#TechForUkraine
Explore other dev related sites in this ring. If you find this idea useful
click here to join
.
devring.club
Previous
Random
Next
linksfor.dev(s)
Posts for 'encryption'
96%
Remote collaboration fuses fewer breakthrough ideas? Probably not.
55%
EP rejects mass scanning of private messages - European Digital Rights (EDRi)
64%
Y Combinator's Future in the Software Slowdown
96%
I got top 20 on my first product hunt launch by doing a homework assignment
97%
How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
99%
Restic Backups on Backblaze B2 with NixOS
98%
Exploring Generative AI
97%
My Personal Data Backup Pipeline – Justin Paulin
98%
Matrix vs. XMPP | Luke's Webpage
94%
My techno-optimism
99%
Demystifying Web Push Notifications
99%
Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
88%
Communication Ministry studying report of IndiHome data leak - ANTARA News
99%
Discover the Magic of .NET 8 and Beyond!
98%
Docker Security Principles Overview - Simple Talk
99%
Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
94%
Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
94%
“Shift left”—wtf does it mean?
99%
Sqids (formerly Hashids) · Generate Short IDs from Numbers
82%
The Bond villain compliance strategy
96%
All that Infocom interpreter code
98%
Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
99%
How STARKs work if you don't care about FRI
98%
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
99%
Things Programmers Can Do in One Week | Blog | build-your-own.org
98%
What Is Refactoring And Understanding Why You Need It
95%
Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
99%
Back up your Bitwarden vault in a future-proof and secure way
99%
Exploring macOS private frameworks
98%
Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
97%
Things Programmers Can Do in One Week | Blog | build-your-own.org
99%
ConcurrentStack in C# - Code Maze
80%
Cryptographers Solve Decades-Old Privacy Problem
98%
Sunbird Security Isn’t Nothing
97%
Sunbird / ‘Nothing Chats’ is Not Secure.
98%
All of the writing I did in a week as a software engineer
96%
Every software is messy and has skeletons
90%
Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
99%
Mainframe and midrange modernization - Azure Logic Apps
98%
Built a bunch of apps, here's what I learned
99%
Privacy is Priceless, but Signal is Expensive
99%
Fiat-Shamir security of FRI and related SNARKs — Part 1
97%
The OSI Model Revisited
99%
Making a nice API of Amtrak's ugly API
99%
Data-as-a-Product: the keystone of the data-mesh
98%
Is the Reversal Curse Real?
96%
CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
94%
Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
99%
Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
98%
Read the docs like a book - Aaron Francis
97%
Building an occupancy sensor with an ESP32 and a serverless DB
98%
OpenAI Platform
99%
Data Oriented Blogging
99%
An important step towards secure and interoperable messaging
94%
Blockchains and the Future of AI
93%
Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
79%
Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
97%
A clarification on the multithreading constraints of the EncryptMessage function - The Old New Thing
76%
Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
95%
Article 45 Will Roll Back Web Security by 12 Years
92%
Seeing like a Bank
99%
Live Coding a containerized web app for event management
99%
Social Networking
99%
GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
73%
Why I Ran Away from Philosophy Because of Sam Bankman-Fried
90%
Getting our focus back
88%
Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
91%
Mechanistic interpretability of LLM analogy-making
98%
Giopler | Easy C++ Profile Debug Trace
95%
Why I Am a Pluralist
98%
How To Rob a Bank
92%
General Knowledge Poker — Drawn In Perspective
97%
An Open Letter to Cryptographers: Please Work Together
99%
.NET 8 Top 10 New Features - NDepend Blog
96%
Lifespan extension: separating fact from fiction
92%
Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
99%
Azure: the cloud platform that is changing the world
99%
From CSS madness to CSS Hooks
99%
An Analysis of Signal's PQXDH
65%
A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
98%
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
98%
Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
88%
Hampton Blog
95%
How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
99%
GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
98%
Nobody knows what a good password looks like
99%
SQL Server Security Primer - Simple Talk
91%
Encrypt. Now. — blog.tripu.info
99%
Creating a Variable Color Font From Scratch
99%
Memory alignment of doubles in C#
98%
Security: The Impact of Time
98%
SSH Hardening with ssh-audit
99%
Intercepting Allocations with the Global Allocator
99%
GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
98%
Massive input and/or spaced repetition
98%
LSP could have been better
94%
Radical Energy Abundance
95%
How I built a MVP in 14 hours
91%
Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
99%
Polylang – Polylang by Polybase Labs
99%
Strikeout (ꓘ) Blog - Security Researcher
98%
How to Perform Case-Insensitive Substring Search in C#
97%
Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
99%
Building an Anomaly Detection System with Recurrent Neural Networks
99%
A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
99%
Observing OSIRIS-REx during the capsule reentry – Daniel Estévez
99%
How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
98%
Understand Linear regression through many facets
96%
Store ssh keys inside the TPM: ssh-tpm-agent
99%
Why HTTP/3 is eating the world | APNIC Blog
99%
Converting a Hexadecimal String to a Byte Array in C# - Code Maze
91%
Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
99%
Security Tradeoffs: Privacy
99%
How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
99%
I don't want to know IPs: encryption in TORRENTDYNE
99%
A journey into zero-knowledge proofs
96%
Reclaim Successfully Passed the ZK Circuit Security Audit
99%
Buy wisely
98%
Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
98%
Public report of Reclaim protocol's ChaCha20 circuit
99%
Free Open source disk encryption with strong security for the Paranoid
97%
Mozilla and the burning need for clients for power users
97%
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
98%
zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
98%
Security in the cloud: Whose responsibility is it?
98%
Finding Bathroom Faucets with Embeddings
97%
On the future of cloud services and BYOC — Jack Vanlightly
98%
Binding Sigmas in Circuits for Fast Curve Operations
99%
Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
91%
t3chn0tix - Your Source for the Latest Tech News
98%
Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
99%
Nintendo 3DS Architecture | A Practical Analysis
97%
Signal Messenger: Speak Freely
98%
S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
98%
What link previews leak | aaron blog
98%
Matrix 2.0: The Future of Matrix
93%
Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users
98%
64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
99%
Inside New Query Engine of MongoDB
99%
Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
99%
Quantum Resistance and the Signal Protocol
98%
Exploring Generative AI
99%
ESXi on SolidRun V3000
95%
SimulaVR
98%
Exploring The Halo 1 System Link Protocol
83%
Nuclear Propulsion | Charles Pellegrino
68%
How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
98%
Book notes & reflections: An Elegant Puzzle
90%
Mario Zechner (@badlogic@mastodon.gamedev.place)
91%
ZK Security meetup with the Succinct Labs folks! · Luma
99%
Kopia
97%
Dymocks - Customer Notices
97%
Onboarding Made Simple with zkLogin
99%
Role Of Algorithms
99%
Getting to Know Dapr with Mark Fussell and Yaron Schneider
99%
Techniques for Checking Floating-Point Equality in C# - Code Maze
99%
GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
98%
How AES Is Implemented
91%
Notes on Self-hosted Transactional Email
99%
The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
99%
GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
98%
Learn the Basics of HTTP Web API - Coding Sonata
96%
why not matrix?
99%
How to Use Basic Authentication With HttpClient? - Code Maze
99%
Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
97%
Designing a 3D Printed Toy for My Son
91%
A (Post-Pandemic) World Without Email
99%
Mullvad on Tailscale: Privately browse the web
93%
Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
93%
The future headwinds
99%
Dunghill Anti-Pattern - Why utility classes and modules smell?
99%
How to Write a Secure JWT Library If You Absolutely Must
96%
Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
83%
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
98%
The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
99%
Android 14 blocks all modification of system certificates, even as root
99%
Deploying a Dapr Sidecar to Azure Container Instances
98%
What 0 to 6 Months of Photography Has Taught Me
98%
Support for custom headers for handshake · Issue #16 · whatwg/websockets
82%
Introducing our summer '23 research seminars
93%
Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
98%
Explaining The Postgres Meme
99%
Wii Architecture | A Practical Analysis
92%
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
97%
The History of Data with Ted Neward
99%
End-to-end encryption with Proton Mail
92%
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
89%
Listen to us on zeroknowledge.fm
99%
Measuring Unicode String Lengths with C#
98%
Choosing Apache Kafka For A New Project – A Questionnaire
99%
Automata Part 1: Understanding Position Automata
98%
BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
87%
Zero-Knowledge Proof Research | Berkeley RDI
98%
Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
97%
Vacation Study Ideas
99%
How to debug linux kernel API (syscalls issues)?
91%
The Tale of a Corrupt Backup
98%
Introducing ChatGPT Enterprise
99%
Demodulation of the 5G NR downlink – Daniel Estévez
98%
Cool & Unique Cryptography Features for Modern Sui DApps
87%
You Should Be Working On Hardware
96%
Blockchain Applications Stanford Summit
99%
You like Circom but you find it confusing? Introducing Circomscribe
99%
Detecting boomerang values in zero-knowledge circuits using tag analysis
88%
Fiat-Shamir Security of FRI and Related SNARKs
99%
How SNARKs fall short for FHE
91%
Getting our focus back
98%
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
95%
Delendum-SBC Research Meetup
85%
Penumbra Security Audits Q3 2023
99%
Ergaster - Syncing Notes with Obsidian
95%
Max Goodhart (@chromakode@mastodon.social)
99%
Raspberry Pi x OpenWRT Travel Router – Tristam
99%
Unlocking Discord Nitro Features for Free
99%
Storing passkeys in password managers is okay, actually
97%
Backing Up Personal Files with rclone
98%
Exploring Generative AI
98%
Exploring Generative AI
96%
About GitHub Copilot for Individuals - GitHub Docs
99%
Breaking The Mutant Language's "Encryption"
99%
How Surround Sound for Headphones Works
99%
Understanding Lasso and Jolt, from theory to code
89%
North Korean Hackers Suspected in New Wave of Malicious npm Packages
98%
Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
98%
How the Nintendo Wii Security Was Defeated
99%
Short session expiration does not help security
53%
EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
99%
Unity 4D #2: Extending Unity to 4D - Alan Zucconi
99%
Bare Metal Space Invaders
99%
The BEST Moq Alternatives: NSubstitute vs FakeItEasy
95%
Self-Discipline Examples That Don't Suck
97%
Software Engineering at Google
99%
Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
99%
Azure Storage Account: Best Practices for Efficient and Secure Storage
91%
Chris James - Practical ways to shift QA left
86%
Reflections on Ten Years Past the Snowden Revelations
90%
Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
97%
State-Issued Identifiers aren’t generally good passwords
98%
Tailscale vs. Narrowlink | Narrowlink
99%
GitHub - id-Software/quake2-rerelease-dll
95%
Do Machine Learning Models Memorize or Generalize?
97%
Introducing per hostname TLS settings — security fit to your needs
95%
Android 14 introduces first-of-its-kind cellular connectivity security features
99%
Removing Randomness with LLDB
93%
Everyday Scientist » Replace Peer Review with “Peer Replication”
99%
Verifiable encryption on the Blockchain
88%
My experience at the k-space hackerspace hackathon
98%
Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
98%
Patterns for Building LLM-based Systems & Products
99%
The Worst API Ever Made
86%
Shamir Secret Sharing
94%
I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
87%
Why do consultants invent words?
99%
Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
55%
The U.K. Government Is Very Close To Eroding Encryption Worldwide
58%
Worldcoin isn’t as bad as it sounds: It’s worse
99%
Introducing GitHub Copilot X
92%
Where are all the women?
97%
The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
97%
What We Know About LLMs (Primer)
98%
Pre 2013 Data Breach - Forum Thread
98%
How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
99%
RSA
99%
Sharing encrypted data over short-form mediums
95%
Attention Is Off By One
98%
Zenbleed
99%
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
96%
Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
99%
Plane - The open source project management tool
97%
What does a CTO actually do?
99%
What Happened to Dolphin on Steam?
98%
1 Introduction · Real-World Cryptography
96%
Best crypto blog posts of 2017
98%
Why Frustum Culling Matters, and Why It's Not Important
99%
Tutorial 1: Hello World | Mina Documentation
75%
ZK Security X Delendum (farewell SBC) · Luma
95%
Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
98%
Sharing code between Deno and Node where Bun and ts-node failed
98%
Distributed Trust with Service-to-Service Authentication
97%
Why the “Null” Lifetime Does Not Exist
99%
Store age identities inside the TPM: age-plugin-tpm
99%
Setting up PostgreSQL with Ansible
98%
I don't know how I feel about email
99%
Bypassing Internet Censorship Using SSH
97%
An Alternative Approach to Deep Tech VC
98%
Jeremy Mikkola - What makes developers productive?
99%
Fun with DNS TXT Records
99%
PhpMyAdmin and Azure Database for MySQL server
83%
Living Life as a B- Student
86%
ZK Security meetup @ Lightspeed · Luma
99%
Episode 467 - OneStream's plans for becoming more cloud native on Azure
98%
17 misconceptions about SNARKs (and why they hold us back)
98%
Cycles of curves: what are they and do we need them?
97%
Regex Isn't Hard - Tim Kellogg
99%
Put a Pin on That
99%
Hacking LangChain For Fun and Profit - I
99%
Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
99%
How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
99%
Experiments with eBPF: Snitchrs
98%
A slack clone in 5 lines of bash
99%
GitHub - zksecurity/noname: Noname: a programming language to write zkapps
99%
The zero-knowledge attack of the year might just have happened, or how Nova got broken
99%
bips/bip-0042.mediawiki at master · bitcoin/bips
98%
Exploring how Magic Link works
94%
VerusCoin, Everything that Ethereum Isn’t
95%
Running on a high-speed rail
99%
Backend development is more than writing endpoints for frontend
81%
Alpha
99%
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
99%
How to do templates properly
99%
Getting Started with API Management: A Beginner's Guide for Developers
98%
Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
99%
Open at Microsoft: Dapr
98%
Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
98%
Blocking, covariate adjustment and optimal experiment design - Emir's blog
98%
Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
97%
My journey into Microsoft – Unstructed.tech
99%
Using encryption to verify a license key
97%
Red-Teaming Explained: How does it reduce toxicity in LLMs?
99%
Based-30b
98%
You don't take enough risks to be lucky
99%
How (not) to compare 2D scatter plots
99%
How to deploy your deep learning side project on a budget
99%
The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
98%
Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
99%
Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
97%
Interesting links of the week 2023-24 (#76)
99%
Announcing .NET 8 Preview 5 - .NET Blog
95%
Introducing the defensive statistics | Andrey Akinshin
99%
Latest Updates for Azure App Service Presented at Microsoft Build 2023
99%
Casey Reeves (@xogium@tech.lgbt)
99%
/home/halosghost/blog
98%
Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
97%
Memory Management in DBMS
99%
Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
77%
Understanding the Tech Right
97%
Stages of Survival
99%
ZK app developers should be able to see down to the constraints
99%
zkSecurity
99%
Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
98%
Generating income from open source
99%
ZK programmability adds a whole new layer to worry about
99%
Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
99%
Open at Microsoft - Dapr
99%
The Prickly Case of JavaScript Proxies
98%
Privacy Enhancing Technologies: An Introduction for Technologists
97%
Private delegated computation is here, and there will be bugs!
99%
Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
98%
On being paid to learn
99%
Using Nix with Dockerfiles
99%
Building a baseline JIT for Lua automatically
99%
Finding your weak spots
99%
How to Use SFTP For Secure File Upload in .NET - Code Maze
99%
Why we're bad at CSS
90%
Free VPN Service SuperVPN Exposes 360 Million User Records
97%
What's New for Azure App Service at Build 2023
99%
backups (public)
97%
How to get (micro) acquired?
99%
Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
99%
SELM: Symmetric Encryption with Language Models
99%
Two Immortals
98%
This Week In Security: .zip Domains, Zip Scanning
99%
Malleable software in the age of LLMs
99%
How to Unleash the Power of Multithreading in JavaScript with Web Workers
99%
Assembling Community OS
98%
Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
99%
Experimenting with multi-factor encryption
96%
How to Understand Abstract Art
97%
transparent polynomial commitment scheme with constant opening proof size and verifier time
97%
Level up your GPT game with prompt engineering - .NET Blog
99%
Fast hashing, it's not that simple
98%
Testing a new encrypted messaging app's extraordinary claims
99%
Is .NET Still a Legitimate Technology in 2023?
98%
API Security Checklist: How to Protect Your APIs
97%
Savoring Complexity. Embracing the Infinite
96%
PV consumption optimization – the power of software defined devices
99%
Using The Decorator Design Pattern in .NET
99%
Why should we read Azure Security?
93%
Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
96%
What is Type-Level Programming? - sulami's blog
99%
How to design your first Solution Architecture Diagram?
83%
Crypto: My Part In Its Downfall
96%
The right to encrypt
91%
Radical Incrementalism
78%
Do We Still Need Journals?
99%
Why is OAuth still hard in 2023? | Nango Blog
99%
Dometrain - Homepage
99%
Bea Stollnitz - How GPT models work
99%
The Most Annoying Math Problem
97%
SLP: a new DDoS amplification vector in the wild
99%
Local license key verification - Theory
84%
Internexit?
99%
The Importance of TLS with SQL Server
98%
Playing devil's advocate on claims made in VPN adverts
96%
Why I joined Cloudflare as Chief Security Officer
99%
Current Issues With The Qt Project - From The Outside Looking In
98%
Get your app to Mars!
99%
Message-Driven Architecture: Promoting Efficient and Scalable Communication
98%
mjg59 | PSA: upgrade your LUKS key derivation function
89%
Nintendo Switch game modding is illegal. – Gabriel Sieben
99%
Hot Takes on the Modern Data Stack
98%
Data Driven Detection Engineering
99%
What do Solution Architects do?
98%
(The Futility of) Keeping Secrets from Yourself
99%
How I fix flaky tests - Code with Jason
99%
5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
90%
Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
94%
Prompt Engineering vs. Blind Prompting
99%
TLS 1.3—What is It and Why Use It?
99%
Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
95%
Recipes For Product Failure: Obsess Over Competitors
98%
Sponge API for Field Elements
82%
‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
98%
Experimenting with LLMs to Research, Reflect, and Plan
98%
Climate Tech Checklist
99%
Rethinking Type I/II error rates
99%
11 API Security Best Practices to Secure Your Business
99%
My Love/Hate Relationship with Cloud Custodian
95%
GPT Voyage: Part 2
80%
Linux and Baikal Electronics: Why Postgres Should not Follow that Path
98%
Do Less, Better (with leverage!)
98%
What We Learnt Building the Largest GPT-Telegram Bot
99%
If It's So Good, Why Isn't Everyone Doing It?
99%
Towards a Nova-based ZK VM
92%
Outperforming Warren Buffet
99%
irhum.github.io - Tensor Parallelism with jax.pjit
98%
I Quit Programming (or did I?)
90%
I Didn't Read 17 Books So You Don't Have To 😩
96%
Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
93%
Unlimited Powers
98%
Ben Howdle - Software Engineering Consultant and Advisor
83%
Paillier's cryptosystem - Addtive homomorphic encryption
98%
Paillier's cryptosystem - Addtive homomorphic encryption
98%
Paillier's additively homomorphic cryptosystem
98%
Paillier's cryptosystem - Addtive homomorphic encryption
98%
So, You Want To Build A DBaaS
99%
How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
99%
Nix Turns 20. What the Hell Is It?
98%
Nobody’s on the ball on AGI alignment
98%
ChatGPT's Plugin System Poses an Existential Risk to the Open Web
99%
Synology NAS Backups with Minimal Bus Factor
99%
Education - Mutable Instruments Documentation
99%
Zig And Rust Mar 26, 2023
98%
Sparks of Artificial General Intelligence (AGI) in GPT-4
99%
Building a DOS ChatGPT client in 2023
95%
The Artificial in AI - Pravesh Koirala
95%
Just update rules between neurons
99%
Symbolic vs Connectionist Machine Learning
98%
(PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
95%
Let’s Talk About TikTok - Black Hills Information Security
97%
No more custom domains in Microsoft Outlook?
98%
mjg59 | We need better support for SSH host certificates
97%
None of Your Business - Why, I Wonder?
91%
zkSummit - Zero Knowledge Summit
99%
fhur
99%
Notes on FFTs: for users
99%
Loading RSA Keys in .NET
99%
Aria: A Fast and Practical Deterministic OLTP Database
99%
Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
92%
Head of Marketing
98%
Geometry in Text-to-Image Diffusion Models
99%
Boosting password security! Pwned Passwords, zxcvbn, and more!
97%
9 years of open-source database development
95%
How I burnt out in FAANG, but it is not what you think
99%
Is OpenBSD for you? - Marián Mižik
97%
Sunsetting Aztec Connect
86%
Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
88%
cURL, the omnipresent data tool, is getting a 25th birthday party this month
99%
QR Code Generator in Laravel 10 Tutorial
99%
My Backup Strategy
98%
The Kids are Not Okay
99%
Tech Notes: Polymorphic shellcode
99%
Announcing new security and observability features in Azure Database for PostgreSQL
98%
Were We All Gaslit About Content Being King?
99%
Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
98%
Warnings-as-errors friction
99%
I made JSON.parse() 2x faster
98%
Caveat Implementor! Key Recovery Attacks on MEGA
99%
TimeSpan in C# - Code Maze
98%
Cryptography without Security - Cronokirby
88%
Quantum computing shorts
98%
zk-SNARK Concepts Explained Like You’re 15
98%
Block Breakers
95%
ChatGPT Explained: A Normie's Guide To How It Works
98%
Use GNU Emacs The Plain Text Computing Environment
96%
Digital Market Act workshop in Brussels
99%
Overview | Mina Documentation
99%
zkVMs are cool, but have you heard of zkCPUs?
99%
How To Deploy EF Database Migrations
99%
Database Cryptography Fur the Rest of Us - Dhole Moments
97%
On mindsets, mind shifts and wins
91%
Thief in the car
94%
LattePanda V1 - my experience with a Raspberry Pi alternative
97%
Zero-knowledge proof composition and recursion. Part 7: Deferred values
97%
Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
98%
Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
98%
On Relearning to Code as an Adult
99%
Zero-knowledge proof composition and recursion. Part 6: cycles of curves
99%
Convert a File to a Byte Array in C# - Code Maze
98%
Cryptography 101 - PHINUG Online Dev Sessions 2023.03
99%
A new series of videos on zero-knowledge proof composition and recursion (part 1)
89%
Real-World Cryptography, a bit more than a year later
93%
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
92%
Cryptography Attacks and Defenses, Reloaded
99%
Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
99%
Asking ChatGPT to Design Its Next Generation, ChatGPT 2
99%
Sangria: a Folding Scheme for PLONK - Geometry Research
98%
Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
96%
How Safe is the Cloud? What Businesses Need to Know
98%
Lessons Learned from Re-rolling 60+ Production Credentials
94%
Gamebert: a Game Boy emulator built by Robert | Robert Heaton
98%
<div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
99%
Google’s Fully Homomorphic Encryption Compiler — A Primer
99%
Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
99%
Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
94%
CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
94%
My most important email filter that helps me control my chaos
97%
The Joy Of Duplexes
63%
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
99%
Challenges 7-12: Implementing and breaking AES ECB
99%
Contributing to open source projects and about learning zero-knowledge proofs
97%
Ian Norris - Blog - Understanding the limits of large language models
99%
.NET Security Headers: A Senior Developer’s Guide✨
99%
Reversing UK mobile rail tickets
98%
Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
99%
Python’s “Disappointing” Superpowers
85%
Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
97%
Anker admits to lying about Eufy security camera encryption; describes future plans
99%
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
99%
Various Ways of Sending Mail via SMTP
83%
My first recession
91%
Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
98%
Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
98%
Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
99%
Making sense of TypeScript using set theory
99%
Encrypting Data in the Browser Using WebAuthn
99%
Introducing Zero to Nix — Determinate Systems
98%
How to debug
98%
Bitwarden design flaw: Server side iterations
98%
Degrees of Open Source
50%
1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
99%
How to Implement Google Authentication in Next with NextAuth
97%
Implementing Zero Trust: A Guide to Securing Your Data
99%
An incomplete guide to stealth addresses
99%
Securely store secrets in Git using SOPS and Azure Key Vault
99%
Breaking EA Desktop's pathetic Encryption
99%
How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
99%
Zero Knowledge Proofs MOOC
99%
Some thoughts on the ETH's Threema Analysis
99%
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
98%
zkIgnite, Cohort 1 Program Overview
99%
What's the deal with zkapps?
97%
The PLONK zero-knowledge proof system
99%
How to Secure Your .NET Application Against Common Threats
97%
Terraform Industries Whitepaper 2.0
99%
.NET 7 Brings Networking Improvements
99%
Encrypting and Decrypting a String in C# - Code Maze
94%
Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
99%
Machine Learning in .NET with F# and ML.NET 2.0
98%
What is Zero Trust and is it the Future of Cybersecurity?
99%
ZK System Benchmarking
98%
Writing a TLA⁺ tree-sitter grammar
98%
Large Transformer Model Inference Optimization
99%
Cryptography Implementations in .NET - Code Maze
99%
MINA zkApp staking pool - HackMD
91%
How I went from 0 to Hacking in SF as a high-schooler
96%
Is it worth encrypting? | Matthew Linkous
99%
Using client side encrypted fields in RavenDB
95%
GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
99%
On PBKDF2 iterations
99%
Renato Athaydes
96%
Debugging Architects
99%
Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
99%
Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
62%
Ancient Apocalypse reviewed
99%
Machine Learning in .NET with F# and ML.NET 2.0
99%
Forming the habit of analog journaling - Why the digital format did not work for me
96%
David Wong
81%
Join Mina's zkIgnite, Cohort 1
99%
Fast Accumulation on Streams (2018) - bkase
90%
Vitalik Buterin's website
95%
Raspberry Pi security alarm — the basics
98%
HTTPS explained with carrier pigeons
91%
RE: False Rumors on API Leaks or Exposure of our Database
98%
Your Pa$$word doesn't matter
92%
Lastpass Breach - Everything you need to know
97%
The Matrix Holiday Update 2022 | Matrix.org
98%
20 Best Cryptography Algorithms Books of All Time
99%
2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
83%
AI assistants help developers produce code that's insecure
99%
Nix on the Steam Deck — Determinate Systems
87%
LastPass users: Your info and password vault data are now in hackers’ hands
94%
Notice of Recent Security Incident - The LastPass Blog
99%
Password requirements: myths and madness
98%
Not Getting Hacked
95%
Personal backups and file archival
99%
Implementing the MySQL server protocol for fun and profit
99%
Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
99%
Yubikeys & PKI: What Are They For? | Charlton's Blog
96%
Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
94%
Why Current Wormhole Research is So Important
91%
Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
97%
How Cloudflare advocates for a better Internet
99%
Why you can’t build a web browser and why you should anyway.
92%
Technical Writer
99%
Real-World Cryptography
97%
ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
99%
Dev environments in the cloud are a half-baked solution
96%
Apple iCloud, and why encrypted backup is the only issue
92%
Apple advances user security with powerful new data protections
99%
Installing Guix on a 10th gen Thinkpad X1 — dthompson
97%
Making an RC Roomba
73%
SBF is Crypto Personified
99%
What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
96%
Notice of Recent Security Incident - The LastPass Blog
92%
Choosing your chat application
95%
Be less scared of overconfidence
98%
Real-World Cryptography: Wong, David + Free Shipping
99%
Mutual Contact Discovery
93%
[Apply by 12/08] Introducing our fellowship program
95%
Autonomy, packet size, friction, fanout, and velocity
99%
Episode 111 - RavenDB with Oren Eini
99%
zkapp-cli
99%
How I over-engineered a Fast Fourier Transform for Arduino.
99%
Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
99%
OpenIddict
98%
Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
94%
The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
95%
Cloud-Native Application Security - DZone Refcardz
98%
Quest for my perfect watch.
97%
zero to connection string
94%
4 Strategies for Dealing with Bad Code
99%
Example: Oracle | Mina Documentation
99%
Mina Launches zkApps Era
98%
Authorization and Authentication in Minimal APIs
97%
Why take and make notes
98%
Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
98%
S1 Ep2: Data Breaches, DNA & the Future of Privacy
98%
My take on self-hosting
99%
Intro to Zero-knowledge & Building zkApps w/Mina Protocol
96%
Live system DD backup, with encryption and compression!
99%
GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
95%
Too Much Crypto
94%
NSA urges orgs to use memory-safe programming languages
99%
Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
99%
Brave New Trusted Boot World
99%
End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
95%
How to contribute to Kimchi
96%
Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
94%
Mina zkApp Developers Meetup - San Francisco
99%
Zero to App Store in 7 weeks
99%
Neural Network Pruning Explained
99%
Wii U Architecture | A Practical Analysis
99%
0.10.0 Release Notes ⚡ The Zig Programming Language
99%
Improving Git protocol security on GitHub | The GitHub Blog
99%
Encrypt and Decrypt Text Values in .NET
95%
Real-World Cryptography: Wong, David + Free Shipping
99%
Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
98%
Encryption
99%
Example: Anonymous Message Board Tutorial | Mina Documentation
99%
We Must Professionalize Programming to Preserve Society and Computing Freedom
96%
Running a law firm on Linux - a year or so in
94%
Jett Hays
97%
How I built and sold a successful startup with fractional hires
98%
10 essentials to mitigating API security risks | Red Hat Developer
68%
In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
99%
What's the deal with zkapps?
99%
LiteDB - A .NET embedded NoSQL database
99%
Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
96%
✂️ The ideal blockchain
59%
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
92%
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
96%
What to know about Zero Knowledge
97%
Jira Pricing - Monthly and Annual Subscription Cost per User
98%
Lucid Multi-Key Deputies Require Commitment
97%
Let's watch videos with David - HackMD
90%
Microsoft Office 365 email encryption could expose message content
98%
How observability-driven development creates elite performers
89%
The Rails SaaS Conference
96%
Seven years in the life of Hypergiants' off-nets
99%
How does the key exchange in HTTPS work?
98%
Threshold ECDSA in Excessive Detail
99%
Comparing Semgrep and CodeQL · Doyensec's Blog
88%
E-commerce platform Bhinneka.com reported to be latest target of data theft
99%
Yubikey Madness
92%
Privacy is a business imperative
99%
.NET R&D Digest (September, 2022)
99%
Scoreboard Hacking Part 2 - Getting the AES Key
82%
The Lens Of Asymmetry
98%
age and Authenticated Encryption
98%
Episode 107 - Unstructured Data With Kirk Marple
75%
Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
99%
Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
99%
The many problems with implementing Single Sign-On
98%
'Berkeley' Testnet Alpha Participation Guide
96%
Outdated vs. Complete
98%
RegEx match open tags except XHTML self-contained tags
99%
the sad state of debug performance in c++
84%
Aging programmer
99%
Help people in Iran reconnect to Signal – a request to our community
93%
06 SnarkyJS
98%
How does PLONK work? Part 1: What's PLONK?
99%
What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
98%
0xPARC
99%
Introducing LiteFS
97%
How hashing and cryptography made the internet possible | Red Hat Developer
99%
An Introduction to Ansible Inventory
97%
IN/"juels; ari" in US Patent Collection
97%
A few thoughts about Uber's breach
99%
How I manage my passwords
99%
FileSystemWatcher in C# - Code Maze
99%
noname developer updates: structs are working!
99%
35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
97%
Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
84%
Visual Cryptography For Physical Keyrings
99%
It pays to be Circomspect
91%
Ethereum activates The Merge as it shifts to proof of stake
98%
A beginner’s guide to regular expressions with grep | Red Hat Developer
98%
Enstil Postmortem
99%
githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
98%
6 Simple and Useful PostgreSQL Features that I wish I knew when I started
98%
Narrative driven development
98%
GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
96%
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
99%
Ed25519 Deep Dive Addendum
95%
learning about zero-knowledge apps and circuits using the noname educational DSL
96%
Security of ZK Systems
99%
An overview of Node.js: architecture, APIs, event loop, concurrency
97%
Predict steel quality with Azure AutoML in manufacturing
98%
On Security Against Time Traveling Adversaries
97%
Someone’s Been Messing With My Subnormals!
99%
Perfect Notes or My Journey to Obsidian
98%
Replicant: Reproducing a Fault Injection Attack on the Trezor One
98%
fxhash - Lessons Learned from Implementing "Wave Function Collapse"
98%
One Year With the Framework Laptop and NixOS
97%
Cloudflare named a Leader by Gartner
97%
Episode 437 - Azure CXP CRE Low Code Automation
99%
Formal Verification of ZK Constraint Systems
99%
Top 10 skills every programmer should know
99%
Implement a GRPC API with OpenIddict and the OAuth client credentials flow
96%
GitHub - mimoo/noname: Noname: a programming language to write zkapps
97%
Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
97%
Security of ZK Systems
98%
Kagi status update: First three months
98%
What Every Programmer Should Know About Optical Fiber
86%
Review: The This by Adam Roberts
99%
My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
92%
We Are All Nerds: The Literary Works of Neal Stephenson
98%
Technical Evaluation of a Startup
99%
What You Should Learn Before Building a zkApp
99%
champonthis | dev/rand/lack-of-attention
99%
2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
99%
Performance isolation in a multi-tenant database environment
98%
Raytracing and Raycasting with Signed Distance Functions
99%
Cryptographic Agility and Superior Alternatives - Dhole Moments
97%
Define “better”
92%
Deep dives & how the Internet works
93%
Should You Buy an EV?
95%
Ask Cryptography
96%
“10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
98%
ASP.NET validation revisited
98%
How much customer service is too much? - Joydeep's Corner
99%
GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
98%
What is Lattice-based Cryptography?
98%
The Paper that Keeps Showing Up
97%
Understanding JSON Web Encryption (JWE)
99%
How I Learned to Stop Worrying and Love Macros
97%
Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
96%
6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
96%
How Did I Become Database Engineer at 23
97%
Workshop at SBC'22 | Tse Lab at Stanford University
98%
GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
99%
Brute Force Development · Matt Layman
98%
Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
97%
SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
97%
zkEVMs: Not a Panacea
99%
GitHub - filecoin-project/neptune: Rust Poseidon implementation.
99%
The quick and practical "MSI" hash table
96%
How does PLONK work? Part 1: What's PLONK?
96%
Module Three – ZK Whiteboard Sessions
98%
On Giving Technical Guidance to Others
90%
NSA, NIST, and post-quantum cryptography
97%
MPC In The Head Special
97%
Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
91%
NSA, NIST, and post-quantum cryptography
99%
Home Network Part 1 - DIY Home Router with NixOS
99%
Experiment with post-quantum cryptography today
97%
An intro to Open Telemetry in .NET - James World
97%
BrainSTARK, Part 0: Introduction
94%
ZK Whiteboard Sessions
85%
Post-quantum encryption contender is taken out by single-core PC and 1 hour
96%
Microsoft Previews Azure Premium SSD V2 Disk Storage
97%
Use One Big Server - Speculative Branches
96%
Document Scanner with OpenCV Using Video Footage
98%
What I'm frustrated by in crypto
99%
Recommended settings for Wi-Fi routers and access points
88%
Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
95%
The many flavors of hashing
99%
x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
96%
Total Fleet Visibility with Kolide
99%
GitHub - o1-labs/proof-systems: The proof systems used by Mina
92%
When the window is not fully open, your TCP stack is doing more than you think
85%
CFF22 trip report
97%
The dangers of Microsoft Pluton – Gabriel Sieben
84%
I quit my business to start an open-source dev tool
97%
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
92%
How I Hacked my Car
99%
British recycle old arguments for bypassing E2E encryption
99%
What are zkVMs? And what's the difference with a zkEVM?
96%
The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
89%
Authentication is Difficult
90%
GitHub - chip-red-pill/MicrocodeDecryptor
98%
Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
95%
The First Secret Problem
90%
Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
88%
Commercial music media, a tier list · brhfl.com
87%
I've started using Mozilla Firefox and now I can never go back to Google Chrome
82%
Mina zkApp Developers Meetup - Paris
93%
Get Compliant with Kolide
95%
GitHub - nalinbhardwaj/zordle
91%
We Need Non-Interactive Post-Quantum KEMs
96%
Checklist For Evaluating Cloud Backup Services
99%
Compiler and Composability in ZKP
89%
FizzBuzz is FizzBuzz years old (and still a powerful tool)
98%
System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
83%
Dmitry.GR: Projects
96%
AWS Summit - Virtual EMEA Recap
96%
Statements Vs. Expressions
87%
mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
72%
CS101 Introduction to Computing Principles
91%
NIST’s pleasant post-quantum surprise
71%
Introducing: the ZK Whiteboard Sessions! - ZK Podcast
95%
How to get a job in a new industry without experience | Jason Tu
66%
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
95%
The PeerTube instance tube.hamnet.io on HAMNET
96%
The best books for cryptography apprentices
64%
Bookchor data breach of over 5 lakh users: What we know so far
93%
Advanced Dashes
94%
Why I left Android Development after 10 years and became a Backend Developer
95%
CloudFormation is Dead, Long Live Terraform
51%
Italy declares Google Analytics illegal
98%
GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
95%
Thomas H. Ptacek
82%
Huobi Global Lists Mina Protocol
89%
Undefined behavior in C is a reading error. – keeping simple
94%
MEGA: Malleable Encryption Goes Awry
97%
Introducing Tailscale SSH
84%
What I'm excited for this build cycle
94%
SnarkyJS Week 2022 - Crowdcast
94%
Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
93%
Facebook Says Apple is Too Powerful. They're Right.
69%
Join Us For the First Ever SnarkyJS Week
90%
Matrix notes - anarcat
95%
My other database is a compiler
91%
Some ways to use ZK-SNARKs for privacy
91%
Eurocrypt 2022 program
92%
The hunt for the cluster-killer Erlang bug
93%
OneService Journey to .NET 6
98%
New UUID Formats
94%
Foreword — ZK Jargon Decoder
97%
The Web PKI 2.0
98%
Hands-on: X25519 Key Exchange
90%
Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
87%
In defense of crypto(currency)
84%
HTTP/3 becomes a standard, at last
88%
On BFT Consensus Evolution: From Monolithic to DAG
99%
GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
90%
What Makes a Good Research Proposal?
97%
What's OpenIddict?
73%
A new portal for Project Galileo participants
98%
GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
97%
Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
96%
HTTP/3 From A To Z: Core Concepts — Smashing Magazine
92%
RFC 9113: HTTP/2
62%
This is not normal
88%
How Effective Abstractions Are Opinionated | 8th Light
90%
Cloudflare observations of Confluence zero day (CVE-2022-26134)
97%
Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
80%
Zero-Day Exploitation of Atlassian Confluence | Volexity
96%
A concise summary of amazing and great ideas · johnpfeiffer
68%
Countering the Crypto Lobbyists
94%
A Gentle(-ish) Introduction to Worst-Case Optimal Joins
91%
Why Seafile is unique among file sync solutions
98%
Security in MySQL: Part Two - Simple Talk
98%
Welcoming Rocket.Chat to Matrix! | Matrix.org
93%
Losing your cookies
98%
Using WebTransport
92%
Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
83%
Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
90%
Cloudflare’s approach to handling BMC vulnerabilities
94%
PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
99%
A Kernel Hacker Meets Fuchsia OS
87%
The power of tech debt
79%
Patch: Zoom chat messages can infect devices with malware
99%
Create AWS resources with Kubernetes and Operators | Red Hat Developer
99%
Preliminary Learning ON Kimchi: PLONK
85%
Cryptology ePrint Archive: Report 2022/621
83%
Site Reliability Engineering – Monitoring Distributed Systems
70%
RustDesk | Open source remote desktop software
88%
Why wireguard is NOT safe, and you should NOT use it.
97%
Automating Well-Architected Principles
85%
Features of the Windows Process Activation Service (WAS)
93%
50 shades of .NET on AWS
91%
Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
95%
Monitoring our monitoring: how we validate our Prometheus alert rules
92%
Laurence Tratt: Static Integer Types
98%
Quick comparison of pricing of Simple Storage Services
98%
KDE Connect
99%
25 Gbit/s HTTP and HTTPS download speeds
90%
Some Cryptography Books I Like
99%
Introducing Lurk: A programming language for recursive zk-SNARKs
86%
Laptopia
97%
Support for custom headers for handshake · Issue #16 · whatwg/websockets
94%
Practical bruteforce of AES-1024 military grade encryption
90%
Announcing Pub/Sub: Programmable MQTT-based Messaging
58%
European Commission prefers breaking privacy to protecting kids
98%
A Beginner's Guide to Application Security
82%
Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
96%
Cryptology ePrint Archive: Report 2022/566
98%
GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
92%
Cryptology ePrint Archive: Report 2016/163
99%
Building a Stack Overflow browser as a VS extension
94%
Fitting Everything Together
66%
Patenting Your Perpetual Motion Machine
95%
Multiplying polynomials with Fast Fourier Transform
94%
The Two Generals Problem
97%
Topographical Maps in Unity: Edge Detection - Alan Zucconi
97%
Themes from Real World Crypto 2022
71%
When Negotiating a Price, Never Bid with a Round Number
88%
Learn to code. Or don't.
99%
Implementing a ZK-focused authenticated-encryption scheme
99%
What's two-adicity?
98%
Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
92%
Announcing Bolt & Forte partnership
91%
Explaining Yao's Garbled Circuits - Cronokirby
95%
Why the fediverse is stuck.
89%
Seeking good work-life balance and avoiding burnout
97%
A File Format to Aid in Security Vulnerability Disclosure
94%
Lies we tell ourselves to keep using Golang
90%
Real World Cryptography Conference 2022
94%
Secret Management with HashiCorp Vault
94%
Secret Management with HashiCorp Vault
81%
Personal Knowledge Management is Bullshit
88%
Building many private virtual networks through Cloudflare Zero Trust
98%
Monolith in Cloud
97%
Announcing the Hare programming language
99%
Why LSP?
90%
Canetti et al's Paradoxical Encryption Scheme
75%
A list of all my projects - Patrick Zhong
89%
Production postmortem: The encrypted database that was too big to replicate
80%
I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
90%
Physical Threshold Encryption
98%
Linearization in Plonk and Kimchi. Why?
99%
The 10 Commandments .NET Developers Must apply for Secure Applications
94%
Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
98%
Things I would like to see in a computer algebra system
98%
Production postmortem: Misleading security and other production snafus
95%
Exponentially Better Rotations
99%
Using dotnet format Command to Format the C#/.NET Code - Code Maze
89%
The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
87%
Episode 96 - The Programmer's Brain with Felienne Hermans
93%
An overview of my threat model
83%
Requests for comment/Stop accepting cryptocurrency donations - Meta
93%
Impressions from a first-time Mac user
98%
Git Credential Manager: authentication for everyone | The GitHub Blog
75%
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
99%
Random Class in C# - Code Maze
94%
This Week in Matrix 2022-04-08 | Matrix.org
91%
Private Classification · The Decentralized Robot
94%
O(1) Labs
77%
Coinbase Lists Mina Protocol
93%
The (r)Evolution of FHE
98%
Optimizing for Luck
90%
How to run a Digital Platform at Scale
99%
placeholder
81%
zkHappyHour with Mina Protocol
66%
What I learned as a hired consultant for autodidact physicists | Aeon Ideas
97%
In response to Moxie's doubts on web3, and about ultra light clients
97%
Introduction
96%
Essential Cryptography for JavaScript Developers | With Blue Ink
89%
Episode 95 - Avalonia UI with Dan Walmsley
59%
PKC Test-of-Time Award
78%
Webinar next week: Clean Architecture with RavenDB
90%
Future-proofing SaltStack
95%
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
74%
BAT: a Fast and Small Key Encapsulation Mechanism
74%
It Looks Like You’re Trying To Take Over The World · Gwern.net
92%
Year in Review: 2020 laid the groundwork for zero knowledge proofs
88%
2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
53%
The (Edited) Latecomer's Guide to Crypto
88%
Postico – a modern PostgreSQL client for the Mac
91%
Ridiculously easy to use Tunnels
98%
Implementing a toy version of TLS 1.3
62%
The Problem With Note-Taking - More To That
81%
The Projects That Matter The Most To Me Are Small
67%
NSA algorithm for PX-1000 broken
79%
James Stanley - Librem 5: first impressions
98%
Using RSA Securely in 2022 - Dhole Moments
88%
Windows Needs a Change in Priorities
97%
The first Asahi Linux Alpha Release is here! - Asahi Linux
85%
Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
90%
Zotero Blog » Blog Archive
91%
Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
58%
$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
96%
Roll your own crypto, then smoke it.
54%
FTC Takes Action Against CafePress for Data Breach Cover Up
86%
WAF for everyone: protecting the web from high severity vulnerabilities
98%
The code is the specification? Introducing cargo spec
95%
How not to build a secure plugins architecture | Crafting Privacy
99%
Rocky Jaiswal | Fun with function composition
79%
Recording: Database Security in a Hostile World
98%
How to Write a Golang App Remotely on a Raspberry Pi Using Atom
62%
...A Farm Upstate Where He Can Run and Run
92%
In praise of opinionated frameworks
96%
Why should you use a random testing library in C#? · Anthony Lloyd
94%
A Comprehensive Primer · Michael Straka
89%
Reintroducing Snapps as zkApps
98%
Search results – Add-ons for Firefox (en-US)
51%
EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
98%
Things I hate about Rust, redux
92%
How Cloudflare verifies the code WhatsApp Web serves to users
80%
Request for comments: Removing graph queries from RavenDB
59%
Deep Learning Is Hitting a Wall
68%
Optimizing code by understanding usage
97%
Put an io_uring on it: Exploiting the Linux Kernel - Blog
82%
Announcing experimental DDR in 1.1.1.1
98%
Use a message envelope
82%
We Cannot Live Without Cryptography!
79%
Webinar: Database Security in a Hostile World
59%
Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
81%
The technological case against Bitcoin and blockchain
99%
Telenot Complex: Insecure AES Key Generation
57%
Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
96%
Introducing Native Matrix VoIP with Element Call!
87%
Never Change Your Password - TidBITS
95%
The Controversy Surrounding Hybrid Cryptography - Dhole Moments
79%
Recording: RavenDB–a really boring database
83%
iCloud Private Relay: information for Cloudflare customers
95%
Blockchain Cryptography | Gary Woodfine
98%
Security for package maintainers
92%
Plagiarism as a patent amplifier
88%
Using the .NET JIT to reduce abstraction overhead
80%
Performance optimizations in production
98%
Transport Layer Security (5/6)
95%
Security | Fleet handbook
99%
Introducing the OpenIddict client
98%
Zig Build System Internals
97%
Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
80%
RavenDB: Domain Modeling and Data Persistency
95%
HPKE: Standardizing public-key encryption (finally!)
99%
Badly implementing encryption: Part X-Additional data
99%
Badly implementing encryption: Part IX–SIV
95%
Making protocols post-quantum
98%
Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
98%
Migrating from Redis-64 to Memurai
98%
GitHub - brouberol/marcel: Le docker français
83%
Badly implementing encryption: Part VIII–timings attacks and side channels
97%
Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
87%
How bad it is using the same IV twice with AES/GCM?
57%
Sign up for weekly tips
99%
Badly implementing encryption: Part VII–implementing authenticated encryption
96%
AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
99%
7 Improvements You Might Have Missed in .NET 6
92%
Why learn Racket? A student's perspective - Micah Cantor
82%
Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
94%
Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
93%
Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
98%
Badly implementing encryption: Part VI–malleable encryption
94%
How to capture book notes and turn those into smart notes
71%
Improving the US financial system
97%
Badly implementing encryption: Part V–nonce reuse
84%
on training
90%
1Password for SSH & Git (Beta) | 1Password Developer Documentation
99%
Badly implementing encryption: Part IV–keyed hash function
98%
Pure-Impure Segregation Principle | Oleksii Holub
93%
The right thing for the wrong reasons: FLOSS doesn't imply security
82%
Learn Privacy-Enhancing Techniques with Cryptographic Games
72%
Badly implementing encryption: Part III–breaking your encryption apart
95%
How Perl Saved the Human Genome Project
99%
Badly implementing encryption: Part II–breaking the code
98%
00
91%
DNS Security, Part VII: Blockchain-based Name Systems and Transparency
77%
Staking
71%
Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
98%
Kimchi: The latest update to Mina’s proof system
99%
Badly implementing encryption: Part I
83%
Key Senators Have Voted For The Anti-Encryption EARN IT Act
89%
BeyondCorp is dead, long live BeyondCorp
66%
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
97%
How we optimized Python API server code 100x
86%
Dolphin Progress Report: November and December 2021, January 2022
73%
BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
88%
r/hearthstone - How I hacked Hearthstone
78%
A Developer's Guide to Dogfooding
72%
Chat Control
66%
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
87%
Estimating the Bit Security of Pairing-Friendly Curves
92%
Jay's Blog
96%
Why and how I got my own ASN!
86%
Remote Pair Programming - Demir Delic
99%
The GNU Name System
96%
PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
99%
Basic cryptography - the Vigenere cipher - Eric Mann's Blog
97%
Knowledge Base - your company’s undervalued asset
96%
I finally understand Declarative Programming 🍀
52%
It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
79%
Tor Browser: a legacy of advancing private browsing innovation | Tor Project
73%
Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
97%
LTO Tape data storage for Linux nerds
94%
BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
58%
PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
75%
Testnet #4: Shielded Staking Is Here
92%
Run Ordinary Rails Apps Globally
60%
The State of Zero Knowledge
84%
Landscape of API Traffic
54%
2022 Tech Predictions · Ted Neward's Blog
92%
The Curse of NixOS
91%
[Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
99%
GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
71%
Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
97%
GitHub - 425show/verifiable-credential-demo
82%
Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
81%
Don’t assume the result of read()
99%
Securing Sensitive Data in an Event Driven Architecture
67%
Why is the Nuclear Power Industry Stagnant?
99%
CC #9: A Wild ECDSA Appears!
72%
Bitwarden Open Source Password Manager
55%
FBI document shows what data can be obtained from encrypted messaging apps
57%
No Place to Hide
95%
You should probably be building a web app
97%
Let's Encrypt SSL certificate overview
99%
Some Techniques to Enhance Your Terraform Proficiency
99%
Switching from macOS to Pop!_OS
97%
GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
78%
Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
96%
SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
50%
Music industry is suing youtube-dl hosters
98%
Publishing and consuming ECMAScript modules via packages – the big picture
97%
When NOT to write an Abstraction Layer
98%
Tips for More Efficient .NET Logs
98%
Introduction to Model Predictive Control · Arnav's Weblog
94%
Introducing Plonky2 — Polygon | Blog
96%
XMPP: the secure communication protocol that respects privacy
95%
Make the Internet Yours Again With an Instant Mesh Network
98%
dmca/2022-01-04-readium.md at master · github/dmca
89%
Donald Knuth - The Patron Saint of Yak Shaves
59%
Hashing is not encryption - Eric Mann's Blog
98%
In response to Moxie's doubts on web3
95%
XML Encryption Syntax and Processing
81%
Real-World Cryptography by David Wong Book Review
99%
6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
62%
The Relativity of Wrong by Isaac Asimov
54%
Coming Clean
60%
The Cryptography of Orphan Annie and Captain Midnight
98%
Neural Network From Scratch
77%
If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
97%
PagerDuty’s Security Training for Engineers! Part Deux
63%
A Succinct Story of Zero Knowledge
66%
How I built a WFH Shed
99%
Fixing stutters in Papers Please on Linux – Blog
77%
The Case Against Crypto
91%
Stupid Patterns
73%
GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
81%
Looking Forward: Some Predictions for 2022
99%
.NET's Cryptographic One-Shots
84%
Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
94%
A Year In Review · Jethro Kuan
94%
GitHub - trailofbits/zkdocs
75%
Fight for privacy — an interview with Troy Hunt
98%
How to Generate Random Numbers From a Range in C# - Code Maze
94%
Cloud Security Breaches and Vulnerabilities: 2021 in Review
82%
Dear Self; We Need To Talk About Social Media
89%
MS Teams: 1 feature, 4 vulnerabilities | Positive Security
98%
Introduction
90%
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
96%
What Problem Blockchains Actually Solve
99%
LISP with GC in 436 bytes
93%
GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
58%
Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
63%
CCPA Scam November 2021 from Princeton University
94%
Don’t start with microservices – monoliths are your friend – Arnold Galovics
92%
Rails 7.0: Fulfilling a vision
98%
How to build large-scale end-to-end encrypted group video calls
99%
Secure Containerized Browser
94%
Research Notes on Humanoid Robots
87%
"Alpha-Rays" behind the scenes - HackMD
92%
Cryptology ePrint Archive: Report 2021/1621
98%
Scrt.link vs. One-Time Secret
86%
How to Write a Technical Book
96%
Meet Kryptology: Coinbase’s Open Source Cryptography Library
98%
Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
91%
"Open source" is not broken
95%
Testing constant-timeness using Valgrind: case of the NSS library
83%
Calculating my open source blast radius
97%
crawshaw - 2021-12-11
98%
Solene'% : What are the VPN available on OpenBSD
58%
Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
97%
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
87%
A Call to Build Models Like We Build Open-Source Software
85%
Avoiding Internet Centralization
57%
Twitter Suspension
95%
Connection Failures with Microsoft.Data.SqlClient 4 and later
54%
Gravatar "Breach" Exposes Data of 100+ Million Users
92%
uBlock, I exfiltrate: exploiting ad blockers with CSS
91%
Security | 2021 | The Web Almanac by HTTP Archive
98%
Understanding HKDF - Dhole Moments
87%
Welcome to CIO Week and the future of corporate networks
86%
Understanding Zero-knowledge proofs through simple examples
86%
Understanding Zero-knowledge proofs through simple examples
67%
On the Use of Pedersen Commitments for Confidential Payments
94%
Securing Sensitive Data in an Event Driven Architecture
76%
Don't Let the Internet Dupe You, Event Sourcing is Hard
98%
Released: General Availability of Microsoft.Data.SqlClient 4.0
89%
Bank transfers as a payment method
95%
Bitslicing for Constant Time Cryptography
71%
How to configure verified GitHub commits?
93%
The best Task+Note system
95%
Understanding identity tokens
95%
An intensive introduction to cryptography: index
91%
An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
92%
RSA vs ECDSA for DNSSEC | APNIC Blog
99%
ZK-Hack Puzzle #4 Writeup - HackMD
59%
Speculative Autobiographies
96%
Mentoring junior programmers: What I tell them is job number one - Vallified
96%
The Joy of Cryptography
98%
GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
91%
80386DX ISA SINGLE BOARD MICROCOMPUTER
82%
Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
99%
Model-based Testing
98%
RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
97%
XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
89%
Regex Learn - Step by step, from zero to advanced.
97%
Cracking the Adventure Time Cipher
96%
ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
81%
ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
93%
Practical attacks against attribute-based encryption
93%
Using a framework can make you stupid!
84%
Yes, Programming is Hard
84%
No one knows what's coming next
87%
Five Great (free!) Ways to Get Started With Cloudflare
87%
Threshold Digital Signatures
98%
Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
95%
ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
91%
Reflecting on 11 years of side projects
99%
Announcing YARP 1.0 Release
64%
Libra Shrugged — Chapter 15: Central bank digital currencies
99%
Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
69%
Matter Labs Announces $50M in New Funding for zkSync
95%
Sizing Up Post-Quantum Signatures
90%
Zillow, Prophet, Time Series, & Prices
66%
HOWTO: Get tenure
96%
How To Learn Stuff Quickly
95%
Random Oracles in Cryptography
98%
Threema: Three Strikes, You’re Out
60%
Timeline of the human condition
98%
How (Not) to Design a Hash Function
91%
PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
98%
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
90%
The Future of Work and the Workplace
88%
Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
93%
Simple Product Management Tricks - Jacob Kaplan-Moss
68%
You Are What You Consume - Priyam Mohanty
96%
Pairings in CIRCL
99%
SectorLISP Now Fits in One Sector
98%
Handshake Encryption: Endgame (an ECH update)
98%
mazzo.li — Backing up WhatsApp data through the multi-device web client
98%
Anatomy of a STARK, Part 0: Introduction
97%
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
99%
You want Tor Browser ... not a VPN
95%
Element One - Matrix, WhatsApp, Signal and Telegram in one place
87%
Privacy is a Human Right | Tor Blog
99%
bitbottle
98%
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
64%
Why aviation’s compass is shifting towards True navigation
98%
The AEGIS family of authenticated encryption algorithms
99%
Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
99%
Bevel Work | Rounding Sharp Corners
98%
Looking into convergent encryption
97%
.NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
99%
F# eXchange 2021 | Skills Matter
98%
8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
93%
Episode 85 - Clean Code in C# With Jason Alls
76%
SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
95%
A Tour Through the OWASP Top 10
98%
PlayStation 3 Architecture | A Practical Analysis
97%
A Critique [The Call of the Open Sidewalk]
96%
How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
97%
Code quality: a concern for businesses, bottom lines, and empathetic programmers
96%
A Graduate Course in Applied Cryptography
91%
Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
73%
Critical security flaw exposed Joburg residents’ private info
98%
NixOS on Framework laptop
99%
Vimarsh Shah - The best way to self host
98%
Introducing Nuntius - Cronokirby
98%
On the Optimization of PLONK – ZK Podcast
95%
Geo Key Manager: Setting up a service for scale
99%
How to use certificates in ASP.NET Core
99%
Avoid Authy, Use Aegis
99%
Privacy-Preserving Compromised Credential Checking
92%
What if Performance Advertising is Just an Analytics Scam? - SparkToro
99%
Cloudflare and the IETF
99%
Canonicalization Attacks Against MACs and Signatures
97%
1Password Refugee’s Guide to KeePass
99%
A Tale Of Two Optimisations
99%
mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
98%
Introducing SSL/TLS Recommender
97%
The efficiency of Microsoft.
99%
You're Doing IoT RNG
97%
Designing technologies with Values? Possibility - Necessity - and European story.
97%
HD wallets and the Legendrery PRF in MPC - HackMD
98%
Sending emails to myself
98%
Cloudflare Research: Two Years In
90%
What happened on the Internet during the Facebook outage
97%
Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
99%
Scheduling Backups To OneDrive For Paperless-ng Using RClone
90%
Lightning Round
99%
A PKI-less secure communication channel: Implementing the record stream
99%
A PKI-less secure communication channel: Coding the handshake
98%
Overview | ChessCoach
99%
The most counterintuitive facts in all of mathematics, computer science, and physics
99%
A PKI-less secure communication channel: The record layer
99%
Ordinal Classification Using PyTorch -- Visual Studio Magazine
99%
A PKI-less secure communication channel: The record layer
74%
New study reveals iPhones aren't as private as you think
96%
Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
91%
Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
99%
Effective Go - The Go Programming Language
95%
The secret to Cloudflare’s pace of Innovation
95%
Copycats and Endurance - The Bootstrapped Founder
99%
A PKI-less secure communication channel: design
93%
Cybersecurity threats - Simple Talk
98%
Automatic cipher suite ordering in crypto/tls
95%
Snapps on Mina with Emre and Izaak – ZK Podcast
96%
Introduction — pyNomo Documentation 0.3.2.0 documentation
98%
The Bi-Symmetric Encryption Fraud
62%
A World Without Sci-Hub
99%
GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
97%
Five ways I handled my OutOfMemoryErrors
93%
How Big Tech Runs Tech Projects and the Curious Absence of Scrum
97%
No, We Won’t Have a Video Call for That!
99%
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
99%
Authenticated Boot and Disk Encryption on Linux
98%
The First Rule of Machine Learning: Start without Machine Learning
94%
Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
95%
Let's Encrypt's Root Certificate is expiring!
97%
Linux on the Desktop: Part Two
97%
Cloudflare Pages is Lightning Fast
99%
Splitting up trust
99%
HTTP/3 support in .NET 6
98%
How We Made Playable Quotes for the Game Boy
99%
If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
99%
“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
94%
ACSC Annual Cyber Threat Report 2020-21
99%
WebSocket per-message compression in ASP.NET Core 6
96%
Why Monero
97%
Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
90%
FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
95%
Cloud Providers Publish Ransomware Mitigation Strategies
98%
Welcome to Speed Week and a Waitless Internet
98%
Why Flask will teach you more about software engineering than Django
98%
Part 4: Notifiable Data Breach (NDB) Scheme
98%
Certified Application Security Specialist (CASS)
84%
Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
74%
Rewilding: 60 years ago, scientists let a farm go wild – the results are in
67%
WhatsApp “end-to-end encrypted” messages aren’t that private after all
99%
GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
98%
Welcome · Real-World Cryptography MEAP V14
50%
ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
97%
Release age v1.0.0 🏁 · FiloSottile/age
99%
Why not ZFS
96%
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
99%
Saving a restic backup the hard way
97%
A meditation on three dead side projects
67%
ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
94%
Important clarifications regarding arrest of climate activist
92%
NO STARTTLS
98%
Proxy vs Reverse Proxy - using a real life example!
69%
Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
61%
WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
98%
Zero Trust Security Architecture Overview | Developer.com
99%
www.opendesktop.org
99%
Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
95%
Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
79%
NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
74%
zkMesh: Aug 2021 recap
99%
Improving Git protocol security on GitHub
99%
Recover Password Sync for a Domain Joined Mac
90%
Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
99%
Writing Programs with NCURSES
96%
The Design and Evolution of OCB - Journal of Cryptology
89%
You’re Not Too Late
99%
on terminal control
99%
Aggregatable Distributed Key Generation
98%
Released: Microsoft.Data.SqlClient 4.0 Preview 1
77%
The All-Seeing "i": Apple Just Declared War on Your Privacy
98%
59a34eabe31910abfb06f308 - Apple NeuralHash Collision
99%
Programmers Don’t Understand Hash Functions
98%
The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
93%
r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
94%
Golem keyboard project
88%
Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
98%
Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
67%
EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
96%
Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
99%
Adventures in fuzzing libolm | Matrix.org
93%
Thinking of the children
98%
Safer Illinois, Isn’t
98%
6 New Ways to Validate Device Posture
98%
How does PLONK work? Part 1: What's PLONK?
99%
Cryptology ePrint Archive: Report 2021/923
97%
Reddit Interview Problems: The Game of Life
93%
Thinking of the children
97%
Why is Learning Functional Programming So Damned Hard?
98%
10×10%
95%
Stewardship of Ourselves
99%
Exploring the password policy rabbit hole — Sun Knudsen
98%
The world in which IPv6 was a good design
94%
GitHub picks Friday 13th to kill off password-based Git authentication
97%
What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
96%
The Deceptive PR Behind Apple’s “Expanded Protections for Children”
98%
.NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
99%
How to never type passwords when using Git
97%
More devices, fewer CAPTCHAs, happier users
85%
If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
97%
Why Doesn't Software Show Up in Productivity?
64%
Australia is becoming a surveillance state
99%
Announcing .NET 6 Preview 7
99%
Implementing ‘le chiffre indéchiffrable’ in Scheme
97%
Apple’s Mistake
98%
One Bad Apple - The Hacker Factor Blog
98%
Hey Signal! Great Encryption Needs Great Authentication
98%
The logic behind three random words
99%
How does FaceTime Work?
72%
Apple to scan U.S. iPhones for images of child sexual abuse
80%
Apple explains how iPhones will scan photos for child-sexual-abuse images
99%
draft-peabody-dispatch-new-uuid-format-01
58%
Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
97%
HTTP/2: The Sequel is Always Worse
91%
Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
91%
Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
94%
When You Get Right Down to It, Most Security Is Based on The Honor System
99%
What is an inner product argument?
97%
An Attempt at Demystifying Graph Deep Learning
94%
GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
64%
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
64%
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
97%
Full-Time Open Source - CoRecursive Podcast
89%
TODO apps are meant for robots
98%
PyTorch Tutorial for Beginners - Building Neural Networks
99%
Wormhole - Simple, private file sharing
71%
Looking between the lines: how media is control.
99%
GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
70%
Tech spec experts seek allies to tear down ISO standards paywall
98%
How I store my files and why you should not rely on fancy tools for backup
99%
Zip - How not to design a file format.
79%
Cloudflare's Athenian Project Expands Internationally
97%
From Stolen Laptop to Inside the Company Network — Dolos Group
97%
Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
97%
IPv4 pricing - Hetzner Docs
99%
Netcat - All you need to know
83%
A new chapter for Google’s Vulnerability Reward Program
99%
Securing your development environment
99%
K-9 Mail is back
74%
Welcome to Cloudflare Impact Week
93%
Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
98%
Syncing all the things
89%
Google pushed a one-character typo to production, bricking Chrome OS devices
76%
Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
99%
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
96%
Germany’s national healthcare system adopts Matrix! | Matrix.org
99%
How does TLS work?
97%
The Game Developers Guide to NFTs
98%
Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
73%
Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
99%
Cryptanalysis of Meow Hash
98%
How To Learn Stuff Quickly
99%
A framework for Front End System Design interviews - draft
89%
Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
97%
HashWires: Range Proofs from Hash Functions | ZKProof Standards
97%
Why we need to do more to reduce certificate lifetimes
95%
TLS - The Cloudflare Blog
98%
ongoing by Tim Bray · Algorithm Agility?
97%
Security Analysis of Telegram (Symmetric Part)
99%
Pa(dding rtitioning) oracles, and another hot take on PAKEs
97%
Building a Trustless and Private Internet for Everyone
91%
Building a Vision of Life Without Work
97%
The EFAIL Hoax [The Call of the Open Sidewalk]
96%
Behind the scenes, AWS Lambda
97%
r/crypto - My breakdown on Partition Oracle Attacks
99%
Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
87%
Ways of reading without the influence of community
95%
The Myth of the Expert Reviewer
99%
An incomplete list of practices to improve security of your (micro)services · m's blog
99%
Sam Lewis
97%
More Secret Codes: A History of Cryptography (Part 2)
92%
A new macroeconomics? – J. W. Mason
98%
Stuff I wish I knew before I went Independent
99%
Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
98%
Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
97%
Write a time-series database engine from scratch
84%
BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
99%
Blazor Flash Cards - State Management with Fluxor
88%
Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
99%
Cryptology ePrint Archive: Report 2021/626
95%
The Missing Email Service For Domains
92%
How to Build a Giant Carmaker
99%
angularsen/UnitsNet
93%
Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
95%
OpenPGP Identity Structure [The Call of the Open Sidewalk]
98%
Yes, the network is hostile, even yours (or: how to lose your data in three steps)
96%
An Elixir Adoption Success Story
88%
New Release: Fiddler Everywhere 2.0 Is Here!
96%
NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
96%
Update on Windows 11 minimum system requirements
98%
Temporal: getting started with JavaScript’s new date time API
99%
cirosantilli/x86-bare-metal-examples
57%
Voice AI is scary good now. Video game actors hate it.
98%
Production Threshold Signing Service
97%
Windows 11, Amazon, and Uncomfortable Questions
98%
Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
97%
Taking the (quantum) leap with go
69%
Messaging app Signal not in compliance with new rules, say officials
98%
Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
94%
Designing a duress PIN: plausible deniability (part II)
94%
Zero Knowledge from the Discrete Logarithm Problem
97%
Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
99%
Remote Desktop Connection Manager - Windows Sysinternals
98%
Hacker's guide to deep-learning side-channel attacks: the theory
96%
Internet-in-a-Box
98%
How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
99%
dsprenkels/sss
99%
Croc Full Plaintext Recovery - CVE-2021-31603
97%
A response to "Did we market Knative wrong?"
98%
streetcomplete/StreetComplete
98%
Cryptographic shuffle | Brain on Fire
88%
Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
95%
I wish I could write this well
97%
Cryptology ePrint Archive: Report 2021/819
98%
Welcome · Real-World Cryptography MEAP V14
98%
Richard Feynman's Integral Trick
83%
[Last Week in .NET #46] – Exceptionally Useful
92%
google/fully-homomorphic-encryption
96%
Automonous Biology
96%
Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
95%
Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
99%
How to Handle Secrets on the Command Line
99%
Taildrop was kind of easy, actually
98%
Answering Community Questions and What’s Ahead for Mina
95%
Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
99%
From KEMs to protocols
98%
Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
98%
Kerckhoffs’s Law for Security Engineers
98%
Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
99%
Althttpd: The Althttpd Webserver
99%
Exploring android development on iPad
98%
Certificates Confuse Everything
59%
It’s time to ditch Chrome
94%
Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
83%
FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
99%
Password Managers.
99%
Kate polynomial commitments
99%
Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
99%
The best cryptographic protocol ever!
99%
Linux Security Hardening and Other Tweaks
98%
Leaky Abstractions
93%
Vinod Vaikuntanathan - Real World Cryptographers Podcast
98%
Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
98%
Using Wikipedia as an Impromptu RottenTomatoes API
98%
Mikkel Paulson
96%
ongoing by Tim Bray · Testing in the Twenties
85%
The Most Expensive Number in Engineering
99%
Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
95%
Amazon devices will soon automatically share your Internet with neighbors
99%
Contributing to Gemini ecosystem
98%
Elliptic Curve Cryptography Explained
99%
Code Maze Weekly #78 - Code Maze
96%
Episode 77 - Application Security with Tanya Janka
90%
QUIC is now RFC 9000
98%
A UDP-Based Multiplexed and Secure Transport
95%
Is MDPI a predatory publisher?
96%
Messaging and Chat Control
98%
New Storage Providers for Azure Durable Functions
99%
The best API design principles inspired by nature - andre.schweighofer
98%
Blockchain voting is overrated among uninformed people but underrated among informed people
96%
DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
98%
Cryptography from the Ground Up
96%
255: What is encryption anyways?
99%
Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
98%
How to Get Rich
97%
Heartbleed Revisited
99%
Secure Search Over Encrypted Data
92%
Indian job portal IIMJobs hacked; 46GB worth of database leaked online
87%
How the UK's Online Safety Bill threatens Matrix | Matrix.org
99%
Authenticated Encryption in .NET with AES-GCM
95%
I am sick and tired of hearing tech companies complain about a developer shortage
96%
Welcoming Linux to the 1Password Family | 1Password
99%
zkSessions: The ZK Languages Roundup - May 19 | Hopin
99%
Constructing a sponge function from MD5 - Gokberk Yaltirakli
90%
Zcon2Lite
93%
I Have a Lot to Say About Signal’s Cellebrite Hack
99%
Password Storage - OWASP Cheat Sheet Series
98%
The stack monoid revisited
99%
Running a .NET 5 web app on Railway
96%
A day at work
97%
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
99%
BLS12-381 For The Rest Of Us - HackMD
99%
Reverse Engineering an Unknown Microcontroller - Dmitry.GR
97%
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
96%
Building an Event Driven .NET Application: The Fundamentals – Wrapt
86%
Peter Thiel's Religion - David Perell
99%
<p>The Node.js CA Footgun</p>
98%
Security flaws in all Wi-Fi devices
99%
Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
99%
Beware of Applications Misusing Root Stores – Mozilla Security Blog
97%
Hell site
99%
Minecraft Modding: Laser Gun - Alan Zucconi
95%
Dear EU: Please Don't Ruin the Root - Articles
98%
Realizing the Mina vision in Rust
90%
Personal Data of 3 Million+ People Exposed In DriveSure Hack
99%
Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
98%
Introducing the Pinecone overlay network | Matrix.org
99%
Understanding Extended-Nonce Constructions
94%
Amazon Fake Reviews Scam Exposed in Data Breach
98%
--this is a no-knowledge proof--
98%
Introduction to JSON Web Tokens (JWT)
97%
timvisee/send
92%
ZK languages with Alex Ozdemir
97%
Is abstraction killing civilization? | datagubbe.se
97%
What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
99%
Mixed Boolean Arithmetic Obfuscation
93%
Update: Security Notification - March 2021
98%
Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
98%
Content Marketing for Bootstrappers | James Chambers
95%
Dabbling in Cryptography
96%
We were promised Strong AI, but instead we got metadata analysis
99%
HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
99%
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
99%
Rust Language Cheat Sheet
99%
Setting up a Cardano Producer node using Kubernetes/microk8s
96%
Customer Notice FAQs
86%
In epic hack, Signal developer turns the tables on forensics firm Cellebrite
97%
Make better predictions, stop estimating - andre.schweighofer
98%
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
90%
Apple introduces AirTag
88%
Minimum Viable State: Building a Nomad Internet Country
99%
Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
99%
dotnet/runtime
99%
What's in the box? - fasterthanli.me
99%
Thoughts on writing a wayland window manager with wlroots
85%
Why should you care about privacy - even if you had nothing to hide
85%
Vanquished Vaccines and Vetocracies – We Are Not Saved
94%
Eat a Peach for Engineers
99%
Standard Notes | A Simple And Private Notes App
98%
Node.js support in Cloudflare Workers
98%
What on Earth is this Encryption Scheme?
99%
Security Control: Implement security best practices
99%
Serving up zero-knowledge proofs
94%
Machine Learning With ML.NET - Evaluation Metrics
61%
The Cursed Computer Iceberg Meme
96%
My Vim Notes Setup
85%
Meet the patent troll that won a $308 million jury trial against Apple
98%
My programming principles • Borislav Grigorov
99%
The Architecture Behind A One-Person Tech Startup
99%
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
99%
WTF are these security chips?
99%
A pretty good guide to pretty good privacy
99%
Goodbye OpenSSL, and Hello To Google Tink
99%
MPC-Over-Signal
81%
The Unparalleled Genius of John von Neumann
82%
Signal Adds Payments—With a Privacy-Focused Cryptocurrency
99%
Dumping user data from cheap tablets in minutes
98%
How I Got Into Computers AppDev Edition
96%
(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
98%
Legalizing Gay Marriage in Crusader Kings III with Ghidra
99%
PostgreSQL Security Hardening
99%
The Exception Model
95%
Zero click vulnerability in Apple’s macOS Mail
99%
C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
75%
Apple's cooperation with authoritarian governments
98%
Some opinionated thoughts on SQL databases
89%
Cloudflare’s WAF is recognized as customers’ choice for 2021
99%
Peace of mind backup - boa.nu
91%
Creation vs. Consumption
95%
208.43.231.11 Git
97%
A new Cloudflare Web Application Firewall
99%
Getting started with Self Sovereign Identity SSI
99%
.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
98%
OpenPGP Message Format
98%
PGP is a Form of Minimalism [The Call of the Open Sidewalk]
87%
About | Mina Illuminate
99%
Single-primitive authenticated encryption for fun
98%
It doesn't work | Frank DENIS random thoughts.
99%
janroesner/sixty5o2
99%
APT Encounters of the Third Kind
99%
Building a phone book: Part I
99%
C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
95%
facebookresearch/Cupcake
99%
The Evolution of Distributed Systems on Kubernetes
97%
Is There a Case for Programmers to Unionize? - Qvault
98%
On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
97%
CoinList
97%
Browser Isolation for teams of all sizes
97%
suite - Privacy-Enhancing Cryptography | CSRC | CSRC
97%
Crystal 1.0 - What to expect
89%
Welcome to Cloudflare Security Week 2021!
98%
My self-study plan for electrical engineering
99%
r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
99%
Hybrid encryption and the KEM/DEM paradigm
97%
Episode 72 - Emulating a Video Game System in .NET with Ryujinx
99%
The missing explanation of ZK-SNARKs: Part 1
98%
Can we talk about client-side certificates?
97%
Zero Knowledge Proof (with Avi Wigderson) - Numberphile
97%
A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
97%
Can an economy keep on growing? - Inverted Passion
98%
What It Means to Learn to Code
97%
Surreptitious Forwarding [The Call of the Open Sidewalk]
58%
The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
98%
A Simple Personal Data Backup Setup
98%
How are zlib, gzip and zip related? What do they have in common and how are they different?
95%
YouTube
99%
Key Exchange Standards
99%
Becoming physically immune to brute-force attacks
98%
About the March 8 & 9, 2021 Verkada camera hack
99%
Block Cipher Structures: Ranked
98%
Getting started with Dapr for .NET Developers
96%
I want a Computer that I Own
89%
4 Times I Felt Discriminated Against for Being a Female Developer
98%
Notion is not a knowledge base
98%
A flamegraph of Real-World Cryptography
77%
It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
94%
The Teams Dashboard: Finding a Product Voice
98%
A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
98%
Online tool to generate and check bcrypt hashed passwords.
99%
Hotpatch for Windows Server Azure Edition (preview)
98%
February 2021 - Killing Turbotax
98%
How I Might Have Hacked Any Microsoft Account - The Zero Hack
95%
How Nacon Cracked and Pirated The Sinking City - Frogwares
98%
Cryptology ePrint Archive: Report 2020/1491
99%
Goodbye Client Affinity, Hello Data Protection with Azure
97%
5 tools I use to protect my privacy online
99%
Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
99%
How I cut GTA Online loading times by 70%
99%
The security of the "Pass" password manager
71%
The Economics of Biodiversity
99%
Cryptology ePrint Archive: Report 2020/1610
99%
How often should I rotate my ssh keys?
99%
Microsoft Releases Azure Firewall Premium in Public Preview
98%
[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
97%
Understanding how Leela Chess Zero works
99%
Cryptography Interface Design is a Security Concern
97%
Zero Bug Tolerance
99%
Cryptographic Wear-Out for Symmetric Encryption
98%
C#'s Functional Journey
99%
The Azure Security Architect Map
99%
Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
92%
Cryptology ePrint Archive: Report 2020/1581
98%
Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
94%
How to destroy the Earth
99%
GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
98%
Cryptology ePrint Archive: Report 2020/1533
98%
Using HPKE to Encrypt Request Payloads
99%
Urbit :: the good, the bad, and the insane
98%
Cryptology ePrint Archive: Report 2020/1536
96%
Distributed Application Runtime (Dapr) v1.0 Announced
99%
Making Easy Auth tokens survive releases on Linux Azure App Service
92%
upgundecha/howtheysre
99%
ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
94%
A Visual Guide: To Sustainable Software Engineering
95%
Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
98%
Multi-asset shielded pool project (MASP)
97%
no dogma podcast - powered by FeedBurner
92%
Securing the post-quantum world
97%
Our Solo v2 launch is official!
99%
Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
98%
Good-bye ESNI, hello ECH!
92%
Crackpot Cryptography and Security Theater
97%
Why should I give you my ID card
78%
2020 U.S. Election: Cybersecurity Analysis
98%
A look at GSM
99%
Reverie: An optimized zero-knowledge proof system
93%
Report: Romanian Real Estate Portal Suffers Crippling Data Breach
88%
Lessons Learned From My Last Startup: A Post Mortem
97%
Is abstraction killing civilization? | datagubbe.se
98%
Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
99%
ARCHITECTURE.md
99%
Working with SSL Certificate in Azure App Service
77%
Ideas That Created the Future
99%
A Simple and Succinct Zero Knowledge Proof
99%
Help users in Iran reconnect to Signal
99%
Security: The Need-to-know principle
92%
Threshold Cryptography with Omer Shlomovits from ZenGo
99%
7 behaviours to avoid in a software architecture role - Daniel Watts
97%
Tearing Down a Humidifier - Lei's Blog
76%
Why Generation X will save the web - Hi, I'm Heather Burns.
96%
SSL/TLS connection issue troubleshooting guide
96%
The Best TLS and PKI Training Course in the World
97%
My experience passing CKA and CKAD
97%
Episode 10: Exploiting Authenticated Encryption Key Commitment!
99%
LackRack - Eth0Wiki
93%
All Stories Are Wrong, but Some Are Useful
99%
The Subtle Hazards of Real-World Cryptography
99%
I didn't install Signal for privacy
78%
The Psychology of Stock Bubbles
99%
How to properly store a password in the Database | Petre Popescu
97%
Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
86%
The EU must protect the right to privacy and not attack end-to-end encryption
94%
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
99%
No, Java is not a Secure Programming Language
99%
berty/berty
99%
Tools I Love to Not Think About
95%
What it means to be a cryptographer
83%
SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
75%
survey.pdf
99%
Write Crypto Code! Don't publish it!
99%
pavlobu/deskreen
96%
Technological stagnation: Why I came around
98%
s-51: Ask Me Anything (AMA), with Joan Daemen
97%
The architecture of my life | mjwsteenbergen-blog
90%
AKS Zero To Hero - Series for everyone - Azure Greg
99%
Release Notes | Bitwarden Help & Support
90%
Stepping up for a truly open source Elasticsearch | Amazon Web Services
99%
My Backup Strategy
99%
So, You Want to CTF? (A Beginner’s Guide to CTFing)
90%
Stepping up for a truly open source Elasticsearch | Amazon Web Services
99%
Building your first Telegram Bot with ASP.NET Core
99%
Please Stop Encrypting with RSA Directly
98%
The worrying trend of game technology centralization
99%
Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
94%
We can do better than Signal
99%
CondensationDB/Condensation
99%
Mesmerizing Chameleon Signatures
98%
Is Writing as Important as Coding?
99%
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
99%
A history of end-to-end encryption and the death of PGP
99%
Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
99%
KEMTLS: Post-quantum TLS without signatures
99%
Fully Homomorphic Encryption Part One: A Gentle Intro
99%
danso - happy-space: a whitespace-sensitive calculator
95%
Holistic web protection: industry recognition for a prolific 2020
94%
Foam
98%
Send and receive WhatsApp messages through email
93%
Learn X by doing Y - A project-based learning search engine
99%
Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
98%
jukefoxer/Signal-Android
99%
An introduction to the Data Protection system in ASP.NET Core
92%
Notification of Data Security Incident - December 23, 2020
97%
My personal wishlist for a decentralized social network
99%
Machine Learning with ML.NET - Linear Regression
96%
Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
99%
Wasmer - The Universal WebAssembly Runtime
98%
Signal, thank you for not collecting my data. But I won’t use you.
90%
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
99%
safepassme
95%
What I learned doing 125 public talks - Part I
97%
Steam's login method is kinda interesting
99%
.NET Rocks! vNext
88%
WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
90%
DALL·E: Creating Images from Text
98%
Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
97%
HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
99%
SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
99%
The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
98%
Cryptology ePrint Archive: Report 2020/1456
98%
s-18: FSE 2020 Rump session
85%
Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
99%
Linux Hardening Guide | Madaidan's Insecurities
98%
Why are video games graphics (still) a challenge? Productionizing rendering algorithms
97%
zkSNARKS and Cryptographic Accumulators
94%
NeurIPS 2020 Best Machine Learning Paper Awards
99%
Web Authentication Methods Compared
96%
Combating abuse in Matrix - without backdoors. | Matrix.org
97%
Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
79%
Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
95%
Development time is money, therefore I RAID
86%
Against Victimhood
80%
The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
95%
No, Cellebrite cannot 'break Signal encryption.'
98%
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
97%
Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
96%
Why I've Been Merging Microservices Back Into The Monolith At InVision
97%
My Engineering Axioms
97%
2020’s Top 15 Machine Learning & AI Research Papers
51%
You're Missing Out If You Don't Write Weekly Digests
97%
Cryptologie | Vetted Encryption
99%
Apple M1 foreshadows RISC-V
97%
Bizarre Design Choices In Zoom’S End-To-End Encryption
94%
Branding Your Own Startup | Blog of Pascal
98%
Commits are snapshots, not diffs - The GitHub Blog
98%
Giving more tools to software engineers: the reorganization of the factory
95%
How to conduct a competitive analysis - Philipp Muens
88%
Adding Encrypted Group Calls to Signal
86%
Learn about online security, privacy, and encryption
98%
The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
97%
Privacy and Compliance Reading List
92%
Computers Are Bad
96%
Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
94%
Google Alternatives 2020: Best Privacy Friendly Alternatives
85%
How to Build a Global Network that Complies with Local Law
99%
Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
98%
There's Always More History • Hillel Wayne
96%
Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
97%
Improving DNS Privacy with Oblivious DoH in 1.1.1.1
98%
From Zero to AppStore
92%
Privacy needs to be built into the Internet
99%
benwilber/boltstream
95%
Welcome to Privacy & Compliance Week
98%
InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
99%
On Trusting Macintosh Hardware
98%
An introduction to three-phase power and PDUs
91%
Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
98%
How to Make Your Code Reviewer Fall in Love with You
99%
Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
99%
An iOS zero-click radio proximity exploit odyssey
98%
Gamedev from scratch 0: Groundwork
91%
Release OpenZFS 2.0.0 · openzfs/zfs
93%
We Need Organic Software
99%
ph1lter
97%
Are My Encryption Keys In The Cloud Really Secure?
94%
How to Think for Yourself
98%
An ex-Googler's guide to dev tools
88%
Crypto Dictionary
90%
Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
98%
How do people find bugs?
94%
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
95%
Getting lucky with posting on Hacker News
96%
Productive Uncertainty - Reaction Wheel
97%
zkSummit 6 | Hopin
98%
Normal Forms - Simple Talk
97%
The book is finished, well sort of...
71%
Facebook Is Going After Its Critics in the Name of Privacy
99%
Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
97%
The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
98%
zfs.rent
97%
Six months of Tiny Projects
99%
Anchoring Trust: A Hardware Secure Boot Story
98%
Claims encryption for B2C tokens | Developer Support
96%
Can’t open apps on macOS: an OCSP disaster waiting to happen
99%
Using Matrix to replace proprietary and centralized chat apps
99%
Going Bark: A Furry’s Guide to End-to-End Encryption
99%
Does Apple really log every app you run? A technical look
97%
SAD DNS Explained
83%
How a Game Developer Leaked 46 Million Accounts
99%
Etebase - Your end-to-end encrypted backend
97%
Get Animal Jam for your mobile device, PC, or Mac
98%
caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
96%
Notes On Owning Your Own Business
97%
How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
96%
Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
80%
Zoom lied to users about end-to-end encryption for years, FTC says
97%
What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
98%
Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
75%
Over 1M Lazada RedMart accounts sold online after data breach
95%
Productivity vs. Privacy
99%
Multithreading Handbook for Simulation Developers
99%
The missing explanation of zk-SNARKs: Part 2
87%
Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
96%
Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
97%
Standing on Our Own Two Feet
99%
Querying Across Databases In SQL Azure
97%
Scripts for Managing Azure Container Registry
97%
A Brief Introduction to Deniability
99%
Leaving OCaml
99%
Two workers are quadratically better than one • Hillel Wayne
99%
C# in Simple Terms - Exceptions and Exception Handling
95%
The Basis of Testing – Stories from a Software Tester
69%
Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
99%
The missing explanation of ZK-SNARKs: Part 1
90%
Scott Santens - An Engineering Argument for Basic Income
93%
RedMart Data Security Incident
97%
Episode 63 - Being Productive With Jay Miller
96%
How software eats money
97%
ML Optimization pt.1 - Gradient Descent with Python
94%
Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
83%
gnu.org
99%
Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
97%
1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
97%
Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
97%
Azure CLI Oct 2020 release
98%
The accelerating adoption of Julia
97%
Personal banking needs an API | Chris Hardie's Tech and Software Blog
87%
Let's talk about fake reviews - part 1
93%
14 Popular Machine Learning Evaluation Metrics
96%
A Legislative Path to an Interoperable Internet
94%
Questioning Probability
99%
charmbracelet/glow
98%
Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
96%
Exposing covert surveillance backdoors in children’s smartwatches
99%
XChaCha20-Poly1305: A Primer with Examples in .NET
98%
Event Feeds: Simple and reliable messaging infrastructure
98%
Smart male chastity lock cock-up
87%
Stop the EARN IT Bill Before It Breaks Encryption
97%
Security Of Streaming Encryption In Google's Tink Library
96%
It Didn’t Take Too Long…
99%
Fortunately, I don't squash my commits
97%
Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
98%
Wiki - RustStarterKit2020
97%
Episode 61 - Azure and Live Conferences With Andy Morrell
99%
Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
66%
Coinbase offers exit package to those uncomfortable with new direction
97%
Doing discourse better: Stuff I wish I knew
98%
is it worth it? — Martin Kleppmann’s blog
93%
Advisory: security issues in AWS KMS and AWS Encryption SDKs
96%
This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
96%
Zig's New Relationship with LLVM
99%
How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
98%
Using Azure RBAC with Azure Key Vault
95%
Uncomfortable Questions About App Signing
98%
71.177.243.54
98%
Google Interview Questions Deconstructed: The Knight’s Dialer
96%
Simple Anomaly Detection Using Plain SQL
88%
Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
99%
VPNs from first principles
98%
No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
97%
Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
97%
dwmkerr/hacker-laws
97%
Revenue Model, not Culture, is the Dominant Term
99%
CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
99%
When double.Epsilon can equal 0
96%
Let's Encrypt's New Root and Intermediate Certificates
97%
A Thanksgiving Carol
95%
Nvidia’s Integration Dreams
98%
Phosphine gas in the cloud decks of Venus
97%
GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
97%
Some Great Books For Programmers That StackOverflow Cannot Replace
97%
Security by Obscurity is Underrated
99%
What Clojure spec is and what you can do with it (an illustrated guide)
99%
Raccoon Attack
99%
BashPitfalls - Greg's Wiki
74%
TLS certificate lifespan cut short: A win for security, or cause for chaos?
98%
Things I Learned to Become a Senior Software Engineer
67%
Verizon achieves milestone in future-proofing data from hackers
97%
Why you want to encrypt password hashes
87%
Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
87%
Attention is your scarcest resource
99%
Key exchange standards - Manning
99%
Key exchange standards - Manning
99%
connorferster/handcalcs
95%
The Why and How of Privacy and Security — This Too Shall Grow
99%
Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
96%
I've decided to pursue a Bootstrap MBA
98%
Why I’m Writing A Book On Cryptography
99%
Minimal React: getting started with the frontend library
99%
Soatok’s Guide to Side-Channel Attacks
98%
Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
99%
So you want to roll your own crypto?
84%
Zoom is now critical infrastructure. That’s a concern
93%
Pure and Applied Chess
97%
It Took 2 Years To Make My First Dollar Selling A Product
95%
The Five Pillars Of Wealth Building - Darius Foroux
95%
Heyyyyyyyyyyyy.com | email with *nuance*
94%
Providers | PrivacyTools
98%
Is cloud security too easy to screw up? | A Cloud Guru
65%
A New Botnet Is Covertly Targeting Millions of Servers
99%
Cross-platform cryptography in .NET Core and .NET 5
98%
degoogle
99%
drduh/macOS-Security-and-Privacy-Guide
99%
Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
95%
July 11, 2020 - LiveAuctioneers Account Security
98%
What's new in the Windows Store client
97%
fast.ai releases new deep learning course, four libraries, and 600-page book
98%
Transfer a Software Project - Lessons Learned - dcaulfield
99%
jesseduffield/horcrux
99%
Obfuscating your email on the web
96%
A Guide to Autodidactism | Jack Kinsella
99%
Symmetric and Asymmetric Encryption in .NET Core
96%
You Need a Password Manager. Here Are the Best Ones
88%
Graphical Linear Algebra
99%
Let's Learn x86-64 Assembly! Part 0
98%
Nintendo DS Architecture | A Practical Analysis
99%
Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
98%
JWTs: Which Signing Algorithm Should I Use?
98%
Data Breach Statement - Utah Gun Exchange
79%
2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
90%
Why I Left a Career as a Startup CTO to Become a Writer
93%
IBM Reveals Next-Generation IBM POWER10 Processor
97%
Hiding messages in x86 binaries using semantic duals
98%
The Illustrated TLS Connection
99%
Frustrated? It's not you, it's Rust - fasterthanli.me
91%
Mozilla's failures and a path to profitability
98%
Intel® Trust Domain Extensions
97%
Handles are the better pointers
99%
Securing Web Application Secrets Through Azure Key Vault - Simple Talk
99%
Serverless apps on AWS using F# and fable
97%
Mozilla Alumni Network
99%
The CompSci Pub
96%
I don’t trust Signal
91%
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
99%
Mobile Phone Streams
97%
bulletproofs::notes::range_proof - Rust
99%
How to encrypt and decrypt shared folders on my Synology NAS
91%
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
98%
Building dashboards for operational visibility | Amazon Builders' Library
94%
A Brief History of The Deficit Myth with Dr. Stephanie Kelton
98%
Proof of X
99%
hephaest0s/usbkill
98%
1Password for Linux development preview
96%
27-inch iMac gets a major update
95%
Tales of the Autistic Developer - Senior Developer
97%
How it works - Briar
99%
Azure Cloud Shell Tips And Tricks | Build5Nines
60%
Cosmetics firm Avon leaks 19 million customer records (Includes interview)
90%
David Wong
96%
swyx Writing | Slack is Fumbling Developers
99%
Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
99%
.NET R&D Digest (July, 2020)
95%
Chessprogramming wiki
99%
Polymorphic Encryption Algorithms — Generating Code Dynamically
99%
Some SQL Tricks of an Application DBA
82%
You Want Options
99%
Tip 272 - Azure Security Best Practices
99%
Joe Bergeron | Java Obfuscation: A Pattern Language
98%
p410n3 blog
93%
Dropping Out of College to Join Facebook: 3 Years Later
97%
Storage 101: Data Security and Privacy - Simple Talk
98%
Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
99%
Exploring Fully Homomorphic Encryption
98%
Essays on programming I think about a lot
95%
You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
95%
Designing a New Old Home: Part 1
99%
The encrypted homelab
99%
Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
96%
MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
98%
What’s New in Thunderbird 78
97%
100 Best Kubernetes Books of All Time
97%
Poor feedback from readers
98%
Hacking Reolink cameras for fun and profit
95%
Welcome to Element!
95%
Data Structures & Algorithms I Actually Used Working at Tech Companies
94%
Digicert revokes a raft of web security certificates
99%
Python Malware On The Rise
99%
A few thoughts about Signal’s Secure Value Recovery
97%
Trending
97%
Disabling Google 2FA Doesn't Need 2FA
56%
New German law would force ISPs to allow secret service to install trojans on user devices
98%
[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
88%
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
99%
Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
98%
A Team
99%
Clean Architecture, 2 years later - Elton Minetto
99%
Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
99%
A Concurrency Cost Hierarchy
88%
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
97%
Why I’m Writing A Book On Cryptography
81%
nabeelqu
97%
Why Can't I Reproduce Their Results?
97%
The true cost of knowledge | RoyalSloth
96%
Beware the Google Password Manager - fasterthanli.me
99%
Apple Lightning
89%
Oppose the EARN IT Act
97%
New Mac ransomware spreading through piracy - Malwarebytes Labs
97%
How CDNs Generate Certificates
98%
foambubble/foam
99%
How to get the best out of your Yubikey with GPG
80%
New US Bill would require makers of encrypted devices to leave a backdoor
98%
Why AES-GCM Sucks
90%
There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
94%
Navigating Power & Status
98%
Which Database should I use in my Azure Serverless App?
99%
Avoiding exposing identifier details to your users
99%
jonathan-laurent/AlphaZero.jl
99%
Do you CI? | Benji's Blog -
96%
How is NSA breaking so much crypto?
95%
Discovering Dennis Ritchie’s Lost Dissertation - CHM
98%
The smartest password policy enforcer for Active Directory
96%
Making your data residency choices easier with Azure
99%
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
89%
End-to-End Encryption Update - Zoom Blog
97%
GitHub Terms of Service - GitHub Help
98%
Reasoning by Lego: The wrong way to think about cryptography.
85%
GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
97%
Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
89%
May 2020 news · Gwern.net
98%
Exploration Strategies in Deep Reinforcement Learning
85%
How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
99%
DRY vs DAMP in Unit Tests
98%
How to set compensation using commonsense principles
99%
Playing Around With The Fuchsia Operating System
98%
Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
94%
12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
79%
Google got rich from your data. DuckDuckGo is fighting back
96%
Discret 11, the French TV encryption of the 80's
99%
Hacking Windows with F# 5.0 Scripts
99%
Byzantine and non-Byzantine distributed systems
99%
Logging with Decorators in TypeScript
99%
How are you improving your technology skills today? Start by reading articles
70%
The Dictator's Army and charismatic founders
95%
Is a trillion-dollar worth of programming lying on the ground
91%
Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
98%
Introducing P2P Matrix | Matrix.org
96%
Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
99%
CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
99%
ScottHolden/BFSourceGen
98%
A Guide to Threat Modelling for Developers
98%
Against an Increasingly User-Hostile Web
98%
A Guide to Threat Modelling for Developers
92%
Obsidian
97%
Messaging with Azure Service Bus - Part 9 - Premium Features
98%
A Guide to Threat Modelling for Developers
99%
Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
99%
Org Mode - Organize Your Life In Plain Text!
99%
Implementing simple cooperative threads in C - Stephen Brennan
87%
Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
98%
NIST Special Publication 800-63-3
90%
An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
99%
A Guide to Threat Modelling for Developers
97%
Introduction to quantum computing with Q# – Part 3, Single qubit gates
96%
Turning Signal App into a Coarse Tracking Device
98%
A Guide to Threat Modelling for Developers
99%
OpenBSD 6.7
96%
Want to build a side business? Just buy a great Domain Name | Deep South Ventures
99%
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
98%
A Guide to Threat Modelling for Developers
98%
Cryptology ePrint Archive: Report 2020/572
99%
How Not to Store Passwords
66%
Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
99%
Replacing JWTs with Branca and PASETO in .NET Core
99%
Meshing with LinkerD2 using gRPC-enabled .NET Core services
98%
Lockdown Course: Introduction to Cryptography - James Grime
96%
Asgard Systems uses ML.NET to reduce food waste | .NET
98%
Make LLVM fast again
88%
Zoom buys Keybase to help it build end-to-end encryption
99%
Alternatives to PGP
98%
Cryptology ePrint Archive: Report 2018/607
75%
A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
93%
Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
96%
Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
98%
April Extensions for Firefox Preview
90%
Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
99%
Modern SAT solvers: fast, neat and underused (part 1 of N)
98%
Startup financial models - 12 templates compared for SaaS
98%
OpenPGP Message Format
98%
How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
91%
SailfishOS - Sailfish OS
97%
IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
99%
Why not "Why not WireGuard?"
99%
Messaging with Azure Service Bus - Part 5 - Message Sending Options
99%
keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
98%
Barbie typewriter
95%
Preventing Software Rot
96%
Search Results - Springer
99%
Build a C# App with CockroachDB and the .NET Npgsql Driver
97%
This is what end-to-end encryption should look like! - Jitsi
99%
FocalFossa/ReleaseNotes - Ubuntu Wiki
99%
How Netflix brings safer and faster streaming experience to the living room on crowded networks…
97%
ZEIT is now Vercel - Vercel
99%
Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
96%
Scuttlebot peer-to-peer log store
89%
Saving Money on Internation Payments as a Remote Freelancer
96%
This is what end-to-end encryption should look like! - Jitsi
99%
Technical reasons to choose FreeBSD over GNU/Linux
99%
The limitations of Android N Encryption
98%
Hacking my Sixth Form College network in 1991
98%
Temporal circuit of macroscale dynamic brain activity supports human consciousness
96%
Learn dbatools in a Month of Lunches
99%
Running your own secure communication service with Matrix and Jitsi | Matrix.org
95%
OnCheckin - Continuous Deployment for ASP.Net websites.
97%
Welcome · Real-World Cryptography MEAP V05
96%
How we recovered over $300K of Bitcoin
72%
Reassuring Words and Good Intentions Don't Mean Good Security
93%
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
88%
A Message to Our Users - Zoom Blog
84%
The EARN IT Act Violates the Constitution
98%
Perspectives & gaps between theory, practice & industry research in cryptography
99%
.NET R&D Digest (March, 2020)
93%
Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
89%
US Government Wages War on Encryption
99%
Await | Writing an OS in Rust
56%
patents in crypto
99%
Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
99%
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
98%
New grad vs senior dev
96%
Released: Microsoft.Data.SqlClient 2.0 Preview 2
99%
Speeding up Linux disk encryption
98%
Unsure Calculator
97%
[15] RFR 8172680: Support SHA-3 based Hmac algorithms
99%
A Quick Garbled Circuits Primer
96%
0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
99%
Software Engineer - Jobs at Apple
99%
How Tailscale works
90%
Scott Helme
83%
MacBook Air
97%
Ryan_Connolly_Resume.docx
91%
EARN IT bill is aiming at destroying encryption. We must take action now.
99%
Async ValueTask Pooling in .NET 5 | .NET Blog
99%
ploeh blog
96%
The polygons of Another World: Atari Jaguar
94%
MakerDAO gets stress tested as ETH price plummets
99%
The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
99%
EARN IT Must Not Happen
99%
What is Meshtastic?
99%
A Template for Clean Domain-Driven Design Architecture
97%
Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
91%
How I Survived Being A $220k/year Intern
99%
draft-ietf-mls-protocol-09
86%
Keybase
96%
EARN IT is a direct attack on end-to-end encryption
99%
Intel x86 Root of Trust: loss of trust
97%
The growth of command line options, 1979-Present
98%
Re: SMB over QUIC: Files Without the VPN
97%
Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
93%
WireGuard Gives Linux a Faster, More Secure VPN
95%
Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
68%
zkMesh
99%
The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
97%
CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
53%
DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
99%
An Intuitive Guide to Linear Algebra – BetterExplained
99%
It’s 2020. Is your code ready for leap day?
97%
pwn.college BETA
97%
If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
98%
How can I create a password protected .zip file in Windows 10?
97%
The Zen of Go | Dave Cheney
98%
A Simple Range Proof From Polynomial Commitments - HackMD
99%
microsoft/electionguard
99%
TimeSnapper, automatic screenshot software, auto screen capture
99%
hassio-addons/addon-ssh
98%
Welcome to the UK .NET Tour 2020
99%
Source Code | OpenVPN
99%
A Brief Intro to Clean Architecture, Clean DDD, and CQRS
99%
Fundamental Concepts for Elastic Jobs in Azure SQL Database
93%
Messaging Layer Security: Towards a New Era of Secure Group Messaging
99%
Cryptologie
98%
Update on our new and upcoming security keys
98%
Latacora - Stop Using Encrypted Email
97%
dwmkerr/hacker-laws
98%
Real-World Cryptography
98%
The NuGet Blog
99%
How HTTPS works Part 1 — Building Blocks
97%
google/tink
99%
damienbod/AspNetCoreCertificates
96%
Serious Cryptography | No Starch Press
99%
draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
98%
Dino 0.1 Release - Dino. Communicating happiness.
99%
Ryujinx/Ryujinx
93%
Searching For New Adventures In Software Development
98%
Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
99%
Building personal search infrastructure for your knowledge and code | beepb00p
97%
Authentication, What The Fuck?
99%
How to write a simple operating system in assembly language
98%
Welcome to the UK .NET Tour 2020
99%
v5.8 Release Notes
99%
The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
99%
.NET Core, .NET 5; the exodus of .NET Framework?
99%
Autocrypt 1.1.0 documentation
99%
On Privacy versus Freedom | Matrix.org
99%
Vim cryptmethod is not authenticated · Issue #638 · vim/vim
92%
Google gives up on US carriers, will roll out its own RCS chat system
99%
.NET R&D Digest (November – December, 2019)
99%
Signal >> Blog >> Technology Preview for secure value recovery
99%
Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
99%
Zero allocation code in C# and Unity - Seba's Lab
72%
How to generate random numbers using water bubbles
99%
tmds/Tmds.Ssh
99%
oqtane/oqtane.framework
95%
Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
96%
Why IVPN - What makes IVPN the best privacy protection service
92%
GateHub Investigation - Final Statement
95%
Stop surveillance and preserve your privacy with IVPN
98%
Isogeny crypto
90%
Homepage | ZKProof Standards
99%
dotnet/SqlClient
98%
Thoughts on DNS-over-HTTPS
99%
x86/x64 SIMD Instruction List (SSE to AVX512)
88%
bye: FTP Support Is Going Away
93%
Verzekeraar Allianz informeert klanten over datalek - Security.NL
95%
Commas in big numbers everywhere: An OpenType adventure
95%
Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
99%
OceanLibrary/Ocean
93%
Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
97%
A detailed look at Ubuntu’s new experimental ZFS installer
92%
Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
95%
Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
97%
Peddle the Pedal to the Metal
99%
praeclarum/sqlite-net
98%
beemdevelopment/Aegis
99%
draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
92%
PrivacySafe: The Anti-Cloud Appliance
98%
awslabs/s2n
99%
Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
96%
Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
99%
OWASP/CheatSheetSeries
99%
OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
92%
Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
98%
Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
83%
Security Incident - Please Change Your Password
94%
EV SSL Certificates Phased Out of New Browser Updates | Venafi
98%
Learn UI Design: The Complete Online Video Course
98%
KNOB Attack
84%
Gone forEVer!
99%
Spying on HTTPS
89%
Online syntax highlighting for the masses!
97%
Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
97%
Canva Security Incident - May 24 FAQs
98%
Architecture for humans - Ayende @ Rahien
80%
Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
93%
Pwnie Awards
97%
More on Backdooring (or Not) WhatsApp - Schneier on Security
99%
ECMAScript 2015 Language Specification – ECMA-262 6th Edition
98%
Kazakhstan’s HTTPS Interception
96%
When a rewrite isn’t: rebuilding Slack on the desktop
97%
Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
79%
Digital Driver’s Licenses Could Become a Real Option in Some States
97%
CRYPTO-LAB
98%
Real-World Cryptography
99%
Proving security at scale with automated reasoning - All Things Distributed
99%
VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
97%
The Ultra Secure Crypto Storage & Communication Device
98%
Security advisory 2019-06-13 | Yubico
99%
Fixing Random, part 34
99%
An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
98%
dotnet/coreclr
98%
Apple CryptoKit | Apple Developer Documentation
98%
Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
99%
Accessing UNIX sockets remotely from .NET - Red Hat Developer
99%
RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
89%
Ethical Alternatives & Resources - ethical.net
98%
dotnet/coreclr
96%
Top SSL Certificates Buyer's Guide
99%
Using Ed25519 signing keys for encryption
99%
Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
99%
Performance Improvements in .NET Core 3.0 | .NET Blog
98%
ZombieLoad Attack
98%
Domain Randomization for Sim2Real Transfer
99%
eyeDisk. Hacking the unhackable. Again | Pen Test Partners
99%
ZkVM: a new design for fast, confidential smart contracts
97%
Community and Communication going forward
99%
Do we need effects to get abstraction?
99%
RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
99%
mpm guide - niall t.l.
98%
The .NET Abstraction Pile
98%
A Recipe for Training Neural Networks
99%
Twisted Oak
99%
AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
97%
Peddle the Pedal to the Metal
99%
JDK 12 Security Enhancements
98%
Understanding the Limitations of HTTPS
99%
Cryptologie
99%
We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
99%
Direct3D 11.3 Functional Specification
99%
Verified cryptographic provider a triple threat
95%
The story of the Rendition Vérité 1000
93%
Scott Helme
99%
Dotnet-Boxed/Templates
99%
BoringTun, a userspace WireGuard implementation in Rust
93%
New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
97%
The WhibOx Contest Edition 2 - CYBERCRYPT
94%
Understanding STIR/SHAKEN
97%
Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
98%
We need to talk about Session Tickets
99%
Introduction
92%
Cybersecurity for the Public Interest - Schneier on Security
89%
Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
97%
Data Leakage from Encrypted Databases - Schneier on Security
94%
kelseyhightower/kubernetes-the-hard-way
95%
Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
99%
Crypto Canon - Andreessen Horowitz
96%
Blockchain Governance: Programming Our Future
97%
Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
97%
Keybase launches encrypted git
98%
AI Progress Measurement
97%
Microsecond Resolution Time Services for Windows
99%
vivri/Adjective
98%
On the Security of Password Managers - Schneier on Security
96%
Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
95%
Reconstructing SIGSALY - Schneier on Security
95%
Public-Interest Tech at the RSA Conference - Schneier on Security
98%
Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
95%
Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
98%
Hacking the GCHQ Backdoor - Schneier on Security
95%
Friday Squid Blogging: Squid Lollipops - Schneier on Security
98%
Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
93%
Friday Squid Blogging: New Giant Squid Video - Schneier on Security
95%
Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
92%
Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
95%
New Australian Backdoor Law - Schneier on Security
92%
Security Risks of Chatbots - Schneier on Security
96%
Security of Solid-State-Drive Encryption - Schneier on Security
93%
ID Systems Throughout the 50 States - Schneier on Security
67%
Cell Phone Security and Heads of State - Schneier on Security
99%
draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
99%
Ext4 Disk Layout - Ext4
99%
Modern Alternatives to PGP
98%
proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
98%
Real World Crypto 2019
93%
The year in post-quantum crypto
95%
Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
91%
The Case Against Quantum Computing - IEEE Spectrum
99%
Mathematics of Public Key Cryptography
81%
CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
92%
D. J. Bernstein / Talks
88%
Security in Times of Surveillance
51%
Round 1 Submissions - Post-Quantum Cryptography | CSRC
88%
Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
79%
Pitching security vs. privacy is asking the wrong question
98%
libpqcrypto: Intro
88%
Security in Times of Surveillance
74%
Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
99%
The ROBOT Attack
97%
Unity Labs Publications | Unity
92%
Mersenne Prime Discovery - 2^82589933-1 is Prime!
86%
Cloud Data Backup for Small Businesses | CrashPlan
99%
nucypher/nufhe
99%
RUB-NDS/TLS-Padding-Oracles
98%
[paper review] A faster, more efficient cryptocurrency
99%
mimoo/eureka
97%
Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
98%
Database Encryption
97%
Kerckhoffs’ principles – Why should I make my cipher public?
93%
Proxy re-encryption and FHE with NuCypher
98%
Attack of the week: searchable encryption and the ever-expanding leakage function
98%
Introducing Adiantum: Encryption for the Next Billion Users
97%
Quantum computing as a field is obvious bullshit
98%
Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
95%
Going old school: how I replaced Facebook with email
74%
» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
72%
» Agrippa (A Book of the Dead) The Digital Antiquarian
69%
» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
92%
» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
99%
.NET Design Review: GitHub Quick Reviews
98%
Tuning a Runtime for Both Productivity and Performance
85%
We didn’t see this coming
99%
Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
98%
dotnet/coreclr
99%
MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
97%
no dogma podcast - powered by FeedBurner
99%
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
99%
Software Tokens Won't Save You
99%
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1