Explore other dev related sites in this ring. If you find this idea useful
click here to join
.
devring.club
Previous
Random
Next
🎁
linksfor.dev(s)
Posts for 'encryption'
Finally, a Replacement for BERT: Introducing ModernBERT
How types make hard problems easy
Failing Randomly: Linux Seccomp and Kernel Hacking
No, You can’t bet on everything (and that’s okay)
Breaking into Vision
Parallel vector graphics rasterization on CPU.
GitHub - markmoxon/elite-source-code-commodore-64: Fully documented and annotated source code for Elite on the Commodore 64
Bluesky and Decentralization -- Dustycloud Brainstorms
Terraform Rules of Thumb
VC will be the best way finance learning
Sharing new research, models, and datasets from Meta FAIR
Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag | Evan Pratten
All Your Codebase
Google Announces Quantum Chip - Willow
Zero to CMake | Fred's Blog
Intel on the Brink of Death | Culture Rot, Product Focus Flawed, Foundry Must Survive
Becoming (more) Afraid To Post Online
nrdlg | From Nix to Eos
Librebooting the ThinkPad T480
Strategy is Not War; It’s Gardening
Lies I was Told About Collaborative Editing, Part 1: Algorithms for offline editing / Moment devlog
meta-llama/Llama-3.3-70B-Instruct · Hugging Face
How I Built the World's Largest Database of LEGO Minifigure Ratings
Teaching Elderly People to Use Android - Lessons Learned
Procedural Knowledge in Pretraining Drives LLM Reasoning
GitHub - privastead/privastead
Weaponizing SSO for profit - Raz Blog
A Vanity VNC server (or Joke over RFB) - ache
100 Bushels of Corn, Revisited – R Works
Solving LeetCode™ problems with Racket
How decentralized is Bluesky really? -- Dustycloud Brainstorms
How to Build a Chess Engine and Fail
Reverse Engineering iOS 18 Inactivity Reboot
fleetwood.dev
What To Use Instead of PGP - Dhole Moments
The fallacies of distributed systems
‘Reflections on Trusting Trust’, but completely by accident this time
Why I Quit Google to Work for Myself
Escape the Surveillance Web with Gemini
What I learned from 130 hours in a Waymo
Traceroute Isn't Real
Former Bayesian captain offers insight
Our First Generalist Policy
House of Nettles • A Non-Technical Intro to Webmentions
Authenticating People With Certificate Chains
Matrix 2.0 Is Here!
delroth's homepage - One weird trick to get the whole planet to send abuse complaints to your best friend(s)
llama-recipes/recipes/quickstart/NotebookLlama at main · meta-llama/llama-recipes
Managing Secrets in NixOS Home Manager with SOPS
Challenges deploying PostgreSQL (9.2) for high availability · Dave Pacheco's Blog
OpenZFS deduplication is good now and you shouldn't use it
Vulnerabilities of Realtek SD card reader driver, part 1
A decade of WiFi
Betting on Bali: My Journey Into the Offshoring Business
I got dysentery so you don’t have to
Clone your building key fob
Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
BearerToken: The new Authentication handler in ASP.NET Core 8
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
Improving ASP.NET Core Security By Putting Your Cookies On A Diet
Exploring what is inside the ASP.NET Core cookies
Improving ASP.NET Core Security By Putting Your Cookies On A Diet
Exploring what is inside the ASP.NET Core cookies
Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
BearerToken: The new Authentication handler in ASP.NET Core 8
HTML Whitespace is Broken - Devel without a Cause
The Stallman report
Turn your old laptop into low-end gaming machine
UDP, A Disclaimer, And QUIC
Large language models reduce public knowledge sharing on online Q&A platforms
Every bug/quirk of the Windows resource compiler (rc.exe), probably
Taste and Tradeoffs
Seven for a secret never to be told
Can You Get Root With Only a Cigarette Lighter?
Beware UserDefaults: a tale of hard to find bugs, and lost data
Getting my daily news from a dot matrix printer
Why I Prefer Errors to Exceptions
Reverse Engineering and Dismantling Kekz Headphones
Why laptop support, why now: FreeBSD’s strategic move toward broader adoption | FreeBSD Foundation
Evaluating the Effectiveness of LLM-Evaluators (aka LLM-as-Judge)
How Mobile Networks Work
A friendly introduction to assembly for high-level programmers — Conditionals
“Bad Romance”: How Kaspersky Lab Failed to Conquer the Western Cybersecurity Market
Digital signatures and how to avoid them
Using YouTube to steal your files
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia is available today
Solene'% : I moved my emails to Proton Mail
Notes on OpenAI’s new o1 chain-of-thought models
Arrays of Wisdom of the Ancients
The Integration of Hardware, Software and Services
Making a game for my friend's retro console — Nick Girardo
Kafka protocol practical guide - Ivan Yurchenko
Managing dotfiles with chezmoi | Daniel Stoddart
Keyhole | MAS
By request from the jobs thread: why my job is to watch dreams die.
Effective Spaced Repetition
Programming ZKPs: From Zero to Hero
To Nerves from Elixir
We've Been Lied To About Work
Exploring inner workings of a random free android VPN
How I’d Set Up My Tech If I Were Tate: Ensuring the Police Have Zero Evidence
Danny O'Brien's Oblomovka » Blog Archive
Why should anyone boot you up?
Why Solid?
Emulating the early Macintosh floppy drive
Is Telegram really an encrypted messaging app?
"What is marketing all about?" - Thoughts on marketing from a developer and rookie marketer
Continuous reinvention: A brief history of block storage at AWS
An unordered list of hidden gems inside NixOS — kokada
Running an LLM on a simple Raspberry Pi
.:: Phrack Magazine ::.
Cache Grab: How Much Are You Leaving on the Table? – CSS Wizardry
VHS to Digital
An underrated software engineering interview question – Jake Zimmerman
That's the Sound of Devs Working on the Chain Gang
Why I am stuck using Dropbox?
Vector Stores Are Dumb - Tim Kellogg
Hacking a VoIP Phone
CrowdStrike: Risk assessment is better off at the sharp end
Dual-Boot NetBSD And Archlinux
Tony Hawk's Pro Strcpy
1fps.video - Hassle-free Screen Sharing
LLM-centric Software Paradigms
A primer on how End-to-End Encryption IS NOT PREVENTING policing, arrest, or conviction of the rioters in the UK race riots (HT @shashj @DmitryOpines @AntiRacismDay @arusbridger)
Linux backup workflow for hackers with restic, rclone, Backblaze B2
Create your own DIY Password Manager with Vim and Syncthing
You Can't Spell WebRTC without RCE - Part 1
Against XMPP+OMEMO - Dhole Moments
Netninja.com
Advice to Young Engineers - Robotic Sea Bass
2024-07-31 just disconnect the internet
On software as an "in-discipline"
Why are open source nonprofits so weird?
Windows resiliency: Best practices and the path forward
Why can't I stop eating?
The New Internet
LiteCluster: Replicated, leaderless, ACID compliant & high availability SQLite
Quantifying Prospective Jobs
Panic! at the Tech Job Market
Software is more like a garden
ComplexType vs JSON Columns: Choosing the Right Data Storage Approach
Samsung Galaxy NX: a decade's review
Not so Secret: Analysis of KakaoTalk's Secret Chat E2EE Feature
Pretty pictures, bootable floppy disks, and the first Canon Cat demo?
The Tragedies of Reality Are Coming for You
Using aerc-mail with Outlook
Announcing SSMS 20.2 ... and getting feedback for SSMS 21
gRPC Over HTTP/3
Extrinsic Hallucinations in LLMs
How LLMs Learn: What We Know, What We Don't (Yet) Know, and What Comes Next
17 vulnerabilities in Sharp Multi-Function Printers
I Have No Constructor, and I Must Initialize
Proton launches its own version of Google Docs
Binary Classification Using LightGBM -- Visual Studio Magazine
Amateur Mathematicians Find Fifth ‘Busy Beaver’ Turing Machine | Quanta Magazine
Ladybird
Creating hashes in .NET
Ladybird
Automating my gate door
Do a firmware update for your AirPods – now – Jonas’ Blog
Mako - Mako is Now Open Source
Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
A Eulogy for DevOps
Rabbit hole full of hardcoded credentials by Mārtiņš Irbe
Skip and Kotlin Multiplatform
On Claude 3.5 Sonnet
Y292B bug
Training a 70B model from scratch: open-source tools, evaluation datasets, and learnings
Cognitive Architectures for Business Decision Making in Supply Chain Management
Why I attack
Profiling with Ctrl-C
How I Organize My Work As a Solo Founder
Why strand.spreen.co is Now Offline
How to Build a Fullstack Webapp with F#
How my weekend project turned into a 3 years journey
Inside the tiny chip that powers Montreal subway tickets
quackland.kr
Exploring How Cache Memory Really Works
EU Council has withdrawn the vote on Chat Control
Why and how to run your own FreeBSD package cache.
Chat Control: The EU's CSEM scanner proposal
What is HSTS and why is it in my ASP.NET Core app?
Chat Control Must Be Stopped – Now!
Chat control: incompatible with fundamental rights
GitHub - nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
Update on the Recall preview feature for Copilot+ PCs
Land value tax in online games and virtual worlds: A how-to guide
My experience crafting an interpreter with Rust
cr.yp.to: 2024.06.12: Bibliography keys
How To Encrypt ASP.NET Core Route Parameters
Solene'% : OpenBSD extreme privacy setup
Blog - Private Cloud Compute: A new frontier for AI privacy in the cloud - Apple Security Research
From Chaos to Clarity: My Journey with Obsidian
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
So You Want To Build A Browser Engine
12 years of the com.lihaoyi Scala Platform
0.13.0 Release Notes ⚡ The Zig Programming Language
When I Realized I Was Not That Guy
What is PID 0? · blog.dave.tf
Towards Federated Key Transparency - Dhole Moments
A Picture is Worth 170 Tokens: How Does GPT-4o Encode Images? - OranLooney.com
Bouncy Castle Cryptography Library for .NET - Code Maze
From Scratch - Generative Adversarial Networks
Blazor in .NET 9 Takes Shape (Preview 4 Highlights)
Encryption At Rest: Whose Threat Model Is It Anyway?
Attacking NIST SP 800-108
Even more Opentelemetry!
Rationalizing Latency Competition in High-Frequency Trading – Headlands Technologies LLC Blog
Encryption At Rest: Whose Threat Model Is It Anyway?
Setting up a local reverse proxy on Proxmox with Traefik and Cloudflare
Majority for chat control possible – Users who refuse scanning to be prevented from sharing photos and links
Lizzy Banks. This story must be heard.
Make Chrome go brrrrrr....
htmx: Simplicity in an Age of Complicated Solutions
Moving Beyond Type Systems | Vhyrro's Digital Garden
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
What We've Learned From A Year of Building with LLMs
Things you wish you didn't need to know about S3
Building a serverless secured dead drop
Startup Risk
Opinion: Ottawa wants the power to create secret backdoors in our networks to allow for surveillance
re: Secure Drop protocol
Web App Security—Broken Authentication vs Session Management
Demystifying Golang Slices
Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs
Understanding Coupling in Software Development
Windows Recall sounds like a privacy nightmare – here's why I'm worried
Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
The Decorator Pattern in Modern C# [2024]
Designing a Scalable OCPP server - Siddharth Sabron
The WAF Swiss-Knife – Pomba Labs
Thinking out loud about 2nd-gen Email – Gabriel Sieben
Stuff I know about ZIP | orchid.pink
New in .NET 8: ASP.NET Core Identity and How to Implement It
100 Exercises To Learn Rust
BashFu - Open X11 window with netcat, echo, pipes and file system
Localizing a .NET console or desktop application
Wolverine’s HTTP Model Does More For You
PeaZip free archiver utility, open extract RAR TAR ZIP files
Dancing on the Shoulders of Giants
using golang's crypto/aes and crypto/cipher packages
Disaster recovery with ZFS and zrepl
Proton Mail Discloses User Data Leading to Arrest in Spain
CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
Deniable Encryption
Conservative codomain conjecture
Using age with org-journal
Hallucination-Free RAG: Making LLMs Safe for Healthcare
My Home Server Journey - From Raspberry Pi to Ryzen
No, I don’t want to fill out your contact form
Deniable Encryption
Woodworking as an escape from the absurdity of software
Multi-Class Classification Using LightGBM -- Visual Studio Magazine
Online Cryptography Course by Dan Boneh
The Disappearance of Lived Time
Direct Preference Optimization Explained In-depth
1000x the telemetry at 0.01x the cost
the Stabilizer Problem
The Simplest Thing In The World: Modifing Keymaps in Wayland
Harry Chapin and RATM: the problem with bleeding interests
Anneal autopsy
C isn’t a Hangover; Rust isn’t a Hangover Cure
open letter to the NixOS foundation
Id30 – magnushoff.com
Why you shouldn't run a BSD on a PC
Why Everything is Becoming a Game
10x Engineers vs -10x Burdens
GoFetch: Will people ever learn?
How do electronic passports work? | Burak Can's Blog
Basic Things Mar 22, 2024
Diffusion Models for Video Generation
I launched a new startup and shut it down in two weeks - Andrew Miracle
Big Integer in Zig
#ChatControl: EU ministers want to exempt themselves
Is Attention All You Need?
PuTTY vulnerability vuln-p521-bias
The Making of Side 7 | GUNDAM EVOLUTION Private Server Project
Building a GPS Receiver, Part 1: Hearing Whispers
Responses to Rabble on ActivityPub
My useless philosophical ramblings about the ecology of programming languages (and OOP is not Java)
Kaspersky analysis of the backdoor in XZ
Common pitfalls of digital health startups & advice on how to avoid them
Our Response to Hashicorp's Cease and Desist Letter | OpenTofu
Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
Extracting curve coordinates from a bitmap
Habitually - I’ve Been Tracking Everything in My Life for A Year
How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
What it’s like to run HTMX in Production
Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
smeso - MIPS stacktrace: an unexpected journey
How to securely reverse-proxy ASP.NET Core web apps
'If this one guy got hit by a bus, the world's software would fall apart.'
Generative transformer from first principles in Julia - Lior Sinai
OpenBSD 7.5
LLM Task-Specific Evals that Do & Don't Work
Performance insights: Engineering for high performance
XZ Backdoor: Not the End of Open Source
What we know about the xz Utils backdoor that almost infected the world
LLaMA Now Goes Faster on CPUs
Refurb weekend: Data General/One (and the worst LCD in the world)
Mental Health in Software Engineering
Filippo Valsorda (@filippo.abyssdomain.expert)
Solving the “Are You a Millionaire?” Problem with ZK certificates
Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
Malicious email .ics attachments
Sealed: Custom Wax Seal NFC Tags
My 12 Favorite Problems
Roll your own ZFS NAS
Knee Deep in tree-sitter Queries
A better jittering approach for discretization acknowledgment in density estimation
The Linux Desktop Is Finally Great (both Ubuntu and Firefox)
IP Geolocation Is Twenty-Five Years Old
How I Built a Bootstrapped Consulting Company: From Zero To 60k€ Revenue
All the fallacies in the world
Functional foundations ⚙️
Securing WebSocket Channels in Local Development: A Guide with Soketi and Laravel Valet - AhmadYousefDev
Conversational Spaced Repetition | David Bieber
Building For Builders - deven.codes
Cloning a laptop over NVME TCP
Plugin Architecture in C# for Improved Software Design
C and C++ Prioritize Performance over Correctness
ZK Taipei #5: ZK Day · Luma
S06E12 - nanoFramework: Unleashing the Power of C# in Embedded Systems and IoT with José Simões
Make your own E-Mail server - FreeBSD, OpenSMTPD, Rspamd and Dovecot included - Part 1
Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
The Pile
Parallel Zero-knowledge Virtual Machine
Azure Cosmos DB — Getting Started and Creating a NoSQL Database
An Overview Of Quantum Computing's Possible Impact On Cryptography
The Case Against Geometric Algebra
Ente - Private cloud for your photos, videos and more
List of 2024 Leap Day Bugs
CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
GitHub - microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
How law firms and corporations are dealing with USPTO’s non-DOCX penalty
Why I use Firefox
Nintendo is suing the creators of Switch emulator Yuzu
Gemini server for 0ut3r.space
Writing is hard, so I got help
The Effect Existence, Its Magnitude, and the Goals
GitHub - zksecurity/zkBank: zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault – Tore Nestenius
ARCHITECTURE.md
ESP32 based voice assistant with wake word – Tristam
OK-Robot: What Really Matters in Integrating Open-Knowledge Models for Robotics
After 14 years in the industry, I still find programming difficult
The Billion Row Challenge (1BRC) - Step-by-step from 71s to 1.7s
ZK Mini Summit · Luma
What is Scrum and is Scrum good for startups? — todo.space blog
Large Language Models Are Drunk at the Wheel
Atuin - Magical Shell History
Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
Open Source: Current State and Future Hopes
Using Azure Key Vault for signing and encrypting JSON Web Tokens
Introducing Safecat
How Google is killing independent sites like ours - HouseFresh
Diseconomies of scale in fraud, spam, support, and moderation
Share a private key without using passwords
Plus and Times Set Free
AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
Tech Support Stories Part 2
How I did the layout for my self-published book
Climbing out of the rabbit hole
E2EE on the web: is the web really that bad?
varoa.net | Galo Navarro
A love letter to the Internet
Synthetic Data for Finetuning: Distillation and Self-Improvement
Secure Yo Self
European Court of Human Rights bans weakening of secure end-to-endencryption - the end of EU‘s chat control CSAR mass surveillance plans?
Engineering Practices for LLM Application Development
I worry our Copilot is leaving some passengers behind
Sign and Verify Messages with HMAC Using the Web Crypto API
Lunar reflections during SLIM landing – Daniel Estévez
Episode 485 - Copilot for Azure
Ransomware Hit $1 Billion in 2023
'Prompt Engineering' Jokes Abound when GitHub Asks Devs for Tips -- Visual Studio Magazine
How to Get the Number of Files in a Folder With C# - Code Maze
.NET Rocks! gRPC Update with Irina Scurtu
How to Use Dapper in Your .NET Projects
From Zero to .NET MAUI: Seeking One Codebase to Run Everywhere -- Visual Studio Magazine
Reverse engineering Skylanders' Toys-to-life mechanics
The Noise Protocol Framework
(Mis)estimation – why estimation does not work
Introducing Citrea: Bitcoin’s First ZK Rollup
Finding New Mountains to Climb
Tools and Best Practices for Secret Management in .NET - Code Maze
Hacking a Smart Home Device
Remaking the app store — Benedict Evans
Issue 46: Is Being Well Read Actually a Thing? Pt III: The Well-Read Archetypes
A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
Infrastructure: From Zero to Enterprise
Reverse-engineering the Synacor Challenge
Embracing Functional Programming in C#
Your Security Program Is Shit
The end of my childhood
The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
I think Notion Calendar is brilliant. Not the features, though. - Tuấn Mon
Snowpipe Streaming Deep Dive
Self-hosted media center
Playing with Nom and parser combinators
Error categories and category errors
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
Crypto is not cryptocurrency
Unleashing the Cloud: A Historical Odyssey of Cloud Storage
Rclone syncs your files to cloud storage
What I Learned from Indie Consulting - jxnl.co
Ruby on Rails load testing habits
zkBitcoin: Zero-Knowledge Applications for Bitcoin
GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
2023 letter | Dan Wang
Corax, Lucene, Benchmarks and lies!
The ZK update conflict issue in multi-user applications
Zero-knowledge proofs in stateful applications
Public Key Encryption with the JavaScript Web Crypto API
Being Intentional in 2024
zero-knowledge proof apps on Bitcoin
Improving ASP.NET Core Security By Putting Your Cookies On A Diet – Tore Nestenius
Learn to code. Or don’t.
There is still cool stuff on the internet
Ceph: A Journey to 1 TiB/s - Ceph
GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
RSA is deceptively simple (and fun)
OpenAI drops ban on military tools to partner with the Pentagon | Semafor
Postgres password encryption without leaking credentials
NixOS on Hetzner Dedicated - mhu.dev
Exploring .NET frozen segments
asmBB Forum "What is AsmBB?"
The Slow Frontier of Genetic Choice
What's out there for ECDSA threshold signatures
</> htmx ~ Is htmx Just Another JavaScript Framework?
The ZK update conflict issue in multi-user applications
JSON Web Tokens are actually great, just not for sessions
Outlook is Microsoft’s new data collection service | Proton
Binius: a Hardware-Optimized SNARK
Language Modeling Reading List (to Start Your Paper Club)
Gmail And Yahoo Inbox Updates & What They Mean For Senders | Mailgun
Released: Security updates for Microsoft.Data.SqlClient and System.Data.SqlClient
Tokenization, or How I Learned to Stop Worrying and Love the Vault
What Is Linux Mobile
Nino
1BRC in .NET · gunnarmorling/1brc · Discussion #44
Questionable Advice: “My boss says we don’t need any engineering managers. Is he right?”
Artificial Knowledge Creation
RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
Hacking a CTF: Do not use ECB mode for encryption
How to Speak the Language of the Internet: A Introduction to the Most Common Network Protocols
Major performance (I/O?) issue in /mnt/* and in ~ (home) · Issue #873 · microsoft/WSL
Mozilla CEO wants business to pick up the pace
Trustlessness and the left
Aleo completes security audits of snarkOS & snarkVM
How to Format a String as Base64 in CSharp – Beginner’s Guide
Compiling Success: My Aspirations for a Transformative Year Ahead - Chris Woodruff's Blog
How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT
The Art of HPC
Linux Boomers
What if I paid for all my free software?
EP 38 : How to use Guard Clauses in C#
"Attention", "Transformers", in Neural Network "Large Language Models"
Update in Thrussh: the SSH Terrapin attack
Don’t Believe Your Eyes - A WhatsApp Clickjacking Vulnerability
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Beeper - Moving Forward
Announcing the Aleo Foundation
New capabilities help simplify and streamline the experience with Microsoft Dev Box
Empirically sup code review best practices
Steering at the Frontier: Extending the Power of Prompting - Microsoft Research
ZFS Profiling on Arch Linux | Bin Wang
Announcing the first Arecibo release
How to Get an Access Token from HttpContext in ASP.NET Core
Kubernetes v1.29: Mandala
Adopting Rust: the missing playbook for managers and CTOs - Mainmatter
Architecting Observability in a Cloud-Native World With eBPF
Demystifying OpenID Connect’s State and Nonce Parameters in ASP.NET Core – Tore Nestenius
Good Docs Take Great Effort
GNU ASCII armor: send encrypted data in plain text
Beeper Mini Is Back
RFC 9330: Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture
6 lessons from building 6 projects, while nomading for 6 months - Dmitry Kudryavtsev
zkLogin | Sui Documentation
GitHub - openbao/openbao at development
Why Team Leaders Give Up
💸 Sending a file in 2017 | Zack Scholl
iMessage, explained
Beeper Mini - iMessage on Android
bips/bip-0341.mediawiki at master · bitcoin/bips
I Hacked Magic the Gathering: Arena for a 100% Winrate
Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
I Started With Nix, NixOS, Home Manager and Flakes
Monocypher 4: The Clean Break
Remote collaboration fuses fewer breakthrough ideas? Probably not.
EP rejects mass scanning of private messages - European Digital Rights (EDRi)
Y Combinator's Future in the Software Slowdown
I got top 20 on my first product hunt launch by doing a homework assignment
How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
Restic Backups on Backblaze B2 with NixOS
Exploring Generative AI
My Personal Data Backup Pipeline – Justin Paulin
Matrix vs. XMPP | Luke's Webpage
My techno-optimism
Demystifying Web Push Notifications
Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
Communication Ministry studying report of IndiHome data leak - ANTARA News
Discover the Magic of .NET 8 and Beyond!
Docker Security Principles Overview - Simple Talk
Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
“Shift left”—wtf does it mean?
Sqids (formerly Hashids) · Generate Short IDs from Numbers
The Bond villain compliance strategy
All that Infocom interpreter code
Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
How STARKs work if you don't care about FRI
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Things Programmers Can Do in One Week | Blog | build-your-own.org
What Is Refactoring And Understanding Why You Need It
Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
Back up your Bitwarden vault in a future-proof and secure way
Exploring macOS private frameworks
Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
Things Programmers Can Do in One Week | Blog | build-your-own.org
ConcurrentStack in C# - Code Maze
Cryptographers Solve Decades-Old Privacy Problem
Sunbird Security Isn’t Nothing
Sunbird / ‘Nothing Chats’ is Not Secure.
All of the writing I did in a week as a software engineer
Every software is messy and has skeletons
Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
Mainframe and midrange modernization - Azure Logic Apps
Built a bunch of apps, here's what I learned
Privacy is Priceless, but Signal is Expensive
Fiat-Shamir security of FRI and related SNARKs — Part 1
The OSI Model Revisited
Making a nice API of Amtrak's ugly API
Data-as-a-Product: the keystone of the data-mesh
Is the Reversal Curse Real?
CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
Read the docs like a book - Aaron Francis
Building an occupancy sensor with an ESP32 and a serverless DB
OpenAI Platform
Data Oriented Blogging
An important step towards secure and interoperable messaging
Blockchains and the Future of AI
Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
A clarification on the multithreading constraints of the EncryptMessage function - The Old New Thing
Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
Article 45 Will Roll Back Web Security by 12 Years
Seeing like a Bank
Live Coding a containerized web app for event management
Social Networking
GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
Why I Ran Away from Philosophy Because of Sam Bankman-Fried
Getting our focus back
Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
Mechanistic interpretability of LLM analogy-making
Giopler | Easy C++ Profile Debug Trace
Why I Am a Pluralist
How To Rob a Bank
General Knowledge Poker — Drawn In Perspective
An Open Letter to Cryptographers: Please Work Together
.NET 8 Top 10 New Features - NDepend Blog
Lifespan extension: separating fact from fiction
Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
Azure: the cloud platform that is changing the world
From CSS madness to CSS Hooks
An Analysis of Signal's PQXDH
A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
Hampton Blog
How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
Nobody knows what a good password looks like
SQL Server Security Primer - Simple Talk
Encrypt. Now. — blog.tripu.info
Creating a Variable Color Font From Scratch
Memory alignment of doubles in C#
Security: The Impact of Time
SSH Hardening with ssh-audit
Intercepting Allocations with the Global Allocator
GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Massive input and/or spaced repetition
LSP could have been better
Radical Energy Abundance
How I built a MVP in 14 hours
Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
Polylang – Polylang by Polybase Labs
Strikeout (ꓘ) Blog - Security Researcher
How to Perform Case-Insensitive Substring Search in C#
Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
Building an Anomaly Detection System with Recurrent Neural Networks
A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
Observing OSIRIS-REx during the capsule reentry – Daniel Estévez
How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
Understand Linear regression through many facets
Store ssh keys inside the TPM: ssh-tpm-agent
Why HTTP/3 is eating the world | APNIC Blog
Converting a Hexadecimal String to a Byte Array in C# - Code Maze
Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
Security Tradeoffs: Privacy
How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
I don't want to know IPs: encryption in TORRENTDYNE
A journey into zero-knowledge proofs
Reclaim Successfully Passed the ZK Circuit Security Audit
Buy wisely
Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
Public report of Reclaim protocol's ChaCha20 circuit
Free Open source disk encryption with strong security for the Paranoid
Mozilla and the burning need for clients for power users
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
Security in the cloud: Whose responsibility is it?
Finding Bathroom Faucets with Embeddings
On the future of cloud services and BYOC — Jack Vanlightly
Binding Sigmas in Circuits for Fast Curve Operations
Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
t3chn0tix - Your Source for the Latest Tech News
Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
Nintendo 3DS Architecture | A Practical Analysis
Signal Messenger: Speak Freely
S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
What link previews leak | aaron blog
Matrix 2.0: The Future of Matrix
Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users
64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
Inside New Query Engine of MongoDB
Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
Quantum Resistance and the Signal Protocol
Exploring Generative AI
ESXi on SolidRun V3000
SimulaVR
Exploring The Halo 1 System Link Protocol
Nuclear Propulsion | Charles Pellegrino
How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
Book notes & reflections: An Elegant Puzzle
Mario Zechner (@badlogic@mastodon.gamedev.place)
ZK Security meetup with the Succinct Labs folks! · Luma
Kopia
Dymocks - Customer Notices
Onboarding Made Simple with zkLogin
Role Of Algorithms
Getting to Know Dapr with Mark Fussell and Yaron Schneider
Techniques for Checking Floating-Point Equality in C# - Code Maze
GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
How AES Is Implemented
Notes on Self-hosted Transactional Email
The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
Learn the Basics of HTTP Web API - Coding Sonata
why not matrix?
How to Use Basic Authentication With HttpClient? - Code Maze
Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
Designing a 3D Printed Toy for My Son
A (Post-Pandemic) World Without Email
Mullvad on Tailscale: Privately browse the web
Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
The future headwinds
Dunghill Anti-Pattern - Why utility classes and modules smell?
How to Write a Secure JWT Library If You Absolutely Must
Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
Android 14 blocks all modification of system certificates, even as root
Deploying a Dapr Sidecar to Azure Container Instances
What 0 to 6 Months of Photography Has Taught Me
Support for custom headers for handshake · Issue #16 · whatwg/websockets
Introducing our summer '23 research seminars
Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
Explaining The Postgres Meme
Wii Architecture | A Practical Analysis
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
The History of Data with Ted Neward
End-to-end encryption with Proton Mail
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
Listen to us on zeroknowledge.fm
Measuring Unicode String Lengths with C#
Choosing Apache Kafka For A New Project – A Questionnaire
Automata Part 1: Understanding Position Automata
BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
Zero-Knowledge Proof Research | Berkeley RDI
Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
Vacation Study Ideas
How to debug linux kernel API (syscalls issues)?
The Tale of a Corrupt Backup
Introducing ChatGPT Enterprise
Demodulation of the 5G NR downlink – Daniel Estévez
Cool & Unique Cryptography Features for Modern Sui DApps
You Should Be Working On Hardware
Blockchain Applications Stanford Summit
You like Circom but you find it confusing? Introducing Circomscribe
Detecting boomerang values in zero-knowledge circuits using tag analysis
Fiat-Shamir Security of FRI and Related SNARKs
How SNARKs fall short for FHE
Getting our focus back
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
Delendum-SBC Research Meetup
Penumbra Security Audits Q3 2023
Ergaster - Syncing Notes with Obsidian
Max Goodhart (@chromakode@mastodon.social)
Raspberry Pi x OpenWRT Travel Router – Tristam
Unlocking Discord Nitro Features for Free
Storing passkeys in password managers is okay, actually
Backing Up Personal Files with rclone
Exploring Generative AI
Exploring Generative AI
About GitHub Copilot for Individuals - GitHub Docs
Breaking The Mutant Language's "Encryption"
How Surround Sound for Headphones Works
Understanding Lasso and Jolt, from theory to code
North Korean Hackers Suspected in New Wave of Malicious npm Packages
Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
How the Nintendo Wii Security Was Defeated
Short session expiration does not help security
EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
Unity 4D #2: Extending Unity to 4D - Alan Zucconi
Bare Metal Space Invaders
The BEST Moq Alternatives: NSubstitute vs FakeItEasy
Self-Discipline Examples That Don't Suck
Software Engineering at Google
Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
Azure Storage Account: Best Practices for Efficient and Secure Storage
Chris James - Practical ways to shift QA left
Reflections on Ten Years Past the Snowden Revelations
Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
State-Issued Identifiers aren’t generally good passwords
Tailscale vs. Narrowlink | Narrowlink
GitHub - id-Software/quake2-rerelease-dll
Do Machine Learning Models Memorize or Generalize?
Introducing per hostname TLS settings — security fit to your needs
Android 14 introduces first-of-its-kind cellular connectivity security features
Removing Randomness with LLDB
Everyday Scientist » Replace Peer Review with “Peer Replication”
Verifiable encryption on the Blockchain
My experience at the k-space hackerspace hackathon
Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
Patterns for Building LLM-based Systems & Products
The Worst API Ever Made
Shamir Secret Sharing
I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
Why do consultants invent words?
Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
The U.K. Government Is Very Close To Eroding Encryption Worldwide
Worldcoin isn’t as bad as it sounds: It’s worse
Introducing GitHub Copilot X
Where are all the women?
The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
What We Know About LLMs (Primer)
Pre 2013 Data Breach - Forum Thread
How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
RSA
Sharing encrypted data over short-form mediums
Attention Is Off By One
Zenbleed
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
Plane - The open source project management tool
What does a CTO actually do?
What Happened to Dolphin on Steam?
1 Introduction · Real-World Cryptography
Best crypto blog posts of 2017
Why Frustum Culling Matters, and Why It's Not Important
Tutorial 1: Hello World | Mina Documentation
ZK Security X Delendum (farewell SBC) · Luma
Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
Sharing code between Deno and Node where Bun and ts-node failed
Distributed Trust with Service-to-Service Authentication
Why the “Null” Lifetime Does Not Exist
Store age identities inside the TPM: age-plugin-tpm
Setting up PostgreSQL with Ansible
I don't know how I feel about email
Bypassing Internet Censorship Using SSH
An Alternative Approach to Deep Tech VC
Jeremy Mikkola - What makes developers productive?
Fun with DNS TXT Records
PhpMyAdmin and Azure Database for MySQL server
Living Life as a B- Student
ZK Security meetup @ Lightspeed · Luma
Episode 467 - OneStream's plans for becoming more cloud native on Azure
17 misconceptions about SNARKs (and why they hold us back)
Cycles of curves: what are they and do we need them?
Regex Isn't Hard - Tim Kellogg
Put a Pin on That
Hacking LangChain For Fun and Profit - I
Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
Experiments with eBPF: Snitchrs
A slack clone in 5 lines of bash
GitHub - zksecurity/noname: Noname: a programming language to write zkapps
The zero-knowledge attack of the year might just have happened, or how Nova got broken
bips/bip-0042.mediawiki at master · bitcoin/bips
Exploring how Magic Link works
VerusCoin, Everything that Ethereum Isn’t
Running on a high-speed rail
Backend development is more than writing endpoints for frontend
Alpha
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
How to do templates properly
Getting Started with API Management: A Beginner's Guide for Developers
Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
Open at Microsoft: Dapr
Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
Blocking, covariate adjustment and optimal experiment design - Emir's blog
Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
My journey into Microsoft – Unstructed.tech
Using encryption to verify a license key
Red-Teaming Explained: How does it reduce toxicity in LLMs?
Based-30b
You don't take enough risks to be lucky
How (not) to compare 2D scatter plots
How to deploy your deep learning side project on a budget
The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
Interesting links of the week 2023-24 (#76)
Announcing .NET 8 Preview 5 - .NET Blog
Introducing the defensive statistics | Andrey Akinshin
Latest Updates for Azure App Service Presented at Microsoft Build 2023
Casey Reeves (@xogium@tech.lgbt)
/home/halosghost/blog
Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
Memory Management in DBMS
Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
Understanding the Tech Right
Stages of Survival
ZK app developers should be able to see down to the constraints
zkSecurity
Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
Generating income from open source
ZK programmability adds a whole new layer to worry about
Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
Open at Microsoft - Dapr
The Prickly Case of JavaScript Proxies
Privacy Enhancing Technologies: An Introduction for Technologists
Private delegated computation is here, and there will be bugs!
Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
On being paid to learn
Using Nix with Dockerfiles
Building a baseline JIT for Lua automatically
Finding your weak spots
How to Use SFTP For Secure File Upload in .NET - Code Maze
Why we're bad at CSS
Free VPN Service SuperVPN Exposes 360 Million User Records
What's New for Azure App Service at Build 2023
backups (public)
How to get (micro) acquired?
Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
SELM: Symmetric Encryption with Language Models
Two Immortals
This Week In Security: .zip Domains, Zip Scanning
Malleable software in the age of LLMs
How to Unleash the Power of Multithreading in JavaScript with Web Workers
Assembling Community OS
Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
Experimenting with multi-factor encryption
How to Understand Abstract Art
transparent polynomial commitment scheme with constant opening proof size and verifier time
Level up your GPT game with prompt engineering - .NET Blog
Fast hashing, it's not that simple
Testing a new encrypted messaging app's extraordinary claims
Is .NET Still a Legitimate Technology in 2023?
API Security Checklist: How to Protect Your APIs
Savoring Complexity. Embracing the Infinite
PV consumption optimization – the power of software defined devices
Using The Decorator Design Pattern in .NET
Why should we read Azure Security?
Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
What is Type-Level Programming? - sulami's blog
How to design your first Solution Architecture Diagram?
Crypto: My Part In Its Downfall
The right to encrypt
Radical Incrementalism
Do We Still Need Journals?
Why is OAuth still hard in 2023? | Nango Blog
Dometrain - Homepage
Bea Stollnitz - How GPT models work
The Most Annoying Math Problem
SLP: a new DDoS amplification vector in the wild
Local license key verification - Theory
Internexit?
The Importance of TLS with SQL Server
Playing devil's advocate on claims made in VPN adverts
Why I joined Cloudflare as Chief Security Officer
Current Issues With The Qt Project - From The Outside Looking In
Get your app to Mars!
Message-Driven Architecture: Promoting Efficient and Scalable Communication
mjg59 | PSA: upgrade your LUKS key derivation function
Nintendo Switch game modding is illegal. – Gabriel Sieben
Hot Takes on the Modern Data Stack
Data Driven Detection Engineering
What do Solution Architects do?
(The Futility of) Keeping Secrets from Yourself
How I fix flaky tests - Code with Jason
5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
Prompt Engineering vs. Blind Prompting
TLS 1.3—What is It and Why Use It?
Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
Recipes For Product Failure: Obsess Over Competitors
Sponge API for Field Elements
‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
Experimenting with LLMs to Research, Reflect, and Plan
Climate Tech Checklist
Rethinking Type I/II error rates
11 API Security Best Practices to Secure Your Business
My Love/Hate Relationship with Cloud Custodian
GPT Voyage: Part 2
Linux and Baikal Electronics: Why Postgres Should not Follow that Path
Do Less, Better (with leverage!)
What We Learnt Building the Largest GPT-Telegram Bot
If It's So Good, Why Isn't Everyone Doing It?
Towards a Nova-based ZK VM
Outperforming Warren Buffet
irhum.github.io - Tensor Parallelism with jax.pjit
I Quit Programming (or did I?)
I Didn't Read 17 Books So You Don't Have To 😩
Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
Unlimited Powers
Ben Howdle - Software Engineering Consultant and Advisor
Paillier's cryptosystem - Addtive homomorphic encryption
Paillier's cryptosystem - Addtive homomorphic encryption
Paillier's additively homomorphic cryptosystem
Paillier's cryptosystem - Addtive homomorphic encryption
So, You Want To Build A DBaaS
How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
Nobody’s on the ball on AGI alignment
ChatGPT's Plugin System Poses an Existential Risk to the Open Web
Synology NAS Backups with Minimal Bus Factor
Education - Mutable Instruments Documentation
Zig And Rust Mar 26, 2023
Sparks of Artificial General Intelligence (AGI) in GPT-4
Building a DOS ChatGPT client in 2023
The Artificial in AI - Pravesh Koirala
Just update rules between neurons
Symbolic vs Connectionist Machine Learning
(PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
Let’s Talk About TikTok - Black Hills Information Security
No more custom domains in Microsoft Outlook?
mjg59 | We need better support for SSH host certificates
None of Your Business - Why, I Wonder?
zkSummit - Zero Knowledge Summit
fhur
Notes on FFTs: for users
Loading RSA Keys in .NET
Aria: A Fast and Practical Deterministic OLTP Database
Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
Head of Marketing
Geometry in Text-to-Image Diffusion Models
Boosting password security! Pwned Passwords, zxcvbn, and more!
9 years of open-source database development
How I burnt out in FAANG, but it is not what you think
Is OpenBSD for you? - Marián Mižik
Sunsetting Aztec Connect
Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
cURL, the omnipresent data tool, is getting a 25th birthday party this month
QR Code Generator in Laravel 10 Tutorial
My Backup Strategy
The Kids are Not Okay
Tech Notes: Polymorphic shellcode
Announcing new security and observability features in Azure Database for PostgreSQL
Were We All Gaslit About Content Being King?
Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
Warnings-as-errors friction
I made JSON.parse() 2x faster
Caveat Implementor! Key Recovery Attacks on MEGA
TimeSpan in C# - Code Maze
Cryptography without Security - Cronokirby
Quantum computing shorts
zk-SNARK Concepts Explained Like You’re 15
Block Breakers
ChatGPT Explained: A Normie's Guide To How It Works
Use GNU Emacs The Plain Text Computing Environment
Digital Market Act workshop in Brussels
Overview | Mina Documentation
zkVMs are cool, but have you heard of zkCPUs?
How To Deploy EF Database Migrations
Database Cryptography Fur the Rest of Us - Dhole Moments
On mindsets, mind shifts and wins
Thief in the car
LattePanda V1 - my experience with a Raspberry Pi alternative
Zero-knowledge proof composition and recursion. Part 7: Deferred values
Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
On Relearning to Code as an Adult
Zero-knowledge proof composition and recursion. Part 6: cycles of curves
Convert a File to a Byte Array in C# - Code Maze
Cryptography 101 - PHINUG Online Dev Sessions 2023.03
A new series of videos on zero-knowledge proof composition and recursion (part 1)
Real-World Cryptography, a bit more than a year later
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
Cryptography Attacks and Defenses, Reloaded
Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
Asking ChatGPT to Design Its Next Generation, ChatGPT 2
Sangria: a Folding Scheme for PLONK - Geometry Research
Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
How Safe is the Cloud? What Businesses Need to Know
Lessons Learned from Re-rolling 60+ Production Credentials
Gamebert: a Game Boy emulator built by Robert | Robert Heaton
<div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
Google’s Fully Homomorphic Encryption Compiler — A Primer
Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
My most important email filter that helps me control my chaos
The Joy Of Duplexes
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
Challenges 7-12: Implementing and breaking AES ECB
Contributing to open source projects and about learning zero-knowledge proofs
Ian Norris - Blog - Understanding the limits of large language models
.NET Security Headers: A Senior Developer’s Guide✨
Reversing UK mobile rail tickets
Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
Python’s “Disappointing” Superpowers
Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
Anker admits to lying about Eufy security camera encryption; describes future plans
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
Various Ways of Sending Mail via SMTP
My first recession
Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
Making sense of TypeScript using set theory
Encrypting Data in the Browser Using WebAuthn
Introducing Zero to Nix — Determinate Systems
How to debug
Bitwarden design flaw: Server side iterations
Degrees of Open Source
1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
How to Implement Google Authentication in Next with NextAuth
Implementing Zero Trust: A Guide to Securing Your Data
An incomplete guide to stealth addresses
Securely store secrets in Git using SOPS and Azure Key Vault
Breaking EA Desktop's pathetic Encryption
How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
Zero Knowledge Proofs MOOC
Some thoughts on the ETH's Threema Analysis
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
zkIgnite, Cohort 1 Program Overview
What's the deal with zkapps?
The PLONK zero-knowledge proof system
How to Secure Your .NET Application Against Common Threats
Terraform Industries Whitepaper 2.0
.NET 7 Brings Networking Improvements
Encrypting and Decrypting a String in C# - Code Maze
Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
Machine Learning in .NET with F# and ML.NET 2.0
What is Zero Trust and is it the Future of Cybersecurity?
ZK System Benchmarking
Writing a TLA⁺ tree-sitter grammar
Large Transformer Model Inference Optimization
Cryptography Implementations in .NET - Code Maze
MINA zkApp staking pool - HackMD
How I went from 0 to Hacking in SF as a high-schooler
Is it worth encrypting? | Matthew Linkous
Using client side encrypted fields in RavenDB
GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
On PBKDF2 iterations
Renato Athaydes
Debugging Architects
Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
Ancient Apocalypse reviewed
Machine Learning in .NET with F# and ML.NET 2.0
Forming the habit of analog journaling - Why the digital format did not work for me
David Wong
Join Mina's zkIgnite, Cohort 1
Fast Accumulation on Streams (2018) - bkase
Vitalik Buterin's website
Raspberry Pi security alarm — the basics
HTTPS explained with carrier pigeons
RE: False Rumors on API Leaks or Exposure of our Database
Your Pa$$word doesn't matter
Lastpass Breach - Everything you need to know
The Matrix Holiday Update 2022 | Matrix.org
20 Best Cryptography Algorithms Books of All Time
2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
AI assistants help developers produce code that's insecure
Nix on the Steam Deck — Determinate Systems
LastPass users: Your info and password vault data are now in hackers’ hands
Notice of Recent Security Incident - The LastPass Blog
Password requirements: myths and madness
Not Getting Hacked
Personal backups and file archival
Implementing the MySQL server protocol for fun and profit
Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
Yubikeys & PKI: What Are They For? | Charlton's Blog
Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
Why Current Wormhole Research is So Important
Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
How Cloudflare advocates for a better Internet
Why you can’t build a web browser and why you should anyway.
Technical Writer
Real-World Cryptography
ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
Dev environments in the cloud are a half-baked solution
Apple iCloud, and why encrypted backup is the only issue
Apple advances user security with powerful new data protections
Installing Guix on a 10th gen Thinkpad X1 — dthompson
Making an RC Roomba
SBF is Crypto Personified
What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
Notice of Recent Security Incident - The LastPass Blog
Choosing your chat application
Be less scared of overconfidence
Real-World Cryptography: Wong, David + Free Shipping
Mutual Contact Discovery
[Apply by 12/08] Introducing our fellowship program
Autonomy, packet size, friction, fanout, and velocity
Episode 111 - RavenDB with Oren Eini
zkapp-cli
How I over-engineered a Fast Fourier Transform for Arduino.
Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
OpenIddict
Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
Cloud-Native Application Security - DZone Refcardz
Quest for my perfect watch.
zero to connection string
4 Strategies for Dealing with Bad Code
Example: Oracle | Mina Documentation
Mina Launches zkApps Era
Authorization and Authentication in Minimal APIs
Why take and make notes
Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
S1 Ep2: Data Breaches, DNA & the Future of Privacy
My take on self-hosting
Intro to Zero-knowledge & Building zkApps w/Mina Protocol
Live system DD backup, with encryption and compression!
GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
Too Much Crypto
NSA urges orgs to use memory-safe programming languages
Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
Brave New Trusted Boot World
End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
How to contribute to Kimchi
Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
Mina zkApp Developers Meetup - San Francisco
Zero to App Store in 7 weeks
Neural Network Pruning Explained
Wii U Architecture | A Practical Analysis
0.10.0 Release Notes ⚡ The Zig Programming Language
Improving Git protocol security on GitHub | The GitHub Blog
Encrypt and Decrypt Text Values in .NET
Real-World Cryptography: Wong, David + Free Shipping
Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
Encryption
Example: Anonymous Message Board Tutorial | Mina Documentation
We Must Professionalize Programming to Preserve Society and Computing Freedom
Running a law firm on Linux - a year or so in
Jett Hays
How I built and sold a successful startup with fractional hires
10 essentials to mitigating API security risks | Red Hat Developer
In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
What's the deal with zkapps?
LiteDB - A .NET embedded NoSQL database
Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
✂️ The ideal blockchain
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
What to know about Zero Knowledge
Jira Pricing - Monthly and Annual Subscription Cost per User
Lucid Multi-Key Deputies Require Commitment
Let's watch videos with David - HackMD
Microsoft Office 365 email encryption could expose message content
How observability-driven development creates elite performers
The Rails SaaS Conference
Seven years in the life of Hypergiants' off-nets
How does the key exchange in HTTPS work?
Threshold ECDSA in Excessive Detail
Comparing Semgrep and CodeQL · Doyensec's Blog
E-commerce platform Bhinneka.com reported to be latest target of data theft
Yubikey Madness
Privacy is a business imperative
.NET R&D Digest (September, 2022)
Scoreboard Hacking Part 2 - Getting the AES Key
The Lens Of Asymmetry
age and Authenticated Encryption
Episode 107 - Unstructured Data With Kirk Marple
Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
The many problems with implementing Single Sign-On
'Berkeley' Testnet Alpha Participation Guide
Outdated vs. Complete
RegEx match open tags except XHTML self-contained tags
the sad state of debug performance in c++
Aging programmer
Help people in Iran reconnect to Signal – a request to our community
06 SnarkyJS
How does PLONK work? Part 1: What's PLONK?
What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
0xPARC
Introducing LiteFS
How hashing and cryptography made the internet possible | Red Hat Developer
An Introduction to Ansible Inventory
IN/"juels; ari" in US Patent Collection
A few thoughts about Uber's breach
How I manage my passwords
FileSystemWatcher in C# - Code Maze
noname developer updates: structs are working!
35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
Visual Cryptography For Physical Keyrings
It pays to be Circomspect
Ethereum activates The Merge as it shifts to proof of stake
A beginner’s guide to regular expressions with grep | Red Hat Developer
Enstil Postmortem
githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
6 Simple and Useful PostgreSQL Features that I wish I knew when I started
Narrative driven development
GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
Ed25519 Deep Dive Addendum
learning about zero-knowledge apps and circuits using the noname educational DSL
Security of ZK Systems
An overview of Node.js: architecture, APIs, event loop, concurrency
Predict steel quality with Azure AutoML in manufacturing
On Security Against Time Traveling Adversaries
Someone’s Been Messing With My Subnormals!
Perfect Notes or My Journey to Obsidian
Replicant: Reproducing a Fault Injection Attack on the Trezor One
fxhash - Lessons Learned from Implementing "Wave Function Collapse"
One Year With the Framework Laptop and NixOS
Cloudflare named a Leader by Gartner
Episode 437 - Azure CXP CRE Low Code Automation
Formal Verification of ZK Constraint Systems
Top 10 skills every programmer should know
Implement a GRPC API with OpenIddict and the OAuth client credentials flow
GitHub - mimoo/noname: Noname: a programming language to write zkapps
Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
Security of ZK Systems
Kagi status update: First three months
What Every Programmer Should Know About Optical Fiber
Review: The This by Adam Roberts
My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
We Are All Nerds: The Literary Works of Neal Stephenson
Technical Evaluation of a Startup
What You Should Learn Before Building a zkApp
champonthis | dev/rand/lack-of-attention
2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
Performance isolation in a multi-tenant database environment
Raytracing and Raycasting with Signed Distance Functions
Cryptographic Agility and Superior Alternatives - Dhole Moments
Define “better”
Deep dives & how the Internet works
Should You Buy an EV?
Ask Cryptography
“10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
ASP.NET validation revisited
How much customer service is too much? - Joydeep's Corner
GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
What is Lattice-based Cryptography?
The Paper that Keeps Showing Up
Understanding JSON Web Encryption (JWE)
How I Learned to Stop Worrying and Love Macros
Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
How Did I Become Database Engineer at 23
Workshop at SBC'22 | Tse Lab at Stanford University
GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
Brute Force Development · Matt Layman
Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
zkEVMs: Not a Panacea
GitHub - filecoin-project/neptune: Rust Poseidon implementation.
The quick and practical "MSI" hash table
How does PLONK work? Part 1: What's PLONK?
Module Three – ZK Whiteboard Sessions
On Giving Technical Guidance to Others
NSA, NIST, and post-quantum cryptography
MPC In The Head Special
Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
NSA, NIST, and post-quantum cryptography
Home Network Part 1 - DIY Home Router with NixOS
Experiment with post-quantum cryptography today
An intro to Open Telemetry in .NET - James World
BrainSTARK, Part 0: Introduction
ZK Whiteboard Sessions
Post-quantum encryption contender is taken out by single-core PC and 1 hour
Microsoft Previews Azure Premium SSD V2 Disk Storage
Use One Big Server - Speculative Branches
Document Scanner with OpenCV Using Video Footage
What I'm frustrated by in crypto
Recommended settings for Wi-Fi routers and access points
Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
The many flavors of hashing
x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
Total Fleet Visibility with Kolide
GitHub - o1-labs/proof-systems: The proof systems used by Mina
When the window is not fully open, your TCP stack is doing more than you think
CFF22 trip report
The dangers of Microsoft Pluton – Gabriel Sieben
I quit my business to start an open-source dev tool
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
How I Hacked my Car
British recycle old arguments for bypassing E2E encryption
What are zkVMs? And what's the difference with a zkEVM?
The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
Authentication is Difficult
GitHub - chip-red-pill/MicrocodeDecryptor
Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
The First Secret Problem
Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
Commercial music media, a tier list · brhfl.com
I've started using Mozilla Firefox and now I can never go back to Google Chrome
Mina zkApp Developers Meetup - Paris
Get Compliant with Kolide
GitHub - nalinbhardwaj/zordle
We Need Non-Interactive Post-Quantum KEMs
Checklist For Evaluating Cloud Backup Services
Compiler and Composability in ZKP
FizzBuzz is FizzBuzz years old (and still a powerful tool)
System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
Dmitry.GR: Projects
AWS Summit - Virtual EMEA Recap
Statements Vs. Expressions
mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
CS101 Introduction to Computing Principles
NIST’s pleasant post-quantum surprise
Introducing: the ZK Whiteboard Sessions! - ZK Podcast
How to get a job in a new industry without experience | Jason Tu
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
The PeerTube instance tube.hamnet.io on HAMNET
The best books for cryptography apprentices
Bookchor data breach of over 5 lakh users: What we know so far
Advanced Dashes
Why I left Android Development after 10 years and became a Backend Developer
CloudFormation is Dead, Long Live Terraform
Italy declares Google Analytics illegal
GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
Thomas H. Ptacek
Huobi Global Lists Mina Protocol
Undefined behavior in C is a reading error. – keeping simple
MEGA: Malleable Encryption Goes Awry
Introducing Tailscale SSH
What I'm excited for this build cycle
SnarkyJS Week 2022 - Crowdcast
Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
Facebook Says Apple is Too Powerful. They're Right.
Join Us For the First Ever SnarkyJS Week
Matrix notes - anarcat
My other database is a compiler
Some ways to use ZK-SNARKs for privacy
Eurocrypt 2022 program
The hunt for the cluster-killer Erlang bug
New UUID Formats
Foreword — ZK Jargon Decoder
The Web PKI 2.0
Hands-on: X25519 Key Exchange
Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
In defense of crypto(currency)
HTTP/3 becomes a standard, at last
On BFT Consensus Evolution: From Monolithic to DAG
GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
What Makes a Good Research Proposal?
What's OpenIddict?
A new portal for Project Galileo participants
GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
HTTP/3 From A To Z: Core Concepts — Smashing Magazine
RFC 9113: HTTP/2
This is not normal
How Effective Abstractions Are Opinionated | 8th Light
Cloudflare observations of Confluence zero day (CVE-2022-26134)
Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
Zero-Day Exploitation of Atlassian Confluence | Volexity
A concise summary of amazing and great ideas · johnpfeiffer
Countering the Crypto Lobbyists
A Gentle(-ish) Introduction to Worst-Case Optimal Joins
Why Seafile is unique among file sync solutions
Security in MySQL: Part Two - Simple Talk
Welcoming Rocket.Chat to Matrix! | Matrix.org
Losing your cookies
Using WebTransport
Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
Cloudflare’s approach to handling BMC vulnerabilities
PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
A Kernel Hacker Meets Fuchsia OS
The power of tech debt
Patch: Zoom chat messages can infect devices with malware
Create AWS resources with Kubernetes and Operators | Red Hat Developer
Preliminary Learning ON Kimchi: PLONK
Cryptology ePrint Archive: Report 2022/621
Site Reliability Engineering – Monitoring Distributed Systems
RustDesk | Open source remote desktop software
Why wireguard is NOT safe, and you should NOT use it.
Automating Well-Architected Principles
Features of the Windows Process Activation Service (WAS)
50 shades of .NET on AWS
Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
Monitoring our monitoring: how we validate our Prometheus alert rules
Laurence Tratt: Static Integer Types
Quick comparison of pricing of Simple Storage Services
KDE Connect
25 Gbit/s HTTP and HTTPS download speeds
Some Cryptography Books I Like
Introducing Lurk: A programming language for recursive zk-SNARKs
Laptopia
Support for custom headers for handshake · Issue #16 · whatwg/websockets
Practical bruteforce of AES-1024 military grade encryption
Announcing Pub/Sub: Programmable MQTT-based Messaging
European Commission prefers breaking privacy to protecting kids
A Beginner's Guide to Application Security
Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
Cryptology ePrint Archive: Report 2022/566
GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
Cryptology ePrint Archive: Report 2016/163
Building a Stack Overflow browser as a VS extension
Fitting Everything Together
Patenting Your Perpetual Motion Machine
Multiplying polynomials with Fast Fourier Transform
The Two Generals Problem
Topographical Maps in Unity: Edge Detection - Alan Zucconi
Themes from Real World Crypto 2022
When Negotiating a Price, Never Bid with a Round Number
Darlings of the self-hosted, open-source world
Learn to code. Or don't.
Implementing a ZK-focused authenticated-encryption scheme
What's two-adicity?
Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
Announcing Bolt & Forte partnership
Explaining Yao's Garbled Circuits - Cronokirby
Why the fediverse is stuck.
Seeking good work-life balance and avoiding burnout
A File Format to Aid in Security Vulnerability Disclosure
Lies we tell ourselves to keep using Golang
Real World Cryptography Conference 2022
Secret Management with HashiCorp Vault
Secret Management with HashiCorp Vault
Personal Knowledge Management is Bullshit
Building many private virtual networks through Cloudflare Zero Trust
Monolith in Cloud
Announcing the Hare programming language
Why LSP?
Canetti et al's Paradoxical Encryption Scheme
A list of all my projects - Patrick Zhong
Production postmortem: The encrypted database that was too big to replicate
I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
Physical Threshold Encryption
Linearization in Plonk and Kimchi. Why?
The 10 Commandments .NET Developers Must apply for Secure Applications
Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
Things I would like to see in a computer algebra system
Production postmortem: Misleading security and other production snafus
Exponentially Better Rotations
Using dotnet format Command to Format the C#/.NET Code - Code Maze
The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
Episode 96 - The Programmer's Brain with Felienne Hermans
An overview of my threat model
Requests for comment/Stop accepting cryptocurrency donations - Meta
Impressions from a first-time Mac user
Git Credential Manager: authentication for everyone | The GitHub Blog
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
Random Class in C# - Code Maze
This Week in Matrix 2022-04-08 | Matrix.org
Private Classification · The Decentralized Robot
O(1) Labs
Coinbase Lists Mina Protocol
The (r)Evolution of FHE
Optimizing for Luck
How to run a Digital Platform at Scale
placeholder
zkHappyHour with Mina Protocol
What I learned as a hired consultant for autodidact physicists | Aeon Ideas
In response to Moxie's doubts on web3, and about ultra light clients
Introduction
Essential Cryptography for JavaScript Developers | With Blue Ink
Episode 95 - Avalonia UI with Dan Walmsley
PKC Test-of-Time Award
Webinar next week: Clean Architecture with RavenDB
Future-proofing SaltStack
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
BAT: a Fast and Small Key Encapsulation Mechanism
It Looks Like You’re Trying To Take Over The World · Gwern.net
Year in Review: 2020 laid the groundwork for zero knowledge proofs
2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
The (Edited) Latecomer's Guide to Crypto
Postico – a modern PostgreSQL client for the Mac
Ridiculously easy to use Tunnels
Implementing a toy version of TLS 1.3
The Problem With Note-Taking - More To That
The Projects That Matter The Most To Me Are Small
NSA algorithm for PX-1000 broken
James Stanley - Librem 5: first impressions
Using RSA Securely in 2022 - Dhole Moments
Windows Needs a Change in Priorities
The first Asahi Linux Alpha Release is here! - Asahi Linux
Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
Zotero Blog » Blog Archive
Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
Roll your own crypto, then smoke it.
FTC Takes Action Against CafePress for Data Breach Cover Up
WAF for everyone: protecting the web from high severity vulnerabilities
The code is the specification? Introducing cargo spec
How not to build a secure plugins architecture | Crafting Privacy
Rocky Jaiswal | Fun with function composition
Recording: Database Security in a Hostile World
How to Write a Golang App Remotely on a Raspberry Pi Using Atom
...A Farm Upstate Where He Can Run and Run
In praise of opinionated frameworks
Why should you use a random testing library in C#? · Anthony Lloyd
A Comprehensive Primer · Michael Straka
Reintroducing Snapps as zkApps
Search results – Add-ons for Firefox (en-US)
EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
Things I hate about Rust, redux
How Cloudflare verifies the code WhatsApp Web serves to users
Request for comments: Removing graph queries from RavenDB
Deep Learning Is Hitting a Wall
Optimizing code by understanding usage
Put an io_uring on it: Exploiting the Linux Kernel - Blog
Announcing experimental DDR in 1.1.1.1
Use a message envelope
We Cannot Live Without Cryptography!
Webinar: Database Security in a Hostile World
Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
The technological case against Bitcoin and blockchain
Telenot Complex: Insecure AES Key Generation
Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
Introducing Native Matrix VoIP with Element Call!
Never Change Your Password - TidBITS
The Controversy Surrounding Hybrid Cryptography - Dhole Moments
Recording: RavenDB–a really boring database
iCloud Private Relay: information for Cloudflare customers
Blockchain Cryptography | Gary Woodfine
Security for package maintainers
Plagiarism as a patent amplifier
Using the .NET JIT to reduce abstraction overhead
Performance optimizations in production
Transport Layer Security (5/6)
Security | Fleet handbook
Introducing the OpenIddict client
Zig Build System Internals
Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
RavenDB: Domain Modeling and Data Persistency
HPKE: Standardizing public-key encryption (finally!)
Badly implementing encryption: Part X-Additional data
Badly implementing encryption: Part IX–SIV
Making protocols post-quantum
Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
Migrating from Redis-64 to Memurai
GitHub - brouberol/marcel: Le docker français
Badly implementing encryption: Part VIII–timings attacks and side channels
Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
How bad it is using the same IV twice with AES/GCM?
Sign up for weekly tips
The Post-Quantum State: a taxonomy of challenges
Badly implementing encryption: Part VII–implementing authenticated encryption
AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
7 Improvements You Might Have Missed in .NET 6
Why learn Racket? A student's perspective - Micah Cantor
Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
Badly implementing encryption: Part VI–malleable encryption
How to capture book notes and turn those into smart notes
Improving the US financial system
Badly implementing encryption: Part V–nonce reuse
on training
1Password for SSH & Git (Beta) | 1Password Developer Documentation
Badly implementing encryption: Part IV–keyed hash function
Pure-Impure Segregation Principle | Oleksii Holub
The right thing for the wrong reasons: FLOSS doesn't imply security
Learn Privacy-Enhancing Techniques with Cryptographic Games
Badly implementing encryption: Part III–breaking your encryption apart
How Perl Saved the Human Genome Project
Badly implementing encryption: Part II–breaking the code
00
DNS Security, Part VII: Blockchain-based Name Systems and Transparency
Staking
Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
Kimchi: The latest update to Mina’s proof system
Badly implementing encryption: Part I
Key Senators Have Voted For The Anti-Encryption EARN IT Act
BeyondCorp is dead, long live BeyondCorp
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
How we optimized Python API server code 100x
Dolphin Progress Report: November and December 2021, January 2022
BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
r/hearthstone - How I hacked Hearthstone
A Developer's Guide to Dogfooding
Chat Control
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
Estimating the Bit Security of Pairing-Friendly Curves
Jay's Blog
Why and how I got my own ASN!
Remote Pair Programming - Demir Delic
The GNU Name System
PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
Basic cryptography - the Vigenere cipher - Eric Mann's Blog
Knowledge Base - your company’s undervalued asset
I finally understand Declarative Programming 🍀
It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
Tor Browser: a legacy of advancing private browsing innovation | Tor Project
Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
LTO Tape data storage for Linux nerds
BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
Testnet #4: Shielded Staking Is Here
Run Ordinary Rails Apps Globally
The State of Zero Knowledge
Landscape of API Traffic
2022 Tech Predictions · Ted Neward's Blog
The Curse of NixOS
[Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
Don’t assume the result of read()
Securing Sensitive Data in an Event Driven Architecture
Why is the Nuclear Power Industry Stagnant?
CC #9: A Wild ECDSA Appears!
Bitwarden Open Source Password Manager
FBI document shows what data can be obtained from encrypted messaging apps
No Place to Hide
You should probably be building a web app
Arm A64 Instruction Set Architecture
Let's Encrypt SSL certificate overview
Some Techniques to Enhance Your Terraform Proficiency
Switching from macOS to Pop!_OS
GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
Music industry is suing youtube-dl hosters
Publishing and consuming ECMAScript modules via packages – the big picture
When NOT to write an Abstraction Layer
Tips for More Efficient .NET Logs
Introduction to Model Predictive Control · Arnav's Weblog
Introducing Plonky2 — Polygon | Blog
XMPP: the secure communication protocol that respects privacy
Make the Internet Yours Again With an Instant Mesh Network
dmca/2022-01-04-readium.md at master · github/dmca
Donald Knuth - The Patron Saint of Yak Shaves
Hashing is not encryption - Eric Mann's Blog
In response to Moxie's doubts on web3
XML Encryption Syntax and Processing
Real-World Cryptography by David Wong Book Review
6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
The Relativity of Wrong by Isaac Asimov
Coming Clean
The Cryptography of Orphan Annie and Captain Midnight
Neural Network From Scratch
If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
PagerDuty’s Security Training for Engineers! Part Deux
A Succinct Story of Zero Knowledge
How I built a WFH Shed
Fixing stutters in Papers Please on Linux – Blog
The Case Against Crypto
Stupid Patterns
GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
Looking Forward: Some Predictions for 2022
.NET's Cryptographic One-Shots
Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
A Year In Review · Jethro Kuan
GitHub - trailofbits/zkdocs
Fight for privacy — an interview with Troy Hunt
How to Generate Random Numbers From a Range in C# - Code Maze
Cloud Security Breaches and Vulnerabilities: 2021 in Review
Dear Self; We Need To Talk About Social Media
MS Teams: 1 feature, 4 vulnerabilities | Positive Security
Introduction
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
What Problem Blockchains Actually Solve
LISP with GC in 436 bytes
GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
CCPA Scam November 2021 from Princeton University
Don’t start with microservices – monoliths are your friend – Arnold Galovics
Rails 7.0: Fulfilling a vision
How to build large-scale end-to-end encrypted group video calls
Secure Containerized Browser
Research Notes on Humanoid Robots
"Alpha-Rays" behind the scenes - HackMD
Cryptology ePrint Archive: Report 2021/1621
Scrt.link vs. One-Time Secret
How to Write a Technical Book
Meet Kryptology: Coinbase’s Open Source Cryptography Library
Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
"Open source" is not broken
Testing constant-timeness using Valgrind: case of the NSS library
Calculating my open source blast radius
crawshaw - 2021-12-11
Solene'% : What are the VPN available on OpenBSD
Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
A Call to Build Models Like We Build Open-Source Software
Avoiding Internet Centralization
Twitter Suspension
Connection Failures with Microsoft.Data.SqlClient 4 and later
Gravatar "Breach" Exposes Data of 100+ Million Users
uBlock, I exfiltrate: exploiting ad blockers with CSS
Security | 2021 | The Web Almanac by HTTP Archive
Understanding HKDF - Dhole Moments
Welcome to CIO Week and the future of corporate networks
Understanding Zero-knowledge proofs through simple examples
Understanding Zero-knowledge proofs through simple examples
On the Use of Pedersen Commitments for Confidential Payments
Securing Sensitive Data in an Event Driven Architecture
Don't Let the Internet Dupe You, Event Sourcing is Hard
Released: General Availability of Microsoft.Data.SqlClient 4.0
Bank transfers as a payment method
Bitslicing for Constant Time Cryptography
How to configure verified GitHub commits?
The best Task+Note system
Understanding identity tokens
An intensive introduction to cryptography: index
An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
RSA vs ECDSA for DNSSEC | APNIC Blog
ZK-Hack Puzzle #4 Writeup - HackMD
Speculative Autobiographies
Mentoring junior programmers: What I tell them is job number one - Vallified
The Joy of Cryptography
GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
80386DX ISA SINGLE BOARD MICROCOMPUTER
Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
Model-based Testing
RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
Regex Learn - Step by step, from zero to advanced.
Cracking the Adventure Time Cipher
ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
Practical attacks against attribute-based encryption
Using a framework can make you stupid!
Yes, Programming is Hard
No one knows what's coming next
Five Great (free!) Ways to Get Started With Cloudflare
Threshold Digital Signatures
Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
Reflecting on 11 years of side projects
Announcing YARP 1.0 Release
Libra Shrugged — Chapter 15: Central bank digital currencies
Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
Matter Labs Announces $50M in New Funding for zkSync
Sizing Up Post-Quantum Signatures
Zillow, Prophet, Time Series, & Prices
HOWTO: Get tenure
How To Learn Stuff Quickly
Random Oracles in Cryptography
Threema: Three Strikes, You’re Out
Timeline of the human condition
How (Not) to Design a Hash Function
PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
The Future of Work and the Workplace
Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
Simple Product Management Tricks - Jacob Kaplan-Moss
You Are What You Consume - Priyam Mohanty
Pairings in CIRCL
SectorLISP Now Fits in One Sector
Handshake Encryption: Endgame (an ECH update)
mazzo.li — Backing up WhatsApp data through the multi-device web client
Anatomy of a STARK, Part 0: Introduction
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
You want Tor Browser ... not a VPN
Element One - Matrix, WhatsApp, Signal and Telegram in one place
Privacy is a Human Right | Tor Blog
bitbottle
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Why aviation’s compass is shifting towards True navigation
The AEGIS family of authenticated encryption algorithms
Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
Bevel Work | Rounding Sharp Corners
Looking into convergent encryption
.NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
F# eXchange 2021 | Skills Matter
8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
Episode 85 - Clean Code in C# With Jason Alls
SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
A Tour Through the OWASP Top 10
PlayStation 3 Architecture | A Practical Analysis
A Critique [The Call of the Open Sidewalk]
How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
Code quality: a concern for businesses, bottom lines, and empathetic programmers
A Graduate Course in Applied Cryptography
Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
Critical security flaw exposed Joburg residents’ private info
NixOS on Framework laptop
Vimarsh Shah - The best way to self host
Introducing Nuntius - Cronokirby
On the Optimization of PLONK – ZK Podcast
Geo Key Manager: Setting up a service for scale
How to use certificates in ASP.NET Core
Avoid Authy, Use Aegis
Privacy-Preserving Compromised Credential Checking
What if Performance Advertising is Just an Analytics Scam? - SparkToro
Cloudflare and the IETF
Canonicalization Attacks Against MACs and Signatures
1Password Refugee’s Guide to KeePass
A Tale Of Two Optimisations
mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
Introducing SSL/TLS Recommender
The efficiency of Microsoft.
You're Doing IoT RNG
Designing technologies with Values? Possibility - Necessity - and European story.
HD wallets and the Legendrery PRF in MPC - HackMD
Sending emails to myself
Cloudflare Research: Two Years In
What happened on the Internet during the Facebook outage
Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
Scheduling Backups To OneDrive For Paperless-ng Using RClone
Lightning Round
A PKI-less secure communication channel: Implementing the record stream
A PKI-less secure communication channel: Coding the handshake
Overview | ChessCoach
The most counterintuitive facts in all of mathematics, computer science, and physics
A PKI-less secure communication channel: The record layer
Ordinal Classification Using PyTorch -- Visual Studio Magazine
A PKI-less secure communication channel: The record layer
New study reveals iPhones aren't as private as you think
Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
Effective Go - The Go Programming Language
The secret to Cloudflare’s pace of Innovation
Copycats and Endurance - The Bootstrapped Founder
A PKI-less secure communication channel: design
Cybersecurity threats - Simple Talk
Automatic cipher suite ordering in crypto/tls
Snapps on Mina with Emre and Izaak – ZK Podcast
Introduction — pyNomo Documentation 0.3.2.0 documentation
The Bi-Symmetric Encryption Fraud
A World Without Sci-Hub
GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Five ways I handled my OutOfMemoryErrors
No, We Won’t Have a Video Call for That!
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
Authenticated Boot and Disk Encryption on Linux
The First Rule of Machine Learning: Start without Machine Learning
Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
Let's Encrypt's Root Certificate is expiring!
Linux on the Desktop: Part Two
Cloudflare Pages is Lightning Fast
Splitting up trust
HTTP/3 support in .NET 6
How We Made Playable Quotes for the Game Boy
If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
ACSC Annual Cyber Threat Report 2020-21
WebSocket per-message compression in ASP.NET Core 6
Why Monero
Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
Cloud Providers Publish Ransomware Mitigation Strategies
Welcome to Speed Week and a Waitless Internet
Why Flask will teach you more about software engineering than Django
Part 4: Notifiable Data Breach (NDB) Scheme
Certified Application Security Specialist (CASS)
Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
Rewilding: 60 years ago, scientists let a farm go wild – the results are in
WhatsApp “end-to-end encrypted” messages aren’t that private after all
GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
Welcome · Real-World Cryptography MEAP V14
ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
Release age v1.0.0 🏁 · FiloSottile/age
Why not ZFS
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
Saving a restic backup the hard way
A meditation on three dead side projects
ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
Important clarifications regarding arrest of climate activist
NO STARTTLS
Proxy vs Reverse Proxy - using a real life example!
Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
Zero Trust Security Architecture Overview | Developer.com
www.opendesktop.org
Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
zkMesh: Aug 2021 recap
Improving Git protocol security on GitHub
Recover Password Sync for a Domain Joined Mac
Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
Writing Programs with NCURSES
The Design and Evolution of OCB - Journal of Cryptology
You’re Not Too Late
on terminal control
Aggregatable Distributed Key Generation
Released: Microsoft.Data.SqlClient 4.0 Preview 1
The All-Seeing "i": Apple Just Declared War on Your Privacy
Azure SDK: Goodbye QnA Maker, Hello AI 'Question Answering' -- Visual Studio Magazine
59a34eabe31910abfb06f308 - Apple NeuralHash Collision
Programmers Don’t Understand Hash Functions
The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
Golem keyboard project
Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
Adventures in fuzzing libolm | Matrix.org
Thinking of the children
Safer Illinois, Isn’t
6 New Ways to Validate Device Posture
How does PLONK work? Part 1: What's PLONK?
Cryptology ePrint Archive: Report 2021/923
Reddit Interview Problems: The Game of Life
Thinking of the children
Why is Learning Functional Programming So Damned Hard?
10×10%
Stewardship of Ourselves
Exploring the password policy rabbit hole — Sun Knudsen
The world in which IPv6 was a good design
GitHub picks Friday 13th to kill off password-based Git authentication
What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
The Deceptive PR Behind Apple’s “Expanded Protections for Children”
.NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
More devices, fewer CAPTCHAs, happier users
If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
Why Doesn't Software Show Up in Productivity?
Australia is becoming a surveillance state
Announcing .NET 6 Preview 7
Implementing ‘le chiffre indéchiffrable’ in Scheme
Apple’s Mistake
One Bad Apple - The Hacker Factor Blog
Hey Signal! Great Encryption Needs Great Authentication
The logic behind three random words
How does FaceTime Work?
Apple to scan U.S. iPhones for images of child sexual abuse
Apple explains how iPhones will scan photos for child-sexual-abuse images
draft-peabody-dispatch-new-uuid-format-01
Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
HTTP/2: The Sequel is Always Worse
Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
When You Get Right Down to It, Most Security Is Based on The Honor System
What is an inner product argument?
An Attempt at Demystifying Graph Deep Learning
GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
Full-Time Open Source - CoRecursive Podcast
TODO apps are meant for robots
PyTorch Tutorial for Beginners - Building Neural Networks
Wormhole - Simple, private file sharing
Looking between the lines: how media is control.
GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
Tech spec experts seek allies to tear down ISO standards paywall
How I store my files and why you should not rely on fancy tools for backup
Zip - How not to design a file format.
Cloudflare's Athenian Project Expands Internationally
From Stolen Laptop to Inside the Company Network — Dolos Group
Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
IPv4 pricing - Hetzner Docs
Netcat - All you need to know
A new chapter for Google’s Vulnerability Reward Program
Securing your development environment
K-9 Mail is back
Welcome to Cloudflare Impact Week
Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
Syncing all the things
Google pushed a one-character typo to production, bricking Chrome OS devices
Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
Germany’s national healthcare system adopts Matrix! | Matrix.org
How does TLS work?
The Game Developers Guide to NFTs
Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
Cryptanalysis of Meow Hash
How To Learn Stuff Quickly
A framework for Front End System Design interviews - draft
Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
HashWires: Range Proofs from Hash Functions | ZKProof Standards
Why we need to do more to reduce certificate lifetimes
TLS - The Cloudflare Blog
ongoing by Tim Bray · Algorithm Agility?
Security Analysis of Telegram (Symmetric Part)
Pa(dding rtitioning) oracles, and another hot take on PAKEs
Building a Trustless and Private Internet for Everyone
Building a Vision of Life Without Work
The EFAIL Hoax [The Call of the Open Sidewalk]
Behind the scenes, AWS Lambda
r/crypto - My breakdown on Partition Oracle Attacks
Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
Ways of reading without the influence of community
The Myth of the Expert Reviewer
An incomplete list of practices to improve security of your (micro)services · m's blog
Sam Lewis
More Secret Codes: A History of Cryptography (Part 2)
A new macroeconomics? – J. W. Mason
Stuff I wish I knew before I went Independent
Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
Write a time-series database engine from scratch
BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
Blazor Flash Cards - State Management with Fluxor
Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
Cryptology ePrint Archive: Report 2021/626
The Missing Email Service For Domains
How to Build a Giant Carmaker
angularsen/UnitsNet
Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
OpenPGP Identity Structure [The Call of the Open Sidewalk]
Yes, the network is hostile, even yours (or: how to lose your data in three steps)
An Elixir Adoption Success Story
New Release: Fiddler Everywhere 2.0 Is Here!
NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
Update on Windows 11 minimum system requirements
Temporal: getting started with JavaScript’s new date time API
cirosantilli/x86-bare-metal-examples
Voice AI is scary good now. Video game actors hate it.
Production Threshold Signing Service
Windows 11, Amazon, and Uncomfortable Questions
Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
Taking the (quantum) leap with go
Messaging app Signal not in compliance with new rules, say officials
Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
Designing a duress PIN: plausible deniability (part II)
Zero Knowledge from the Discrete Logarithm Problem
Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
Remote Desktop Connection Manager - Windows Sysinternals
Hacker's guide to deep-learning side-channel attacks: the theory
Internet-in-a-Box
How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
dsprenkels/sss
Croc Full Plaintext Recovery - CVE-2021-31603
A response to "Did we market Knative wrong?"
streetcomplete/StreetComplete
Cryptographic shuffle | Brain on Fire
Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
I wish I could write this well
Cryptology ePrint Archive: Report 2021/819
Welcome · Real-World Cryptography MEAP V14
Richard Feynman's Integral Trick
[Last Week in .NET #46] – Exceptionally Useful
google/fully-homomorphic-encryption
Automonous Biology
Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
How to Handle Secrets on the Command Line
Taildrop was kind of easy, actually
Answering Community Questions and What’s Ahead for Mina
Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
From KEMs to protocols
Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
Kerckhoffs’s Law for Security Engineers
Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
Althttpd: The Althttpd Webserver
Exploring android development on iPad
Certificates Confuse Everything
It’s time to ditch Chrome
Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
Password Managers.
Kate polynomial commitments
Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
The best cryptographic protocol ever!
Linux Security Hardening and Other Tweaks
Leaky Abstractions
Vinod Vaikuntanathan - Real World Cryptographers Podcast
Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
Using Wikipedia as an Impromptu RottenTomatoes API
Mikkel Paulson
ongoing by Tim Bray · Testing in the Twenties
The Most Expensive Number in Engineering
Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
Amazon devices will soon automatically share your Internet with neighbors
Contributing to Gemini ecosystem
Elliptic Curve Cryptography Explained
Code Maze Weekly #78 - Code Maze
Episode 77 - Application Security with Tanya Janka
QUIC is now RFC 9000
A UDP-Based Multiplexed and Secure Transport
Is MDPI a predatory publisher?
Messaging and Chat Control
New Storage Providers for Azure Durable Functions
The best API design principles inspired by nature - andre.schweighofer
Blockchain voting is overrated among uninformed people but underrated among informed people
DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
Cryptography from the Ground Up
255: What is encryption anyways?
Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
How to Get Rich
Heartbleed Revisited
Secure Search Over Encrypted Data
Indian job portal IIMJobs hacked; 46GB worth of database leaked online
How the UK's Online Safety Bill threatens Matrix | Matrix.org
Authenticated Encryption in .NET with AES-GCM
I am sick and tired of hearing tech companies complain about a developer shortage
Welcoming Linux to the 1Password Family | 1Password
zkSessions: The ZK Languages Roundup - May 19 | Hopin
Constructing a sponge function from MD5 - Gokberk Yaltirakli
Zcon2Lite
I Have a Lot to Say About Signal’s Cellebrite Hack
Password Storage - OWASP Cheat Sheet Series
The stack monoid revisited
Running a .NET 5 web app on Railway
A day at work
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
BLS12-381 For The Rest Of Us - HackMD
Reverse Engineering an Unknown Microcontroller - Dmitry.GR
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
Building an Event Driven .NET Application: The Fundamentals – Wrapt
Peter Thiel's Religion - David Perell
<p>The Node.js CA Footgun</p>
Security flaws in all Wi-Fi devices
Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
Beware of Applications Misusing Root Stores – Mozilla Security Blog
Hell site
Minecraft Modding: Laser Gun - Alan Zucconi
Dear EU: Please Don't Ruin the Root - Articles
Realizing the Mina vision in Rust
Personal Data of 3 Million+ People Exposed In DriveSure Hack
Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
Introducing the Pinecone overlay network | Matrix.org
Understanding Extended-Nonce Constructions
Amazon Fake Reviews Scam Exposed in Data Breach
--this is a no-knowledge proof--
Introduction to JSON Web Tokens (JWT)
timvisee/send
ZK languages with Alex Ozdemir
Is abstraction killing civilization? | datagubbe.se
What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
Mixed Boolean Arithmetic Obfuscation
Update: Security Notification - March 2021
Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
Content Marketing for Bootstrappers | James Chambers
Dabbling in Cryptography
We were promised Strong AI, but instead we got metadata analysis
HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
Rust Language Cheat Sheet
Setting up a Cardano Producer node using Kubernetes/microk8s
Customer Notice FAQs
In epic hack, Signal developer turns the tables on forensics firm Cellebrite
Make better predictions, stop estimating - andre.schweighofer
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
Apple introduces AirTag
Minimum Viable State: Building a Nomad Internet Country
Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
dotnet/runtime
What's in the box? - fasterthanli.me
Thoughts on writing a wayland window manager with wlroots
Why should you care about privacy - even if you had nothing to hide
Vanquished Vaccines and Vetocracies – We Are Not Saved
Eat a Peach for Engineers
Standard Notes | A Simple And Private Notes App
Node.js support in Cloudflare Workers
What on Earth is this Encryption Scheme?
Security Control: Implement security best practices
Serving up zero-knowledge proofs
Machine Learning With ML.NET - Evaluation Metrics
The Cursed Computer Iceberg Meme
My Vim Notes Setup
Meet the patent troll that won a $308 million jury trial against Apple
My programming principles • Borislav Grigorov
The Architecture Behind A One-Person Tech Startup
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
WTF are these security chips?
A pretty good guide to pretty good privacy
Goodbye OpenSSL, and Hello To Google Tink
MPC-Over-Signal
The Unparalleled Genius of John von Neumann
Signal Adds Payments—With a Privacy-Focused Cryptocurrency
Dumping user data from cheap tablets in minutes
How I Got Into Computers AppDev Edition
(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
Legalizing Gay Marriage in Crusader Kings III with Ghidra
PostgreSQL Security Hardening
The Exception Model
Zero click vulnerability in Apple’s macOS Mail
C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
Apple's cooperation with authoritarian governments
Some opinionated thoughts on SQL databases
Cloudflare’s WAF is recognized as customers’ choice for 2021
Peace of mind backup - boa.nu
Creation vs. Consumption
208.43.231.11 Git
A new Cloudflare Web Application Firewall
Getting started with Self Sovereign Identity SSI
.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
OpenPGP Message Format
PGP is a Form of Minimalism [The Call of the Open Sidewalk]
About | Mina Illuminate
Single-primitive authenticated encryption for fun
It doesn't work | Frank DENIS random thoughts.
janroesner/sixty5o2
APT Encounters of the Third Kind
Building a phone book: Part I
C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
facebookresearch/Cupcake
The Evolution of Distributed Systems on Kubernetes
Is There a Case for Programmers to Unionize? - Qvault
On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
CoinList
Browser Isolation for teams of all sizes
suite - Privacy-Enhancing Cryptography | CSRC | CSRC
Crystal 1.0 - What to expect
Welcome to Cloudflare Security Week 2021!
My self-study plan for electrical engineering
r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
Hybrid encryption and the KEM/DEM paradigm
Episode 72 - Emulating a Video Game System in .NET with Ryujinx
The missing explanation of ZK-SNARKs: Part 1
Can we talk about client-side certificates?
Zero Knowledge Proof (with Avi Wigderson) - Numberphile
A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
Can an economy keep on growing? - Inverted Passion
What It Means to Learn to Code
Surreptitious Forwarding [The Call of the Open Sidewalk]
The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
A Simple Personal Data Backup Setup
How are zlib, gzip and zip related? What do they have in common and how are they different?
YouTube
Key Exchange Standards
Becoming physically immune to brute-force attacks
About the March 8 & 9, 2021 Verkada camera hack
Block Cipher Structures: Ranked
Getting started with Dapr for .NET Developers
I want a Computer that I Own
4 Times I Felt Discriminated Against for Being a Female Developer
Notion is not a knowledge base
A flamegraph of Real-World Cryptography
It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
The Teams Dashboard: Finding a Product Voice
A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
Online tool to generate and check bcrypt hashed passwords.
Hotpatch for Windows Server Azure Edition (preview)
February 2021 - Killing Turbotax
How I Might Have Hacked Any Microsoft Account - The Zero Hack
How Nacon Cracked and Pirated The Sinking City - Frogwares
Cryptology ePrint Archive: Report 2020/1491
Goodbye Client Affinity, Hello Data Protection with Azure
5 tools I use to protect my privacy online
Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
How I cut GTA Online loading times by 70%
The security of the "Pass" password manager
The Economics of Biodiversity
Cryptology ePrint Archive: Report 2020/1610
How often should I rotate my ssh keys?
Microsoft Releases Azure Firewall Premium in Public Preview
[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
Understanding how Leela Chess Zero works
Cryptography Interface Design is a Security Concern
Zero Bug Tolerance
Cryptographic Wear-Out for Symmetric Encryption
C#'s Functional Journey
The Azure Security Architect Map
Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
Cryptology ePrint Archive: Report 2020/1581
Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
How to destroy the Earth
GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
Cryptology ePrint Archive: Report 2020/1533
Using HPKE to Encrypt Request Payloads
Urbit :: the good, the bad, and the insane
Cryptology ePrint Archive: Report 2020/1536
Distributed Application Runtime (Dapr) v1.0 Announced
Making Easy Auth tokens survive releases on Linux Azure App Service
upgundecha/howtheysre
ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
A Visual Guide: To Sustainable Software Engineering
Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
Multi-asset shielded pool project (MASP)
no dogma podcast - powered by FeedBurner
Securing the post-quantum world
Our Solo v2 launch is official!
Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
Good-bye ESNI, hello ECH!
Crackpot Cryptography and Security Theater
Why should I give you my ID card
2020 U.S. Election: Cybersecurity Analysis
A look at GSM
Reverie: An optimized zero-knowledge proof system
Report: Romanian Real Estate Portal Suffers Crippling Data Breach
Lessons Learned From My Last Startup: A Post Mortem
Is abstraction killing civilization? | datagubbe.se
Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
ARCHITECTURE.md
Working with SSL Certificate in Azure App Service
Ideas That Created the Future
A Simple and Succinct Zero Knowledge Proof
Help users in Iran reconnect to Signal
Security: The Need-to-know principle
Threshold Cryptography with Omer Shlomovits from ZenGo
7 behaviours to avoid in a software architecture role - Daniel Watts
Tearing Down a Humidifier - Lei's Blog
Why Generation X will save the web - Hi, I'm Heather Burns.
SSL/TLS connection issue troubleshooting guide
The Best TLS and PKI Training Course in the World
My experience passing CKA and CKAD
Episode 10: Exploiting Authenticated Encryption Key Commitment!
LackRack - Eth0Wiki
All Stories Are Wrong, but Some Are Useful
The Subtle Hazards of Real-World Cryptography
I didn't install Signal for privacy
The Psychology of Stock Bubbles
How to properly store a password in the Database | Petre Popescu
Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
The EU must protect the right to privacy and not attack end-to-end encryption
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
No, Java is not a Secure Programming Language
berty/berty
Tools I Love to Not Think About
What it means to be a cryptographer
SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
survey.pdf
Write Crypto Code! Don't publish it!
pavlobu/deskreen
Technological stagnation: Why I came around
s-51: Ask Me Anything (AMA), with Joan Daemen
The architecture of my life | mjwsteenbergen-blog
AKS Zero To Hero - Series for everyone - Azure Greg
Release Notes | Bitwarden Help & Support
Stepping up for a truly open source Elasticsearch | Amazon Web Services
My Backup Strategy
So, You Want to CTF? (A Beginner’s Guide to CTFing)
Stepping up for a truly open source Elasticsearch | Amazon Web Services
Building your first Telegram Bot with ASP.NET Core
Please Stop Encrypting with RSA Directly
The State of State Machines
The worrying trend of game technology centralization
Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
We can do better than Signal
CondensationDB/Condensation
Mesmerizing Chameleon Signatures
Is Writing as Important as Coding?
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
A history of end-to-end encryption and the death of PGP
Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
KEMTLS: Post-quantum TLS without signatures
Fully Homomorphic Encryption Part One: A Gentle Intro
danso - happy-space: a whitespace-sensitive calculator
Holistic web protection: industry recognition for a prolific 2020
Foam
Send and receive WhatsApp messages through email
Learn X by doing Y - A project-based learning search engine
Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
jukefoxer/Signal-Android
An introduction to the Data Protection system in ASP.NET Core
Notification of Data Security Incident - December 23, 2020
My personal wishlist for a decentralized social network
Machine Learning with ML.NET - Linear Regression
Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
Wasmer - The Universal WebAssembly Runtime
Signal, thank you for not collecting my data. But I won’t use you.
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
safepassme
What I learned doing 125 public talks - Part I
Steam's login method is kinda interesting
.NET Rocks! vNext
WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
DALL·E: Creating Images from Text
Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
Cryptology ePrint Archive: Report 2020/1456
s-18: FSE 2020 Rump session
Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
Linux Hardening Guide | Madaidan's Insecurities
Why are video games graphics (still) a challenge? Productionizing rendering algorithms
zkSNARKS and Cryptographic Accumulators
NeurIPS 2020 Best Machine Learning Paper Awards
Web Authentication Methods Compared
Combating abuse in Matrix - without backdoors. | Matrix.org
Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
Development time is money, therefore I RAID
Against Victimhood
The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
No, Cellebrite cannot 'break Signal encryption.'
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
Why I've Been Merging Microservices Back Into The Monolith At InVision
My Engineering Axioms
2020’s Top 15 Machine Learning & AI Research Papers
You're Missing Out If You Don't Write Weekly Digests
Cryptologie | Vetted Encryption
Apple M1 foreshadows RISC-V
Bizarre Design Choices In Zoom’S End-To-End Encryption
Branding Your Own Startup | Blog of Pascal
Commits are snapshots, not diffs - The GitHub Blog
Giving more tools to software engineers: the reorganization of the factory
How to conduct a competitive analysis - Philipp Muens
Adding Encrypted Group Calls to Signal
Learn about online security, privacy, and encryption
The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
Privacy and Compliance Reading List
Computers Are Bad
Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
Google Alternatives 2020: Best Privacy Friendly Alternatives
How to Build a Global Network that Complies with Local Law
Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
There's Always More History • Hillel Wayne
Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
Improving DNS Privacy with Oblivious DoH in 1.1.1.1
From Zero to AppStore
Privacy needs to be built into the Internet
benwilber/boltstream
Welcome to Privacy & Compliance Week
InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
On Trusting Macintosh Hardware
An introduction to three-phase power and PDUs
Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
How to Make Your Code Reviewer Fall in Love with You
Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
An iOS zero-click radio proximity exploit odyssey
Gamedev from scratch 0: Groundwork
Release OpenZFS 2.0.0 · openzfs/zfs
We Need Organic Software
ph1lter
Are My Encryption Keys In The Cloud Really Secure?
How to Think for Yourself
An ex-Googler's guide to dev tools
Crypto Dictionary
Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
How do people find bugs?
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
Getting lucky with posting on Hacker News
Productive Uncertainty - Reaction Wheel
zkSummit 6 | Hopin
Normal Forms - Simple Talk
The book is finished, well sort of...
Facebook Is Going After Its Critics in the Name of Privacy
Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
zfs.rent
Six months of Tiny Projects
Anchoring Trust: A Hardware Secure Boot Story
Claims encryption for B2C tokens | Developer Support
Can’t open apps on macOS: an OCSP disaster waiting to happen
Using Matrix to replace proprietary and centralized chat apps
Going Bark: A Furry’s Guide to End-to-End Encryption
Does Apple really log every app you run? A technical look
SAD DNS Explained
How a Game Developer Leaked 46 Million Accounts
Etebase - Your end-to-end encrypted backend
Get Animal Jam for your mobile device, PC, or Mac
caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
Notes On Owning Your Own Business
How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
Zoom lied to users about end-to-end encryption for years, FTC says
What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
Over 1M Lazada RedMart accounts sold online after data breach
Productivity vs. Privacy
Multithreading Handbook for Simulation Developers
The missing explanation of zk-SNARKs: Part 2
Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
Standing on Our Own Two Feet
Querying Across Databases In SQL Azure
Scripts for Managing Azure Container Registry
A Brief Introduction to Deniability
Leaving OCaml
Two workers are quadratically better than one • Hillel Wayne
C# in Simple Terms - Exceptions and Exception Handling
The Basis of Testing – Stories from a Software Tester
Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
The missing explanation of ZK-SNARKs: Part 1
Scott Santens - An Engineering Argument for Basic Income
RedMart Data Security Incident
Episode 63 - Being Productive With Jay Miller
How software eats money
ML Optimization pt.1 - Gradient Descent with Python
Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
gnu.org
Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
Azure CLI Oct 2020 release
The accelerating adoption of Julia
Personal banking needs an API | Chris Hardie's Tech and Software Blog
Let's talk about fake reviews - part 1
14 Popular Machine Learning Evaluation Metrics
A Legislative Path to an Interoperable Internet
Questioning Probability
charmbracelet/glow
Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
Exposing covert surveillance backdoors in children’s smartwatches
XChaCha20-Poly1305: A Primer with Examples in .NET
Event Feeds: Simple and reliable messaging infrastructure
Smart male chastity lock cock-up
Stop the EARN IT Bill Before It Breaks Encryption
Security Of Streaming Encryption In Google's Tink Library
It Didn’t Take Too Long…
Fortunately, I don't squash my commits
Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
Wiki - RustStarterKit2020
Episode 61 - Azure and Live Conferences With Andy Morrell
Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
Coinbase offers exit package to those uncomfortable with new direction
Doing discourse better: Stuff I wish I knew
is it worth it? — Martin Kleppmann’s blog
Advisory: security issues in AWS KMS and AWS Encryption SDKs
This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
Zig's New Relationship with LLVM
How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
Using Azure RBAC with Azure Key Vault
Uncomfortable Questions About App Signing
71.177.243.54
Google Interview Questions Deconstructed: The Knight’s Dialer
Simple Anomaly Detection Using Plain SQL
Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
VPNs from first principles
No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
dwmkerr/hacker-laws
Revenue Model, not Culture, is the Dominant Term
CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
When double.Epsilon can equal 0
Let's Encrypt's New Root and Intermediate Certificates
A Thanksgiving Carol
Nvidia’s Integration Dreams
Phosphine gas in the cloud decks of Venus
GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
Some Great Books For Programmers That StackOverflow Cannot Replace
Security by Obscurity is Underrated
What Clojure spec is and what you can do with it (an illustrated guide)
Raccoon Attack
BashPitfalls - Greg's Wiki
TLS certificate lifespan cut short: A win for security, or cause for chaos?
Things I Learned to Become a Senior Software Engineer
Verizon achieves milestone in future-proofing data from hackers
Why you want to encrypt password hashes
Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
Attention is your scarcest resource
Key exchange standards - Manning
Key exchange standards - Manning
connorferster/handcalcs
The Why and How of Privacy and Security — This Too Shall Grow
Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
I've decided to pursue a Bootstrap MBA
Why I’m Writing A Book On Cryptography
Minimal React: getting started with the frontend library
Soatok’s Guide to Side-Channel Attacks
Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
So you want to roll your own crypto?
Zoom is now critical infrastructure. That’s a concern
Pure and Applied Chess
It Took 2 Years To Make My First Dollar Selling A Product
The Five Pillars Of Wealth Building - Darius Foroux
Heyyyyyyyyyyyy.com | email with *nuance*
Providers | PrivacyTools
Is cloud security too easy to screw up? | A Cloud Guru
A New Botnet Is Covertly Targeting Millions of Servers
Cross-platform cryptography in .NET Core and .NET 5
degoogle
drduh/macOS-Security-and-Privacy-Guide
Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
July 11, 2020 - LiveAuctioneers Account Security
What's new in the Windows Store client
fast.ai releases new deep learning course, four libraries, and 600-page book
Transfer a Software Project - Lessons Learned - dcaulfield
jesseduffield/horcrux
Obfuscating your email on the web
A Guide to Autodidactism | Jack Kinsella
Symmetric and Asymmetric Encryption in .NET Core
You Need a Password Manager. Here Are the Best Ones
Graphical Linear Algebra
Let's Learn x86-64 Assembly! Part 0
Nintendo DS Architecture | A Practical Analysis
Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
JWTs: Which Signing Algorithm Should I Use?
Data Breach Statement - Utah Gun Exchange
2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
Why I Left a Career as a Startup CTO to Become a Writer
IBM Reveals Next-Generation IBM POWER10 Processor
Hiding messages in x86 binaries using semantic duals
The Illustrated TLS Connection
Frustrated? It's not you, it's Rust - fasterthanli.me
Mozilla's failures and a path to profitability
Intel® Trust Domain Extensions
Handles are the better pointers
Securing Web Application Secrets Through Azure Key Vault - Simple Talk
Serverless apps on AWS using F# and fable
Mozilla Alumni Network
The CompSci Pub
I don’t trust Signal
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Mobile Phone Streams
bulletproofs::notes::range_proof - Rust
How to encrypt and decrypt shared folders on my Synology NAS
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Building dashboards for operational visibility | Amazon Builders' Library
A Brief History of The Deficit Myth with Dr. Stephanie Kelton
Proof of X
hephaest0s/usbkill
1Password for Linux development preview
27-inch iMac gets a major update
Tales of the Autistic Developer - Senior Developer
How it works - Briar
Azure Cloud Shell Tips And Tricks | Build5Nines
Cosmetics firm Avon leaks 19 million customer records (Includes interview)
David Wong
swyx Writing | Slack is Fumbling Developers
Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
.NET R&D Digest (July, 2020)
Chessprogramming wiki
Polymorphic Encryption Algorithms — Generating Code Dynamically
Some SQL Tricks of an Application DBA
You Want Options
Tip 272 - Azure Security Best Practices
Joe Bergeron | Java Obfuscation: A Pattern Language
p410n3 blog
Dropping Out of College to Join Facebook: 3 Years Later
Storage 101: Data Security and Privacy - Simple Talk
Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
Exploring Fully Homomorphic Encryption
Essays on programming I think about a lot
You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
Designing a New Old Home: Part 1
The encrypted homelab
Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
What’s New in Thunderbird 78
100 Best Kubernetes Books of All Time
Poor feedback from readers
Hacking Reolink cameras for fun and profit
Welcome to Element!
Data Structures & Algorithms I Actually Used Working at Tech Companies
Digicert revokes a raft of web security certificates
Python Malware On The Rise
A few thoughts about Signal’s Secure Value Recovery
Trending
Disabling Google 2FA Doesn't Need 2FA
New German law would force ISPs to allow secret service to install trojans on user devices
[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
A Team
Clean Architecture, 2 years later - Elton Minetto
Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
A Concurrency Cost Hierarchy
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Why I’m Writing A Book On Cryptography
nabeelqu
Why Can't I Reproduce Their Results?
The true cost of knowledge | RoyalSloth
Beware the Google Password Manager - fasterthanli.me
Apple Lightning
Oppose the EARN IT Act
New Mac ransomware spreading through piracy - Malwarebytes Labs
How CDNs Generate Certificates
foambubble/foam
How to get the best out of your Yubikey with GPG
New US Bill would require makers of encrypted devices to leave a backdoor
Why AES-GCM Sucks
There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
Navigating Power & Status
Which Database should I use in my Azure Serverless App?
Avoiding exposing identifier details to your users
jonathan-laurent/AlphaZero.jl
Do you CI? | Benji's Blog -
How is NSA breaking so much crypto?
Discovering Dennis Ritchie’s Lost Dissertation - CHM
The smartest password policy enforcer for Active Directory
Making your data residency choices easier with Azure
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
End-to-End Encryption Update - Zoom Blog
GitHub Terms of Service - GitHub Help
Reasoning by Lego: The wrong way to think about cryptography.
GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
May 2020 news · Gwern.net
Exploration Strategies in Deep Reinforcement Learning
How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
DRY vs DAMP in Unit Tests
How to set compensation using commonsense principles
Playing Around With The Fuchsia Operating System
Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
Google got rich from your data. DuckDuckGo is fighting back
Discret 11, the French TV encryption of the 80's
Hacking Windows with F# 5.0 Scripts
Byzantine and non-Byzantine distributed systems
Logging with Decorators in TypeScript
How are you improving your technology skills today? Start by reading articles
The Dictator's Army and charismatic founders
Is a trillion-dollar worth of programming lying on the ground
Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
Introducing P2P Matrix | Matrix.org
Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
ScottHolden/BFSourceGen
A Guide to Threat Modelling for Developers
Against an Increasingly User-Hostile Web
A Guide to Threat Modelling for Developers
Obsidian
Messaging with Azure Service Bus - Part 9 - Premium Features
A Guide to Threat Modelling for Developers
Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
Org Mode - Organize Your Life In Plain Text!
Implementing simple cooperative threads in C - Stephen Brennan
Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
NIST Special Publication 800-63-3
An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
A Guide to Threat Modelling for Developers
Introduction to quantum computing with Q# – Part 3, Single qubit gates
Turning Signal App into a Coarse Tracking Device
A Guide to Threat Modelling for Developers
OpenBSD 6.7
Want to build a side business? Just buy a great Domain Name | Deep South Ventures
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
A Guide to Threat Modelling for Developers
Cryptology ePrint Archive: Report 2020/572
How Not to Store Passwords
Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
Replacing JWTs with Branca and PASETO in .NET Core
Meshing with LinkerD2 using gRPC-enabled .NET Core services
Lockdown Course: Introduction to Cryptography - James Grime
Asgard Systems uses ML.NET to reduce food waste | .NET
Make LLVM fast again
Zoom buys Keybase to help it build end-to-end encryption
Alternatives to PGP
Cryptology ePrint Archive: Report 2018/607
A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
April Extensions for Firefox Preview
Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
Modern SAT solvers: fast, neat and underused (part 1 of N)
Startup financial models - 12 templates compared for SaaS
OpenPGP Message Format
How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
SailfishOS - Sailfish OS
IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
Why not "Why not WireGuard?"
Messaging with Azure Service Bus - Part 5 - Message Sending Options
keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
Barbie typewriter
Preventing Software Rot
Search Results - Springer
Build a C# App with CockroachDB and the .NET Npgsql Driver
This is what end-to-end encryption should look like! - Jitsi
FocalFossa/ReleaseNotes - Ubuntu Wiki
How Netflix brings safer and faster streaming experience to the living room on crowded networks…
ZEIT is now Vercel - Vercel
Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
Scuttlebot peer-to-peer log store
Saving Money on Internation Payments as a Remote Freelancer
This is what end-to-end encryption should look like! - Jitsi
Technical reasons to choose FreeBSD over GNU/Linux
The limitations of Android N Encryption
Hacking my Sixth Form College network in 1991
Temporal circuit of macroscale dynamic brain activity supports human consciousness
Learn dbatools in a Month of Lunches
Running your own secure communication service with Matrix and Jitsi | Matrix.org
OnCheckin - Continuous Deployment for ASP.Net websites.
Welcome · Real-World Cryptography MEAP V05
How we recovered over $300K of Bitcoin
Reassuring Words and Good Intentions Don't Mean Good Security
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
A Message to Our Users - Zoom Blog
The EARN IT Act Violates the Constitution
Perspectives & gaps between theory, practice & industry research in cryptography
.NET R&D Digest (March, 2020)
Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
US Government Wages War on Encryption
Await | Writing an OS in Rust
patents in crypto
Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
New grad vs senior dev
Released: Microsoft.Data.SqlClient 2.0 Preview 2
Speeding up Linux disk encryption
Unsure Calculator
[15] RFR 8172680: Support SHA-3 based Hmac algorithms
A Quick Garbled Circuits Primer
0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
Software Engineer - Jobs at Apple
How Tailscale works
Scott Helme
MacBook Air
Ryan_Connolly_Resume.docx
EARN IT bill is aiming at destroying encryption. We must take action now.
Async ValueTask Pooling in .NET 5 | .NET Blog
ploeh blog
The polygons of Another World: Atari Jaguar
MakerDAO gets stress tested as ETH price plummets
The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
EARN IT Must Not Happen
What is Meshtastic?
A Template for Clean Domain-Driven Design Architecture
Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
How I Survived Being A $220k/year Intern
draft-ietf-mls-protocol-09
Keybase
EARN IT is a direct attack on end-to-end encryption
Intel x86 Root of Trust: loss of trust
The growth of command line options, 1979-Present
Re: SMB over QUIC: Files Without the VPN
Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
WireGuard Gives Linux a Faster, More Secure VPN
Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
zkMesh
The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
An Intuitive Guide to Linear Algebra – BetterExplained
It’s 2020. Is your code ready for leap day?
pwn.college BETA
If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
How can I create a password protected .zip file in Windows 10?
The Zen of Go | Dave Cheney
A Simple Range Proof From Polynomial Commitments - HackMD
microsoft/electionguard
TimeSnapper, automatic screenshot software, auto screen capture
hassio-addons/addon-ssh
Welcome to the UK .NET Tour 2020
Source Code | OpenVPN
A Brief Intro to Clean Architecture, Clean DDD, and CQRS
Fundamental Concepts for Elastic Jobs in Azure SQL Database
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Cryptologie
Update on our new and upcoming security keys
Latacora - Stop Using Encrypted Email
dwmkerr/hacker-laws
Real-World Cryptography
The NuGet Blog
How HTTPS works Part 1 — Building Blocks
google/tink
damienbod/AspNetCoreCertificates
Serious Cryptography | No Starch Press
draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
Dino 0.1 Release - Dino. Communicating happiness.
Ryujinx/Ryujinx
Searching For New Adventures In Software Development
Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
Building personal search infrastructure for your knowledge and code | beepb00p
Authentication, What The Fuck?
How to write a simple operating system in assembly language
Welcome to the UK .NET Tour 2020
v5.8 Release Notes
The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
.NET Core, .NET 5; the exodus of .NET Framework?
Autocrypt 1.1.0 documentation
On Privacy versus Freedom | Matrix.org
Vim cryptmethod is not authenticated · Issue #638 · vim/vim
Google gives up on US carriers, will roll out its own RCS chat system
.NET R&D Digest (November – December, 2019)
Signal >> Blog >> Technology Preview for secure value recovery
Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
Zero allocation code in C# and Unity - Seba's Lab
How to generate random numbers using water bubbles
tmds/Tmds.Ssh
oqtane/oqtane.framework
Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
Why IVPN - What makes IVPN the best privacy protection service
GateHub Investigation - Final Statement
Stop surveillance and preserve your privacy with IVPN
Isogeny crypto
Homepage | ZKProof Standards
dotnet/SqlClient
Thoughts on DNS-over-HTTPS
x86/x64 SIMD Instruction List (SSE to AVX512)
bye: FTP Support Is Going Away
Verzekeraar Allianz informeert klanten over datalek - Security.NL
Commas in big numbers everywhere: An OpenType adventure
Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
OceanLibrary/Ocean
Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
A detailed look at Ubuntu’s new experimental ZFS installer
Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
Peddle the Pedal to the Metal
praeclarum/sqlite-net
beemdevelopment/Aegis
draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
PrivacySafe: The Anti-Cloud Appliance
awslabs/s2n
Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
OWASP/CheatSheetSeries
OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
Security Incident - Please Change Your Password
EV SSL Certificates Phased Out of New Browser Updates | Venafi
Learn UI Design: The Complete Online Video Course
KNOB Attack
Gone forEVer!
Spying on HTTPS
Online syntax highlighting for the masses!
Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
Canva Security Incident - May 24 FAQs
Architecture for humans - Ayende @ Rahien
Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
Pwnie Awards
More on Backdooring (or Not) WhatsApp - Schneier on Security
ECMAScript 2015 Language Specification – ECMA-262 6th Edition
Kazakhstan’s HTTPS Interception
When a rewrite isn’t: rebuilding Slack on the desktop
Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
Digital Driver’s Licenses Could Become a Real Option in Some States
CRYPTO-LAB
Real-World Cryptography
Proving security at scale with automated reasoning - All Things Distributed
VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
The Ultra Secure Crypto Storage & Communication Device
Security advisory 2019-06-13 | Yubico
Fixing Random, part 34
An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
dotnet/coreclr
Apple CryptoKit | Apple Developer Documentation
Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
Accessing UNIX sockets remotely from .NET - Red Hat Developer
RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
Ethical Alternatives & Resources - ethical.net
dotnet/coreclr
Top SSL Certificates Buyer's Guide
Using Ed25519 signing keys for encryption
Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
ZombieLoad Attack
Domain Randomization for Sim2Real Transfer
eyeDisk. Hacking the unhackable. Again | Pen Test Partners
ZkVM: a new design for fast, confidential smart contracts
Community and Communication going forward
Do we need effects to get abstraction?
RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
mpm guide - niall t.l.
The .NET Abstraction Pile
A Recipe for Training Neural Networks
Twisted Oak
AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
Peddle the Pedal to the Metal
JDK 12 Security Enhancements
Understanding the Limitations of HTTPS
Cryptologie
We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
Direct3D 11.3 Functional Specification
Verified cryptographic provider a triple threat
The story of the Rendition Vérité 1000
Scott Helme
Dotnet-Boxed/Templates
BoringTun, a userspace WireGuard implementation in Rust
New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
The WhibOx Contest Edition 2 - CYBERCRYPT
Understanding STIR/SHAKEN
Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
We need to talk about Session Tickets
Introduction
Cybersecurity for the Public Interest - Schneier on Security
Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
Data Leakage from Encrypted Databases - Schneier on Security
kelseyhightower/kubernetes-the-hard-way
Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
Crypto Canon - Andreessen Horowitz
Blockchain Governance: Programming Our Future
Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
Keybase launches encrypted git
AI Progress Measurement
Microsecond Resolution Time Services for Windows
vivri/Adjective
On the Security of Password Managers - Schneier on Security
Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
Reconstructing SIGSALY - Schneier on Security
Public-Interest Tech at the RSA Conference - Schneier on Security
Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
Hacking the GCHQ Backdoor - Schneier on Security
Friday Squid Blogging: Squid Lollipops - Schneier on Security
Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
Friday Squid Blogging: New Giant Squid Video - Schneier on Security
Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
New Australian Backdoor Law - Schneier on Security
Security Risks of Chatbots - Schneier on Security
Friday Squid Blogging: Squid Sculptures - Schneier on Security
Security of Solid-State-Drive Encryption - Schneier on Security
ID Systems Throughout the 50 States - Schneier on Security
Cell Phone Security and Heads of State - Schneier on Security
draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
Ext4 Disk Layout - Ext4
Modern Alternatives to PGP
proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
Real World Crypto 2019
The year in post-quantum crypto
Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
The Case Against Quantum Computing - IEEE Spectrum
Mathematics of Public Key Cryptography
CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
D. J. Bernstein / Talks
Security in Times of Surveillance
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
Pitching security vs. privacy is asking the wrong question
libpqcrypto: Intro
Security in Times of Surveillance
Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
The ROBOT Attack
Unity Labs Publications | Unity
Mersenne Prime Discovery - 2^82589933-1 is Prime!
Cloud Data Backup for Small Businesses | CrashPlan
nucypher/nufhe
RUB-NDS/TLS-Padding-Oracles
[paper review] A faster, more efficient cryptocurrency
mimoo/eureka
Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
Database Encryption
Kerckhoffs’ principles – Why should I make my cipher public?
Proxy re-encryption and FHE with NuCypher
Attack of the week: searchable encryption and the ever-expanding leakage function
Introducing Adiantum: Encryption for the Next Billion Users
Quantum computing as a field is obvious bullshit
Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
Going old school: how I replaced Facebook with email
» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
» Agrippa (A Book of the Dead) The Digital Antiquarian
» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
.NET Design Review: GitHub Quick Reviews
Tuning a Runtime for Both Productivity and Performance
We didn’t see this coming
Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
dotnet/coreclr
MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
no dogma podcast - powered by FeedBurner
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
Software Tokens Won't Save You
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1