Explore other dev related sites in this ring. If you would like to join this ring click here.
devring.club Previous Random Next


Posts for 'encryption'

  1. Richard Feynman's Integral Trick
  2. [Last Week in .NET #46] – Exceptionally Useful
  3. google/fully-homomorphic-encryption
  4. Automonous Biology
  5. Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
  6. Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
  7. How to Handle Secrets on the Command Line
  8. Taildrop was kind of easy, actually
  9. Answering Community Questions and What’s Ahead for Mina
  10. Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
  11. From KEMs to protocols
  12. Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  13. Kerckhoffs’s Law for Security Engineers
  14. Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
  15. Althttpd: The Althttpd Webserver
  16. 'Heavy blow' for criminals as more than 200 underworld figures charged after app sting
  17. Organised crime dealt ‘heavy blow’, says PM, after global police sting cracks open ‘encrypted’ app
  18. Exploring android development on iPad
  19. Certificates Confuse Everything
  20. It’s time to ditch Chrome
  21. Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  22. FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
  23. Password Managers.
  24. Kate polynomial commitments
  25. Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
  26. The best cryptographic protocol ever!
  27. Linux Security Hardening and Other Tweaks
  28. Leaky Abstractions
  29. Vinod Vaikuntanathan - Real World Cryptographers Podcast
  30. From Competitive Programming to APL - CoRecursive Podcast
  31. Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
  32. Using Wikipedia as an Impromptu RottenTomatoes API
  33. Mikkel Paulson
  34. ongoing by Tim Bray · Testing in the Twenties
  35. The Most Expensive Number in Engineering
  36. Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
  37. Amazon devices will soon automatically share your Internet with neighbors
  38. Contributing to Gemini ecosystem
  39. Elliptic Curve Cryptography Explained
  40. This MMO that promised an 'infinite open world' has become a giant fiasco
  41. Code Maze Weekly #78 - Code Maze
  42. Episode 77 - Application Security with Tanya Janka
  43. QUIC is now RFC 9000
  44. A UDP-Based Multiplexed and Secure Transport
  45. Is MDPI a predatory publisher?
  46. Messaging and Chat Control
  47. New Storage Providers for Azure Durable Functions
  48. The best API design principles inspired by nature - andre.schweighofer
  49. Blockchain voting is overrated among uninformed people but underrated among informed people
  50. DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
  51. Cryptography from the Ground Up
  52. 255: What is encryption anyways?
  53. Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  54. How to Get Rich
  55. Heartbleed Revisited
  56. Secure Search Over Encrypted Data
  57. Indian job portal IIMJobs hacked; 46GB worth of database leaked online
  58. How the UK's Online Safety Bill threatens Matrix | Matrix.org
  59. Authenticated Encryption in .NET with AES-GCM
  60. I am sick and tired of hearing tech companies complain about a developer shortage
  61. Welcoming Linux to the 1Password Family | 1Password
  62. zkSessions: The ZK Languages Roundup - May 19 | Hopin
  63. Constructing a sponge function from MD5 - Gokberk Yaltirakli
  64. Zcon2Lite
  65. I Have a Lot to Say About Signal’s Cellebrite Hack
  66. Password Storage - OWASP Cheat Sheet Series
  67. The stack monoid revisited
  68. Running a .NET 5 web app on Railway
  69. A day at work
  70. Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  71. BLS12-381 For The Rest Of Us - HackMD
  72. Reverse Engineering an Unknown Microcontroller - Dmitry.GR
  73. Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  74. Building an Event Driven .NET Application: The Fundamentals – Wrapt
  75. Peter Thiel's Religion - David Perell
  76. <p>The Node.js CA Footgun</p>
  77. Security flaws in all Wi-Fi devices
  78. Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  79. Beware of Applications Misusing Root Stores – Mozilla Security Blog
  80. Hell site
  81. Minecraft Modding: Laser Gun - Alan Zucconi
  82. Dear EU: Please Don't Ruin the Root - Articles
  83. Realizing the Mina vision in Rust
  84. Personal Data of 3 Million+ People Exposed In DriveSure Hack
  85. Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
  86. Introducing the Pinecone overlay network | Matrix.org
  87. Understanding Extended-Nonce Constructions
  88. Amazon Fake Reviews Scam Exposed in Data Breach
  89. --this is a no-knowledge proof--
  90. Introduction to JSON Web Tokens (JWT)
  91. timvisee/send
  92. ZK languages with Alex Ozdemir
  93. Is abstraction killing civilization? | datagubbe.se
  94. What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  95. Mixed Boolean Arithmetic Obfuscation
  96. Update: Security Notification - March 2021
  97. Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  98. Signal's Cellebrite Hack Is Already Causing Grief for the Law
  99. Content Marketing for Bootstrappers | James Chambers
  100. Dabbling in Cryptography
  101. HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
  102. Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  103. Rust Language Cheat Sheet
  104. Setting up a Cardano Producer node using Kubernetes/microk8s
  105. Customer Notice FAQs
  106. In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  107. Make better predictions, stop estimating - andre.schweighofer
  108. Apple introduces AirTag
  109. Minimum Viable State: Building a Nomad Internet Country
  110. Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
  111. dotnet/runtime
  112. What's in the box? - fasterthanli.me
  113. Thoughts on writing a wayland window manager with wlroots
  114. Why should you care about privacy - even if you had nothing to hide
  115. Vanquished Vaccines and Vetocracies – We Are Not Saved
  116. Eat a Peach for Engineers
  117. Standard Notes | A Simple And Private Notes App
  118. Node.js support in Cloudflare Workers
  119. What on Earth is this Encryption Scheme?
  120. Security Control: Implement security best practices
  121. Serving up zero-knowledge proofs
  122. Machine Learning With ML.NET - Evaluation Metrics
  123. The Cursed Computer Iceberg Meme
  124. My Vim Notes Setup
  125. Meet the patent troll that won a $308 million jury trial against Apple
  126. My programming principles • Borislav Grigorov
  127. The Architecture Behind A One-Person Tech Startup
  128. BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
  129. WTF are these security chips?
  130. A pretty good guide to pretty good privacy
  131. Goodbye OpenSSL, and Hello To Google Tink
  132. MPC-Over-Signal
  133. The Unparalleled Genius of John von Neumann
  134. Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  135. Dumping user data from cheap tablets in minutes
  136. How I Got Into Computers AppDev Edition
  137. Leaked phone number of Mark Zuckerberg reveals he is on Signal
  138. (PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
  139. Legalizing Gay Marriage in Crusader Kings III with Ghidra
  140. PostgreSQL Security Hardening
  141. The Exception Model
  142. Zero click vulnerability in Apple’s macOS Mail
  143. C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  144. Apple's cooperation with authoritarian governments
  145. Some opinionated thoughts on SQL databases
  146. Cloudflare’s WAF is recognized as customers’ choice for 2021
  147. Peace of mind backup - boa.nu
  148. Fleeing WhatsApp for Privacy? Don't Turn to Telegram
  149. Creation vs. Consumption
  150. Git
  151. A new Cloudflare Web Application Firewall
  152. Getting started with Self Sovereign Identity SSI
  153. .NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
  154. OpenPGP Message Format
  155. PGP is a Form of Minimalism [The Call of the Open Sidewalk]
  156. About | Mina Illuminate
  157. Single-primitive authenticated encryption for fun
  158. It doesn't work | Frank DENIS random thoughts.
  159. janroesner/sixty5o2
  160. APT Encounters of the Third Kind
  161. Building a phone book: Part I
  162. C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  163. facebookresearch/Cupcake
  164. The Evolution of Distributed Systems on Kubernetes
  165. Is There a Case for Programmers to Unionize? - Qvault
  166. On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  167. CoinList
  168. Browser Isolation for teams of all sizes
  169. suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  170. Crystal 1.0 - What to expect
  171. Welcome to Cloudflare Security Week 2021!
  172. My self-study plan for electrical engineering
  173. r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  174. Hybrid encryption and the KEM/DEM paradigm
  175. Episode 72 - Emulating a Video Game System in .NET with Ryujinx
  176. The missing explanation of ZK-SNARKs: Part 1
  177. Can we talk about client-side certificates?
  178. Zero Knowledge Proof (with Avi Wigderson) - Numberphile
  179. A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
  180. Can an economy keep on growing? - Inverted Passion
  181. What It Means to Learn to Code
  182. Surreptitious Forwarding [The Call of the Open Sidewalk]
  183. The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
  184. A Simple Personal Data Backup Setup
  185. How are zlib, gzip and zip related? What do they have in common and how are they different?
  186. YouTube
  187. Key Exchange Standards
  188. Becoming physically immune to brute-force attacks
  189. About the March 8 & 9, 2021 Verkada camera hack
  190. Block Cipher Structures: Ranked
  191. Getting started with Dapr for .NET Developers
  192. I want a Computer that I Own
  193. 4 Times I Felt Discriminated Against for Being a Female Developer
  194. Notion is not a knowledge base
  195. A flamegraph of Real-World Cryptography
  196. It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
  197. The Teams Dashboard: Finding a Product Voice
  198. A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
  199. Online tool to generate and check bcrypt hashed passwords.
  200. Hotpatch for Windows Server Azure Edition (preview)
  201. February 2021 - Killing Turbotax
  202. How Nacon Cracked and Pirated The Sinking City - Frogwares
  203. Cryptology ePrint Archive: Report 2020/1491
  204. Goodbye Client Affinity, Hello Data Protection with Azure
  205. 5 tools I use to protect my privacy online
  206. Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
  207. How I cut GTA Online loading times by 70%
  208. Camera Response Function
  209. The security of the "Pass" password manager
  210. The Economics of Biodiversity
  211. Cryptology ePrint Archive: Report 2020/1610
  212. How often should I rotate my ssh keys?
  213. Microsoft Releases Azure Firewall Premium in Public Preview
  214. [JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  215. Understanding how Leela Chess Zero works
  216. Cryptography Interface Design is a Security Concern
  217. Zero Bug Tolerance
  218. Cryptographic Wear-Out for Symmetric Encryption
  219. C#'s Functional Journey
  220. California can enforce net neutrality law, judge rules in loss for ISPs
  221. The Azure Security Architect Map
  222. Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
  223. Cryptology ePrint Archive: Report 2020/1581
  224. Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
  225. How to destroy the Earth
  226. GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
  227. Cryptology ePrint Archive: Report 2020/1533
  228. Using HPKE to Encrypt Request Payloads
  229. Urbit :: the good, the bad, and the insane
  230. Cryptology ePrint Archive: Report 2020/1536
  231. Distributed Application Runtime (Dapr) v1.0 Announced
  232. Making Easy Auth tokens survive releases on Linux Azure App Service
  233. upgundecha/howtheysre
  234. ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
  235. A Visual Guide: To Sustainable Software Engineering
  236. Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
  237. Multi-asset shielded pool project (MASP)
  238. Securing the post-quantum world
  239. Our Solo v2 launch is official!
  240. Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  241. Good-bye ESNI, hello ECH!
  242. Crackpot Cryptography and Security Theater
  243. Why should I give you my ID card
  244. 2020 U.S. Election: Cybersecurity Analysis
  245. A look at GSM
  246. Reverie: An optimized zero-knowledge proof system
  247. Writing high performance F# code
  248. Report: Romanian Real Estate Portal Suffers Crippling Data Breach
  249. Lessons Learned From My Last Startup: A Post Mortem
  250. Is abstraction killing civilization? | datagubbe.se
  251. Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  253. Working with SSL Certificate in Azure App Service
  254. Ideas That Created the Future
  255. A Simple and Succinct Zero Knowledge Proof
  256. Help users in Iran reconnect to Signal
  257. Security: The Need-to-know principle
  258. Threshold Cryptography with Omer Shlomovits from ZenGo
  259. 7 behaviours to avoid in a software architecture role - Daniel Watts
  260. Tearing Down a Humidifier - Lei's Blog
  261. Why Generation X will save the web - Hi, I'm Heather Burns.
  262. SSL/TLS connection issue troubleshooting guide
  263. The Best TLS and PKI Training Course in the World
  264. My experience passing CKA and CKAD
  265. Episode 10: Exploiting Authenticated Encryption Key Commitment!
  266. LackRack - Eth0Wiki
  267. All Stories Are Wrong, but Some Are Useful
  268. The Subtle Hazards of Real-World Cryptography
  269. I didn't install Signal for privacy
  270. The Psychology of Stock Bubbles
  271. How to properly store a password in the Database | Petre Popescu
  272. Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
  273. The EU must protect the right to privacy and not attack end-to-end encryption
  274. Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  275. No, Java is not a Secure Programming Language
  276. berty/berty
  277. Tools I Love to Not Think About
  278. What it means to be a cryptographer
  279. SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  280. survey.pdf
  281. Write Crypto Code! Don't publish it!
  282. pavlobu/deskreen
  283. Technological stagnation: Why I came around
  284. s-51: Ask Me Anything (AMA), with Joan Daemen
  285. The architecture of my life | mjwsteenbergen-blog
  286. AKS Zero To Hero - Series for everyone - Azure Greg
  287. Release Notes | Bitwarden Help & Support
  288. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  289. My Backup Strategy
  290. So, You Want to CTF? (A Beginner’s Guide to CTFing)
  291. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  292. Building your first Telegram Bot with ASP.NET Core
  293. Please Stop Encrypting with RSA Directly
  294. The worrying trend of game technology centralization
  295. Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  296. We can do better than Signal
  297. CondensationDB/Condensation
  298. Mesmerizing Chameleon Signatures
  299. Is Writing as Important as Coding?
  300. Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  301. A history of end-to-end encryption and the death of PGP
  302. Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  303. KEMTLS: Post-quantum TLS without signatures
  304. Fully Homomorphic Encryption Part One: A Gentle Intro
  305. danso - happy-space: a whitespace-sensitive calculator
  306. Holistic web protection: industry recognition for a prolific 2020
  307. Foam
  308. Send and receive WhatsApp messages through email
  309. Learn X by doing Y - A project-based learning search engine
  310. Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  311. jukefoxer/Signal-Android
  312. An introduction to the Data Protection system in ASP.NET Core
  313. Notification of Data Security Incident - December 23, 2020
  314. My personal wishlist for a decentralized social network
  315. Machine Learning with ML.NET - Linear Regression
  316. Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  317. Wasmer - The Universal WebAssembly Runtime
  318. Signal, thank you for not collecting my data. But I won’t use you.
  319. Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  320. safepassme
  321. What I learned doing 125 public talks - Part I
  322. .NET Rocks! vNext
  323. DALL·E: Creating Images from Text
  324. Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  325. HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  326. SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  327. The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  328. Cryptology ePrint Archive: Report 2020/1456
  329. s-18: FSE 2020 Rump session
  330. Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  331. Linux Hardening Guide | Madaidan's Insecurities
  332. Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  333. zkSNARKS and Cryptographic Accumulators
  334. NeurIPS 2020 Best Machine Learning Paper Awards
  335. Web Authentication Methods Compared
  336. Combating abuse in Matrix - without backdoors. | Matrix.org
  337. Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  338. Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  339. Development time is money, therefore I RAID
  340. Against Victimhood
  341. The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  342. No, Cellebrite cannot 'break Signal encryption.'
  343. Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  344. Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  345. Why I've Been Merging Microservices Back Into The Monolith At InVision
  346. My Engineering Axioms
  347. 2020’s Top 15 Machine Learning & AI Research Papers
  348. You're Missing Out If You Don't Write Weekly Digests
  349. Cryptologie | Vetted Encryption
  350. Apple M1 foreshadows RISC-V
  351. Bizarre Design Choices In Zoom’S End-To-End Encryption
  352. Branding Your Own Startup | Blog of Pascal
  353. Commits are snapshots, not diffs - The GitHub Blog
  354. Giving more tools to software engineers: the reorganization of the factory
  355. How to conduct a competitive analysis - Philipp Muens
  356. Adding Encrypted Group Calls to Signal
  357. Learn about online security, privacy, and encryption
  358. The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  359. Privacy and Compliance Reading List
  360. Computers Are Bad
  361. Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  362. Google Alternatives 2020: Best Privacy Friendly Alternatives
  363. How to Build a Global Network that Complies with Local Law
  364. Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  365. There's Always More History • Hillel Wayne
  366. Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  367. Improving DNS Privacy with Oblivious DoH in
  368. From Zero to AppStore
  369. Privacy needs to be built into the Internet
  370. benwilber/boltstream
  371. Welcome to Privacy & Compliance Week
  372. InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  373. On Trusting Macintosh Hardware
  374. An introduction to three-phase power and PDUs
  375. Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  376. How to Make Your Code Reviewer Fall in Love with You
  377. Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  378. An iOS zero-click radio proximity exploit odyssey
  379. Gamedev from scratch 0: Groundwork
  380. Release OpenZFS 2.0.0 · openzfs/zfs
  381. We Need Organic Software
  382. ph1lter
  383. Are My Encryption Keys In The Cloud Really Secure?
  384. How to Think for Yourself
  385. An ex-Googler's guide to dev tools
  386. Crypto Dictionary
  387. Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  388. How do people find bugs?
  389. What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  390. Getting lucky with posting on Hacker News
  391. Productive Uncertainty - Reaction Wheel
  392. zkSummit 6 | Hopin
  393. Normal Forms - Simple Talk
  394. The book is finished, well sort of...
  395. Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  396. The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  397. zfs.rent
  398. Six months of Tiny Projects
  399. ‘You Have Zero Privacy’ Says an Internal RCMP Presentation. Inside the Force’s Web Spying Program | The Tyee
  400. Claims encryption for B2C tokens | Developer Support
  401. Can’t open apps on macOS: an OCSP disaster waiting to happen
  402. Using Matrix to replace proprietary and centralized chat apps
  403. Going Bark: A Furry’s Guide to End-to-End Encryption
  404. Does Apple really log every app you run? A technical look
  405. SAD DNS Explained
  406. How a Game Developer Leaked 46 Million Accounts
  407. Etebase - Your end-to-end encrypted backend
  408. Get Animal Jam for your mobile device, PC, or Mac
  409. caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  410. Notes On Owning Your Own Business
  411. How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  412. Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  413. Zoom lied to users about end-to-end encryption for years, FTC says
  414. What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  415. Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  416. Over 1M Lazada RedMart accounts sold online after data breach
  417. Productivity vs. Privacy
  418. Multithreading Handbook for Simulation Developers
  419. The missing explanation of zk-SNARKs: Part 2
  420. https://www.statewatch.org/media/1434/eu-council-draft-declaration-against-encryption-12143-20.pdf
  421. Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  422. Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  423. Standing on Our Own Two Feet
  424. Querying Across Databases In SQL Azure
  425. Scripts for Managing Azure Container Registry
  426. A Brief Introduction to Deniability
  427. Leaving OCaml
  428. Two workers are quadratically better than one • Hillel Wayne
  429. C# in Simple Terms - Exceptions and Exception Handling
  430. ML Optimization - Advanced Optimizers from scratch with Python
  431. The Basis of Testing – Stories from a Software Tester
  432. Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  433. The missing explanation of ZK-SNARKs: Part 1
  434. Scott Santens - An Engineering Argument for Basic Income
  435. Personal data from 2.8 million Eatigo accounts stolen, put up for sale online
  436. RedMart Data Security Incident
  437. Lazada suffers data breach; personal information from 1.1 million RedMart accounts for sale online
  438. Episode 63 - Being Productive With Jay Miller
  439. How software eats money
  440. ML Optimization pt.1 - Gradient Descent with Python
  441. Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  442. gnu.org
  443. Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  444. 1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  445. Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  446. Azure CLI Oct 2020 release
  447. Ransomware Group Makes Splashy $20K Donation to Charities
  448. The accelerating adoption of Julia
  449. Personal banking needs an API | Chris Hardie's Tech and Software Blog
  450. Let's talk about fake reviews - part 1
  451. 14 Popular Machine Learning Evaluation Metrics
  452. A Legislative Path to an Interoperable Internet
  453. Questioning Probability
  454. charmbracelet/glow
  455. Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  456. Exposing covert surveillance backdoors in children’s smartwatches
  457. XChaCha20-Poly1305: A Primer with Examples in .NET
  458. Five Eyes and Japan call for Facebook backdoor to monitor crime
  459. Event Feeds: Simple and reliable messaging infrastructure
  460. Smart male chastity lock cock-up
  461. Stop the EARN IT Bill Before It Breaks Encryption
  462. Security Of Streaming Encryption In Google's Tink Library
  463. It Didn’t Take Too Long…
  464. Fortunately, I don't squash my commits
  465. Cute Cryptography Stories
  466. Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  467. Wiki - RustStarterKit2020
  468. Urgent: EARN IT Act Introduced in House of Representatives
  469. Episode 61 - Azure and Live Conferences With Andy Morrell
  470. Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  471. Coinbase offers exit package to those uncomfortable with new direction
  472. Doing discourse better: Stuff I wish I knew
  473. is it worth it? — Martin Kleppmann’s blog
  474. Advisory: security issues in AWS KMS and AWS Encryption SDKs
  475. This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  476. Zig's New Relationship with LLVM
  477. How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  478. Using Azure RBAC with Azure Key Vault
  479. Uncomfortable Questions About App Signing
  480. Python behind the scenes #2: how the CPython compiler works
  482. Google Interview Questions Deconstructed: The Knight’s Dialer
  483. Simple Anomaly Detection Using Plain SQL
  484. Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  485. VPNs from first principles
  486. No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  487. Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  488. dwmkerr/hacker-laws
  489. Revenue Model, not Culture, is the Dominant Term
  490. CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  491. When double.Epsilon can equal 0
  492. Let's Encrypt's New Root and Intermediate Certificates
  493. A Thanksgiving Carol
  494. Nvidia’s Integration Dreams
  495. Phosphine gas in the cloud decks of Venus
  496. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  497. Some Great Books For Programmers That StackOverflow Cannot Replace
  498. Security by Obscurity is Underrated
  499. What Clojure spec is and what you can do with it (an illustrated guide)
  500. Raccoon Attack
  501. BashPitfalls - Greg's Wiki
  502. Oracle Developer Live—Java
  503. TLS certificate lifespan cut short: A win for security, or cause for chaos?
  504. Things I Learned to Become a Senior Software Engineer
  505. Verizon achieves milestone in future-proofing data from hackers
  506. Why you want to encrypt password hashes
  507. Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  508. Attention is your scarcest resource
  509. Key exchange standards - Manning
  510. Key exchange standards - Manning
  511. connorferster/handcalcs
  512. The Why and How of Privacy and Security — This Too Shall Grow
  513. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  514. A Saudi Prince's Attempt to Silence Critics on Twitter
  515. I've decided to pursue a Bootstrap MBA
  516. Why I’m Writing A Book On Cryptography
  517. Minimal React: getting started with the frontend library
  518. Soatok’s Guide to Side-Channel Attacks
  519. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  520. So you want to roll your own crypto?
  521. Zoom is now critical infrastructure. That’s a concern
  522. Pure and Applied Chess
  523. It Took 2 Years To Make My First Dollar Selling A Product
  524. The Five Pillars Of Wealth Building - Darius Foroux
  525. Providers | PrivacyTools
  526. Is cloud security too easy to screw up? | A Cloud Guru
  527. A New Botnet Is Covertly Targeting Millions of Servers
  528. Cross-platform cryptography in .NET Core and .NET 5
  529. degoogle
  530. drduh/macOS-Security-and-Privacy-Guide
  531. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  532. What's new in the Windows Store client
  533. fast.ai releases new deep learning course, four libraries, and 600-page book
  534. Transfer a Software Project - Lessons Learned - dcaulfield
  535. jesseduffield/horcrux
  536. Obfuscating your email on the web
  537. A Guide to Autodidactism | Jack Kinsella
  538. Symmetric and Asymmetric Encryption in .NET Core
  539. You Need a Password Manager. Here Are the Best Ones
  540. Graphical Linear Algebra
  541. Let's Learn x86-64 Assembly! Part 0
  542. Nintendo DS Architecture | A Practical Analysis
  543. Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  544. JWTs: Which Signing Algorithm Should I Use?
  545. Data Breach Statement - Utah Gun Exchange
  546. 2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  547. Why I Left a Career as a Startup CTO to Become a Writer
  548. IBM Reveals Next-Generation IBM POWER10 Processor
  549. The Illustrated TLS Connection
  550. Frustrated? It's not you, it's Rust - fasterthanli.me
  551. Mozilla's failures and a path to profitability
  552. Intel® Trust Domain Extensions
  553. Handles are the better pointers
  554. Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  555. Serverless apps on AWS using F# and fable
  556. Mozilla Alumni Network
  557. The CompSci Pub
  558. I don’t trust Signal
  559. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  560. Mobile Phone Streams
  561. bulletproofs::notes::range_proof - Rust
  562. How to encrypt and decrypt shared folders on my Synology NAS
  563. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  564. Building dashboards for operational visibility | Amazon Builders' Library
  565. A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  566. Proof of X
  567. hephaest0s/usbkill
  568. 1Password for Linux development preview
  569. 27-inch iMac gets a major update
  570. Tales of the Autistic Developer - Senior Developer
  571. Physical Attractiveness Bias in the Legal System — The Law Project
  572. How it works - Briar
  573. Azure Cloud Shell Tips And Tricks | Build5Nines
  574. Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  575. David Wong
  576. swyx Writing | Slack is Fumbling Developers
  577. Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  578. .NET R&D Digest (July, 2020)
  579. Chessprogramming wiki
  580. Polymorphic Encryption Algorithms — Generating Code Dynamically
  581. Some SQL Tricks of an Application DBA
  582. You Want Options
  583. Tip 272 - Azure Security Best Practices
  584. Joe Bergeron | Java Obfuscation: A Pattern Language
  585. p410n3 blog
  586. Dropping Out of College to Join Facebook: 3 Years Later
  587. Storage 101: Data Security and Privacy - Simple Talk
  588. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  589. Exploring Fully Homomorphic Encryption
  590. Essays on programming I think about a lot
  591. You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  592. Designing a New Old Home: Part 1
  593. The encrypted homelab
  594. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  595. MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  596. What’s New in Thunderbird 78
  597. 100 Best Kubernetes Books of All Time
  598. Poor feedback from readers
  599. Hacking Reolink cameras for fun and profit
  600. Welcome to Element!
  601. Data Structures & Algorithms I Actually Used Working at Tech Companies
  602. Digicert revokes a raft of web security certificates
  603. A few thoughts about Signal’s Secure Value Recovery
  604. Trending
  605. crypto_stories.md
  606. Disabling Google 2FA Doesn't Need 2FA
  607. New German law would force ISPs to allow secret service to install trojans on user devices
  608. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  609. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  610. Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  611. A Team
  612. Clean Architecture, 2 years later - Elton Minetto
  613. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  614. A Concurrency Cost Hierarchy
  615. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  616. Why I’m Writing A Book On Cryptography
  617. nabeelqu
  618. Why Can't I Reproduce Their Results?
  619. The true cost of knowledge | RoyalSloth
  620. Beware the Google Password Manager - fasterthanli.me
  621. Apple Lightning
  622. Oppose the EARN IT Act
  623. New Mac ransomware spreading through piracy - Malwarebytes Labs
  624. How CDNs Generate Certificates
  625. foambubble/foam
  626. How to get the best out of your Yubikey with GPG
  627. New US Bill would require makers of encrypted devices to leave a backdoor
  628. US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News
  629. Why AES-GCM Sucks
  630. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  631. Navigating Power & Status
  632. Journalist’s phone hacked by new ‘invisible’ technique: All he had to do was visit one website. Any website.
  633. Which Database should I use in my Azure Serverless App?
  634. Avoiding exposing identifier details to your users
  635. jonathan-laurent/AlphaZero.jl
  636. Do you CI? | Benji's Blog -
  637. How is NSA breaking so much crypto?
  638. Discovering Dennis Ritchie’s Lost Dissertation - CHM
  639. The smartest password policy enforcer for Active Directory
  640. Making your data residency choices easier with Azure
  641. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  642. End-to-End Encryption Update - Zoom Blog
  643. Zoom to Introduce New Censorship Features After Doing China's Bidding
  644. GitHub Terms of Service - GitHub Help
  645. Reasoning by Lego: The wrong way to think about cryptography.
  646. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  647. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  648. May 2020 news · Gwern.net
  649. Exploration Strategies in Deep Reinforcement Learning
  650. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  651. DRY vs DAMP in Unit Tests
  652. How to set compensation using commonsense principles
  653. Playing Around With The Fuchsia Operating System
  654. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  655. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  656. Google got rich from your data. DuckDuckGo is fighting back
  657. Discret 11, the French TV encryption of the 80's
  658. Hacking Windows with F# 5.0 Scripts
  659. Byzantine and non-Byzantine distributed systems
  660. Logging with Decorators in TypeScript
  661. How are you improving your technology skills today? Start by reading articles
  662. The Dictator's Army and charismatic founders
  663. Is a trillion-dollar worth of programming lying on the ground
  664. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  665. Introducing P2P Matrix | Matrix.org
  666. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  667. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  668. ScottHolden/BFSourceGen
  669. A Guide to Threat Modelling for Developers
  670. Against an Increasingly User-Hostile Web
  671. A Guide to Threat Modelling for Developers
  672. Obsidian
  673. Messaging with Azure Service Bus - Part 9 - Premium Features
  674. A Guide to Threat Modelling for Developers
  675. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  676. Org Mode - Organize Your Life In Plain Text!
  677. Implementing simple cooperative threads in C - Stephen Brennan
  678. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  679. NIST Special Publication 800-63-3
  680. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  681. A Guide to Threat Modelling for Developers
  682. Introduction to quantum computing with Q# – Part 3, Single qubit gates
  683. Turning Signal App into a Coarse Tracking Device
  684. A Guide to Threat Modelling for Developers
  685. Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  686. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  687. A Guide to Threat Modelling for Developers
  688. Cryptology ePrint Archive: Report 2020/572
  689. How Not to Store Passwords
  690. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  691. Replacing JWTs with Branca and PASETO in .NET Core
  692. Meshing with LinkerD2 using gRPC-enabled .NET Core services
  693. Lockdown Course: Introduction to Cryptography - James Grime
  694. Asgard Systems uses ML.NET to reduce food waste | .NET
  695. Make LLVM fast again
  696. Zoom buys Keybase to help it build end-to-end encryption
  697. Alternatives to PGP
  698. Cryptology ePrint Archive: Report 2018/607
  699. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  700. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  701. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  702. April Extensions for Firefox Preview
  703. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  704. Modern SAT solvers: fast, neat and underused (part 1 of N)
  705. Startup financial models - 12 templates compared for SaaS
  706. OpenPGP Message Format
  707. How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  708. SailfishOS - Sailfish OS
  709. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  710. Why not "Why not WireGuard?"
  711. Messaging with Azure Service Bus - Part 5 - Message Sending Options
  712. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  713. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  714. Barbie typewriter
  715. Preventing Software Rot
  716. Search Results - Springer
  717. Build a C# App with CockroachDB and the .NET Npgsql Driver
  718. This is what end-to-end encryption should look like! - Jitsi
  719. FocalFossa/ReleaseNotes - Ubuntu Wiki
  720. How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  721. ZEIT is now Vercel - Vercel
  722. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  723. “Stubs” in the .NET Runtime
  724. Scuttlebot peer-to-peer log store
  725. Saving Money on Internation Payments as a Remote Freelancer
  726. This is what end-to-end encryption should look like! - Jitsi
  727. Technical reasons to choose FreeBSD over GNU/Linux
  728. The limitations of Android N Encryption
  729. Hacking my Sixth Form College network in 1991
  730. Temporal circuit of macroscale dynamic brain activity supports human consciousness
  731. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  732. Messaging App Signal Threatens to Dump US Market if Anti-Encryption Bill Passes
  733. Learn dbatools in a Month of Lunches
  734. Running your own secure communication service with Matrix and Jitsi | Matrix.org
  735. Hack yourself first – how to go on the offence before online attackers do
  736. OnCheckin - Continuous Deployment for ASP.Net websites.
  737. Welcome · Real-World Cryptography MEAP V05
  738. How we recovered over $300K of Bitcoin
  739. Reassuring Words and Good Intentions Don't Mean Good Security
  740. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  741. A Message to Our Users - Zoom Blog
  742. The EARN IT Act Violates the Constitution
  743. Perspectives & gaps between theory, practice & industry research in cryptography
  744. .NET R&D Digest (March, 2020)
  745. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  746. US Government Wages War on Encryption
  747. Await | Writing an OS in Rust
  748. patents in crypto
  749. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  750. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  751. New grad vs senior dev
  752. Released: Microsoft.Data.SqlClient 2.0 Preview 2
  753. Speeding up Linux disk encryption
  754. Unsure Calculator
  755. [15] RFR 8172680: Support SHA-3 based Hmac algorithms
  756. A Quick Garbled Circuits Primer
  757. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  758. Software Engineer - Jobs at Apple
  759. How Tailscale works
  760. Scott Helme
  761. MacBook Air
  762. Ryan_Connolly_Resume.docx
  763. EARN IT bill is aiming at destroying encryption. We must take action now.
  764. Async ValueTask Pooling in .NET 5 | .NET Blog
  765. US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News
  766. ploeh blog
  767. The polygons of Another World: Atari Jaguar
  768. MakerDAO gets stress tested as ETH price plummets
  769. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  770. EARN IT Must Not Happen
  771. What is Meshtastic?
  772. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  773. How I Survived Being A $220k/year Intern
  774. draft-ietf-mls-protocol-09
  775. Keybase
  776. EARN IT is a direct attack on end-to-end encryption
  777. Intel x86 Root of Trust: loss of trust
  778. Enhancing Pwned Passwords Privacy with Padding
  779. The growth of command line options, 1979-Present
  780. Re: SMB over QUIC: Files Without the VPN
  781. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  782. WireGuard Gives Linux a Faster, More Secure VPN
  783. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  784. zkMesh
  785. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  786. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  787. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  788. An Intuitive Guide to Linear Algebra – BetterExplained
  789. It’s 2020. Is your code ready for leap day?
  790. pwn.college BETA
  791. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  792. How can I create a password protected .zip file in Windows 10?
  793. The Zen of Go | Dave Cheney
  794. A Simple Range Proof From Polynomial Commitments - HackMD
  795. microsoft/electionguard
  796. TimeSnapper, automatic screenshot software, auto screen capture
  797. hassio-addons/addon-ssh
  798. Welcome to the UK .NET Tour 2020
  799. Source Code | OpenVPN
  800. A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  801. Fundamental Concepts for Elastic Jobs in Azure SQL Database
  802. Messaging Layer Security: Towards a New Era of Secure Group Messaging
  803. Cryptologie
  804. Update on our new and upcoming security keys
  805. Latacora - Stop Using Encrypted Email
  806. dwmkerr/hacker-laws
  807. Real-World Cryptography
  808. The NuGet Blog
  809. How HTTPS works Part 1 — Building Blocks
  810. google/tink
  811. damienbod/AspNetCoreCertificates
  812. Serious Cryptography | No Starch Press
  813. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  814. Dino 0.1 Release - Dino. Communicating happiness.
  815. Ryujinx/Ryujinx
  816. Searching For New Adventures In Software Development
  817. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  818. Building personal search infrastructure for your knowledge and code | beepb00p
  819. Authentication, What The Fuck?
  820. How to write a simple operating system in assembly language
  821. Welcome to the UK .NET Tour 2020
  822. v5.8 Release Notes
  823. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  824. .NET Core, .NET 5; the exodus of .NET Framework?
  825. Autocrypt 1.1.0 documentation
  826. On Privacy versus Freedom | Matrix.org
  827. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  828. Google gives up on US carriers, will roll out its own RCS chat system
  829. .NET R&D Digest (November – December, 2019)
  830. Signal >> Blog >> Technology Preview for secure value recovery
  831. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  832. Zero allocation code in C# and Unity - Seba's Lab
  833. How to generate random numbers using water bubbles
  834. tmds/Tmds.Ssh
  835. oqtane/oqtane.framework
  836. Data breach disclosure 101: How to succeed after you've failed
  837. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  838. Why IVPN - What makes IVPN the best privacy protection service
  839. GateHub Investigation - Final Statement
  840. Stop surveillance and preserve your privacy with IVPN
  841. Isogeny crypto
  842. Homepage | ZKProof Standards
  843. dotnet/SqlClient
  844. Real World Crypto 2020 Program
  845. Thoughts on DNS-over-HTTPS
  846. x86/x64 SIMD Instruction List (SSE to AVX512)
  847. bye: FTP Support Is Going Away
  848. Verzekeraar Allianz informeert klanten over datalek - Security.NL
  849. Commas in big numbers everywhere: An OpenType adventure
  850. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  851. OceanLibrary/Ocean
  852. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  853. A detailed look at Ubuntu’s new experimental ZFS installer
  854. Intel 545s 2.5&#34; 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive &#40;SSD&#41; SSDSC2KW256G8X1 - Newegg.com
  855. “Stubs” in the .NET Runtime
  856. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  857. Peddle the Pedal to the Metal
  858. praeclarum/sqlite-net
  859. beemdevelopment/Aegis
  860. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  861. PrivacySafe: The Anti-Cloud Appliance
  862. awslabs/s2n
  863. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  864. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  865. OWASP/CheatSheetSeries
  866. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  867. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  868. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  869. Security Incident - Please Change Your Password
  870. EV SSL Certificates Phased Out of New Browser Updates | Venafi
  871. Learn UI Design: The Complete Online Video Course
  872. KNOB Attack
  873. Gone forEVer!
  874. Extended Validation Certificates are (Really, Really) Dead
  875. Spying on HTTPS
  876. Online syntax highlighting for the masses!
  877. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  878. Canva Security Incident - May 24 FAQs
  879. Architecture for humans - Ayende @ Rahien
  880. Pwnie Awards
  881. More on Backdooring (or Not) WhatsApp - Schneier on Security
  882. ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  883. Kazakhstan’s HTTPS Interception
  884. When a rewrite isn’t: rebuilding Slack on the desktop
  885. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  886. Digital Driver’s Licenses Could Become a Real Option in Some States
  888. Real-World Cryptography
  889. Proving security at scale with automated reasoning - All Things Distributed
  890. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  891. The Ultra Secure Crypto Storage & Communication Device
  892. Security advisory 2019-06-13 | Yubico
  893. I wanna go fast: HTTPS' massive speed advantage
  894. Fixing Random, part 34
  895. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  896. dotnet/coreclr
  897. Apple CryptoKit | Apple Developer Documentation
  898. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  899. Accessing UNIX sockets remotely from .NET - Red Hat Developer
  900. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  901. Ethical Alternatives & Resources - ethical.net
  902. dotnet/coreclr
  903. Top SSL Certificates Buyer's Guide
  904. Using Ed25519 signing keys for encryption
  905. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  906. Performance Improvements in .NET Core 3.0 | .NET Blog
  907. ZombieLoad Attack
  908. Domain Randomization for Sim2Real Transfer
  909. eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  910. ZkVM: a new design for fast, confidential smart contracts
  911. Thank you Waitrose, now fix your insecure site
  912. Community and Communication going forward
  913. Do we need effects to get abstraction?
  914. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  915. A doorbell company owned by Amazon wants to start producing “crime news” and it’ll definitely end well
  916. mpm guide - niall t.l.
  917. The .NET Abstraction Pile
  918. A Recipe for Training Neural Networks
  919. Twisted Oak
  920. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  921. Peddle the Pedal to the Metal
  922. JDK 12 Security Enhancements
  923. Understanding the Limitations of HTTPS
  924. How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch
  925. Cryptologie
  926. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  927. Direct3D 11.3 Functional Specification
  928. Website enumeration insanity: how our personal data is leaked
  929. Verified cryptographic provider a triple threat
  930. The story of the Rendition Vérité 1000
  931. Scott Helme
  932. Dotnet-Boxed/Templates
  933. BoringTun, a userspace WireGuard implementation in Rust
  934. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  935. The WhibOx Contest Edition 2 - CYBERCRYPT
  936. Understanding STIR/SHAKEN
  937. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  938. We need to talk about Session Tickets
  939. Introduction
  940. Cybersecurity for the Public Interest - Schneier on Security
  941. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  942. Data Leakage from Encrypted Databases - Schneier on Security
  943. kelseyhightower/kubernetes-the-hard-way
  944. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  945. Crypto Canon - Andreessen Horowitz
  946. Blockchain Governance: Programming Our Future
  947. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  948. Keybase launches encrypted git
  949. AI Progress Measurement
  950. Microsecond Resolution Time Services for Windows
  951. vivri/Adjective
  952. On the Security of Password Managers - Schneier on Security
  953. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  954. Reconstructing SIGSALY - Schneier on Security
  955. Public-Interest Tech at the RSA Conference - Schneier on Security
  956. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  957. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  958. Hacking the GCHQ Backdoor - Schneier on Security
  959. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  960. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  961. El Chapo's Encryption Defeated by Turning His IT Consultant - Schneier on Security
  962. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  963. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  964. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  965. New Australian Backdoor Law - Schneier on Security
  966. Security Risks of Chatbots - Schneier on Security
  967. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  968. Security of Solid-State-Drive Encryption - Schneier on Security
  969. ID Systems Throughout the 50 States - Schneier on Security
  970. Cell Phone Security and Heads of State - Schneier on Security
  971. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  972. Ext4 Disk Layout - Ext4
  973. Modern Alternatives to PGP
  974. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  975. Real World Crypto 2019
  976. The year in post-quantum crypto
  977. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  978. The Case Against Quantum Computing - IEEE Spectrum
  979. Mathematics of Public Key Cryptography
  980. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  981. D. J. Bernstein / Talks
  982. Security in Times of Surveillance
  983. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  984. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  985. Pitching security vs. privacy is asking the wrong question
  986. libpqcrypto: Intro
  987. Security in Times of Surveillance
  988. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  989. The ROBOT Attack
  990. Unity Labs Publications | Unity
  991. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  992. Cloud Data Backup for Small Businesses | CrashPlan
  993. nucypher/nufhe
  994. RUB-NDS/TLS-Padding-Oracles
  995. [paper review] A faster, more efficient cryptocurrency
  996. mimoo/eureka
  997. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  998. Database Encryption
  999. Kerckhoffs’ principles – Why should I make my cipher public?
  1000. Proxy re-encryption and FHE with NuCypher
  1001. Attack of the week: searchable encryption and the ever-expanding leakage function
  1002. Introducing Adiantum: Encryption for the Next Billion Users
  1003. Quantum computing as a field is obvious bullshit
  1004. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  1005. Going old school: how I replaced Facebook with email
  1006. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  1007. » Agrippa (A Book of the Dead) The Digital Antiquarian
  1008. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  1009. » The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian
  1010. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  1011. .NET Design Review: GitHub Quick Reviews
  1012. Tuning a Runtime for Both Productivity and Performance
  1013. We didn’t see this coming
  1014. dotnet/coreclr
  1015. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  1016. no dogma podcast - powered by FeedBurner
  1017. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  1018. Software Tokens Won't Save You
  1019. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1