devring.club Previous Random Next

linksfor.dev(s)

Posts for 'encryption'

  1. Apple Lightning (READABLE)
  2. Oppose the EARN IT Act (READABLE)
  3. New Mac ransomware spreading through piracy - Malwarebytes Labs (READABLE)
  4. foambubble/foam (READABLE)
  5. How to get the best out of your Yubikey with GPG (READABLE)
  6. New US Bill would require makers of encrypted devices to leave a backdoor (READABLE)
  7. US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News (READABLE)
  8. Why AES-GCM Sucks (READABLE)
  9. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK. (READABLE)
  10. Navigating Power & Status (READABLE)
  11. Journalist’s phone hacked by new ‘invisible’ technique: All he had to do was visit one website. Any website. (READABLE)
  12. Which Database should I use in my Azure Serverless App? (READABLE)
  13. Avoiding exposing identifier details to your users (READABLE)
  14. jonathan-laurent/AlphaZero.jl (READABLE)
  15. Do you CI? | Benji's Blog - (READABLE)
  16. How is NSA breaking so much crypto? (READABLE)
  17. Discovering Dennis Ritchie’s Lost Dissertation - CHM (READABLE)
  18. The smartest password policy enforcer for Active Directory (READABLE)
  19. Making your data residency choices easier with Azure (READABLE)
  20. Reverse Engineering Snapchat (Part I): Obfuscation Techniques (READABLE)
  21. End-to-End Encryption Update - Zoom Blog (READABLE)
  22. Zoom to Introduce New Censorship Features After Doing China's Bidding (READABLE)
  23. GitHub Terms of Service - GitHub Help (READABLE)
  24. Reasoning by Lego: The wrong way to think about cryptography. (READABLE)
  25. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet (READABLE)
  26. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten (READABLE)
  27. #FuckDiscord | Cadence's Blog (READABLE)
  28. May 2020 news · Gwern.net (READABLE)
  29. Exploration Strategies in Deep Reinforcement Learning (READABLE)
  30. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon (READABLE)
  31. DRY vs DAMP in Unit Tests (READABLE)
  32. How to set compensation using commonsense principles (READABLE)
  33. Playing Around With The Fuchsia Operating System (READABLE)
  34. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey (READABLE)
  35. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom (READABLE)
  36. Google got rich from your data. DuckDuckGo is fighting back (READABLE)
  37. Discret 11, the French TV encryption of the 80's (READABLE)
  38. Hacking Windows with F# 5.0 Scripts (READABLE)
  39. Byzantine and non-Byzantine distributed systems (READABLE)
  40. Logging with Decorators in TypeScript (READABLE)
  41. How are you improving your technology skills today? Start by reading articles (READABLE)
  42. The Dictator's Army and charismatic founders (READABLE)
  43. Is a trillion-dollar worth of programming lying on the ground (READABLE)
  44. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io (READABLE)
  45. Introducing P2P Matrix | Matrix.org (READABLE)
  46. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation (READABLE)
  47. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability (READABLE)
  48. ScottHolden/BFSourceGen (READABLE)
  49. A Guide to Threat Modelling for Developers (READABLE)
  50. Against an Increasingly User-Hostile Web (READABLE)
  51. A Guide to Threat Modelling for Developers (READABLE)
  52. Obsidian (READABLE)
  53. Messaging with Azure Service Bus - Part 9 - Premium Features (READABLE)
  54. A Guide to Threat Modelling for Developers (READABLE)
  55. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog (READABLE)
  56. Org Mode - Organize Your Life In Plain Text! (READABLE)
  57. Implementing simple cooperative threads in C - Stephen Brennan (READABLE)
  58. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet (READABLE)
  59. TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10 (READABLE)
  60. NIST Special Publication 800-63-3 (READABLE)
  61. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3) (READABLE)
  62. A Guide to Threat Modelling for Developers (READABLE)
  63. Introduction to quantum computing with Q# – Part 3, Single qubit gates (READABLE)
  64. Turning Signal App into a Coarse Tracking Device (READABLE)
  65. A Guide to Threat Modelling for Developers (READABLE)
  66. OpenBSD 6.7 (READABLE)
  67. Want to build a side business? Just buy a great Domain Name | Deep South Ventures (READABLE)
  68. The Hardest Program I've Ever Written – journal.stuffwithstuff.com (READABLE)
  69. A Guide to Threat Modelling for Developers (READABLE)
  70. Cryptology ePrint Archive: Report 2020/572 (READABLE)
  71. How Not to Store Passwords (READABLE)
  72. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant (READABLE)
  73. Replacing JWTs with Branca and PASETO in .NET Core (READABLE)
  74. Meshing with LinkerD2 using gRPC-enabled .NET Core services (READABLE)
  75. Lockdown Course: Introduction to Cryptography - James Grime (READABLE)
  76. Asgard Systems uses ML.NET to reduce food waste | .NET (READABLE)
  77. Make LLVM fast again (READABLE)
  78. Zoom buys Keybase to help it build end-to-end encryption (READABLE)
  79. Alternatives to PGP (READABLE)
  80. Cryptology ePrint Archive: Report 2018/607 (READABLE)
  81. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet (READABLE)
  82. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog (READABLE)
  83. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server (READABLE)
  84. April Extensions for Firefox Preview (READABLE)
  85. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance (READABLE)
  86. Modern SAT solvers: fast, neat and underused (part 1 of N) (READABLE)
  87. Startup financial models - 12 templates compared for SaaS (READABLE)
  88. OpenPGP Message Format (READABLE)
  89. How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog (READABLE)
  90. SailfishOS - Sailfish OS (READABLE)
  91. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet (READABLE)
  92. Why not "Why not WireGuard?" (READABLE)
  93. Messaging with Azure Service Bus - Part 5 - Message Sending Options (READABLE)
  94. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager. (READABLE)
  95. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns (READABLE)
  96. Barbie typewriter (READABLE)
  97. Preventing Software Rot (READABLE)
  98. Search Results - Springer (READABLE)
  99. Build a C# App with CockroachDB and the .NET Npgsql Driver (READABLE)
  100. This is what end-to-end encryption should look like! - Jitsi (READABLE)
  101. FocalFossa/ReleaseNotes - Ubuntu Wiki (READABLE)
  102. How Netflix brings safer and faster streaming experience to the living room on crowded networks… (READABLE)
  103. ZEIT is now Vercel - Vercel (READABLE)
  104. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield (READABLE)
  105. “Stubs” in the .NET Runtime (READABLE)
  106. Scuttlebot peer-to-peer log store (READABLE)
  107. Saving Money on Internation Payments as a Remote Freelancer (READABLE)
  108. This is what end-to-end encryption should look like! - Jitsi (READABLE)
  109. Technical reasons to choose FreeBSD over GNU/Linux (READABLE)
  110. The limitations of Android N Encryption (READABLE)
  111. Hacking my Sixth Form College network in 1991 (READABLE)
  112. Temporal circuit of macroscale dynamic brain activity supports human consciousness (READABLE)
  113. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns (READABLE)
  114. Messaging App Signal Threatens to Dump US Market if Anti-Encryption Bill Passes (READABLE)
  115. Learn dbatools in a Month of Lunches (READABLE)
  116. Running your own secure communication service with Matrix and Jitsi | Matrix.org (READABLE)
  117. Hack yourself first – how to go on the offence before online attackers do (READABLE)
  118. OnCheckin - Continuous Deployment for ASP.Net websites. (READABLE)
  119. Welcome · Real-World Cryptography MEAP V05 (READABLE)
  120. How we recovered over $300K of Bitcoin (READABLE)
  121. Reassuring Words and Good Intentions Don't Mean Good Security (READABLE)
  122. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab (READABLE)
  123. A Message to Our Users - Zoom Blog (READABLE)
  124. The EARN IT Act Violates the Constitution (READABLE)
  125. Perspectives & gaps between theory, practice & industry research in cryptography (READABLE)
  126. .NET R&D Digest (March, 2020) (READABLE)
  127. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online (READABLE)
  128. US Government Wages War on Encryption (READABLE)
  129. Await | Writing an OS in Rust (READABLE)
  130. patents in crypto (READABLE)
  131. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS (READABLE)
  132. The Hardest Program I've Ever Written – journal.stuffwithstuff.com (READABLE)
  133. New grad vs senior dev (READABLE)
  134. Released: Microsoft.Data.SqlClient 2.0 Preview 2 (READABLE)
  135. Speeding up Linux disk encryption (READABLE)
  136. Unsure Calculator (READABLE)
  137. [15] RFR 8172680: Support SHA-3 based Hmac algorithms (READABLE)
  138. A Quick Garbled Circuits Primer (READABLE)
  139. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger (READABLE)
  140. Software Engineer - Jobs at Apple (READABLE)
  141. How Tailscale works (READABLE)
  142. Scott Helme (READABLE)
  143. Specification by Example, 10 years later (READABLE)
  144. MacBook Air (READABLE)
  145. EARN IT bill is aiming at destroying encryption. We must take action now. (READABLE)
  146. Async ValueTask Pooling in .NET 5 | .NET Blog (READABLE)
  147. US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News (READABLE)
  148. ploeh blog (READABLE)
  149. The polygons of Another World: Atari Jaguar (READABLE)
  150. MakerDAO gets stress tested as ETH price plummets (READABLE)
  151. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation (READABLE)
  152. EARN IT Must Not Happen (READABLE)
  153. What is Meshtastic? (READABLE)
  154. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt (READABLE)
  155. How I Survived Being A $220k/year Intern (READABLE)
  156. draft-ietf-mls-protocol-09 (READABLE)
  157. Keybase (READABLE)
  158. EARN IT is a direct attack on end-to-end encryption (READABLE)
  159. Intel x86 Root of Trust: loss of trust (READABLE)
  160. Enhancing Pwned Passwords Privacy with Padding (READABLE)
  161. The growth of command line options, 1979-Present (READABLE)
  162. Re: SMB over QUIC: Files Without the VPN (READABLE)
  163. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages (READABLE)
  164. WireGuard Gives Linux a Faster, More Secure VPN (READABLE)
  165. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers (READABLE)
  166. zkMesh (READABLE)
  167. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards (READABLE)
  168. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures" (READABLE)
  169. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot (READABLE)
  170. An Intuitive Guide to Linear Algebra – BetterExplained (READABLE)
  171. It’s 2020. Is your code ready for leap day? (READABLE)
  172. pwn.college BETA (READABLE)
  173. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure? (READABLE)
  174. How can I create a password protected .zip file in Windows 10? (READABLE)
  175. The Zen of Go | Dave Cheney (READABLE)
  176. A Simple Range Proof From Polynomial Commitments - HackMD (READABLE)
  177. microsoft/electionguard (READABLE)
  178. TimeSnapper, automatic screenshot software, auto screen capture (READABLE)
  179. hassio-addons/addon-ssh (READABLE)
  180. Welcome to the UK .NET Tour 2020 (READABLE)
  181. Source Code | OpenVPN (READABLE)
  182. A Brief Intro to Clean Architecture, Clean DDD, and CQRS (READABLE)
  183. Fundamental Concepts for Elastic Jobs in Azure SQL Database (READABLE)
  184. Messaging Layer Security: Towards a New Era of Secure Group Messaging (READABLE)
  185. Cryptologie (READABLE)
  186. Update on our new and upcoming security keys (READABLE)
  187. Latacora - Stop Using Encrypted Email (READABLE)
  188. dwmkerr/hacker-laws (READABLE)
  189. Real-World Cryptography (READABLE)
  190. The NuGet Blog (READABLE)
  191. How HTTPS works Part 1 — Building Blocks (READABLE)
  192. google/tink (READABLE)
  193. damienbod/AspNetCoreCertificates (READABLE)
  194. Serious Cryptography | No Starch Press (READABLE)
  195. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture (READABLE)
  196. Dino 0.1 Release - Dino. Communicating happiness. (READABLE)
  197. Ryujinx/Ryujinx (READABLE)
  198. Searching For New Adventures In Software Development (READABLE)
  199. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure (READABLE)
  200. Building personal search infrastructure for your knowledge and code | beepb00p (READABLE)
  201. Authentication, What The Fuck? (READABLE)
  202. How to write a simple operating system in assembly language (READABLE)
  203. Welcome to the UK .NET Tour 2020 (READABLE)
  204. Pascal's wager - Wikipedia (READABLE)
  205. v5.8 Release Notes (READABLE)
  206. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH (READABLE)
  207. .NET Core, .NET 5; the exodus of .NET Framework? (READABLE)
  208. Autocrypt 1.1.0 documentation (READABLE)
  209. On Privacy versus Freedom | Matrix.org (READABLE)
  210. Vim cryptmethod is not authenticated · Issue #638 · vim/vim (READABLE)
  211. Google gives up on US carriers, will roll out its own RCS chat system (READABLE)
  212. .NET R&D Digest (November – December, 2019) (READABLE)
  213. Signal >> Blog >> Technology Preview for secure value recovery (READABLE)
  214. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures (READABLE)
  215. Zero allocation code in C# and Unity - Seba's Lab (READABLE)
  216. How to generate random numbers using water bubbles (READABLE)
  217. tmds/Tmds.Ssh (READABLE)
  218. oqtane/oqtane.framework (READABLE)
  219. Data breach disclosure 101: How to succeed after you've failed (READABLE)
  220. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories (READABLE)
  221. Why IVPN - What makes IVPN the best privacy protection service (READABLE)
  222. GateHub Investigation - Final Statement (READABLE)
  223. Stop surveillance and preserve your privacy with IVPN (READABLE)
  224. Isogeny crypto (READABLE)
  225. Homepage | ZKProof Standards (READABLE)
  226. dotnet/SqlClient (READABLE)
  227. Real World Crypto 2020 Program (READABLE)
  228. Thoughts on DNS-over-HTTPS (READABLE)
  229. x86/x64 SIMD Instruction List (SSE to AVX512) (READABLE)
  230. bye: FTP Support Is Going Away (READABLE)
  231. Verzekeraar Allianz informeert klanten over datalek - Security.NL (READABLE)
  232. Commas in big numbers everywhere: An OpenType adventure (READABLE)
  233. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control (READABLE)
  234. OceanLibrary/Ocean (READABLE)
  235. The Lines of Code That Changed Everything (READABLE)
  236. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain (READABLE)
  237. A detailed look at Ubuntu’s new experimental ZFS installer (READABLE)
  238. Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com (READABLE)
  239. “Stubs” in the .NET Runtime (READABLE)
  240. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime (READABLE)
  241. Peddle the Pedal to the Metal (READABLE)
  242. praeclarum/sqlite-net (READABLE)
  243. beemdevelopment/Aegis (READABLE)
  244. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport (READABLE)
  245. PrivacySafe: The Anti-Cloud Appliance (READABLE)
  246. awslabs/s2n (READABLE)
  247. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog (READABLE)
  248. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council (READABLE)
  249. OWASP/CheatSheetSeries (READABLE)
  250. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet (READABLE)
  251. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56) (READABLE)
  252. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]" (READABLE)
  253. Why didn't the Romans contribute much to mathematics? | Hacker News (READABLE)
  254. Security Incident - Please Change Your Password (READABLE)
  255. Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards — Krebs on Security (READABLE)
  256. EV SSL Certificates Phased Out of New Browser Updates | Venafi (READABLE)
  257. Learn UI Design: The Complete Online Video Course (READABLE)
  258. KNOB Attack (READABLE)
  259. Gone forEVer! (READABLE)
  260. Extended Validation Certificates are (Really, Really) Dead (READABLE)
  261. Spying on HTTPS (READABLE)
  262. Online syntax highlighting for the masses! (READABLE)
  263. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t (READABLE)
  264. Canva Security Incident - May 24 FAQs (READABLE)
  265. Architecture for humans - Ayende @ Rahien (READABLE)
  266. Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky (READABLE)
  267. Pwnie Awards (READABLE)
  268. More on Backdooring (or Not) WhatsApp - Schneier on Security (READABLE)
  269. ECMAScript 2015 Language Specification – ECMA-262 6th Edition (READABLE)
  270. Kazakhstan’s HTTPS Interception (READABLE)
  271. When a rewrite isn’t: rebuilding Slack on the desktop (READABLE)
  272. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365 (READABLE)
  273. Digital Driver’s Licenses Could Become a Real Option in Some States (READABLE)
  274. CRYPTO-LAB (READABLE)
  275. Real-World Cryptography (READABLE)
  276. Scunthorpe problem - Wikipedia (READABLE)
  277. Proving security at scale with automated reasoning - All Things Distributed (READABLE)
  278. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server (READABLE)
  279. The Ultra Secure Crypto Storage & Communication Device (READABLE)
  280. Security advisory 2019-06-13 | Yubico (READABLE)
  281. I wanna go fast: HTTPS' massive speed advantage (READABLE)
  282. Fixing Random, part 34 (READABLE)
  283. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest. (READABLE)
  284. dotnet/coreclr (READABLE)
  285. Apple CryptoKit | Apple Developer Documentation (READABLE)
  286. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer (READABLE)
  287. Accessing UNIX sockets remotely from .NET - Red Hat Developer (READABLE)
  288. Changing my Mind about AI, Universal Basic Income, and the Value of Data – The Art of Research (READABLE)
  289. Building Facebook's service encryption infrastructure - Facebook Engineering (READABLE)
  290. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt) (READABLE)
  291. Ethical Alternatives & Resources - ethical.net (READABLE)
  292. dotnet/coreclr (READABLE)
  293. Top SSL Certificates Buyer's Guide (READABLE)
  294. Using Ed25519 signing keys for encryption (READABLE)
  295. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining (READABLE)
  296. Performance Improvements in .NET Core 3.0 | .NET Blog (READABLE)
  297. ZombieLoad Attack (READABLE)
  298. Domain Randomization for Sim2Real Transfer (READABLE)
  299. Your most sensitive data is likely exposed online. These people try to find it (READABLE)
  300. eyeDisk. Hacking the unhackable. Again | Pen Test Partners (READABLE)
  301. ZkVM: a new design for fast, confidential smart contracts (READABLE)
  302. (READABLE)
  303. Thank you Waitrose, now fix your insecure site (READABLE)
  304. Community and Communication going forward (READABLE)
  305. » Return to Zork The Digital Antiquarian (READABLE)
  306. Do we need effects to get abstraction? (READABLE)
  307. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification (READABLE)
  308. A doorbell company owned by Amazon wants to start producing “crime news” and it’ll definitely end well (READABLE)
  309. mpm guide - niall t.l. (READABLE)
  310. The LLVM Compiler Infrastructure Project (READABLE)
  311. The .NET Abstraction Pile (READABLE)
  312. A Recipe for Training Neural Networks (READABLE)
  313. Twisted Oak (READABLE)
  314. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security (READABLE)
  315. Peddle the Pedal to the Metal (READABLE)
  316. JDK 12 Security Enhancements (READABLE)
  317. Understanding the Limitations of HTTPS (READABLE)
  318. How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch (READABLE)
  319. Cryptologie (READABLE)
  320. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org (READABLE)
  321. Direct3D 11.3 Functional Specification (READABLE)
  322. Website enumeration insanity: how our personal data is leaked (READABLE)
  323. Verified cryptographic provider a triple threat (READABLE)
  324. The story of the Rendition Vérité 1000 (READABLE)
  325. Scott Helme (READABLE)
  326. Dotnet-Boxed/Templates (READABLE)
  327. BoringTun, a userspace WireGuard implementation in Rust (READABLE)
  328. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services (READABLE)
  329. The WhibOx Contest Edition 2 - CYBERCRYPT (READABLE)
  330. Understanding STIR/SHAKEN (READABLE)
  331. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs (READABLE)
  332. We need to talk about Session Tickets (READABLE)
  333. Introduction (READABLE)
  334. Cybersecurity for the Public Interest - Schneier on Security (READABLE)
  335. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security (READABLE)
  336. Data Leakage from Encrypted Databases - Schneier on Security (READABLE)
  337. kelseyhightower/kubernetes-the-hard-way (READABLE)
  338. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability (READABLE)
  339. Crypto Canon - Andreessen Horowitz (READABLE)
  340. Blockchain Governance: Programming Our Future (READABLE)
  341. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz (READABLE)
  342. Keybase launches encrypted git (READABLE)
  343. AI Progress Measurement (READABLE)
  344. Microsecond Resolution Time Services for Windows (READABLE)
  345. vivri/Adjective (READABLE)
  346. On the Security of Password Managers - Schneier on Security (READABLE)
  347. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security (READABLE)
  348. Reconstructing SIGSALY - Schneier on Security (READABLE)
  349. Public-Interest Tech at the RSA Conference - Schneier on Security (READABLE)
  350. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security (READABLE)
  351. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security (READABLE)
  352. Hacking the GCHQ Backdoor - Schneier on Security (READABLE)
  353. Friday Squid Blogging: Squid Lollipops - Schneier on Security (READABLE)
  354. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security (READABLE)
  355. El Chapo's Encryption Defeated by Turning His IT Consultant - Schneier on Security (READABLE)
  356. Friday Squid Blogging: New Giant Squid Video - Schneier on Security (READABLE)
  357. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security (READABLE)
  358. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security (READABLE)
  359. New Australian Backdoor Law - Schneier on Security (READABLE)
  360. Friday Squid Blogging: Problems with the Squid Emoji - Schneier on Security (READABLE)
  361. Security Risks of Chatbots - Schneier on Security (READABLE)
  362. Friday Squid Blogging: Squid Sculptures - Schneier on Security (READABLE)
  363. Security of Solid-State-Drive Encryption - Schneier on Security (READABLE)
  364. ID Systems Throughout the 50 States - Schneier on Security (READABLE)
  365. Cell Phone Security and Heads of State - Schneier on Security (READABLE)
  366. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption (READABLE)
  367. Ext4 Disk Layout - Ext4 (READABLE)
  368. Modern Alternatives to PGP (READABLE)
  369. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go (READABLE)
  370. Real World Crypto 2019 (READABLE)
  371. The year in post-quantum crypto (READABLE)
  372. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress (READABLE)
  373. The Case Against Quantum Computing - IEEE Spectrum (READABLE)
  374. Mathematics of Public Key Cryptography (READABLE)
  375. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix (READABLE)
  376. D. J. Bernstein / Talks (READABLE)
  377. Security in Times of Surveillance (READABLE)
  378. (READABLE)
  379. Round 1 Submissions - Post-Quantum Cryptography | CSRC (READABLE)
  380. Selected Areas in Cryptography (SAC) 2018 | University of Calgary | (READABLE)
  381. Pitching security vs. privacy is asking the wrong question (READABLE)
  382. libpqcrypto: Intro (READABLE)
  383. Security in Times of Surveillance (READABLE)
  384. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science (READABLE)
  385. (READABLE)
  386. The ROBOT Attack (READABLE)
  387. Unity Labs Publications | Unity (READABLE)
  388. Mersenne Prime Discovery - 2^82589933-1 is Prime! (READABLE)
  389. Cloud Data Backup for Small Businesses | CrashPlan (READABLE)
  390. nucypher/nufhe (READABLE)
  391. RUB-NDS/TLS-Padding-Oracles (READABLE)
  392. [paper review] A faster, more efficient cryptocurrency (READABLE)
  393. mimoo/eureka (READABLE)
  394. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom (READABLE)
  395. Database Encryption (READABLE)
  396. Kerckhoffs’ principles – Why should I make my cipher public? (READABLE)
  397. Proxy re-encryption and FHE with NuCypher (READABLE)
  398. Attack of the week: searchable encryption and the ever-expanding leakage function (READABLE)
  399. Introducing Adiantum: Encryption for the Next Billion Users (READABLE)
  400. Quantum computing as a field is obvious bullshit (READABLE)
  401. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company (READABLE)
  402. Why Facts Don’t Change Our Minds (READABLE)
  403. Going old school: how I replaced Facebook with email (READABLE)
  404. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian (READABLE)
  405. » Agrippa (A Book of the Dead) The Digital Antiquarian (READABLE)
  406. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian (READABLE)
  407. » The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian (READABLE)
  408. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian (READABLE)
  409. .NET Design Review: GitHub Quick Reviews (READABLE)
  410. Tuning a Runtime for Both Productivity and Performance (READABLE)
  411. We didn’t see this coming (READABLE)
  412. dotnet/coreclr (READABLE)
  413. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore (READABLE)
  414. no dogma podcast - powered by FeedBurner (READABLE)
  415. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1 (READABLE)
  416. Software Tokens Won't Save You (READABLE)
  417. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1 (READABLE)