight
  1993. Neural Network From Scratch
  1994. If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
  1995. PagerDuty’s Security Training for Engineers! Part Deux
  1996. A Succinct Story of Zero Knowledge
  1997. How I built a WFH Shed
  1998. Fixing stutters in Papers Please on Linux – Blog
  1999. The Case Against Crypto
  2000. Stupid Patterns
  2001. GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
  2002. Looking Forward: Some Predictions for 2022
  2003. .NET's Cryptographic One-Shots
  2004. Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
  2005. A Year In Review · Jethro Kuan
  2006. GitHub - trailofbits/zkdocs
  2007. Fight for privacy — an interview with Troy Hunt
  2008. How to Generate Random Numbers From a Range in C# - Code Maze
  2009. Cloud Security Breaches and Vulnerabilities: 2021 in Review
  2010. Dear Self; We Need To Talk About Social Media
  2011. MS Teams: 1 feature, 4 vulnerabilities | Positive Security
  2012. Introduction
  2013. Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
  2014. What Problem Blockchains Actually Solve
  2015. LISP with GC in 436 bytes
  2016. GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
  2017. Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
  2018. CCPA Scam November 2021 from Princeton University
  2019. Don’t start with microservices – monoliths are your friend – Arnold Galovics
  2020. Rails 7.0: Fulfilling a vision
  2021. How to build large-scale end-to-end encrypted group video calls
  2022. Secure Containerized Browser
  2023. Research Notes on Humanoid Robots
  2024. "Alpha-Rays" behind the scenes - HackMD
  2025. Cryptology ePrint Archive: Report 2021/1621
  2026. Scrt.link vs. One-Time Secret
  2027. How to Write a Technical Book
  2028. Meet Kryptology: Coinbase’s Open Source Cryptography Library
  2029. Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
  2030. "Open source" is not broken
  2031. Testing constant-timeness using Valgrind: case of the NSS library
  2032. Calculating my open source blast radius
  2033. crawshaw - 2021-12-11
  2034. Solene'% : What are the VPN available on OpenBSD
  2035. Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
  2036. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2037. A Call to Build Models Like We Build Open-Source Software
  2038. Avoiding Internet Centralization
  2039. Twitter Suspension
  2040. Connection Failures with Microsoft.Data.SqlClient 4 and later
  2041. Gravatar "Breach" Exposes Data of 100+ Million Users
  2042. uBlock, I exfiltrate: exploiting ad blockers with CSS
  2043. Security | 2021 | The Web Almanac by HTTP Archive
  2044. Understanding HKDF - Dhole Moments
  2045. Welcome to CIO Week and the future of corporate networks
  2046. Understanding Zero-knowledge proofs through simple examples
  2047. Understanding Zero-knowledge proofs through simple examples
  2048. On the Use of Pedersen Commitments for Confidential Payments
  2049. Securing Sensitive Data in an Event Driven Architecture
  2050. Don't Let the Internet Dupe You, Event Sourcing is Hard
  2051. Released: General Availability of Microsoft.Data.SqlClient 4.0
  2052. Bank transfers as a payment method
  2053. Bitslicing for Constant Time Cryptography
  2054. How to configure verified GitHub commits?
  2055. The best Task+Note system
  2056. Understanding identity tokens
  2057. An intensive introduction to cryptography: index
  2058. An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
  2059. RSA vs ECDSA for DNSSEC | APNIC Blog
  2060. ZK-Hack Puzzle #4 Writeup - HackMD
  2061. Speculative Autobiographies
  2062. Mentoring junior programmers: What I tell them is job number one - Vallified
  2063. The Joy of Cryptography
  2064. GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
  2065. 80386DX ISA SINGLE BOARD MICROCOMPUTER
  2066. Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
  2067. Model-based Testing
  2068. RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
  2069. XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
  2070. Regex Learn - Step by step, from zero to advanced.
  2071. Cracking the Adventure Time Cipher
  2072. ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
  2073. ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
  2074. Practical attacks against attribute-based encryption
  2075. Using a framework can make you stupid!
  2076. Yes, Programming is Hard
  2077. No one knows what's coming next
  2078. Five Great (free!) Ways to Get Started With Cloudflare
  2079. Threshold Digital Signatures
  2080. Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
  2081. ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
  2082. Reflecting on 11 years of side projects
  2083. Announcing YARP 1.0 Release
  2084. Libra Shrugged — Chapter 15: Central bank digital currencies
  2085. Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
  2086. Matter Labs Announces $50M in New Funding for zkSync
  2087. Sizing Up Post-Quantum Signatures
  2088. Zillow, Prophet, Time Series, & Prices
  2089. HOWTO: Get tenure
  2090. How To Learn Stuff Quickly
  2091. Random Oracles in Cryptography
  2092. Threema: Three Strikes, You’re Out
  2093. Timeline of the human condition
  2094. How (Not) to Design a Hash Function
  2095. PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
  2096. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2097. The Future of Work and the Workplace
  2098. Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
  2099. Simple Product Management Tricks - Jacob Kaplan-Moss
  2100. You Are What You Consume - Priyam Mohanty
  2101. Pairings in CIRCL
  2102. SectorLISP Now Fits in One Sector
  2103. Handshake Encryption: Endgame (an ECH update)
  2104. mazzo.li — Backing up WhatsApp data through the multi-device web client
  2105. Anatomy of a STARK, Part 0: Introduction
  2106. Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
  2107. You want Tor Browser ... not a VPN
  2108. Element One - Matrix, WhatsApp, Signal and Telegram in one place
  2109. Privacy is a Human Right | Tor Blog
  2110. bitbottle
  2111. FROST: Flexible Round-Optimized Schnorr Threshold Signatures
  2112. Why aviation’s compass is shifting towards True navigation
  2113. The AEGIS family of authenticated encryption algorithms
  2114. Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
  2115. Bevel Work | Rounding Sharp Corners
  2116. Looking into convergent encryption
  2117. .NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
  2118. F# eXchange 2021 | Skills Matter
  2119. 8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
  2120. Episode 85 - Clean Code in C# With Jason Alls
  2121. SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
  2122. A Tour Through the OWASP Top 10
  2123. PlayStation 3 Architecture | A Practical Analysis
  2124. A Critique [The Call of the Open Sidewalk]
  2125. How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
  2126. Code quality: a concern for businesses, bottom lines, and empathetic programmers
  2127. A Graduate Course in Applied Cryptography
  2128. Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
  2129. Critical security flaw exposed Joburg residents’ private info
  2130. NixOS on Framework laptop
  2131. Vimarsh Shah - The best way to self host
  2132. Introducing Nuntius - Cronokirby
  2133. On the Optimization of PLONK – ZK Podcast
  2134. Geo Key Manager: Setting up a service for scale
  2135. How to use certificates in ASP.NET Core
  2136. Avoid Authy, Use Aegis
  2137. Privacy-Preserving Compromised Credential Checking
  2138. What if Performance Advertising is Just an Analytics Scam? - SparkToro
  2139. Cloudflare and the IETF
  2140. Canonicalization Attacks Against MACs and Signatures
  2141. 1Password Refugee’s Guide to KeePass
  2142. A Tale Of Two Optimisations
  2143. mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
  2144. Introducing SSL/TLS Recommender
  2145. The efficiency of Microsoft.
  2146. You're Doing IoT RNG
  2147. Designing technologies with Values? Possibility - Necessity - and European story.
  2148. HD wallets and the Legendrery PRF in MPC - HackMD
  2149. Sending emails to myself
  2150. Cloudflare Research: Two Years In
  2151. What happened on the Internet during the Facebook outage
  2152. Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
  2153. Scheduling Backups To OneDrive For Paperless-ng Using RClone
  2154. Lightning Round
  2155. A PKI-less secure communication channel: Implementing the record stream
  2156. A PKI-less secure communication channel: Coding the handshake
  2157. Overview | ChessCoach
  2158. The most counterintuitive facts in all of mathematics, computer science, and physics
  2159. A PKI-less secure communication channel: The record layer
  2160. Ordinal Classification Using PyTorch -- Visual Studio Magazine
  2161. A PKI-less secure communication channel: The record layer
  2162. New study reveals iPhones aren't as private as you think
  2163. Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
  2164. Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
  2165. Effective Go - The Go Programming Language
  2166. The secret to Cloudflare’s pace of Innovation
  2167. Copycats and Endurance - The Bootstrapped Founder
  2168. A PKI-less secure communication channel: design
  2169. Cybersecurity threats - Simple Talk
  2170. Automatic cipher suite ordering in crypto/tls
  2171. Snapps on Mina with Emre and Izaak – ZK Podcast
  2172. Introduction — pyNomo Documentation 0.3.2.0 documentation
  2173. The Bi-Symmetric Encryption Fraud
  2174. A World Without Sci-Hub
  2175. GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
  2176. Five ways I handled my OutOfMemoryErrors
  2177. No, We Won’t Have a Video Call for That!
  2178. Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  2179. Authenticated Boot and Disk Encryption on Linux
  2180. The First Rule of Machine Learning: Start without Machine Learning
  2181. Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
  2182. Let's Encrypt's Root Certificate is expiring!
  2183. Linux on the Desktop: Part Two
  2184. Cloudflare Pages is Lightning Fast
  2185. Splitting up trust
  2186. HTTP/3 support in .NET 6
  2187. How We Made Playable Quotes for the Game Boy
  2188. If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
  2189. “Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
  2190. ACSC Annual Cyber Threat Report 2020-21
  2191. WebSocket per-message compression in ASP.NET Core 6
  2192. Why Monero
  2193. Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
  2194. FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
  2195. Cloud Providers Publish Ransomware Mitigation Strategies
  2196. Welcome to Speed Week and a Waitless Internet
  2197. Why Flask will teach you more about software engineering than Django
  2198. Part 4: Notifiable Data Breach (NDB) Scheme
  2199. Certified Application Security Specialist (CASS)
  2200. Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
  2201. Rewilding: 60 years ago, scientists let a farm go wild – the results are in
  2202. WhatsApp “end-to-end encrypted” messages aren’t that private after all
  2203. GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
  2204. Welcome · Real-World Cryptography MEAP V14
  2205. ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
  2206. Release age v1.0.0 🏁 · FiloSottile/age
  2207. Why not ZFS
  2208. Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
  2209. Saving a restic backup the hard way
  2210. A meditation on three dead side projects
  2211. ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
  2212. Important clarifications regarding arrest of climate activist
  2213. NO STARTTLS
  2214. Proxy vs Reverse Proxy - using a real life example!
  2215. Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
  2216. WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
  2217. Zero Trust Security Architecture Overview | Developer.com
  2218. www.opendesktop.org
  2219. Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
  2220. Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
  2221. NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  2222. zkMesh: Aug 2021 recap
  2223. Improving Git protocol security on GitHub
  2224. Recover Password Sync for a Domain Joined Mac
  2225. Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
  2226. Writing Programs with NCURSES
  2227. The Design and Evolution of OCB - Journal of Cryptology
  2228. You’re Not Too Late
  2229. on terminal control
  2230. Aggregatable Distributed Key Generation
  2231. Released: Microsoft.Data.SqlClient 4.0 Preview 1
  2232. The All-Seeing "i": Apple Just Declared War on Your Privacy
  2233. Azure SDK: Goodbye QnA Maker, Hello AI 'Question Answering' -- Visual Studio Magazine
  2234. 59a34eabe31910abfb06f308 - Apple NeuralHash Collision
  2235. Programmers Don’t Understand Hash Functions
  2236. The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
  2237. r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
  2238. Golem keyboard project
  2239. Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
  2240. Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
  2241. EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
  2242. Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
  2243. Adventures in fuzzing libolm | Matrix.org
  2244. Thinking of the children
  2245. Safer Illinois, Isn’t
  2246. 6 New Ways to Validate Device Posture
  2247. How does PLONK work? Part 1: What's PLONK?
  2248. Cryptology ePrint Archive: Report 2021/923
  2249. Reddit Interview Problems: The Game of Life
  2250. Thinking of the children
  2251. Why is Learning Functional Programming So Damned Hard?
  2252. 10×10%
  2253. Stewardship of Ourselves
  2254. Exploring the password policy rabbit hole — Sun Knudsen
  2255. The world in which IPv6 was a good design
  2256. GitHub picks Friday 13th to kill off password-based Git authentication
  2257. What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
  2258. The Deceptive PR Behind Apple’s “Expanded Protections for Children”
  2259. .NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
  2260. More devices, fewer CAPTCHAs, happier users
  2261. If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
  2262. Why Doesn't Software Show Up in Productivity?
  2263. Australia is becoming a surveillance state
  2264. Announcing .NET 6 Preview 7
  2265. Implementing ‘le chiffre indéchiffrable’ in Scheme
  2266. Apple’s Mistake
  2267. One Bad Apple - The Hacker Factor Blog
  2268. Hey Signal! Great Encryption Needs Great Authentication
  2269. The logic behind three random words
  2270. How does FaceTime Work?
  2271. Apple to scan U.S. iPhones for images of child sexual abuse
  2272. Apple explains how iPhones will scan photos for child-sexual-abuse images
  2273. draft-peabody-dispatch-new-uuid-format-01
  2274. Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
  2275. HTTP/2: The Sequel is Always Worse
  2276. Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
  2277. Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
  2278. When You Get Right Down to It, Most Security Is Based on The Honor System
  2279. What is an inner product argument?
  2280. An Attempt at Demystifying Graph Deep Learning
  2281. GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
  2282. Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  2283. Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  2284. Full-Time Open Source - CoRecursive Podcast
  2285. TODO apps are meant for robots
  2286. PyTorch Tutorial for Beginners - Building Neural Networks
  2287. Wormhole - Simple, private file sharing
  2288. Looking between the lines: how media is control.
  2289. GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
  2290. Tech spec experts seek allies to tear down ISO standards paywall
  2291. How I store my files and why you should not rely on fancy tools for backup
  2292. Zip - How not to design a file format.
  2293. Cloudflare's Athenian Project Expands Internationally
  2294. From Stolen Laptop to Inside the Company Network — Dolos Group
  2295. Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
  2296. IPv4 pricing - Hetzner Docs
  2297. Netcat - All you need to know
  2298. A new chapter for Google’s Vulnerability Reward Program
  2299. Securing your development environment
  2300. K-9 Mail is back
  2301. Welcome to Cloudflare Impact Week
  2302. Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
  2303. Syncing all the things
  2304. Google pushed a one-character typo to production, bricking Chrome OS devices
  2305. Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
  2306. Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
  2307. Germany’s national healthcare system adopts Matrix! | Matrix.org
  2308. How does TLS work?
  2309. The Game Developers Guide to NFTs
  2310. Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
  2311. Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
  2312. Cryptanalysis of Meow Hash
  2313. How To Learn Stuff Quickly
  2314. A framework for Front End System Design interviews - draft
  2315. Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
  2316. HashWires: Range Proofs from Hash Functions | ZKProof Standards
  2317. Why we need to do more to reduce certificate lifetimes
  2318. TLS - The Cloudflare Blog
  2319. ongoing by Tim Bray · Algorithm Agility?
  2320. Security Analysis of Telegram (Symmetric Part)
  2321. Pa(dding rtitioning) oracles, and another hot take on PAKEs
  2322. Building a Trustless and Private Internet for Everyone
  2323. Building a Vision of Life Without Work
  2324. The EFAIL Hoax [The Call of the Open Sidewalk]
  2325. Behind the scenes, AWS Lambda
  2326. r/crypto - My breakdown on Partition Oracle Attacks
  2327. Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
  2328. Ways of reading without the influence of community
  2329. The Myth of the Expert Reviewer
  2330. An incomplete list of practices to improve security of your (micro)services · m's blog
  2331. Sam Lewis
  2332. More Secret Codes: A History of Cryptography (Part 2)
  2333. A new macroeconomics? – J. W. Mason
  2334. Stuff I wish I knew before I went Independent
  2335. Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
  2336. Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
  2337. Write a time-series database engine from scratch
  2338. BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
  2339. Blazor Flash Cards - State Management with Fluxor
  2340. Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
  2341. Cryptology ePrint Archive: Report 2021/626
  2342. The Missing Email Service For Domains
  2343. How to Build a Giant Carmaker
  2344. angularsen/UnitsNet
  2345. Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
  2346. OpenPGP Identity Structure [The Call of the Open Sidewalk]
  2347. Yes, the network is hostile, even yours (or: how to lose your data in three steps)
  2348. An Elixir Adoption Success Story
  2349. New Release: Fiddler Everywhere 2.0 Is Here!
  2350. NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
  2351. Update on Windows 11 minimum system requirements
  2352. Temporal: getting started with JavaScript’s new date time API
  2353. cirosantilli/x86-bare-metal-examples
  2354. Voice AI is scary good now. Video game actors hate it.
  2355. Production Threshold Signing Service
  2356. Windows 11, Amazon, and Uncomfortable Questions
  2357. Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
  2358. Taking the (quantum) leap with go
  2359. Messaging app Signal not in compliance with new rules, say officials
  2360. Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
  2361. Designing a duress PIN: plausible deniability (part II)
  2362. Zero Knowledge from the Discrete Logarithm Problem
  2363. Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
  2364. Remote Desktop Connection Manager - Windows Sysinternals
  2365. Hacker's guide to deep-learning side-channel attacks: the theory
  2366. Internet-in-a-Box
  2367. How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
  2368. dsprenkels/sss
  2369. Croc Full Plaintext Recovery - CVE-2021-31603
  2370. A response to "Did we market Knative wrong?"
  2371. streetcomplete/StreetComplete
  2372. Cryptographic shuffle | Brain on Fire
  2373. Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
  2374. I wish I could write this well
  2375. Cryptology ePrint Archive: Report 2021/819
  2376. Welcome · Real-World Cryptography MEAP V14
  2377. Richard Feynman's Integral Trick
  2378. [Last Week in .NET #46] – Exceptionally Useful
  2379. google/fully-homomorphic-encryption
  2380. Automonous Biology
  2381. Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
  2382. Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
  2383. How to Handle Secrets on the Command Line
  2384. Taildrop was kind of easy, actually
  2385. Answering Community Questions and What’s Ahead for Mina
  2386. Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
  2387. From KEMs to protocols
  2388. Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  2389. Kerckhoffs’s Law for Security Engineers
  2390. Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
  2391. Althttpd: The Althttpd Webserver
  2392. Exploring android development on iPad
  2393. Certificates Confuse Everything
  2394. It’s time to ditch Chrome
  2395. Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  2396. FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
  2397. Password Managers.
  2398. Kate polynomial commitments
  2399. Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
  2400. The best cryptographic protocol ever!
  2401. Linux Security Hardening and Other Tweaks
  2402. Leaky Abstractions
  2403. Vinod Vaikuntanathan - Real World Cryptographers Podcast
  2404. Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
  2405. Using Wikipedia as an Impromptu RottenTomatoes API
  2406. Mikkel Paulson
  2407. ongoing by Tim Bray · Testing in the Twenties
  2408. The Most Expensive Number in Engineering
  2409. Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
  2410. Amazon devices will soon automatically share your Internet with neighbors
  2411. Contributing to Gemini ecosystem
  2412. Elliptic Curve Cryptography Explained
  2413. Code Maze Weekly #78 - Code Maze
  2414. Episode 77 - Application Security with Tanya Janka
  2415. QUIC is now RFC 9000
  2416. A UDP-Based Multiplexed and Secure Transport
  2417. Is MDPI a predatory publisher?
  2418. Messaging and Chat Control
  2419. New Storage Providers for Azure Durable Functions
  2420. The best API design principles inspired by nature - andre.schweighofer
  2421. Blockchain voting is overrated among uninformed people but underrated among informed people
  2422. DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
  2423. Cryptography from the Ground Up
  2424. 255: What is encryption anyways?
  2425. Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  2426. How to Get Rich
  2427. Heartbleed Revisited
  2428. Secure Search Over Encrypted Data
  2429. Indian job portal IIMJobs hacked; 46GB worth of database leaked online
  2430. How the UK's Online Safety Bill threatens Matrix | Matrix.org
  2431. Authenticated Encryption in .NET with AES-GCM
  2432. I am sick and tired of hearing tech companies complain about a developer shortage
  2433. Welcoming Linux to the 1Password Family | 1Password
  2434. zkSessions: The ZK Languages Roundup - May 19 | Hopin
  2435. Constructing a sponge function from MD5 - Gokberk Yaltirakli
  2436. Zcon2Lite
  2437. I Have a Lot to Say About Signal’s Cellebrite Hack
  2438. Password Storage - OWASP Cheat Sheet Series
  2439. The stack monoid revisited
  2440. Running a .NET 5 web app on Railway
  2441. A day at work
  2442. Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  2443. BLS12-381 For The Rest Of Us - HackMD
  2444. Reverse Engineering an Unknown Microcontroller - Dmitry.GR
  2445. Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  2446. Building an Event Driven .NET Application: The Fundamentals – Wrapt
  2447. Peter Thiel's Religion - David Perell
  2448. <p>The Node.js CA Footgun</p>
  2449. Security flaws in all Wi-Fi devices
  2450. Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  2451. Beware of Applications Misusing Root Stores – Mozilla Security Blog
  2452. Hell site
  2453. Minecraft Modding: Laser Gun - Alan Zucconi
  2454. Dear EU: Please Don't Ruin the Root - Articles
  2455. Realizing the Mina vision in Rust
  2456. Personal Data of 3 Million+ People Exposed In DriveSure Hack
  2457. Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
  2458. Introducing the Pinecone overlay network | Matrix.org
  2459. Understanding Extended-Nonce Constructions
  2460. Amazon Fake Reviews Scam Exposed in Data Breach
  2461. --this is a no-knowledge proof--
  2462. Introduction to JSON Web Tokens (JWT)
  2463. timvisee/send
  2464. ZK languages with Alex Ozdemir
  2465. Is abstraction killing civilization? | datagubbe.se
  2466. What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  2467. Mixed Boolean Arithmetic Obfuscation
  2468. Update: Security Notification - March 2021
  2469. Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  2470. Content Marketing for Bootstrappers | James Chambers
  2471. Dabbling in Cryptography
  2472. We were promised Strong AI, but instead we got metadata analysis
  2473. HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
  2474. Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  2475. Rust Language Cheat Sheet
  2476. Setting up a Cardano Producer node using Kubernetes/microk8s
  2477. Customer Notice FAQs
  2478. In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  2479. Make better predictions, stop estimating - andre.schweighofer
  2480. Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
  2481. Apple introduces AirTag
  2482. Minimum Viable State: Building a Nomad Internet Country
  2483. Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
  2484. dotnet/runtime
  2485. What's in the box? - fasterthanli.me
  2486. Thoughts on writing a wayland window manager with wlroots
  2487. Why should you care about privacy - even if you had nothing to hide
  2488. Vanquished Vaccines and Vetocracies – We Are Not Saved
  2489. Eat a Peach for Engineers
  2490. Standard Notes | A Simple And Private Notes App
  2491. Node.js support in Cloudflare Workers
  2492. What on Earth is this Encryption Scheme?
  2493. Security Control: Implement security best practices
  2494. Serving up zero-knowledge proofs
  2495. Machine Learning With ML.NET - Evaluation Metrics
  2496. The Cursed Computer Iceberg Meme
  2497. My Vim Notes Setup
  2498. Meet the patent troll that won a $308 million jury trial against Apple
  2499. My programming principles • Borislav Grigorov
  2500. The Architecture Behind A One-Person Tech Startup
  2501. BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
  2502. WTF are these security chips?
  2503. A pretty good guide to pretty good privacy
  2504. Goodbye OpenSSL, and Hello To Google Tink
  2505. MPC-Over-Signal
  2506. The Unparalleled Genius of John von Neumann
  2507. Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  2508. Dumping user data from cheap tablets in minutes
  2509. How I Got Into Computers AppDev Edition
  2510. (PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
  2511. Legalizing Gay Marriage in Crusader Kings III with Ghidra
  2512. PostgreSQL Security Hardening
  2513. The Exception Model
  2514. Zero click vulnerability in Apple’s macOS Mail
  2515. C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  2516. Apple's cooperation with authoritarian governments
  2517. Some opinionated thoughts on SQL databases
  2518. Cloudflare’s WAF is recognized as customers’ choice for 2021
  2519. Peace of mind backup - boa.nu
  2520. Creation vs. Consumption
  2521. 208.43.231.11 Git
  2522. A new Cloudflare Web Application Firewall
  2523. Getting started with Self Sovereign Identity SSI
  2524. .NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
  2525. OpenPGP Message Format
  2526. PGP is a Form of Minimalism [The Call of the Open Sidewalk]
  2527. About | Mina Illuminate
  2528. Single-primitive authenticated encryption for fun
  2529. It doesn't work | Frank DENIS random thoughts.
  2530. janroesner/sixty5o2
  2531. APT Encounters of the Third Kind
  2532. Building a phone book: Part I
  2533. C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  2534. facebookresearch/Cupcake
  2535. The Evolution of Distributed Systems on Kubernetes
  2536. Is There a Case for Programmers to Unionize? - Qvault
  2537. On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  2538. CoinList
  2539. Browser Isolation for teams of all sizes
  2540. suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  2541. Crystal 1.0 - What to expect
  2542. Welcome to Cloudflare Security Week 2021!
  2543. My self-study plan for electrical engineering
  2544. r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  2545. Hybrid encryption and the KEM/DEM paradigm
  2546. Episode 72 - Emulating a Video Game System in .NET with Ryujinx
  2547. The missing explanation of ZK-SNARKs: Part 1
  2548. Can we talk about client-side certificates?
  2549. Zero Knowledge Proof (with Avi Wigderson) - Numberphile
  2550. A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
  2551. Can an economy keep on growing? - Inverted Passion
  2552. What It Means to Learn to Code
  2553. Surreptitious Forwarding [The Call of the Open Sidewalk]
  2554. The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
  2555. A Simple Personal Data Backup Setup
  2556. How are zlib, gzip and zip related? What do they have in common and how are they different?
  2557. YouTube
  2558. Key Exchange Standards
  2559. Becoming physically immune to brute-force attacks
  2560. About the March 8 & 9, 2021 Verkada camera hack
  2561. Block Cipher Structures: Ranked
  2562. Getting started with Dapr for .NET Developers
  2563. I want a Computer that I Own
  2564. 4 Times I Felt Discriminated Against for Being a Female Developer
  2565. Notion is not a knowledge base
  2566. A flamegraph of Real-World Cryptography
  2567. It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
  2568. The Teams Dashboard: Finding a Product Voice
  2569. A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
  2570. Online tool to generate and check bcrypt hashed passwords.
  2571. Hotpatch for Windows Server Azure Edition (preview)
  2572. February 2021 - Killing Turbotax
  2573. How I Might Have Hacked Any Microsoft Account - The Zero Hack
  2574. How Nacon Cracked and Pirated The Sinking City - Frogwares
  2575. Cryptology ePrint Archive: Report 2020/1491
  2576. Goodbye Client Affinity, Hello Data Protection with Azure
  2577. 5 tools I use to protect my privacy online
  2578. Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
  2579. How I cut GTA Online loading times by 70%
  2580. The security of the "Pass" password manager
  2581. The Economics of Biodiversity
  2582. Cryptology ePrint Archive: Report 2020/1610
  2583. How often should I rotate my ssh keys?
  2584. Microsoft Releases Azure Firewall Premium in Public Preview
  2585. [JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  2586. Understanding how Leela Chess Zero works
  2587. Cryptography Interface Design is a Security Concern
  2588. Zero Bug Tolerance
  2589. Cryptographic Wear-Out for Symmetric Encryption
  2590. C#'s Functional Journey
  2591. The Azure Security Architect Map
  2592. Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
  2593. Cryptology ePrint Archive: Report 2020/1581
  2594. Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
  2595. How to destroy the Earth
  2596. GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
  2597. Cryptology ePrint Archive: Report 2020/1533
  2598. Using HPKE to Encrypt Request Payloads
  2599. Urbit :: the good, the bad, and the insane
  2600. Cryptology ePrint Archive: Report 2020/1536
  2601. Distributed Application Runtime (Dapr) v1.0 Announced
  2602. Making Easy Auth tokens survive releases on Linux Azure App Service
  2603. upgundecha/howtheysre
  2604. ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
  2605. A Visual Guide: To Sustainable Software Engineering
  2606. Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
  2607. Multi-asset shielded pool project (MASP)
  2608. no dogma podcast - powered by FeedBurner
  2609. Securing the post-quantum world
  2610. Our Solo v2 launch is official!
  2611. Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  2612. Good-bye ESNI, hello ECH!
  2613. Crackpot Cryptography and Security Theater
  2614. Why should I give you my ID card
  2615. 2020 U.S. Election: Cybersecurity Analysis
  2616. A look at GSM
  2617. Reverie: An optimized zero-knowledge proof system
  2618. Report: Romanian Real Estate Portal Suffers Crippling Data Breach
  2619. Lessons Learned From My Last Startup: A Post Mortem
  2620. Is abstraction killing civilization? | datagubbe.se
  2621. Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  2622. ARCHITECTURE.md
  2623. Working with SSL Certificate in Azure App Service
  2624. Ideas That Created the Future
  2625. A Simple and Succinct Zero Knowledge Proof
  2626. Help users in Iran reconnect to Signal
  2627. Security: The Need-to-know principle
  2628. Threshold Cryptography with Omer Shlomovits from ZenGo
  2629. 7 behaviours to avoid in a software architecture role - Daniel Watts
  2630. Tearing Down a Humidifier - Lei's Blog
  2631. Why Generation X will save the web - Hi, I'm Heather Burns.
  2632. SSL/TLS connection issue troubleshooting guide
  2633. The Best TLS and PKI Training Course in the World
  2634. My experience passing CKA and CKAD
  2635. Episode 10: Exploiting Authenticated Encryption Key Commitment!
  2636. LackRack - Eth0Wiki
  2637. All Stories Are Wrong, but Some Are Useful
  2638. The Subtle Hazards of Real-World Cryptography
  2639. I didn't install Signal for privacy
  2640. The Psychology of Stock Bubbles
  2641. How to properly store a password in the Database | Petre Popescu
  2642. Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
  2643. The EU must protect the right to privacy and not attack end-to-end encryption
  2644. Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  2645. No, Java is not a Secure Programming Language
  2646. berty/berty
  2647. Tools I Love to Not Think About
  2648. What it means to be a cryptographer
  2649. SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  2650. survey.pdf
  2651. Write Crypto Code! Don't publish it!
  2652. pavlobu/deskreen
  2653. Technological stagnation: Why I came around
  2654. s-51: Ask Me Anything (AMA), with Joan Daemen
  2655. The architecture of my life | mjwsteenbergen-blog
  2656. AKS Zero To Hero - Series for everyone - Azure Greg
  2657. Release Notes | Bitwarden Help & Support
  2658. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  2659. My Backup Strategy
  2660. So, You Want to CTF? (A Beginner’s Guide to CTFing)
  2661. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  2662. Building your first Telegram Bot with ASP.NET Core
  2663. Please Stop Encrypting with RSA Directly
  2664. The State of State Machines
  2665. The worrying trend of game technology centralization
  2666. Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  2667. We can do better than Signal
  2668. CondensationDB/Condensation
  2669. Mesmerizing Chameleon Signatures
  2670. Is Writing as Important as Coding?
  2671. Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  2672. A history of end-to-end encryption and the death of PGP
  2673. Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  2674. KEMTLS: Post-quantum TLS without signatures
  2675. Fully Homomorphic Encryption Part One: A Gentle Intro
  2676. danso - happy-space: a whitespace-sensitive calculator
  2677. Holistic web protection: industry recognition for a prolific 2020
  2678. Foam
  2679. Send and receive WhatsApp messages through email
  2680. Learn X by doing Y - A project-based learning search engine
  2681. Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  2682. jukefoxer/Signal-Android
  2683. An introduction to the Data Protection system in ASP.NET Core
  2684. Notification of Data Security Incident - December 23, 2020
  2685. My personal wishlist for a decentralized social network
  2686. Machine Learning with ML.NET - Linear Regression
  2687. Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  2688. Wasmer - The Universal WebAssembly Runtime
  2689. Signal, thank you for not collecting my data. But I won’t use you.
  2690. Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  2691. safepassme
  2692. What I learned doing 125 public talks - Part I
  2693. Steam's login method is kinda interesting
  2694. .NET Rocks! vNext
  2695. WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
  2696. DALL·E: Creating Images from Text
  2697. Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  2698. HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  2699. SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  2700. The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  2701. Cryptology ePrint Archive: Report 2020/1456
  2702. s-18: FSE 2020 Rump session
  2703. Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  2704. Linux Hardening Guide | Madaidan's Insecurities
  2705. Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  2706. zkSNARKS and Cryptographic Accumulators
  2707. NeurIPS 2020 Best Machine Learning Paper Awards
  2708. Web Authentication Methods Compared
  2709. Combating abuse in Matrix - without backdoors. | Matrix.org
  2710. Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  2711. Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  2712. Development time is money, therefore I RAID
  2713. Against Victimhood
  2714. The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  2715. No, Cellebrite cannot 'break Signal encryption.'
  2716. Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  2717. Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  2718. Why I've Been Merging Microservices Back Into The Monolith At InVision
  2719. My Engineering Axioms
  2720. 2020’s Top 15 Machine Learning & AI Research Papers
  2721. You're Missing Out If You Don't Write Weekly Digests
  2722. Cryptologie | Vetted Encryption
  2723. Apple M1 foreshadows RISC-V
  2724. Bizarre Design Choices In Zoom’S End-To-End Encryption
  2725. Branding Your Own Startup | Blog of Pascal
  2726. Commits are snapshots, not diffs - The GitHub Blog
  2727. Giving more tools to software engineers: the reorganization of the factory
  2728. How to conduct a competitive analysis - Philipp Muens
  2729. Adding Encrypted Group Calls to Signal
  2730. Learn about online security, privacy, and encryption
  2731. The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  2732. Privacy and Compliance Reading List
  2733. Computers Are Bad
  2734. Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  2735. Google Alternatives 2020: Best Privacy Friendly Alternatives
  2736. How to Build a Global Network that Complies with Local Law
  2737. Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  2738. There's Always More History • Hillel Wayne
  2739. Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  2740. Improving DNS Privacy with Oblivious DoH in 1.1.1.1
  2741. From Zero to AppStore
  2742. Privacy needs to be built into the Internet
  2743. benwilber/boltstream
  2744. Welcome to Privacy & Compliance Week
  2745. InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  2746. On Trusting Macintosh Hardware
  2747. An introduction to three-phase power and PDUs
  2748. Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  2749. How to Make Your Code Reviewer Fall in Love with You
  2750. Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  2751. An iOS zero-click radio proximity exploit odyssey
  2752. Gamedev from scratch 0: Groundwork
  2753. Release OpenZFS 2.0.0 · openzfs/zfs
  2754. We Need Organic Software
  2755. ph1lter
  2756. Are My Encryption Keys In The Cloud Really Secure?
  2757. How to Think for Yourself
  2758. An ex-Googler's guide to dev tools
  2759. Crypto Dictionary
  2760. Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  2761. How do people find bugs?
  2762. What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  2763. Getting lucky with posting on Hacker News
  2764. Productive Uncertainty - Reaction Wheel
  2765. zkSummit 6 | Hopin
  2766. Normal Forms - Simple Talk
  2767. The book is finished, well sort of...
  2768. Facebook Is Going After Its Critics in the Name of Privacy
  2769. Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  2770. The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  2771. zfs.rent
  2772. Six months of Tiny Projects
  2773. Anchoring Trust: A Hardware Secure Boot Story
  2774. Claims encryption for B2C tokens | Developer Support
  2775. Can’t open apps on macOS: an OCSP disaster waiting to happen
  2776. Using Matrix to replace proprietary and centralized chat apps
  2777. Going Bark: A Furry’s Guide to End-to-End Encryption
  2778. Does Apple really log every app you run? A technical look
  2779. SAD DNS Explained
  2780. How a Game Developer Leaked 46 Million Accounts
  2781. Etebase - Your end-to-end encrypted backend
  2782. Get Animal Jam for your mobile device, PC, or Mac
  2783. caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  2784. Notes On Owning Your Own Business
  2785. How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  2786. Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  2787. Zoom lied to users about end-to-end encryption for years, FTC says
  2788. What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  2789. Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  2790. Over 1M Lazada RedMart accounts sold online after data breach
  2791. Productivity vs. Privacy
  2792. Multithreading Handbook for Simulation Developers
  2793. The missing explanation of zk-SNARKs: Part 2
  2794. Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  2795. Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  2796. Standing on Our Own Two Feet
  2797. Querying Across Databases In SQL Azure
  2798. Scripts for Managing Azure Container Registry
  2799. A Brief Introduction to Deniability
  2800. Leaving OCaml
  2801. Two workers are quadratically better than one • Hillel Wayne
  2802. C# in Simple Terms - Exceptions and Exception Handling
  2803. The Basis of Testing – Stories from a Software Tester
  2804. Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  2805. The missing explanation of ZK-SNARKs: Part 1
  2806. Scott Santens - An Engineering Argument for Basic Income
  2807. RedMart Data Security Incident
  2808. Episode 63 - Being Productive With Jay Miller
  2809. How software eats money
  2810. ML Optimization pt.1 - Gradient Descent with Python
  2811. Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  2812. gnu.org
  2813. Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  2814. 1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  2815. Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  2816. Azure CLI Oct 2020 release
  2817. The accelerating adoption of Julia
  2818. Personal banking needs an API | Chris Hardie's Tech and Software Blog
  2819. Let's talk about fake reviews - part 1
  2820. 14 Popular Machine Learning Evaluation Metrics
  2821. A Legislative Path to an Interoperable Internet
  2822. Questioning Probability
  2823. charmbracelet/glow
  2824. Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  2825. Exposing covert surveillance backdoors in children’s smartwatches
  2826. XChaCha20-Poly1305: A Primer with Examples in .NET
  2827. Event Feeds: Simple and reliable messaging infrastructure
  2828. Smart male chastity lock cock-up
  2829. Stop the EARN IT Bill Before It Breaks Encryption
  2830. Security Of Streaming Encryption In Google's Tink Library
  2831. It Didn’t Take Too Long…
  2832. Fortunately, I don't squash my commits
  2833. Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  2834. Wiki - RustStarterKit2020
  2835. Episode 61 - Azure and Live Conferences With Andy Morrell
  2836. Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  2837. Coinbase offers exit package to those uncomfortable with new direction
  2838. Doing discourse better: Stuff I wish I knew
  2839. is it worth it? — Martin Kleppmann’s blog
  2840. Advisory: security issues in AWS KMS and AWS Encryption SDKs
  2841. This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  2842. Zig's New Relationship with LLVM
  2843. How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  2844. Using Azure RBAC with Azure Key Vault
  2845. Uncomfortable Questions About App Signing
  2846. 71.177.243.54
  2847. Google Interview Questions Deconstructed: The Knight’s Dialer
  2848. Simple Anomaly Detection Using Plain SQL
  2849. Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  2850. VPNs from first principles
  2851. No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  2852. Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  2853. dwmkerr/hacker-laws
  2854. Revenue Model, not Culture, is the Dominant Term
  2855. CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  2856. When double.Epsilon can equal 0
  2857. Let's Encrypt's New Root and Intermediate Certificates
  2858. A Thanksgiving Carol
  2859. Nvidia’s Integration Dreams
  2860. Phosphine gas in the cloud decks of Venus
  2861. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  2862. Some Great Books For Programmers That StackOverflow Cannot Replace
  2863. Security by Obscurity is Underrated
  2864. What Clojure spec is and what you can do with it (an illustrated guide)
  2865. Raccoon Attack
  2866. BashPitfalls - Greg's Wiki
  2867. TLS certificate lifespan cut short: A win for security, or cause for chaos?
  2868. Things I Learned to Become a Senior Software Engineer
  2869. Verizon achieves milestone in future-proofing data from hackers
  2870. Why you want to encrypt password hashes
  2871. Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  2872. Attention is your scarcest resource
  2873. Key exchange standards - Manning
  2874. Key exchange standards - Manning
  2875. connorferster/handcalcs
  2876. The Why and How of Privacy and Security — This Too Shall Grow
  2877. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  2878. I've decided to pursue a Bootstrap MBA
  2879. Why I’m Writing A Book On Cryptography
  2880. Minimal React: getting started with the frontend library
  2881. Soatok’s Guide to Side-Channel Attacks
  2882. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  2883. So you want to roll your own crypto?
  2884. Zoom is now critical infrastructure. That’s a concern
  2885. Pure and Applied Chess
  2886. It Took 2 Years To Make My First Dollar Selling A Product
  2887. The Five Pillars Of Wealth Building - Darius Foroux
  2888. Heyyyyyyyyyyyy.com | email with *nuance*
  2889. Providers | PrivacyTools
  2890. Is cloud security too easy to screw up? | A Cloud Guru
  2891. A New Botnet Is Covertly Targeting Millions of Servers
  2892. Cross-platform cryptography in .NET Core and .NET 5
  2893. degoogle
  2894. drduh/macOS-Security-and-Privacy-Guide
  2895. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  2896. July 11, 2020 - LiveAuctioneers Account Security
  2897. What's new in the Windows Store client
  2898. fast.ai releases new deep learning course, four libraries, and 600-page book
  2899. Transfer a Software Project - Lessons Learned - dcaulfield
  2900. jesseduffield/horcrux
  2901. Obfuscating your email on the web
  2902. A Guide to Autodidactism | Jack Kinsella
  2903. Symmetric and Asymmetric Encryption in .NET Core
  2904. You Need a Password Manager. Here Are the Best Ones
  2905. Graphical Linear Algebra
  2906. Let's Learn x86-64 Assembly! Part 0
  2907. Nintendo DS Architecture | A Practical Analysis
  2908. Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  2909. JWTs: Which Signing Algorithm Should I Use?
  2910. Data Breach Statement - Utah Gun Exchange
  2911. 2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  2912. Why I Left a Career as a Startup CTO to Become a Writer
  2913. IBM Reveals Next-Generation IBM POWER10 Processor
  2914. Hiding messages in x86 binaries using semantic duals
  2915. The Illustrated TLS Connection
  2916. Frustrated? It's not you, it's Rust - fasterthanli.me
  2917. Mozilla's failures and a path to profitability
  2918. Intel® Trust Domain Extensions
  2919. Handles are the better pointers
  2920. Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  2921. Serverless apps on AWS using F# and fable
  2922. Mozilla Alumni Network
  2923. The CompSci Pub
  2924. I don’t trust Signal
  2925. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  2926. Mobile Phone Streams
  2927. bulletproofs::notes::range_proof - Rust
  2928. How to encrypt and decrypt shared folders on my Synology NAS
  2929. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  2930. Building dashboards for operational visibility | Amazon Builders' Library
  2931. A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  2932. Proof of X
  2933. hephaest0s/usbkill
  2934. 1Password for Linux development preview
  2935. 27-inch iMac gets a major update
  2936. Tales of the Autistic Developer - Senior Developer
  2937. How it works - Briar
  2938. Azure Cloud Shell Tips And Tricks | Build5Nines
  2939. Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  2940. David Wong
  2941. swyx Writing | Slack is Fumbling Developers
  2942. Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  2943. .NET R&D Digest (July, 2020)
  2944. Chessprogramming wiki
  2945. Polymorphic Encryption Algorithms — Generating Code Dynamically
  2946. Some SQL Tricks of an Application DBA
  2947. You Want Options
  2948. Tip 272 - Azure Security Best Practices
  2949. Joe Bergeron | Java Obfuscation: A Pattern Language
  2950. p410n3 blog
  2951. Dropping Out of College to Join Facebook: 3 Years Later
  2952. Storage 101: Data Security and Privacy - Simple Talk
  2953. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  2954. Exploring Fully Homomorphic Encryption
  2955. Essays on programming I think about a lot
  2956. You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  2957. Designing a New Old Home: Part 1
  2958. The encrypted homelab
  2959. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  2960. MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  2961. What’s New in Thunderbird 78
  2962. 100 Best Kubernetes Books of All Time
  2963. Poor feedback from readers
  2964. Hacking Reolink cameras for fun and profit
  2965. Welcome to Element!
  2966. Data Structures & Algorithms I Actually Used Working at Tech Companies
  2967. Digicert revokes a raft of web security certificates
  2968. Python Malware On The Rise
  2969. A few thoughts about Signal’s Secure Value Recovery
  2970. Trending
  2971. Disabling Google 2FA Doesn't Need 2FA
  2972. New German law would force ISPs to allow secret service to install trojans on user devices
  2973. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  2974. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  2975. Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  2976. A Team
  2977. Clean Architecture, 2 years later - Elton Minetto
  2978. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  2979. A Concurrency Cost Hierarchy
  2980. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  2981. Why I’m Writing A Book On Cryptography
  2982. nabeelqu
  2983. Why Can't I Reproduce Their Results?
  2984. The true cost of knowledge | RoyalSloth
  2985. Beware the Google Password Manager - fasterthanli.me
  2986. Apple Lightning
  2987. Oppose the EARN IT Act
  2988. New Mac ransomware spreading through piracy - Malwarebytes Labs
  2989. How CDNs Generate Certificates
  2990. foambubble/foam
  2991. How to get the best out of your Yubikey with GPG
  2992. New US Bill would require makers of encrypted devices to leave a backdoor
  2993. Why AES-GCM Sucks
  2994. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  2995. Navigating Power & Status
  2996. Which Database should I use in my Azure Serverless App?
  2997. Avoiding exposing identifier details to your users
  2998. jonathan-laurent/AlphaZero.jl
  2999. Do you CI? | Benji's Blog -
  3000. How is NSA breaking so much crypto?
  3001. Discovering Dennis Ritchie’s Lost Dissertation - CHM
  3002. The smartest password policy enforcer for Active Directory
  3003. Making your data residency choices easier with Azure
  3004. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  3005. End-to-End Encryption Update - Zoom Blog
  3006. GitHub Terms of Service - GitHub Help
  3007. Reasoning by Lego: The wrong way to think about cryptography.
  3008. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  3009. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  3010. May 2020 news · Gwern.net
  3011. Exploration Strategies in Deep Reinforcement Learning
  3012. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  3013. DRY vs DAMP in Unit Tests
  3014. How to set compensation using commonsense principles
  3015. Playing Around With The Fuchsia Operating System
  3016. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  3017. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  3018. Google got rich from your data. DuckDuckGo is fighting back
  3019. Discret 11, the French TV encryption of the 80's
  3020. Hacking Windows with F# 5.0 Scripts
  3021. Byzantine and non-Byzantine distributed systems
  3022. Logging with Decorators in TypeScript
  3023. How are you improving your technology skills today? Start by reading articles
  3024. The Dictator's Army and charismatic founders
  3025. Is a trillion-dollar worth of programming lying on the ground
  3026. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  3027. Introducing P2P Matrix | Matrix.org
  3028. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  3029. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  3030. ScottHolden/BFSourceGen
  3031. A Guide to Threat Modelling for Developers
  3032. Against an Increasingly User-Hostile Web
  3033. A Guide to Threat Modelling for Developers
  3034. Obsidian
  3035. Messaging with Azure Service Bus - Part 9 - Premium Features
  3036. A Guide to Threat Modelling for Developers
  3037. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  3038. Org Mode - Organize Your Life In Plain Text!
  3039. Implementing simple cooperative threads in C - Stephen Brennan
  3040. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  3041. NIST Special Publication 800-63-3
  3042. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  3043. A Guide to Threat Modelling for Developers
  3044. Introduction to quantum computing with Q# – Part 3, Single qubit gates
  3045. Turning Signal App into a Coarse Tracking Device
  3046. A Guide to Threat Modelling for Developers
  3047. OpenBSD 6.7
  3048. Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  3049. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  3050. A Guide to Threat Modelling for Developers
  3051. Cryptology ePrint Archive: Report 2020/572
  3052. How Not to Store Passwords
  3053. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  3054. Replacing JWTs with Branca and PASETO in .NET Core
  3055. Meshing with LinkerD2 using gRPC-enabled .NET Core services
  3056. Lockdown Course: Introduction to Cryptography - James Grime
  3057. Asgard Systems uses ML.NET to reduce food waste | .NET
  3058. Make LLVM fast again
  3059. Zoom buys Keybase to help it build end-to-end encryption
  3060. Alternatives to PGP
  3061. Cryptology ePrint Archive: Report 2018/607
  3062. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  3063. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  3064. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  3065. April Extensions for Firefox Preview
  3066. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  3067. Modern SAT solvers: fast, neat and underused (part 1 of N)
  3068. Startup financial models - 12 templates compared for SaaS
  3069. OpenPGP Message Format
  3070. How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  3071. SailfishOS - Sailfish OS
  3072. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  3073. Why not "Why not WireGuard?"
  3074. Messaging with Azure Service Bus - Part 5 - Message Sending Options
  3075. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  3076. Barbie typewriter
  3077. Preventing Software Rot
  3078. Search Results - Springer
  3079. Build a C# App with CockroachDB and the .NET Npgsql Driver
  3080. This is what end-to-end encryption should look like! - Jitsi
  3081. FocalFossa/ReleaseNotes - Ubuntu Wiki
  3082. How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  3083. ZEIT is now Vercel - Vercel
  3084. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  3085. Scuttlebot peer-to-peer log store
  3086. Saving Money on Internation Payments as a Remote Freelancer
  3087. This is what end-to-end encryption should look like! - Jitsi
  3088. Technical reasons to choose FreeBSD over GNU/Linux
  3089. The limitations of Android N Encryption
  3090. Hacking my Sixth Form College network in 1991
  3091. Temporal circuit of macroscale dynamic brain activity supports human consciousness
  3092. Learn dbatools in a Month of Lunches
  3093. Running your own secure communication service with Matrix and Jitsi | Matrix.org
  3094. OnCheckin - Continuous Deployment for ASP.Net websites.
  3095. Welcome · Real-World Cryptography MEAP V05
  3096. How we recovered over $300K of Bitcoin
  3097. Reassuring Words and Good Intentions Don't Mean Good Security
  3098. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  3099. A Message to Our Users - Zoom Blog
  3100. The EARN IT Act Violates the Constitution
  3101. Perspectives & gaps between theory, practice & industry research in cryptography
  3102. .NET R&D Digest (March, 2020)
  3103. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  3104. US Government Wages War on Encryption
  3105. Await | Writing an OS in Rust
  3106. patents in crypto
  3107. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  3108. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  3109. New grad vs senior dev
  3110. Released: Microsoft.Data.SqlClient 2.0 Preview 2
  3111. Speeding up Linux disk encryption
  3112. Unsure Calculator
  3113. [15] RFR 8172680: Support SHA-3 based Hmac algorithms
  3114. A Quick Garbled Circuits Primer
  3115. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  3116. Software Engineer - Jobs at Apple
  3117. How Tailscale works
  3118. Scott Helme
  3119. MacBook Air
  3120. Ryan_Connolly_Resume.docx
  3121. EARN IT bill is aiming at destroying encryption. We must take action now.
  3122. Async ValueTask Pooling in .NET 5 | .NET Blog
  3123. ploeh blog
  3124. The polygons of Another World: Atari Jaguar
  3125. MakerDAO gets stress tested as ETH price plummets
  3126. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  3127. EARN IT Must Not Happen
  3128. What is Meshtastic?
  3129. A Template for Clean Domain-Driven Design Architecture
  3130. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  3131. How I Survived Being A $220k/year Intern
  3132. draft-ietf-mls-protocol-09
  3133. Keybase
  3134. EARN IT is a direct attack on end-to-end encryption
  3135. Intel x86 Root of Trust: loss of trust
  3136. The growth of command line options, 1979-Present
  3137. Re: SMB over QUIC: Files Without the VPN
  3138. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  3139. WireGuard Gives Linux a Faster, More Secure VPN
  3140. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  3141. zkMesh
  3142. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  3143. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  3144. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  3145. An Intuitive Guide to Linear Algebra – BetterExplained
  3146. It’s 2020. Is your code ready for leap day?
  3147. pwn.college BETA
  3148. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  3149. How can I create a password protected .zip file in Windows 10?
  3150. The Zen of Go | Dave Cheney
  3151. A Simple Range Proof From Polynomial Commitments - HackMD
  3152. microsoft/electionguard
  3153. TimeSnapper, automatic screenshot software, auto screen capture
  3154. hassio-addons/addon-ssh
  3155. Welcome to the UK .NET Tour 2020
  3156. Source Code | OpenVPN
  3157. A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  3158. Fundamental Concepts for Elastic Jobs in Azure SQL Database
  3159. Messaging Layer Security: Towards a New Era of Secure Group Messaging
  3160. Cryptologie
  3161. Update on our new and upcoming security keys
  3162. Latacora - Stop Using Encrypted Email
  3163. dwmkerr/hacker-laws
  3164. Real-World Cryptography
  3165. The NuGet Blog
  3166. How HTTPS works Part 1 — Building Blocks
  3167. google/tink
  3168. damienbod/AspNetCoreCertificates
  3169. Serious Cryptography | No Starch Press
  3170. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  3171. Dino 0.1 Release - Dino. Communicating happiness.
  3172. Ryujinx/Ryujinx
  3173. Searching For New Adventures In Software Development
  3174. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  3175. Building personal search infrastructure for your knowledge and code | beepb00p
  3176. Authentication, What The Fuck?
  3177. How to write a simple operating system in assembly language
  3178. Welcome to the UK .NET Tour 2020
  3179. v5.8 Release Notes
  3180. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  3181. .NET Core, .NET 5; the exodus of .NET Framework?
  3182. Autocrypt 1.1.0 documentation
  3183. On Privacy versus Freedom | Matrix.org
  3184. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  3185. Google gives up on US carriers, will roll out its own RCS chat system
  3186. .NET R&D Digest (November – December, 2019)
  3187. Signal >> Blog >> Technology Preview for secure value recovery
  3188. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  3189. Zero allocation code in C# and Unity - Seba's Lab
  3190. How to generate random numbers using water bubbles
  3191. tmds/Tmds.Ssh
  3192. oqtane/oqtane.framework
  3193. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  3194. Why IVPN - What makes IVPN the best privacy protection service
  3195. GateHub Investigation - Final Statement
  3196. Stop surveillance and preserve your privacy with IVPN
  3197. Isogeny crypto
  3198. Homepage | ZKProof Standards
  3199. dotnet/SqlClient
  3200. Thoughts on DNS-over-HTTPS
  3201. x86/x64 SIMD Instruction List (SSE to AVX512)
  3202. bye: FTP Support Is Going Away
  3203. Verzekeraar Allianz informeert klanten over datalek - Security.NL
  3204. Commas in big numbers everywhere: An OpenType adventure
  3205. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  3206. OceanLibrary/Ocean
  3207. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  3208. A detailed look at Ubuntu’s new experimental ZFS installer
  3209. Intel 545s 2.5&#34; 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive &#40;SSD&#41; SSDSC2KW256G8X1 - Newegg.com
  3210. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  3211. Peddle the Pedal to the Metal
  3212. praeclarum/sqlite-net
  3213. beemdevelopment/Aegis
  3214. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  3215. PrivacySafe: The Anti-Cloud Appliance
  3216. awslabs/s2n
  3217. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  3218. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  3219. OWASP/CheatSheetSeries
  3220. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  3221. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  3222. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  3223. Security Incident - Please Change Your Password
  3224. EV SSL Certificates Phased Out of New Browser Updates | Venafi
  3225. Learn UI Design: The Complete Online Video Course
  3226. KNOB Attack
  3227. Gone forEVer!
  3228. Spying on HTTPS
  3229. Online syntax highlighting for the masses!
  3230. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  3231. Canva Security Incident - May 24 FAQs
  3232. Architecture for humans - Ayende @ Rahien
  3233. Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
  3234. Pwnie Awards
  3235. More on Backdooring (or Not) WhatsApp - Schneier on Security
  3236. ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  3237. Kazakhstan’s HTTPS Interception
  3238. When a rewrite isn’t: rebuilding Slack on the desktop
  3239. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  3240. Digital Driver’s Licenses Could Become a Real Option in Some States
  3241. CRYPTO-LAB
  3242. Real-World Cryptography
  3243. Proving security at scale with automated reasoning - All Things Distributed
  3244. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  3245. The Ultra Secure Crypto Storage & Communication Device
  3246. Security advisory 2019-06-13 | Yubico
  3247. Fixing Random, part 34
  3248. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  3249. dotnet/coreclr
  3250. Apple CryptoKit | Apple Developer Documentation
  3251. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  3252. Accessing UNIX sockets remotely from .NET - Red Hat Developer
  3253. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  3254. Ethical Alternatives & Resources - ethical.net
  3255. dotnet/coreclr
  3256. Top SSL Certificates Buyer's Guide
  3257. Using Ed25519 signing keys for encryption
  3258. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  3259. ZombieLoad Attack
  3260. Domain Randomization for Sim2Real Transfer
  3261. eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  3262. ZkVM: a new design for fast, confidential smart contracts
  3263. Community and Communication going forward
  3264. Do we need effects to get abstraction?
  3265. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  3266. mpm guide - niall t.l.
  3267. The .NET Abstraction Pile
  3268. A Recipe for Training Neural Networks
  3269. Twisted Oak
  3270. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  3271. Peddle the Pedal to the Metal
  3272. JDK 12 Security Enhancements
  3273. Understanding the Limitations of HTTPS
  3274. Cryptologie
  3275. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  3276. Direct3D 11.3 Functional Specification
  3277. Verified cryptographic provider a triple threat
  3278. The story of the Rendition Vérité 1000
  3279. Scott Helme
  3280. Dotnet-Boxed/Templates
  3281. BoringTun, a userspace WireGuard implementation in Rust
  3282. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  3283. The WhibOx Contest Edition 2 - CYBERCRYPT
  3284. Understanding STIR/SHAKEN
  3285. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  3286. We need to talk about Session Tickets
  3287. Introduction
  3288. Cybersecurity for the Public Interest - Schneier on Security
  3289. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  3290. Data Leakage from Encrypted Databases - Schneier on Security
  3291. kelseyhightower/kubernetes-the-hard-way
  3292. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  3293. Crypto Canon - Andreessen Horowitz
  3294. Blockchain Governance: Programming Our Future
  3295. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  3296. Keybase launches encrypted git
  3297. AI Progress Measurement
  3298. Microsecond Resolution Time Services for Windows
  3299. vivri/Adjective
  3300. On the Security of Password Managers - Schneier on Security
  3301. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  3302. Reconstructing SIGSALY - Schneier on Security
  3303. Public-Interest Tech at the RSA Conference - Schneier on Security
  3304. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  3305. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  3306. Hacking the GCHQ Backdoor - Schneier on Security
  3307. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  3308. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  3309. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  3310. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  3311. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  3312. New Australian Backdoor Law - Schneier on Security
  3313. Security Risks of Chatbots - Schneier on Security
  3314. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  3315. Security of Solid-State-Drive Encryption - Schneier on Security
  3316. ID Systems Throughout the 50 States - Schneier on Security
  3317. Cell Phone Security and Heads of State - Schneier on Security
  3318. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  3319. Ext4 Disk Layout - Ext4
  3320. Modern Alternatives to PGP
  3321. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  3322. Real World Crypto 2019
  3323. The year in post-quantum crypto
  3324. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  3325. The Case Against Quantum Computing - IEEE Spectrum
  3326. Mathematics of Public Key Cryptography
  3327. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  3328. D. J. Bernstein / Talks
  3329. Security in Times of Surveillance
  3330. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  3331. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  3332. Pitching security vs. privacy is asking the wrong question
  3333. libpqcrypto: Intro
  3334. Security in Times of Surveillance
  3335. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  3336. The ROBOT Attack
  3337. Unity Labs Publications | Unity
  3338. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  3339. Cloud Data Backup for Small Businesses | CrashPlan
  3340. nucypher/nufhe
  3341. RUB-NDS/TLS-Padding-Oracles
  3342. [paper review] A faster, more efficient cryptocurrency
  3343. mimoo/eureka
  3344. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  3345. Database Encryption
  3346. Kerckhoffs’ principles – Why should I make my cipher public?
  3347. Proxy re-encryption and FHE with NuCypher
  3348. Attack of the week: searchable encryption and the ever-expanding leakage function
  3349. Introducing Adiantum: Encryption for the Next Billion Users
  3350. Quantum computing as a field is obvious bullshit
  3351. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  3352. Going old school: how I replaced Facebook with email
  3353. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  3354. » Agrippa (A Book of the Dead) The Digital Antiquarian
  3355. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  3356. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  3357. .NET Design Review: GitHub Quick Reviews
  3358. Tuning a Runtime for Both Productivity and Performance
  3359. We didn’t see this coming
  3360. Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  3361. dotnet/coreclr
  3362. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  3363. no dogma podcast - powered by FeedBurner
  3364. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  3365. Software Tokens Won't Save You
  3366. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1