Explore other dev related sites in this ring. If you find this idea useful click here to join.
devring.club Previous Random Next


Posts for 'encryption'

  1. 97%Thinking out loud about 2nd-gen Email – Gabriel Sieben
  2. 98%Stuff I know about ZIP | orchid.pink
  3. 98%New in .NET 8: ASP.NET Core Identity and How to Implement It
  4. 99%100 Exercises To Learn Rust
  5. 98%BashFu - Open X11 window with netcat, echo, pipes and file system
  6. 99%Localizing a .NET console or desktop application
  7. 99%Wolverine’s HTTP Model Does More For You
  8. 98%PeaZip free archiver utility, open extract RAR TAR ZIP files
  9. 97%Dancing on the Shoulders of Giants
  10. 99%using golang's crypto/aes and crypto/cipher packages
  11. 95%Disaster recovery with ZFS and zrepl
  12. 82%Proton Mail Discloses User Data Leading to Arrest in Spain
  13. 98%CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
  14. 99%Deniable Encryption
  15. 99%Conservative codomain conjecture
  16. 99%Using age with org-journal
  17. 98%Hallucination-Free RAG: Making LLMs Safe for Healthcare
  18. 97%My Home Server Journey - From Raspberry Pi to Ryzen
  19. 99%No, I don’t want to fill out your contact form
  20. 99%Deniable Encryption
  21. 86%Woodworking as an escape from the absurdity of software
  22. 99%Multi-Class Classification Using LightGBM -- Visual Studio Magazine
  23. 98%Online Cryptography Course by Dan Boneh
  24. 89%The Disappearance of Lived Time
  25. 98%Direct Preference Optimization Explained In-depth
  26. 98%1000x the telemetry at 0.01x the cost
  27. 95%the Stabilizer Problem
  28. 99%The Simplest Thing In The World: Modifing Keymaps in Wayland
  29. 91%Harry Chapin and RATM: the problem with bleeding interests
  30. 96%Anneal autopsy
  31. 98%C isn’t a Hangover; Rust isn’t a Hangover Cure
  32. 94%open letter to the NixOS foundation
  33. 95%Id30 – magnushoff.com
  34. 99%Why you shouldn't run a BSD on a PC
  35. 70%Why Everything is Becoming a Game
  36. 96%10x Engineers vs -10x Burdens
  37. 99%GoFetch: Will people ever learn?
  38. 97%How do electronic passports work? | Burak Can's Blog
  39. 99%Basic Things Mar 22, 2024
  40. 98%Diffusion Models for Video Generation
  41. 95%I launched a new startup and shut it down in two weeks - Andrew Miracle
  42. 98%Big Integer in Zig
  43. 75%#ChatControl: EU ministers want to exempt themselves
  44. 98%Is Attention All You Need?
  45. 99%PuTTY vulnerability vuln-p521-bias
  46. 90%The Making of Side 7 | GUNDAM EVOLUTION Private Server Project
  47. 98%Building a GPS Receiver, Part 1: Hearing Whispers
  48. 99%Responses to Rabble on ActivityPub
  49. 99%My useless philosophical ramblings about the ecology of programming languages (and OOP is not Java)
  50. 98%Kaspersky analysis of the backdoor in XZ
  51. 94%Common pitfalls of digital health startups & advice on how to avoid them
  52. 96%Our Response to Hashicorp's Cease and Desist Letter | OpenTofu
  53. 99%Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
  54. 99%Extracting curve coordinates from a bitmap
  55. 92%Habitually - I’ve Been Tracking Everything in My Life for A Year
  56. 97%How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
  57. 99%What it’s like to run HTMX in Production
  58. 99%Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
  59. 99%smeso - MIPS stacktrace: an unexpected journey
  60. 99%How to securely reverse-proxy ASP.NET Core web apps
  61. 98%'If this one guy got hit by a bus, the world's software would fall apart.'
  62. 99%Generative transformer from first principles in Julia - Lior Sinai
  63. 98%OpenBSD 7.5
  64. 98%LLM Task-Specific Evals that Do & Don't Work
  65. 98%Performance insights: Engineering for high performance
  66. 98%XZ Backdoor: Not the End of Open Source
  67. 96%What we know about the xz Utils backdoor that almost infected the world
  68. 99%LLaMA Now Goes Faster on CPUs
  69. 96%Refurb weekend: Data General/One (and the worst LCD in the world)
  70. 96%Mental Health in Software Engineering
  71. 95%Filippo Valsorda (@filippo.abyssdomain.expert)
  72. 71%Solving the “Are You a Millionaire?” Problem with ZK certificates
  73. 99%Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
  74. 99%Malicious email .ics attachments
  75. 97%Sealed: Custom Wax Seal NFC Tags
  76. 83%My 12 Favorite Problems
  77. 99%Roll your own ZFS NAS
  78. 99%Knee Deep in tree-sitter Queries
  79. 99%A better jittering approach for discretization acknowledgment in density estimation
  80. 98%The Linux Desktop Is Finally Great (both Ubuntu and Firefox)
  81. 96%IP Geolocation Is Twenty-Five Years Old
  82. 96%How I Built a Bootstrapped Consulting Company: From Zero To 60k€ Revenue
  83. 93%All the fallacies in the world
  84. 99%Functional foundations ⚙️
  85. 99%Securing WebSocket Channels in Local Development: A Guide with Soketi and Laravel Valet - AhmadYousefDev
  86. 99%Conversational Spaced Repetition | David Bieber
  87. 98%Building For Builders - deven.codes
  88. 96%Cloning a laptop over NVME TCP
  89. 99%Plugin Architecture in C# for Improved Software Design
  90. 98%C and C++ Prioritize Performance over Correctness
  91. 97%ZK Taipei #5: ZK Day · Luma
  92. 99%S06E12 - nanoFramework: Unleashing the Power of C# in Embedded Systems and IoT with José Simões
  93. 99%Make your own E-Mail server - FreeBSD, OpenSMTPD, Rspamd and Dovecot included - Part 1
  94. 82%Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
  95. 95%The Pile
  96. 99%Parallel Zero-knowledge Virtual Machine
  97. 99%Azure Cosmos DB — Getting Started and Creating a NoSQL Database
  98. 97%An Overview Of Quantum Computing's Possible Impact On Cryptography
  99. 98%The Case Against Geometric Algebra
  100. 99%Ente - Private cloud for your photos, videos and more
  101. 95%List of 2024 Leap Day Bugs
  102. 61%CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
  103. 98%GitHub - microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
  104. 87%How law firms and corporations are dealing with USPTO’s non-DOCX penalty
  105. 99%Why I use Firefox
  106. 66%Nintendo is suing the creators of Switch emulator Yuzu
  107. 99%Gemini server for 0ut3r.space
  108. 99%Writing is hard, so I got help
  109. 90%The Effect Existence, Its Magnitude, and the Goals
  110. 81%GitHub - zksecurity/zkBank: zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!
  111. 98%Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault – Tore Nestenius
  112. 99%ARCHITECTURE.md
  113. 99%ESP32 based voice assistant with wake word – Tristam
  114. 94%OK-Robot: What Really Matters in Integrating Open-Knowledge Models for Robotics
  115. 97%After 14 years in the industry, I still find programming difficult
  116. 98%The Billion Row Challenge (1BRC) - Step-by-step from 71s to 1.7s
  117. 87%ZK Mini Summit · Luma
  118. 92%What is Scrum and is Scrum good for startups? — todo.space blog
  119. 95%Large Language Models Are Drunk at the Wheel
  120. 99%Atuin - Magical Shell History
  121. 98%Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
  122. 97%Open Source: Current State and Future Hopes
  123. 99%Using Azure Key Vault for signing and encrypting JSON Web Tokens
  124. 98%Introducing Safecat
  125. 83%How Google is killing independent sites like ours - HouseFresh
  126. 80%Diseconomies of scale in fraud, spam, support, and moderation
  127. 99%Share a private key without using passwords
  128. 87%Plus and Times Set Free
  129. 86%AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
  130. 89%Tech Support Stories Part 2
  131. 99%How I did the layout for my self-published book
  132. 72%Climbing out of the rabbit hole
  133. 99%E2EE on the web: is the web really that bad?
  134. 98%varoa.net | Galo Navarro
  135. 87%A love letter to the Internet
  136. 98%Synthetic Data for Finetuning: Distillation and Self-Improvement
  137. 99%Secure Yo Self
  138. 82%European Court of Human Rights bans weakening of secure end-to-endencryption - the end of EU‘s chat control CSAR mass surveillance plans?
  139. 98%Engineering Practices for LLM Application Development
  140. 99%I worry our Copilot is leaving some passengers behind
  141. 99%Sign and Verify Messages with HMAC Using the Web Crypto API
  142. 98%Lunar reflections during SLIM landing – Daniel Estévez
  143. 99%Episode 485 - Copilot for Azure
  144. 68%Ransomware Hit $1 Billion in 2023
  145. 99%'Prompt Engineering' Jokes Abound when GitHub Asks Devs for Tips -- Visual Studio Magazine
  146. 99%How to Get the Number of Files in a Folder With C# - Code Maze
  147. 98%.NET Rocks! gRPC Update with Irina Scurtu
  148. 99%How to Use Dapper in Your .NET Projects
  149. 99%From Zero to .NET MAUI: Seeking One Codebase to Run Everywhere -- Visual Studio Magazine
  150. 98%Reverse engineering Skylanders' Toys-to-life mechanics
  151. 97%The Noise Protocol Framework
  152. 99%(Mis)estimation – why estimation does not work
  153. 98%Introducing Citrea: Bitcoin’s First ZK Rollup
  154. 82%Finding New Mountains to Climb
  155. 99%Tools and Best Practices for Secret Management in .NET - Code Maze
  156. 99%Hacking a Smart Home Device
  157. 97%Remaking the app store — Benedict Evans
  158. 88%Issue 46: Is Being Well Read Actually a Thing? Pt III: The Well-Read Archetypes
  159. 76%A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
  160. 99%Infrastructure: From Zero to Enterprise
  161. 98%Reverse-engineering the Synacor Challenge
  162. 99%Embracing Functional Programming in C#
  163. 82%Your Security Program Is Shit
  164. 83%The end of my childhood
  165. 99%The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
  166. 97%I think Notion Calendar is brilliant. Not the features, though. - Tuấn Mon
  167. 99%Snowpipe Streaming Deep Dive
  168. 99%Self-hosted media center
  169. 98%Playing with Nom and parser combinators
  170. 99%Error categories and category errors
  171. 99%Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
  172. 99%Crypto is not cryptocurrency
  173. 96%Unleashing the Cloud: A Historical Odyssey of Cloud Storage
  174. 99%Rclone syncs your files to cloud storage
  175. 95%What I Learned from Indie Consulting - jxnl.co
  176. 99%Ruby on Rails load testing habits
  177. 99%zkBitcoin: Zero-Knowledge Applications for Bitcoin
  178. 99%GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  179. 71%2023 letter | Dan Wang
  180. 98%Corax, Lucene, Benchmarks and lies!
  181. 99%The ZK update conflict issue in multi-user applications
  182. 99%Zero-knowledge proofs in stateful applications
  183. 99%Public Key Encryption with the JavaScript Web Crypto API
  184. 94%Being Intentional in 2024
  185. 99%zero-knowledge proof apps on Bitcoin
  186. 98%Improving ASP.NET Core Security By Putting Your Cookies On A Diet – Tore Nestenius
  187. 99%Learn to code. Or don’t.
  188. 98%There is still cool stuff on the internet
  189. 99%Ceph: A Journey to 1 TiB/s - Ceph
  190. 99%GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  191. 99%Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
  192. 99%RSA is deceptively simple (and fun)
  193. 95%OpenAI drops ban on military tools to partner with the Pentagon | Semafor
  194. 99%Postgres password encryption without leaking credentials
  195. 99%NixOS on Hetzner Dedicated - mhu.dev
  196. 99%Exploring .NET frozen segments
  197. 99%asmBB Forum "What is AsmBB?"
  198. 91%The Slow Frontier of Genetic Choice
  199. 95%What's out there for ECDSA threshold signatures
  200. 99%</> htmx ~ Is htmx Just Another JavaScript Framework?
  201. 99%The ZK update conflict issue in multi-user applications
  202. 99%JSON Web Tokens are actually great, just not for sessions
  203. 78%Outlook is Microsoft’s new data collection service | Proton
  204. 97%Binius: a Hardware-Optimized SNARK
  205. 98%Language Modeling Reading List (to Start Your Paper Club)
  206. 91%Gmail And Yahoo Inbox Updates & What They Mean For Senders | Mailgun
  207. 99%Released: Security updates for Microsoft.Data.SqlClient and System.Data.SqlClient
  208. 96%Tokenization, or How I Learned to Stop Worrying and Love the Vault
  209. 98%What Is Linux Mobile
  210. 99%Nino
  211. 98%1BRC in .NET · gunnarmorling/1brc · Discussion #44
  212. 98%Questionable Advice: “My boss says we don’t need any engineering managers. Is he right?”
  213. 96%Artificial Knowledge Creation
  214. 92%RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
  215. 99%Hacking a CTF: Do not use ECB mode for encryption
  216. 99%How to Speak the Language of the Internet: A Introduction to the Most Common Network Protocols
  217. 98%Major performance (I/O?) issue in /mnt/* and in ~ (home) · Issue #873 · microsoft/WSL
  218. 69%Mozilla CEO wants business to pick up the pace
  219. 92%Trustlessness and the left
  220. 99%Aleo completes security audits of snarkOS & snarkVM
  221. 99%How to Format a String as Base64 in CSharp – Beginner’s Guide
  222. 93%Compiling Success: My Aspirations for a Transformative Year Ahead - Chris Woodruff's Blog
  223. 95%How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT
  224. 99%The Art of HPC
  225. 98%Linux Boomers
  226. 82%What if I paid for all my free software?
  227. 99%EP 38 : How to use Guard Clauses in C#
  228. 83%"Attention", "Transformers", in Neural Network "Large Language Models"
  229. 97%Update in Thrussh: the SSH Terrapin attack
  230. 98%Don’t Believe Your Eyes - A WhatsApp Clickjacking Vulnerability
  231. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  232. 96%Beeper - Moving Forward
  233. 99%Announcing the Aleo Foundation
  234. 99%New capabilities help simplify and streamline the experience with Microsoft Dev Box
  235. 97%Empirically sup code review best practices
  236. 95%Steering at the Frontier: Extending the Power of Prompting - Microsoft Research
  237. 98%ZFS Profiling on Arch Linux | Bin Wang
  238. 98%Announcing the first Arecibo release
  239. 99%How to Get an Access Token from HttpContext in ASP.NET Core
  240. 99%Kubernetes v1.29: Mandala
  241. 96%Adopting Rust: the missing playbook for managers and CTOs - Mainmatter
  242. 98%Architecting Observability in a Cloud-Native World With eBPF
  243. 98%Demystifying OpenID Connect’s State and Nonce Parameters in ASP.NET Core – Tore Nestenius
  244. 96%Good Docs Take Great Effort
  245. 99%GNU ASCII armor: send encrypted data in plain text
  246. 99%Beeper Mini Is Back
  247. 97%RFC 9330: Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture
  248. 97%6 lessons from building 6 projects, while nomading for 6 months - Dmitry Kudryavtsev
  249. 99%zkLogin | Sui Documentation
  250. 99%GitHub - openbao/openbao at development
  251. 97%Why Team Leaders Give Up
  252. 99%💸 Sending a file in 2017 | Zack Scholl
  253. 98%iMessage, explained
  254. 98%Beeper Mini - iMessage on Android
  255. 99%bips/bip-0341.mediawiki at master · bitcoin/bips
  256. 99%I Hacked Magic the Gathering: Arena for a 100% Winrate
  257. 99%Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
  258. 99%I Started With Nix, NixOS, Home Manager and Flakes
  259. 99%Monocypher 4: The Clean Break
  260. 96%Remote collaboration fuses fewer breakthrough ideas? Probably not.
  261. 55%EP rejects mass scanning of private messages - European Digital Rights (EDRi)
  262. 64%Y Combinator's Future in the Software Slowdown
  263. 96%I got top 20 on my first product hunt launch by doing a homework assignment
  264. 97%How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
  265. 99%Restic Backups on Backblaze B2 with NixOS
  266. 98%Exploring Generative AI
  267. 97%My Personal Data Backup Pipeline – Justin Paulin
  268. 98%Matrix vs. XMPP | Luke's Webpage
  269. 94%My techno-optimism
  270. 99%Demystifying Web Push Notifications
  271. 99%Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
  272. 88%Communication Ministry studying report of IndiHome data leak - ANTARA News
  273. 99%Discover the Magic of .NET 8 and Beyond!
  274. 98%Docker Security Principles Overview - Simple Talk
  275. 99%Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
  276. 94%Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
  277. 94%“Shift left”—wtf does it mean?
  278. 99%Sqids (formerly Hashids) · Generate Short IDs from Numbers
  279. 82%The Bond villain compliance strategy
  280. 96%All that Infocom interpreter code
  281. 98%Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
  282. 99%How STARKs work if you don't care about FRI
  283. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  284. 99%Things Programmers Can Do in One Week | Blog | build-your-own.org
  285. 98%What Is Refactoring And Understanding Why You Need It
  286. 95%Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
  287. 99%Back up your Bitwarden vault in a future-proof and secure way
  288. 99%Exploring macOS private frameworks
  289. 98%Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
  290. 97%Things Programmers Can Do in One Week | Blog | build-your-own.org
  291. 99%ConcurrentStack in C# - Code Maze
  292. 80%Cryptographers Solve Decades-Old Privacy Problem
  293. 98%Sunbird Security Isn’t Nothing
  294. 97%Sunbird / ‘Nothing Chats’ is Not Secure.
  295. 98%All of the writing I did in a week as a software engineer
  296. 96%Every software is messy and has skeletons
  297. 90%Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
  298. 99%Mainframe and midrange modernization - Azure Logic Apps
  299. 98%Built a bunch of apps, here's what I learned
  300. 99%Privacy is Priceless, but Signal is Expensive
  301. 99%Fiat-Shamir security of FRI and related SNARKs — Part 1
  302. 97%The OSI Model Revisited
  303. 99%Making a nice API of Amtrak's ugly API
  304. 99%Data-as-a-Product: the keystone of the data-mesh
  305. 98%Is the Reversal Curse Real?
  306. 96%CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
  307. 94%Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
  308. 99% Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
  309. 98%Read the docs like a book - Aaron Francis
  310. 97%Building an occupancy sensor with an ESP32 and a serverless DB
  311. 98%OpenAI Platform
  312. 99%Data Oriented Blogging
  313. 99%An important step towards secure and interoperable messaging
  314. 94%Blockchains and the Future of AI
  315. 93%Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
  316. 79%Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
  317. 97%A clarification on the multithreading constraints of the Encrypt­Message function - The Old New Thing
  318. 76%Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
  319. 95%Article 45 Will Roll Back Web Security by 12 Years
  320. 92%Seeing like a Bank
  321. 99%Live Coding a containerized web app for event management
  322. 99%Social Networking
  323. 99%GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
  324. 73%Why I Ran Away from Philosophy Because of Sam Bankman-Fried
  325. 90%Getting our focus back
  326. 88%Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
  327. 91%Mechanistic interpretability of LLM analogy-making
  328. 98%Giopler | Easy C++ Profile Debug Trace
  329. 95%Why I Am a Pluralist
  330. 98%How To Rob a Bank
  331. 92%General Knowledge Poker — Drawn In Perspective
  332. 97%An Open Letter to Cryptographers: Please Work Together
  333. 99%.NET 8 Top 10 New Features - NDepend Blog
  334. 96%Lifespan extension: separating fact from fiction
  335. 92%Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
  336. 99%Azure: the cloud platform that is changing the world
  337. 99%From CSS madness to CSS Hooks
  338. 99%An Analysis of Signal's PQXDH
  339. 65%A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
  340. 98%Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
  341. 98%Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
  342. 88%Hampton Blog
  343. 95%How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
  344. 99%GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
  345. 98%Nobody knows what a good password looks like
  346. 99%SQL Server Security Primer - Simple Talk
  347. 91%Encrypt. Now. — blog.tripu.info
  348. 99%Creating a Variable Color Font From Scratch
  349. 99%Memory alignment of doubles in C#
  350. 98%Security: The Impact of Time
  351. 98%SSH Hardening with ssh-audit
  352. 99%Intercepting Allocations with the Global Allocator
  353. 99%GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
  354. 98%Massive input and/or spaced repetition
  355. 98%LSP could have been better
  356. 94%Radical Energy Abundance
  357. 95%How I built a MVP in 14 hours
  358. 91%Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
  359. 99%Polylang – Polylang by Polybase Labs
  360. 99%Strikeout (ꓘ) Blog - Security Researcher
  361. 98%How to Perform Case-Insensitive Substring Search in C#
  362. 97%Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
  363. 99%Building an Anomaly Detection System with Recurrent Neural Networks
  364. 99%A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
  365. 99%Observing OSIRIS-REx during the capsule reentry – Daniel Estévez
  366. 99%How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
  367. 98%Understand Linear regression through many facets
  368. 96%Store ssh keys inside the TPM: ssh-tpm-agent
  369. 99%Why HTTP/3 is eating the world | APNIC Blog
  370. 99%Converting a Hexadecimal String to a Byte Array in C# - Code Maze
  371. 91%Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
  372. 99%Security Tradeoffs: Privacy
  373. 99%How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
  374. 99%I don't want to know IPs: encryption in TORRENTDYNE
  375. 99%A journey into zero-knowledge proofs
  376. 96%Reclaim Successfully Passed the ZK Circuit Security Audit
  377. 99%Buy wisely
  378. 98%Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
  379. 98%Public report of Reclaim protocol's ChaCha20 circuit
  380. 99%Free Open source disk encryption with strong security for the Paranoid
  381. 97%Mozilla and the burning need for clients for power users
  382. 97%Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
  383. 98%zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
  384. 98%Security in the cloud: Whose responsibility is it?
  385. 98%Finding Bathroom Faucets with Embeddings
  386. 97%On the future of cloud services and BYOC — Jack Vanlightly
  387. 98%Binding Sigmas in Circuits for Fast Curve Operations
  388. 99%Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
  389. 91%t3chn0tix - Your Source for the Latest Tech News
  390. 98%Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
  391. 99%Nintendo 3DS Architecture | A Practical Analysis
  392. 97%Signal Messenger: Speak Freely
  393. 98%S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
  394. 98%What link previews leak | aaron blog
  395. 98%Matrix 2.0: The Future of Matrix
  396. 93%Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users 
  397. 98%64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
  398. 99%Inside New Query Engine of MongoDB
  399. 99%Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
  400. 99%Quantum Resistance and the Signal Protocol
  401. 98%Exploring Generative AI
  402. 99%ESXi on SolidRun V3000
  403. 95%SimulaVR
  404. 98%Exploring The Halo 1 System Link Protocol
  405. 83%Nuclear Propulsion | Charles Pellegrino
  406. 68%How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
  407. 98%Book notes & reflections: An Elegant Puzzle
  408. 90%Mario Zechner (@badlogic@mastodon.gamedev.place)
  409. 91%ZK Security meetup with the Succinct Labs folks! · Luma
  410. 99%Kopia
  411. 97%Dymocks - Customer Notices
  412. 97%Onboarding Made Simple with zkLogin
  413. 99%Role Of Algorithms
  414. 99%Getting to Know Dapr with Mark Fussell and Yaron Schneider
  415. 99%Techniques for Checking Floating-Point Equality in C# - Code Maze
  416. 99%GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
  417. 98%How AES Is Implemented
  418. 91%Notes on Self-hosted Transactional Email
  419. 99%The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
  420. 99%GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
  421. 98%Learn the Basics of HTTP Web API - Coding Sonata
  422. 96%why not matrix?
  423. 99%How to Use Basic Authentication With HttpClient? - Code Maze
  424. 99%Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
  425. 97%Designing a 3D Printed Toy for My Son
  426. 91%A (Post-Pandemic) World Without Email
  427. 99%Mullvad on Tailscale: Privately browse the web
  428. 93%Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
  429. 93%The future headwinds
  430. 99%Dunghill Anti-Pattern - Why utility classes and modules smell?
  431. 99%How to Write a Secure JWT Library If You Absolutely Must
  432. 96%Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
  433. 83%U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
  434. 98%The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
  435. 99%Android 14 blocks all modification of system certificates, even as root
  436. 99%Deploying a Dapr Sidecar to Azure Container Instances
  437. 98%What 0 to 6 Months of Photography Has Taught Me
  438. 98%Support for custom headers for handshake · Issue #16 · whatwg/websockets
  439. 82%Introducing our summer '23 research seminars
  440. 93%Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
  441. 98%Explaining The Postgres Meme
  442. 99%Wii Architecture | A Practical Analysis
  443. 92%Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  444. 97%The History of Data with Ted Neward
  445. 99%End-to-end encryption with Proton Mail
  446. 92%Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  447. 89%Listen to us on zeroknowledge.fm
  448. 99%Measuring Unicode String Lengths with C#
  449. 98%Choosing Apache Kafka For A New Project – A Questionnaire
  450. 99%Automata Part 1: Understanding Position Automata
  451. 98%BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
  452. 87%Zero-Knowledge Proof Research | Berkeley RDI
  453. 98%Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
  454. 97%Vacation Study Ideas
  455. 99%How to debug linux kernel API (syscalls issues)?
  456. 91%The Tale of a Corrupt Backup
  457. 98%Introducing ChatGPT Enterprise
  458. 99%Demodulation of the 5G NR downlink – Daniel Estévez
  459. 98%Cool & Unique Cryptography Features for Modern Sui DApps
  460. 87%You Should Be Working On Hardware
  461. 96%Blockchain Applications Stanford Summit
  462. 99%You like Circom but you find it confusing? Introducing Circomscribe
  463. 99%Detecting boomerang values in zero-knowledge circuits using tag analysis
  464. 88%Fiat-Shamir Security of FRI and Related SNARKs
  465. 99%How SNARKs fall short for FHE
  466. 91%Getting our focus back
  467. 98%Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
  468. 95%Delendum-SBC Research Meetup
  469. 85%Penumbra Security Audits Q3 2023
  470. 99%Ergaster - Syncing Notes with Obsidian
  471. 95%Max Goodhart (@chromakode@mastodon.social)
  472. 99%Raspberry Pi x OpenWRT Travel Router – Tristam
  473. 99%Unlocking Discord Nitro Features for Free
  474. 99%Storing passkeys in password managers is okay, actually
  475. 97%Backing Up Personal Files with rclone
  476. 98%Exploring Generative AI
  477. 98%Exploring Generative AI
  478. 96%About GitHub Copilot for Individuals - GitHub Docs
  479. 99%Breaking The Mutant Language's "Encryption"
  480. 99%How Surround Sound for Headphones Works
  481. 99%Understanding Lasso and Jolt, from theory to code
  482. 89%North Korean Hackers Suspected in New Wave of Malicious npm Packages
  483. 98%Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
  484. 98%How the Nintendo Wii Security Was Defeated
  485. 99%Short session expiration does not help security
  486. 53%EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
  487. 99%Unity 4D #2: Extending Unity to 4D - Alan Zucconi
  488. 99%Bare Metal Space Invaders
  489. 99%The BEST Moq Alternatives: NSubstitute vs FakeItEasy
  490. 95%Self-Discipline Examples That Don't Suck
  491. 97%Software Engineering at Google
  492. 99%Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
  493. 99%Azure Storage Account: Best Practices for Efficient and Secure Storage
  494. 91%Chris James - Practical ways to shift QA left
  495. 86%Reflections on Ten Years Past the Snowden Revelations
  496. 90%Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
  497. 97%State-Issued Identifiers aren’t generally good passwords
  498. 98%Tailscale vs. Narrowlink | Narrowlink
  499. 99%GitHub - id-Software/quake2-rerelease-dll
  500. 95%Do Machine Learning Models Memorize or Generalize?
  501. 97%Introducing per hostname TLS settings — security fit to your needs
  502. 95%Android 14 introduces first-of-its-kind cellular connectivity security features
  503. 99%Removing Randomness with LLDB
  504. 93%Everyday Scientist » Replace Peer Review with “Peer Replication”
  505. 99%Verifiable encryption on the Blockchain
  506. 88%My experience at the k-space hackerspace hackathon
  507. 98%Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
  508. 98%Patterns for Building LLM-based Systems & Products
  509. 99%The Worst API Ever Made
  510. 86%Shamir Secret Sharing
  511. 94%I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
  512. 87%Why do consultants invent words?
  513. 99%Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
  514. 55%The U.K. Government Is Very Close To Eroding Encryption Worldwide 
  515. 58%Worldcoin isn’t as bad as it sounds: It’s worse
  516. 99%Introducing GitHub Copilot X
  517. 92%Where are all the women?
  518. 97%The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
  519. 97%What We Know About LLMs (Primer)
  520. 98%Pre 2013 Data Breach - Forum Thread
  521. 98%How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
  522. 99%RSA
  523. 99%Sharing encrypted data over short-form mediums
  524. 95%Attention Is Off By One
  525. 98%Zenbleed
  526. 99%Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  527. 96%Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
  528. 99%Plane - The open source project management tool
  529. 97%What does a CTO actually do?
  530. 99%What Happened to Dolphin on Steam?
  531. 98%1 Introduction · Real-World Cryptography
  532. 96%Best crypto blog posts of 2017
  533. 98%Why Frustum Culling Matters, and Why It's Not Important
  534. 99%Tutorial 1: Hello World | Mina Documentation
  535. 75%ZK Security X Delendum (farewell SBC) · Luma
  536. 95%Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
  537. 98%Sharing code between Deno and Node where Bun and ts-node failed
  538. 98%Distributed Trust with Service-to-Service Authentication
  539. 97%Why the “Null” Lifetime Does Not Exist
  540. 99%Store age identities inside the TPM: age-plugin-tpm
  541. 99%Setting up PostgreSQL with Ansible
  542. 98%I don't know how I feel about email
  543. 99%Bypassing Internet Censorship Using SSH
  544. 97%An Alternative Approach to Deep Tech VC
  545. 98%Jeremy Mikkola - What makes developers productive?
  546. 99%Fun with DNS TXT Records
  547. 99%PhpMyAdmin and Azure Database for MySQL server
  548. 83%Living Life as a B- Student
  549. 86%ZK Security meetup @ Lightspeed · Luma
  550. 99%Episode 467 - OneStream's plans for becoming more cloud native on Azure
  551. 98%17 misconceptions about SNARKs (and why they hold us back)
  552. 98%Cycles of curves: what are they and do we need them?
  553. 97%Regex Isn't Hard - Tim Kellogg
  554. 99%Put a Pin on That
  555. 99%Hacking LangChain For Fun and Profit - I
  556. 99%Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
  557. 99%How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
  558. 99%Experiments with eBPF: Snitchrs
  559. 98%A slack clone in 5 lines of bash
  560. 99%GitHub - zksecurity/noname: Noname: a programming language to write zkapps
  561. 99%The zero-knowledge attack of the year might just have happened, or how Nova got broken
  562. 99%bips/bip-0042.mediawiki at master · bitcoin/bips
  563. 98%Exploring how Magic Link works
  564. 94%VerusCoin, Everything that Ethereum Isn’t
  565. 95%Running on a high-speed rail
  566. 99%Backend development is more than writing endpoints for frontend
  567. 81%Alpha
  568. 99%Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  569. 99%How to do templates properly
  570. 99%Getting Started with API Management: A Beginner's Guide for Developers
  571. 98%Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
  572. 99%Open at Microsoft: Dapr
  573. 98%Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
  574. 98%Blocking, covariate adjustment and optimal experiment design - Emir's blog
  575. 98%Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
  576. 97%My journey into Microsoft – Unstructed.tech
  577. 99%Using encryption to verify a license key
  578. 97%Red-Teaming Explained: How does it reduce toxicity in LLMs?
  579. 99%Based-30b
  580. 98%You don't take enough risks to be lucky
  581. 99%How (not) to compare 2D scatter plots
  582. 99%How to deploy your deep learning side project on a budget
  583. 99%The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
  584. 98%Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
  585. 99%Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
  586. 97%Interesting links of the week 2023-24 (#76)
  587. 99%Announcing .NET 8 Preview 5 - .NET Blog
  588. 95%Introducing the defensive statistics | Andrey Akinshin
  589. 99%Latest Updates for Azure App Service Presented at Microsoft Build 2023
  590. 99%Casey Reeves (@xogium@tech.lgbt)
  591. 99%/home/halosghost/blog
  592. 98%Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
  593. 97%Memory Management in DBMS
  594. 99%Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
  595. 77%Understanding the Tech Right
  596. 97%Stages of Survival
  597. 99%ZK app developers should be able to see down to the constraints
  598. 99%zkSecurity
  599. 99%Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
  600. 98%Generating income from open source
  601. 99%ZK programmability adds a whole new layer to worry about
  602. 99%Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
  603. 99%Open at Microsoft - Dapr
  604. 99%The Prickly Case of JavaScript Proxies
  605. 98%Privacy Enhancing Technologies: An Introduction for Technologists
  606. 97%Private delegated computation is here, and there will be bugs!
  607. 99%Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
  608. 98%On being paid to learn
  609. 99%Using Nix with Dockerfiles
  610. 99%Building a baseline JIT for Lua automatically
  611. 99%Finding your weak spots
  612. 99%How to Use SFTP For Secure File Upload in .NET - Code Maze
  613. 99%Why we're bad at CSS
  614. 90%Free VPN Service SuperVPN Exposes 360 Million User Records
  615. 97%What's New for Azure App Service at Build 2023
  616. 99%backups (public)
  617. 97%How to get (micro) acquired?
  618. 99%Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
  619. 99%SELM: Symmetric Encryption with Language Models
  620. 99%Two Immortals
  621. 98%This Week In Security: .zip Domains, Zip Scanning
  622. 99%Malleable software in the age of LLMs
  623. 99%How to Unleash the Power of Multithreading in JavaScript with Web Workers
  624. 99%Assembling Community OS
  625. 98%Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
  626. 99%Experimenting with multi-factor encryption
  627. 96%How to Understand Abstract Art
  628. 97%transparent polynomial commitment scheme with constant opening proof size and verifier time
  629. 97%Level up your GPT game with prompt engineering - .NET Blog
  630. 99%Fast hashing, it's not that simple
  631. 98%Testing a new encrypted messaging app's extraordinary claims
  632. 99%Is .NET Still a Legitimate Technology in 2023?
  633. 98%API Security Checklist: How to Protect Your APIs
  634. 97%Savoring Complexity. Embracing the Infinite
  635. 96%PV consumption optimization – the power of software defined devices
  636. 99%Using The Decorator Design Pattern in .NET
  637. 99%Why should we read Azure Security?
  638. 93%Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
  639. 96%What is Type-Level Programming? - sulami's blog
  640. 99%How to design your first Solution Architecture Diagram?
  641. 83%Crypto: My Part In Its Downfall
  642. 96%The right to encrypt
  643. 91%Radical Incrementalism
  644. 78%Do We Still Need Journals?
  645. 99%Why is OAuth still hard in 2023? | Nango Blog
  646. 99%Dometrain - Homepage
  647. 99%Bea Stollnitz - How GPT models work
  648. 99%The Most Annoying Math Problem
  649. 97%SLP: a new DDoS amplification vector in the wild
  650. 99%Local license key verification - Theory
  651. 84%Internexit?
  652. 99%The Importance of TLS with SQL Server
  653. 98%Playing devil's advocate on claims made in VPN adverts
  654. 96%Why I joined Cloudflare as Chief Security Officer
  655. 99%Current Issues With The Qt Project - From The Outside Looking In
  656. 98%Get your app to Mars!
  657. 99%Message-Driven Architecture: Promoting Efficient and Scalable Communication
  658. 98%mjg59 | PSA: upgrade your LUKS key derivation function
  659. 89%Nintendo Switch game modding is illegal. – Gabriel Sieben
  660. 99%Hot Takes on the Modern Data Stack
  661. 98%Data Driven Detection Engineering
  662. 99%What do Solution Architects do?
  663. 98%(The Futility of) Keeping Secrets from Yourself
  664. 99%How I fix flaky tests - Code with Jason
  665. 99%5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
  666. 90%Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
  667. 94%Prompt Engineering vs. Blind Prompting
  668. 99%TLS 1.3—What is It and Why Use It?
  669. 99% Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
  670. 95%Recipes For Product Failure: Obsess Over Competitors
  671. 98%Sponge API for Field Elements
  672. 82%‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
  673. 98%Experimenting with LLMs to Research, Reflect, and Plan
  674. 98%Climate Tech Checklist
  675. 99%Rethinking Type I/II error rates
  676. 99%11 API Security Best Practices to Secure Your Business
  677. 99%My Love/Hate Relationship with Cloud Custodian
  678. 95%GPT Voyage: Part 2
  679. 80%Linux and Baikal Electronics: Why Postgres Should not Follow that Path
  680. 98%Do Less, Better (with leverage!)
  681. 98%What We Learnt Building the Largest GPT-Telegram Bot
  682. 99%If It's So Good, Why Isn't Everyone Doing It?
  683. 99%Towards a Nova-based ZK VM
  684. 92%Outperforming Warren Buffet
  685. 99%irhum.github.io - Tensor Parallelism with jax.pjit
  686. 98%I Quit Programming (or did I?)
  687. 90%I Didn't Read 17 Books So You Don't Have To 😩
  688. 96%Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
  689. 93%Unlimited Powers
  690. 98%Ben Howdle - Software Engineering Consultant and Advisor
  691. 83%Paillier's cryptosystem - Addtive homomorphic encryption
  692. 98%Paillier's cryptosystem - Addtive homomorphic encryption
  693. 98%Paillier's additively homomorphic cryptosystem
  694. 98%Paillier's cryptosystem - Addtive homomorphic encryption
  695. 98%So, You Want To Build A DBaaS
  696. 99%How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
  697. 98%Nobody’s on the ball on AGI alignment
  698. 98%ChatGPT's Plugin System Poses an Existential Risk to the Open Web
  699. 99%Synology NAS Backups with Minimal Bus Factor
  700. 99%Education - Mutable Instruments Documentation
  701. 99%Zig And Rust Mar 26, 2023
  702. 98%Sparks of Artificial General Intelligence (AGI) in GPT-4
  703. 99%Building a DOS ChatGPT client in 2023
  704. 95%The Artificial in AI - Pravesh Koirala
  705. 95%Just update rules between neurons
  706. 99%Symbolic vs Connectionist Machine Learning
  707. 98%(PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
  708. 95%Let’s Talk About TikTok - Black Hills Information Security
  709. 97%No more custom domains in Microsoft Outlook?
  710. 98%mjg59 | We need better support for SSH host certificates
  711. 97%None of Your Business - Why, I Wonder?
  712. 91%zkSummit - Zero Knowledge Summit
  713. 99%fhur
  714. 99%Notes on FFTs: for users
  715. 99%Loading RSA Keys in .NET
  716. 99% Aria: A Fast and Practical Deterministic OLTP Database
  717. 99%Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
  718. 92%Head of Marketing
  719. 98%Geometry in Text-to-Image Diffusion Models
  720. 99%Boosting password security! Pwned Passwords, zxcvbn, and more!
  721. 97%9 years of open-source database development
  722. 95%How I burnt out in FAANG, but it is not what you think
  723. 99%Is OpenBSD for you? - Marián Mižik
  724. 97%Sunsetting Aztec Connect
  725. 86%Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
  726. 88%cURL, the omnipresent data tool, is getting a 25th birthday party this month
  727. 99%QR Code Generator in Laravel 10 Tutorial
  728. 99%My Backup Strategy
  729. 98%The Kids are Not Okay
  730. 99%Tech Notes: Polymorphic shellcode
  731. 99%Announcing new security and observability features in Azure Database for PostgreSQL
  732. 98%Were We All Gaslit About Content Being King?
  733. 99%Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
  734. 98%Warnings-as-errors friction
  735. 99%I made JSON.parse() 2x faster
  736. 98%Caveat Implementor! Key Recovery Attacks on MEGA
  737. 99%TimeSpan in C# - Code Maze
  738. 98%Cryptography without Security - Cronokirby
  739. 88%Quantum computing shorts
  740. 98%zk-SNARK Concepts Explained Like You’re 15
  741. 98%Block Breakers
  742. 95%ChatGPT Explained: A Normie's Guide To How It Works
  743. 98%Use GNU Emacs The Plain Text Computing Environment
  744. 96%Digital Market Act workshop in Brussels
  745. 99%Overview | Mina Documentation
  746. 99%zkVMs are cool, but have you heard of zkCPUs?
  747. 99%How To Deploy EF Database Migrations
  748. 99%Database Cryptography Fur the Rest of Us - Dhole Moments
  749. 97%On mindsets, mind shifts and wins
  750. 91%Thief in the car
  751. 94%LattePanda V1 - my experience with a Raspberry Pi alternative
  752. 97%Zero-knowledge proof composition and recursion. Part 7: Deferred values
  753. 97%Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
  754. 98%Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
  755. 98%On Relearning to Code as an Adult
  756. 99%Zero-knowledge proof composition and recursion. Part 6: cycles of curves
  757. 99%Convert a File to a Byte Array in C# - Code Maze
  758. 98%Cryptography 101 - PHINUG Online Dev Sessions 2023.03
  759. 99%A new series of videos on zero-knowledge proof composition and recursion (part 1)
  760. 89%Real-World Cryptography, a bit more than a year later
  761. 93%87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
  762. 92%Cryptography Attacks and Defenses, Reloaded
  763. 99%Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
  764. 99%Asking ChatGPT to Design Its Next Generation, ChatGPT 2
  765. 99%Sangria: a Folding Scheme for PLONK - Geometry Research
  766. 98%Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
  767. 96%How Safe is the Cloud? What Businesses Need to Know
  768. 98%Lessons Learned from Re-rolling 60+ Production Credentials
  769. 94%Gamebert: a Game Boy emulator built by Robert | Robert Heaton
  770. 98%<div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
  771. 99%Google’s Fully Homomorphic Encryption Compiler — A Primer
  772. 99%Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
  773. 99%Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
  774. 94%CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
  775. 94%My most important email filter that helps me control my chaos
  776. 97%The Joy Of Duplexes
  777. 63%NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
  778. 99%Challenges 7-12: Implementing and breaking AES ECB
  779. 99%Contributing to open source projects and about learning zero-knowledge proofs
  780. 97%Ian Norris - Blog - Understanding the limits of large language models
  781. 99%.NET Security Headers: A Senior Developer’s Guide✨
  782. 99%Reversing UK mobile rail tickets
  783. 98%Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
  784. 99%Python’s “Disappointing” Superpowers
  785. 85%Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
  786. 97%Anker admits to lying about Eufy security camera encryption; describes future plans
  787. 99%The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  788. 99%Various Ways of Sending Mail via SMTP
  789. 83%My first recession
  790. 91%Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
  791. 98%Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
  792. 98%Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
  793. 99%Making sense of TypeScript using set theory
  794. 99%Encrypting Data in the Browser Using WebAuthn
  795. 99%Introducing Zero to Nix — Determinate Systems
  796. 98%How to debug
  797. 98%Bitwarden design flaw: Server side iterations
  798. 98%Degrees of Open Source
  799. 50%1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
  800. 99%How to Implement Google Authentication in Next with NextAuth
  801. 97%Implementing Zero Trust: A Guide to Securing Your Data
  802. 99%An incomplete guide to stealth addresses
  803. 99%Securely store secrets in Git using SOPS and Azure Key Vault
  804. 99%Breaking EA Desktop's pathetic Encryption
  805. 99%How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
  806. 99%Zero Knowledge Proofs MOOC
  807. 99%Some thoughts on the ETH's Threema Analysis
  808. 99%The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  809. 98%zkIgnite, Cohort 1 Program Overview
  810. 99%What's the deal with zkapps?
  811. 97%The PLONK zero-knowledge proof system
  812. 99%How to Secure Your .NET Application Against Common Threats
  813. 97%Terraform Industries Whitepaper 2.0
  814. 99%.NET 7 Brings Networking Improvements
  815. 99%Encrypting and Decrypting a String in C# - Code Maze
  816. 94%Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
  817. 99%Machine Learning in .NET with F# and ML.NET 2.0
  818. 98%What is Zero Trust and is it the Future of Cybersecurity?
  819. 99%ZK System Benchmarking
  820. 98%Writing a TLA⁺ tree-sitter grammar
  821. 98%Large Transformer Model Inference Optimization
  822. 99%Cryptography Implementations in .NET - Code Maze
  823. 99%MINA zkApp staking pool - HackMD
  824. 91%How I went from 0 to Hacking in SF as a high-schooler
  825. 96%Is it worth encrypting? | Matthew Linkous
  826. 99%Using client side encrypted fields in RavenDB
  827. 95%GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
  828. 99%On PBKDF2 iterations
  829. 99%Renato Athaydes
  830. 96%Debugging Architects
  831. 99%Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
  832. 99%Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
  833. 62%Ancient Apocalypse reviewed
  834. 99%Machine Learning in .NET with F# and ML.NET 2.0
  835. 99%Forming the habit of analog journaling - Why the digital format did not work for me
  836. 96%David Wong
  837. 81%Join Mina's zkIgnite, Cohort 1
  838. 99%Fast Accumulation on Streams (2018) - bkase
  839. 90%Vitalik Buterin's website
  840. 95%Raspberry Pi security alarm — the basics
  841. 98%HTTPS explained with carrier pigeons
  842. 91%RE: False Rumors on API Leaks or Exposure of our Database
  843. 98%Your Pa$$word doesn't matter
  844. 92%Lastpass Breach - Everything you need to know
  845. 97%The Matrix Holiday Update 2022 | Matrix.org
  846. 98%20 Best Cryptography Algorithms Books of All Time
  847. 99%2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
  848. 83%AI assistants help developers produce code that's insecure
  849. 99%Nix on the Steam Deck — Determinate Systems
  850. 87%LastPass users: Your info and password vault data are now in hackers’ hands
  851. 94%Notice of Recent Security Incident - The LastPass Blog
  852. 99%Password requirements: myths and madness
  853. 98%Not Getting Hacked
  854. 95%Personal backups and file archival
  855. 99%Implementing the MySQL server protocol for fun and profit
  856. 99%Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
  857. 99%Yubikeys & PKI: What Are They For? | Charlton's Blog
  858. 96%Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
  859. 94%Why Current Wormhole Research is So Important
  860. 91%Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
  861. 97%How Cloudflare advocates for a better Internet
  862. 99%Why you can’t build a web browser and why you should anyway.
  863. 92%Technical Writer
  864. 99%Real-World Cryptography
  865. 97%ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
  866. 99%Dev environments in the cloud are a half-baked solution
  867. 96%Apple iCloud, and why encrypted backup is the only issue
  868. 92%Apple advances user security with powerful new data protections
  869. 99%Installing Guix on a 10th gen Thinkpad X1 — dthompson
  870. 97%Making an RC Roomba
  871. 73%SBF is Crypto Personified
  872. 99%What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
  873. 96%Notice of Recent Security Incident - The LastPass Blog
  874. 92%Choosing your chat application
  875. 95%Be less scared of overconfidence
  876. 98%Real-World Cryptography: Wong, David + Free Shipping
  877. 99%Mutual Contact Discovery
  878. 93%[Apply by 12/08] Introducing our fellowship program
  879. 95%Autonomy, packet size, friction, fanout, and velocity
  880. 99%Episode 111 - RavenDB with Oren Eini
  881. 99%zkapp-cli
  882. 99%How I over-engineered a Fast Fourier Transform for Arduino.
  883. 99%Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
  884. 99%OpenIddict
  885. 98%Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
  886. 94%The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
  887. 95%Cloud-Native Application Security - DZone Refcardz
  888. 98%Quest for my perfect watch.
  889. 97%zero to connection string
  890. 94%4 Strategies for Dealing with Bad Code
  891. 99%Example: Oracle | Mina Documentation
  892. 99%Mina Launches zkApps Era
  893. 98%Authorization and Authentication in Minimal APIs
  894. 97%Why take and make notes
  895. 98%Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
  896. 98%S1 Ep2: Data Breaches, DNA & the Future of Privacy
  897. 98%My take on self-hosting
  898. 99%Intro to Zero-knowledge & Building zkApps w/Mina Protocol
  899. 96%Live system DD backup, with encryption and compression!
  900. 99%GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
  901. 95%Too Much Crypto
  902. 94%NSA urges orgs to use memory-safe programming languages
  903. 99%Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
  904. 99%Brave New Trusted Boot World
  905. 99%End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
  906. 95%How to contribute to Kimchi
  907. 96%Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
  908. 94%Mina zkApp Developers Meetup - San Francisco
  909. 99%Zero to App Store in 7 weeks
  910. 99%Neural Network Pruning Explained
  911. 99%Wii U Architecture | A Practical Analysis
  912. 99%0.10.0 Release Notes ⚡ The Zig Programming Language
  913. 99%Improving Git protocol security on GitHub | The GitHub Blog
  914. 99%Encrypt and Decrypt Text Values in .NET
  915. 95%Real-World Cryptography: Wong, David + Free Shipping
  916. 99%Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
  917. 98%Encryption
  918. 99%Example: Anonymous Message Board Tutorial | Mina Documentation
  919. 99%We Must Professionalize Programming to Preserve Society and Computing Freedom
  920. 96%Running a law firm on Linux - a year or so in
  921. 94%Jett Hays
  922. 97%How I built and sold a successful startup with fractional hires
  923. 98%10 essentials to mitigating API security risks | Red Hat Developer
  924. 68%In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
  925. 99%What's the deal with zkapps?
  926. 99%LiteDB - A .NET embedded NoSQL database
  927. 99%Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
  928. 96%✂️ The ideal blockchain
  929. 59%Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  930. 92%Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  931. 96%What to know about Zero Knowledge
  932. 97%Jira Pricing - Monthly and Annual Subscription Cost per User
  933. 98%Lucid Multi-Key Deputies Require Commitment
  934. 97%Let's watch videos with David - HackMD
  935. 90%Microsoft Office 365 email encryption could expose message content
  936. 98%How observability-driven development creates elite performers
  937. 89%The Rails SaaS Conference
  938. 96%Seven years in the life of Hypergiants' off-nets
  939. 99%How does the key exchange in HTTPS work?
  940. 98%Threshold ECDSA in Excessive Detail
  941. 99%Comparing Semgrep and CodeQL · Doyensec's Blog
  942. 88%E-commerce platform Bhinneka.com reported to be latest target of data theft
  943. 99%Yubikey Madness
  944. 92%Privacy is a business imperative
  945. 99%.NET R&D Digest (September, 2022)
  946. 99%Scoreboard Hacking Part 2 - Getting the AES Key
  947. 82%The Lens Of Asymmetry
  948. 98%age and Authenticated Encryption
  949. 98%Episode 107 - Unstructured Data With Kirk Marple
  950. 75%Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
  951. 99%Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
  952. 99%The many problems with implementing Single Sign-On
  953. 98%'Berkeley' Testnet Alpha Participation Guide
  954. 96%Outdated vs. Complete
  955. 98%RegEx match open tags except XHTML self-contained tags
  956. 99%the sad state of debug performance in c++
  957. 84%Aging programmer
  958. 99%Help people in Iran reconnect to Signal – a request to our community
  959. 93%06 SnarkyJS
  960. 98%How does PLONK work? Part 1: What's PLONK?
  961. 99%What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
  962. 98%0xPARC
  963. 99%Introducing LiteFS
  964. 97%How hashing and cryptography made the internet possible | Red Hat Developer
  965. 99%An Introduction to Ansible Inventory
  966. 97%IN/"juels; ari" in US Patent Collection
  967. 97%A few thoughts about Uber&#39;s breach
  968. 99%How I manage my passwords
  969. 99%FileSystemWatcher in C# - Code Maze
  970. 99%noname developer updates: structs are working!
  971. 99%35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
  972. 97%Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
  973. 84%Visual Cryptography For Physical Keyrings
  974. 99%It pays to be Circomspect
  975. 91%Ethereum activates The Merge as it shifts to proof of stake
  976. 98%A beginner’s guide to regular expressions with grep | Red Hat Developer
  977. 98%Enstil Postmortem
  978. 99%githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
  979. 98%6 Simple and Useful PostgreSQL Features that I wish I knew when I started
  980. 98%Narrative driven development
  981. 98%GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
  982. 96%Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
  983. 99%Ed25519 Deep Dive Addendum
  984. 95%learning about zero-knowledge apps and circuits using the noname educational DSL
  985. 96%Security of ZK Systems
  986. 99%An overview of Node.js: architecture, APIs, event loop, concurrency
  987. 97%Predict steel quality with Azure AutoML in manufacturing
  988. 98%On Security Against Time Traveling Adversaries
  989. 97%Someone’s Been Messing With My Subnormals!
  990. 99%Perfect Notes or My Journey to Obsidian
  991. 98%Replicant: Reproducing a Fault Injection Attack on the Trezor One
  992. 98%fxhash - Lessons Learned from Implementing "Wave Function Collapse"
  993. 98%One Year With the Framework Laptop and NixOS
  994. 97%Cloudflare named a Leader by Gartner
  995. 97%Episode 437 - Azure CXP CRE Low Code Automation
  996. 99%Formal Verification of ZK Constraint Systems
  997. 99%Top 10 skills every programmer should know
  998. 99%Implement a GRPC API with OpenIddict and the OAuth client credentials flow
  999. 96%GitHub - mimoo/noname: Noname: a programming language to write zkapps
  1000. 97%Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
  1001. 97%Security of ZK Systems
  1002. 98%Kagi status update: First three months
  1003. 98%What Every Programmer Should Know About Optical Fiber
  1004. 86%Review: The This by Adam Roberts
  1005. 99%My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
  1006. 92%We Are All Nerds: The Literary Works of Neal Stephenson
  1007. 98%Technical Evaluation of a Startup
  1008. 99%What You Should Learn Before Building a zkApp
  1009. 99%champonthis | dev/rand/lack-of-attention
  1010. 99%2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
  1011. 99%Performance isolation in a multi-tenant database environment
  1012. 98%Raytracing and Raycasting with Signed Distance Functions
  1013. 99%Cryptographic Agility and Superior Alternatives - Dhole Moments
  1014. 97%Define “better”
  1015. 92%Deep dives & how the Internet works
  1016. 93%Should You Buy an EV?
  1017. 95%Ask Cryptography
  1018. 96%“10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
  1019. 98%ASP.NET validation revisited
  1020. 98%How much customer service is too much? - Joydeep's Corner
  1021. 99%GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
  1022. 98%What is Lattice-based Cryptography?
  1023. 98%The Paper that Keeps Showing Up
  1024. 97%Understanding JSON Web Encryption (JWE)
  1025. 99%How I Learned to Stop Worrying and Love Macros
  1026. 97%Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
  1027. 96%6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
  1028. 96%How Did I Become Database Engineer at 23
  1029. 97%Workshop at SBC'22 | Tse Lab at Stanford University
  1030. 98%GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
  1031. 99%Brute Force Development · Matt Layman
  1032. 98%Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
  1033. 97%SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
  1034. 97%zkEVMs: Not a Panacea
  1035. 99%GitHub - filecoin-project/neptune: Rust Poseidon implementation.
  1036. 99%The quick and practical "MSI" hash table
  1037. 96%How does PLONK work? Part 1: What's PLONK?
  1038. 96%Module Three – ZK Whiteboard Sessions
  1039. 98%On Giving Technical Guidance to Others
  1040. 90%NSA, NIST, and post-quantum cryptography
  1041. 97%MPC In The Head Special
  1042. 97%Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
  1043. 91%NSA, NIST, and post-quantum cryptography
  1044. 99%Home Network Part 1 - DIY Home Router with NixOS
  1045. 99%Experiment with post-quantum cryptography today
  1046. 97%An intro to Open Telemetry in .NET - James World
  1047. 97%BrainSTARK, Part 0: Introduction
  1048. 94%ZK Whiteboard Sessions
  1049. 85%Post-quantum encryption contender is taken out by single-core PC and 1 hour
  1050. 96%Microsoft Previews Azure Premium SSD V2 Disk Storage
  1051. 97%Use One Big Server - Speculative Branches
  1052. 96%Document Scanner with OpenCV Using Video Footage
  1053. 98%What I'm frustrated by in crypto
  1054. 99%Recommended settings for Wi-Fi routers and access points
  1055. 88%Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
  1056. 95%The many flavors of hashing
  1057. 99%x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
  1058. 96%Total Fleet Visibility with Kolide
  1059. 99%GitHub - o1-labs/proof-systems: The proof systems used by Mina
  1060. 92%When the window is not fully open, your TCP stack is doing more than you think
  1061. 85%CFF22 trip report
  1062. 97%The dangers of Microsoft Pluton – Gabriel Sieben
  1063. 84%I quit my business to start an open-source dev tool
  1064. 97%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1065. 92%How I Hacked my Car
  1066. 99%British recycle old arguments for bypassing E2E encryption
  1067. 99%What are zkVMs? And what's the difference with a zkEVM?
  1068. 96%The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
  1069. 89%Authentication is Difficult
  1070. 90%GitHub - chip-red-pill/MicrocodeDecryptor
  1071. 98%Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
  1072. 95%The First Secret Problem
  1073. 90%Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
  1074. 88%Commercial music media, a tier list · brhfl.com
  1075. 87%I've started using Mozilla Firefox and now I can never go back to Google Chrome
  1076. 82%Mina zkApp Developers Meetup - Paris
  1077. 93%Get Compliant with Kolide
  1078. 95%GitHub - nalinbhardwaj/zordle
  1079. 91%We Need Non-Interactive Post-Quantum KEMs
  1080. 96%Checklist For Evaluating Cloud Backup Services
  1081. 99%Compiler and Composability in ZKP
  1082. 89%FizzBuzz is FizzBuzz years old (and still a powerful tool)
  1083. 98%System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
  1084. 83%Dmitry.GR: Projects
  1085. 96%AWS Summit - Virtual EMEA Recap
  1086. 96%Statements Vs. Expressions
  1087. 87%mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
  1088. 72%CS101 Introduction to Computing Principles
  1089. 91%NIST’s pleasant post-quantum surprise
  1090. 71%Introducing: the ZK Whiteboard Sessions! - ZK Podcast
  1091. 95%How to get a job in a new industry without experience | Jason Tu
  1092. 66%NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
  1093. 95%The PeerTube instance tube.hamnet.io on HAMNET
  1094. 96%The best books for cryptography apprentices
  1095. 64%Bookchor data breach of over 5 lakh users: What we know so far
  1096. 93%Advanced Dashes
  1097. 94%Why I left Android Development after 10 years and became a Backend Developer
  1098. 95%CloudFormation is Dead, Long Live Terraform
  1099. 51%Italy declares Google Analytics illegal
  1100. 98%GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
  1101. 95%Thomas H. Ptacek
  1102. 82%Huobi Global Lists Mina Protocol
  1103. 89%Undefined behavior in C is a reading error. – keeping simple
  1104. 94%MEGA: Malleable Encryption Goes Awry
  1105. 97%Introducing Tailscale SSH
  1106. 84%What I'm excited for this build cycle
  1107. 94%SnarkyJS Week 2022 - Crowdcast
  1108. 94%Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
  1109. 93%Facebook Says Apple is Too Powerful. They're Right.
  1110. 69%Join Us For the First Ever SnarkyJS Week
  1111. 90%Matrix notes - anarcat
  1112. 95%My other database is a compiler
  1113. 91%Some ways to use ZK-SNARKs for privacy
  1114. 91%Eurocrypt 2022 program
  1115. 92%The hunt for the cluster-killer Erlang bug
  1116. 98%New UUID Formats
  1117. 94%Foreword — ZK Jargon Decoder
  1118. 97%The Web PKI 2.0
  1119. 98%Hands-on: X25519 Key Exchange
  1120. 90%Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
  1121. 87%In defense of crypto(currency)
  1122. 84%HTTP/3 becomes a standard, at last
  1123. 88%On BFT Consensus Evolution: From Monolithic to DAG
  1124. 99%GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
  1125. 90%What Makes a Good Research Proposal?
  1126. 97%What's OpenIddict?
  1127. 73%A new portal for Project Galileo participants
  1128. 98%GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
  1129. 97%Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
  1130. 96%HTTP/3 From A To Z: Core Concepts — Smashing Magazine
  1131. 92%RFC 9113: HTTP/2
  1132. 62%This is not normal
  1133. 88%How Effective Abstractions Are Opinionated | 8th Light
  1134. 90%Cloudflare observations of Confluence zero day (CVE-2022-26134)
  1135. 97%Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
  1136. 80%Zero-Day Exploitation of Atlassian Confluence | Volexity
  1137. 96%A concise summary of amazing and great ideas · johnpfeiffer
  1138. 68%Countering the Crypto Lobbyists
  1139. 94%A Gentle(-ish) Introduction to Worst-Case Optimal Joins
  1140. 91%Why Seafile is unique among file sync solutions
  1141. 98%Security in MySQL: Part Two - Simple Talk
  1142. 98%Welcoming Rocket.Chat to Matrix! | Matrix.org
  1143. 93%Losing your cookies
  1144. 98%Using WebTransport
  1145. 92%Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
  1146. 83%Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
  1147. 90%Cloudflare’s approach to handling BMC vulnerabilities
  1148. 94%PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
  1149. 99%A Kernel Hacker Meets Fuchsia OS
  1150. 87%The power of tech debt
  1151. 79%Patch: Zoom chat messages can infect devices with malware
  1152. 99%Create AWS resources with Kubernetes and Operators | Red Hat Developer
  1153. 99%Preliminary Learning ON Kimchi: PLONK
  1154. 85%Cryptology ePrint Archive: Report 2022/621
  1155. 83%Site Reliability Engineering – Monitoring Distributed Systems
  1156. 70%RustDesk | Open source remote desktop software
  1157. 88%Why wireguard is NOT safe, and you should NOT use it.
  1158. 97%Automating Well-Architected Principles
  1159. 85%Features of the Windows Process Activation Service (WAS)
  1160. 93%50 shades of .NET on AWS
  1161. 91%Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
  1162. 95%Monitoring our monitoring: how we validate our Prometheus alert rules
  1163. 92%Laurence Tratt: Static Integer Types
  1164. 98%Quick comparison of pricing of Simple Storage Services
  1165. 98%‎KDE Connect
  1166. 99%25 Gbit/s HTTP and HTTPS download speeds
  1167. 90%Some Cryptography Books I Like
  1168. 99%Introducing Lurk: A programming language for recursive zk-SNARKs
  1169. 86%Laptopia
  1170. 97%Support for custom headers for handshake · Issue #16 · whatwg/websockets
  1171. 94%Practical bruteforce of AES-1024 military grade encryption
  1172. 90%Announcing Pub/Sub: Programmable MQTT-based Messaging
  1173. 58%European Commission prefers breaking privacy to protecting kids
  1174. 98%A Beginner's Guide to Application Security
  1175. 82%Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
  1176. 96%Cryptology ePrint Archive: Report 2022/566
  1177. 98%GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
  1178. 92%Cryptology ePrint Archive: Report 2016/163
  1179. 99%Building a Stack Overflow browser as a VS extension
  1180. 94%Fitting Everything Together
  1181. 66%Patenting Your Perpetual Motion Machine
  1182. 95%Multiplying polynomials with Fast Fourier Transform
  1183. 94%The Two Generals Problem
  1184. 97%Topographical Maps in Unity: Edge Detection - Alan Zucconi
  1185. 97%Themes from Real World Crypto 2022
  1186. 71%When Negotiating a Price, Never Bid with a Round Number
  1187. 95%Darlings of the self-hosted, open-source world
  1188. 88%Learn to code. Or don't.
  1189. 99%Implementing a ZK-focused authenticated-encryption scheme
  1190. 99%What's two-adicity?
  1191. 98%Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
  1192. 92%Announcing Bolt & Forte partnership
  1193. 91%Explaining Yao's Garbled Circuits - Cronokirby
  1194. 95%Why the fediverse is stuck.
  1195. 89%Seeking good work-life balance and avoiding burnout
  1196. 97%A File Format to Aid in Security Vulnerability Disclosure
  1197. 94%Lies we tell ourselves to keep using Golang
  1198. 90%Real World Cryptography Conference 2022
  1199. 94%Secret Management with HashiCorp Vault
  1200. 94%Secret Management with HashiCorp Vault
  1201. 81%Personal Knowledge Management is Bullshit
  1202. 88%Building many private virtual networks through Cloudflare Zero Trust
  1203. 98%Monolith in Cloud
  1204. 97%Announcing the Hare programming language
  1205. 99%Why LSP?
  1206. 90%Canetti et al's Paradoxical Encryption Scheme
  1207. 75%A list of all my projects - Patrick Zhong
  1208. 89%Production postmortem: The encrypted database that was too big to replicate
  1209. 80%I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
  1210. 90%Physical Threshold Encryption
  1211. 98%Linearization in Plonk and Kimchi. Why?
  1212. 99%The 10 Commandments .NET Developers Must apply for Secure Applications
  1213. 94%Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
  1214. 98%Things I would like to see in a computer algebra system
  1215. 98%Production postmortem: Misleading security and other production snafus
  1216. 95%Exponentially Better Rotations
  1217. 99%Using dotnet format Command to Format the C#/.NET Code - Code Maze
  1218. 89%The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
  1219. 87%Episode 96 - The Programmer's Brain with Felienne Hermans
  1220. 93%An overview of my threat model
  1221. 83%Requests for comment/Stop accepting cryptocurrency donations - Meta
  1222. 93%Impressions from a first-time Mac user
  1223. 98%Git Credential Manager: authentication for everyone | The GitHub Blog
  1224. 75%zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
  1225. 99%Random Class in C# - Code Maze
  1226. 94%This Week in Matrix 2022-04-08 | Matrix.org
  1227. 91%Private Classification · The Decentralized Robot
  1228. 94%O(1) Labs
  1229. 77%Coinbase Lists Mina Protocol
  1230. 93%The (r)Evolution of FHE
  1231. 98%Optimizing for Luck
  1232. 90%How to run a Digital Platform at Scale
  1233. 99%placeholder
  1234. 81%zkHappyHour with Mina Protocol
  1235. 66%What I learned as a hired consultant for autodidact physicists | Aeon Ideas
  1236. 97%In response to Moxie's doubts on web3, and about ultra light clients
  1237. 97%Introduction
  1238. 96%Essential Cryptography for JavaScript Developers | With Blue Ink
  1239. 89%Episode 95 - Avalonia UI with Dan Walmsley
  1240. 59%PKC Test-of-Time Award
  1241. 78%Webinar next week: Clean Architecture with RavenDB
  1242. 90%Future-proofing SaltStack
  1243. 95%Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
  1244. 74%BAT: a Fast and Small Key Encapsulation Mechanism
  1245. 74%It Looks Like You’re Trying To Take Over The World · Gwern.net
  1246. 92%Year in Review: 2020 laid the groundwork for zero knowledge proofs
  1247. 88%2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
  1248. 53%The (Edited) Latecomer's Guide to Crypto
  1249. 88%Postico – a modern PostgreSQL client for the Mac
  1250. 91%Ridiculously easy to use Tunnels
  1251. 98%Implementing a toy version of TLS 1.3
  1252. 62%The Problem With Note-Taking - More To That
  1253. 81%The Projects That Matter The Most To Me Are Small
  1254. 67%NSA algorithm for PX-1000 broken
  1255. 79%James Stanley - Librem 5: first impressions
  1256. 98%Using RSA Securely in 2022 - Dhole Moments
  1257. 88%Windows Needs a Change in Priorities
  1258. 97%The first Asahi Linux Alpha Release is here! - Asahi Linux
  1259. 85%Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
  1260. 90%Zotero Blog » Blog Archive
  1261. 91%Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
  1262. 58%$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
  1263. 96%Roll your own crypto, then smoke it.
  1264. 54%FTC Takes Action Against CafePress for Data Breach Cover Up
  1265. 86%WAF for everyone: protecting the web from high severity vulnerabilities
  1266. 98%The code is the specification? Introducing cargo spec
  1267. 95%How not to build a secure plugins architecture | Crafting Privacy
  1268. 99%Rocky Jaiswal | Fun with function composition
  1269. 79%Recording: Database Security in a Hostile World
  1270. 98%How to Write a Golang App Remotely on a Raspberry Pi Using Atom
  1271. 62%...A Farm Upstate Where He Can Run and Run
  1272. 92%In praise of opinionated frameworks
  1273. 96%Why should you use a random testing library in C#? · Anthony Lloyd
  1274. 94%A Comprehensive Primer · Michael Straka
  1275. 89%Reintroducing Snapps as zkApps
  1276. 98%Search results – Add-ons for Firefox (en-US)
  1277. 51%EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
  1278. 98%Things I hate about Rust, redux
  1279. 92%How Cloudflare verifies the code WhatsApp Web serves to users
  1280. 80%Request for comments: Removing graph queries from RavenDB
  1281. 59%Deep Learning Is Hitting a Wall
  1282. 68%Optimizing code by understanding usage
  1283. 97%Put an io_uring on it: Exploiting the Linux Kernel - Blog
  1284. 82%Announcing experimental DDR in
  1285. 98%Use a message envelope
  1286. 82%We Cannot Live Without Cryptography!
  1287. 79%Webinar: Database Security in a Hostile World
  1288. 59%Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
  1289. 81%The technological case against Bitcoin and blockchain
  1290. 99%Telenot Complex: Insecure AES Key Generation
  1291. 57%Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
  1292. 96%Introducing Native Matrix VoIP with Element Call!
  1293. 87%Never Change Your Password - TidBITS
  1294. 95%The Controversy Surrounding Hybrid Cryptography - Dhole Moments
  1295. 79%Recording: RavenDB–a really boring database
  1296. 83%iCloud Private Relay: information for Cloudflare customers
  1297. 95%Blockchain Cryptography | Gary Woodfine
  1298. 98%Security for package maintainers
  1299. 92%Plagiarism as a patent amplifier
  1300. 88%Using the .NET JIT to reduce abstraction overhead
  1301. 80%Performance optimizations in production
  1302. 98%Transport Layer Security (5/6)
  1303. 95%Security | Fleet handbook
  1304. 99%Introducing the OpenIddict client
  1305. 98%Zig Build System Internals
  1306. 97%Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
  1307. 80%RavenDB: Domain Modeling and Data Persistency
  1308. 95%HPKE: Standardizing public-key encryption (finally!)
  1309. 99%Badly implementing encryption: Part X-Additional data
  1310. 99%Badly implementing encryption: Part IX–SIV
  1311. 95%Making protocols post-quantum
  1312. 98%Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
  1313. 98%Migrating from Redis-64 to Memurai
  1314. 98%GitHub - brouberol/marcel: Le docker français
  1315. 83%Badly implementing encryption: Part VIII–timings attacks and side channels
  1316. 97%Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
  1317. 87%How bad it is using the same IV twice with AES/GCM?
  1318. 57%Sign up for weekly tips
  1319. 99%Badly implementing encryption: Part VII–implementing authenticated encryption
  1320. 96%AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
  1321. 99%7 Improvements You Might Have Missed in .NET 6
  1322. 92%Why learn Racket? A student's perspective - Micah Cantor
  1323. 82%Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
  1324. 94%Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
  1325. 93%Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
  1326. 98%Badly implementing encryption: Part VI–malleable encryption
  1327. 94%How to capture book notes and turn those into smart notes
  1328. 71%Improving the US financial system
  1329. 97%Badly implementing encryption: Part V–nonce reuse
  1330. 84%on training
  1331. 90%1Password for SSH & Git (Beta) | 1Password Developer Documentation
  1332. 99%Badly implementing encryption: Part IV–keyed hash function
  1333. 98%Pure-Impure Segregation Principle | Oleksii Holub
  1334. 93%The right thing for the wrong reasons: FLOSS doesn't imply security
  1335. 82%Learn Privacy-Enhancing Techniques with Cryptographic Games
  1336. 72%Badly implementing encryption: Part III–breaking your encryption apart
  1337. 95%How Perl Saved the Human Genome Project
  1338. 99%Badly implementing encryption: Part II–breaking the code
  1339. 98%00
  1340. 91%DNS Security, Part VII: Blockchain-based Name Systems and Transparency
  1341. 77%Staking
  1342. 71%Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
  1343. 98%Kimchi: The latest update to Mina’s proof system
  1344. 99%Badly implementing encryption: Part I
  1345. 83%Key Senators Have Voted For The Anti-Encryption EARN IT Act
  1346. 89%BeyondCorp is dead, long live BeyondCorp
  1347. 66%On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
  1348. 97%How we optimized Python API server code 100x
  1349. 86%Dolphin Progress Report: November and December 2021, January 2022
  1350. 73%BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
  1351. 88%r/hearthstone - How I hacked Hearthstone
  1352. 78%A Developer's Guide to Dogfooding
  1353. 72%Chat Control
  1354. 66%It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
  1355. 87%Estimating the Bit Security of Pairing-Friendly Curves
  1356. 92%Jay's Blog
  1357. 96%Why and how I got my own ASN!
  1358. 86%Remote Pair Programming - Demir Delic
  1359. 99%The GNU Name System
  1360. 96%PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
  1361. 99%Basic cryptography - the Vigenere cipher - Eric Mann's Blog
  1362. 97%Knowledge Base - your company’s undervalued asset
  1363. 96%I finally understand Declarative Programming 🍀
  1364. 52%It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
  1365. 79%Tor Browser: a legacy of advancing private browsing innovation | Tor Project
  1366. 73%Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
  1367. 97%LTO Tape data storage for Linux nerds
  1368. 94%BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
  1369. 58%PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
  1370. 75%Testnet #4: Shielded Staking Is Here
  1371. 92%Run Ordinary Rails Apps Globally
  1372. 60%The State of Zero Knowledge
  1373. 84%Landscape of API Traffic
  1374. 54% 2022 Tech Predictions · Ted Neward's Blog
  1375. 92%The Curse of NixOS
  1376. 91%[Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
  1377. 99%GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
  1378. 71%Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
  1379. 97%GitHub - 425show/verifiable-credential-demo
  1380. 82%Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
  1381. 81%Don’t assume the result of read()
  1382. 99%Securing Sensitive Data in an Event Driven Architecture
  1383. 67%Why is the Nuclear Power Industry Stagnant?
  1384. 99%CC #9: A Wild ECDSA Appears!
  1385. 72%Bitwarden Open Source Password Manager
  1386. 55%FBI document shows what data can be obtained from encrypted messaging apps
  1387. 57%No Place to Hide
  1388. 95%You should probably be building a web app
  1389. 90%Arm A64 Instruction Set Architecture
  1390. 97%Let's Encrypt SSL certificate overview
  1391. 99%Some Techniques to Enhance Your Terraform Proficiency
  1392. 99%Switching from macOS to Pop!_OS
  1393. 97%GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
  1394. 78%Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
  1395. 96%SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
  1396. 50%Music industry is suing youtube-dl hosters
  1397. 98%Publishing and consuming ECMAScript modules via packages – the big picture
  1398. 97%When NOT to write an Abstraction Layer
  1399. 98%Tips for More Efficient .NET Logs
  1400. 98%Introduction to Model Predictive Control · Arnav's Weblog
  1401. 94%Introducing Plonky2 — Polygon | Blog
  1402. 96%XMPP: the secure communication protocol that respects privacy
  1403. 95%Make the Internet Yours Again With an Instant Mesh Network
  1404. 98%dmca/2022-01-04-readium.md at master · github/dmca
  1405. 89%Donald Knuth - The Patron Saint of Yak Shaves
  1406. 59%Hashing is not encryption - Eric Mann's Blog
  1407. 98%In response to Moxie's doubts on web3
  1408. 95%XML Encryption Syntax and Processing
  1409. 81%Real-World Cryptography by David Wong Book Review
  1410. 99%6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
  1411. 62%The Relativity of Wrong by Isaac Asimov
  1412. 54%Coming Clean
  1413. 60%The Cryptography of Orphan Annie and Captain Midnight
  1414. 98%Neural Network From Scratch
  1415. 77%If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
  1416. 97%PagerDuty’s Security Training for Engineers! Part Deux
  1417. 63%A Succinct Story of Zero Knowledge
  1418. 66%How I built a WFH Shed
  1419. 99%Fixing stutters in Papers Please on Linux – Blog
  1420. 77%The Case Against Crypto
  1421. 91%Stupid Patterns
  1422. 73%GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
  1423. 81%Looking Forward: Some Predictions for 2022
  1424. 99%.NET's Cryptographic One-Shots
  1425. 84%Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
  1426. 94%A Year In Review · Jethro Kuan
  1427. 94%GitHub - trailofbits/zkdocs
  1428. 75%Fight for privacy — an interview with Troy Hunt
  1429. 98%How to Generate Random Numbers From a Range in C# - Code Maze
  1430. 94%Cloud Security Breaches and Vulnerabilities: 2021 in Review
  1431. 82%Dear Self; We Need To Talk About Social Media
  1432. 89%MS Teams: 1 feature, 4 vulnerabilities | Positive Security
  1433. 98%Introduction
  1434. 90%Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
  1435. 96%What Problem Blockchains Actually Solve
  1436. 99%LISP with GC in 436 bytes
  1437. 93%GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
  1438. 58%Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
  1439. 63%CCPA Scam November 2021 from Princeton University
  1440. 94%Don’t start with microservices – monoliths are your friend – Arnold Galovics
  1441. 92%Rails 7.0: Fulfilling a vision
  1442. 98%How to build large-scale end-to-end encrypted group video calls
  1443. 99%Secure Containerized Browser
  1444. 94%Research Notes on Humanoid Robots
  1445. 87%"Alpha-Rays" behind the scenes - HackMD
  1446. 92%Cryptology ePrint Archive: Report 2021/1621
  1447. 98%Scrt.link vs. One-Time Secret
  1448. 86%How to Write a Technical Book
  1449. 96%Meet Kryptology: Coinbase’s Open Source Cryptography Library
  1450. 98%Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
  1451. 91%"Open source" is not broken
  1452. 95%Testing constant-timeness using Valgrind: case of the NSS library
  1453. 83%Calculating my open source blast radius
  1454. 97%crawshaw - 2021-12-11
  1455. 98%Solene'% : What are the VPN available on OpenBSD
  1456. 58%Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
  1457. 97%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1458. 87%A Call to Build Models Like We Build Open-Source Software
  1459. 85%Avoiding Internet Centralization
  1460. 57%Twitter Suspension
  1461. 95%Connection Failures with Microsoft.Data.SqlClient 4 and later
  1462. 54%Gravatar "Breach" Exposes Data of 100+ Million Users
  1463. 92%uBlock, I exfiltrate: exploiting ad blockers with CSS
  1464. 91%Security | 2021 | The Web Almanac by HTTP Archive
  1465. 98%Understanding HKDF - Dhole Moments
  1466. 87%Welcome to CIO Week and the future of corporate networks
  1467. 86%Understanding Zero-knowledge proofs through simple examples
  1468. 86%Understanding Zero-knowledge proofs through simple examples
  1469. 67%On the Use of Pedersen Commitments for Confidential Payments
  1470. 94%Securing Sensitive Data in an Event Driven Architecture
  1471. 76%Don't Let the Internet Dupe You, Event Sourcing is Hard
  1472. 98%Released: General Availability of Microsoft.Data.SqlClient 4.0
  1473. 89%Bank transfers as a payment method
  1474. 95%Bitslicing for Constant Time Cryptography
  1475. 71%How to configure verified GitHub commits?
  1476. 93%The best Task+Note system
  1477. 95%Understanding identity tokens
  1478. 95%An intensive introduction to cryptography: index
  1479. 91%An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
  1480. 92%RSA vs ECDSA for DNSSEC | APNIC Blog
  1481. 99%ZK-Hack Puzzle #4 Writeup - HackMD
  1482. 59%Speculative Autobiographies
  1483. 96%Mentoring junior programmers: What I tell them is job number one - Vallified
  1484. 96%The Joy of Cryptography
  1485. 98%GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
  1487. 82%Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
  1488. 99%Model-based Testing
  1489. 98%RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
  1490. 97%XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
  1491. 89%Regex Learn - Step by step, from zero to advanced.
  1492. 97%Cracking the Adventure Time Cipher
  1493. 96%ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
  1494. 81%ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
  1495. 93%Practical attacks against attribute-based encryption
  1496. 93%Using a framework can make you stupid!
  1497. 84%Yes, Programming is Hard
  1498. 84%No one knows what's coming next
  1499. 87%Five Great (free!) Ways to Get Started With Cloudflare
  1500. 87%Threshold Digital Signatures
  1501. 98%Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
  1502. 95%ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
  1503. 91%Reflecting on 11 years of side projects
  1504. 99%Announcing YARP 1.0 Release
  1505. 64%Libra Shrugged — Chapter 15: Central bank digital currencies
  1506. 99%Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
  1507. 69%Matter Labs Announces $50M in New Funding for zkSync
  1508. 95%Sizing Up Post-Quantum Signatures
  1509. 90%Zillow, Prophet, Time Series, & Prices
  1510. 66%HOWTO: Get tenure
  1511. 96%How To Learn Stuff Quickly
  1512. 95%Random Oracles in Cryptography
  1513. 98%Threema: Three Strikes, You’re Out
  1514. 60%Timeline of the human condition
  1515. 98%How (Not) to Design a Hash Function
  1516. 91%PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
  1517. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1518. 90%The Future of Work and the Workplace
  1519. 88%Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
  1520. 93%Simple Product Management Tricks - Jacob Kaplan-Moss
  1521. 68%You Are What You Consume - Priyam Mohanty
  1522. 96%Pairings in CIRCL
  1523. 99%SectorLISP Now Fits in One Sector
  1524. 98%Handshake Encryption: Endgame (an ECH update)
  1525. 98%mazzo.li — Backing up WhatsApp data through the multi-device web client
  1526. 98%Anatomy of a STARK, Part 0: Introduction
  1527. 97%Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
  1528. 99%You want Tor Browser ... not a VPN
  1529. 95%Element One - Matrix, WhatsApp, Signal and Telegram in one place
  1530. 87%Privacy is a Human Right | Tor Blog
  1531. 99%bitbottle
  1532. 98%FROST: Flexible Round-Optimized Schnorr Threshold Signatures
  1533. 64%Why aviation’s compass is shifting towards True navigation
  1534. 98%The AEGIS family of authenticated encryption algorithms
  1535. 99%Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
  1536. 99%Bevel Work | Rounding Sharp Corners
  1537. 98%Looking into convergent encryption
  1538. 97%.NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
  1539. 99%F# eXchange 2021 | Skills Matter
  1540. 98%8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
  1541. 93%Episode 85 - Clean Code in C# With Jason Alls
  1542. 76%SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
  1543. 95%A Tour Through the OWASP Top 10
  1544. 98%PlayStation 3 Architecture | A Practical Analysis
  1545. 97%A Critique [The Call of the Open Sidewalk]
  1546. 96%How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
  1547. 97%Code quality: a concern for businesses, bottom lines, and empathetic programmers
  1548. 96%A Graduate Course in Applied Cryptography
  1549. 91%Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
  1550. 73%Critical security flaw exposed Joburg residents’ private info
  1551. 98%NixOS on Framework laptop
  1552. 99%Vimarsh Shah - The best way to self host
  1553. 98%Introducing Nuntius - Cronokirby
  1554. 98%On the Optimization of PLONK – ZK Podcast
  1555. 95%Geo Key Manager: Setting up a service for scale
  1556. 99%How to use certificates in ASP.NET Core
  1557. 99%Avoid Authy, Use Aegis
  1558. 99%Privacy-Preserving Compromised Credential Checking
  1559. 92%What if Performance Advertising is Just an Analytics Scam? - SparkToro
  1560. 99%Cloudflare and the IETF
  1561. 99%Canonicalization Attacks Against MACs and Signatures
  1562. 97%1Password Refugee’s Guide to KeePass
  1563. 99%A Tale Of Two Optimisations
  1564. 99%mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
  1565. 98%Introducing SSL/TLS Recommender
  1566. 97%The efficiency of Microsoft.
  1567. 99%You're Doing IoT RNG
  1568. 97%Designing technologies with Values? Possibility - Necessity - and European story.
  1569. 97%HD wallets and the Legendrery PRF in MPC - HackMD
  1570. 98%Sending emails to myself
  1571. 98%Cloudflare Research: Two Years In
  1572. 90%What happened on the Internet during the Facebook outage
  1573. 97%Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
  1574. 99%Scheduling Backups To OneDrive For Paperless-ng Using RClone
  1575. 90%Lightning Round
  1576. 99%A PKI-less secure communication channel: Implementing the record stream
  1577. 99%A PKI-less secure communication channel: Coding the handshake
  1578. 98%Overview | ChessCoach
  1579. 99%The most counterintuitive facts in all of mathematics, computer science, and physics
  1580. 99%A PKI-less secure communication channel: The record layer
  1581. 99%Ordinal Classification Using PyTorch -- Visual Studio Magazine
  1582. 99%A PKI-less secure communication channel: The record layer
  1583. 74%New study reveals iPhones aren't as private as you think
  1584. 96%Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
  1585. 91%Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
  1586. 99%Effective Go - The Go Programming Language
  1587. 95%The secret to Cloudflare’s pace of Innovation
  1588. 95%Copycats and Endurance - The Bootstrapped Founder
  1589. 99%A PKI-less secure communication channel: design
  1590. 93%Cybersecurity threats - Simple Talk
  1591. 98%Automatic cipher suite ordering in crypto/tls
  1592. 95%Snapps on Mina with Emre and Izaak – ZK Podcast
  1593. 96%Introduction — pyNomo Documentation documentation
  1594. 98%The Bi-Symmetric Encryption Fraud
  1595. 62%A World Without Sci-Hub
  1596. 99%GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
  1597. 97%Five ways I handled my OutOfMemoryErrors
  1598. 93%How Big Tech Runs Tech Projects and the Curious Absence of Scrum
  1599. 97%No, We Won’t Have a Video Call for That!
  1600. 99%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  1601. 99%Authenticated Boot and Disk Encryption on Linux
  1602. 98%The First Rule of Machine Learning: Start without Machine Learning
  1603. 94%Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
  1604. 95%Let's Encrypt's Root Certificate is expiring!
  1605. 97%Linux on the Desktop: Part Two
  1606. 97%Cloudflare Pages is Lightning Fast
  1607. 99%Splitting up trust
  1608. 99%HTTP/3 support in .NET 6
  1609. 98%How We Made Playable Quotes for the Game Boy
  1610. 99%If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
  1611. 99%“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
  1612. 94%ACSC Annual Cyber Threat Report 2020-21
  1613. 99%WebSocket per-message compression in ASP.NET Core 6
  1614. 96%Why Monero
  1615. 97%Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
  1616. 90%FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
  1617. 95%Cloud Providers Publish Ransomware Mitigation Strategies
  1618. 98%Welcome to Speed Week and a Waitless Internet
  1619. 98%Why Flask will teach you more about software engineering than Django
  1620. 98%Part 4: Notifiable Data Breach (NDB) Scheme
  1621. 98%Certified Application Security Specialist (CASS)
  1622. 84%Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
  1623. 74%Rewilding: 60 years ago, scientists let a farm go wild – the results are in
  1624. 67%WhatsApp “end-to-end encrypted” messages aren’t that private after all
  1625. 99%GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
  1626. 98%Welcome · Real-World Cryptography MEAP V14
  1627. 50%ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
  1628. 97%Release age v1.0.0 🏁 · FiloSottile/age
  1629. 99%Why not ZFS
  1630. 96%Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
  1631. 99%Saving a restic backup the hard way
  1632. 97%A meditation on three dead side projects
  1633. 67%ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
  1634. 94%Important clarifications regarding arrest of climate activist
  1635. 92%NO STARTTLS
  1636. 98%Proxy vs Reverse Proxy - using a real life example!
  1637. 69%Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
  1638. 61%WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
  1639. 98%Zero Trust Security Architecture Overview | Developer.com
  1640. 99%www.opendesktop.org
  1641. 99%Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
  1642. 95%Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
  1643. 79%NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  1644. 74%zkMesh: Aug 2021 recap
  1645. 99%Improving Git protocol security on GitHub
  1646. 99%Recover Password Sync for a Domain Joined Mac
  1647. 90%Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
  1648. 99%Writing Programs with NCURSES
  1649. 96%The Design and Evolution of OCB - Journal of Cryptology
  1650. 89%You’re Not Too Late
  1651. 99%on terminal control
  1652. 99%Aggregatable Distributed Key Generation
  1653. 98%Released: Microsoft.Data.SqlClient 4.0 Preview 1
  1654. 77%The All-Seeing "i": Apple Just Declared War on Your Privacy
  1655. 98%59a34eabe31910abfb06f308 - Apple NeuralHash Collision
  1656. 99%Programmers Don’t Understand Hash Functions
  1657. 98%The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
  1658. 93%r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
  1659. 94%Golem keyboard project
  1660. 88%Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
  1661. 98%Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
  1662. 67%EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
  1663. 96%Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
  1664. 99%Adventures in fuzzing libolm | Matrix.org
  1665. 93%Thinking of the children
  1666. 98%Safer Illinois, Isn’t
  1667. 98%6 New Ways to Validate Device Posture
  1668. 98%How does PLONK work? Part 1: What's PLONK?
  1669. 99%Cryptology ePrint Archive: Report 2021/923
  1670. 97%Reddit Interview Problems: The Game of Life
  1671. 93%Thinking of the children
  1672. 97%Why is Learning Functional Programming So Damned Hard?
  1673. 98%10×10%
  1674. 95%Stewardship of Ourselves
  1675. 99%Exploring the password policy rabbit hole — Sun Knudsen
  1676. 98%The world in which IPv6 was a good design
  1677. 94%GitHub picks Friday 13th to kill off password-based Git authentication
  1678. 97%What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
  1679. 96%The Deceptive PR Behind Apple’s “Expanded Protections for Children”
  1680. 98%.NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
  1681. 99%How to never type passwords when using Git
  1682. 97%More devices, fewer CAPTCHAs, happier users
  1683. 85%If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
  1684. 97%Why Doesn't Software Show Up in Productivity?
  1685. 64%Australia is becoming a surveillance state
  1686. 99%Announcing .NET 6 Preview 7
  1687. 99%Implementing ‘le chiffre indéchiffrable’ in Scheme
  1688. 97%Apple’s Mistake
  1689. 98%One Bad Apple - The Hacker Factor Blog
  1690. 98%Hey Signal! Great Encryption Needs Great Authentication
  1691. 98%The logic behind three random words
  1692. 99%How does FaceTime Work?
  1693. 72%Apple to scan U.S. iPhones for images of child sexual abuse
  1694. 80%Apple explains how iPhones will scan photos for child-sexual-abuse images
  1695. 99%draft-peabody-dispatch-new-uuid-format-01
  1696. 58%Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
  1697. 97%HTTP/2: The Sequel is Always Worse
  1698. 91%Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
  1699. 91%Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
  1700. 94%When You Get Right Down to It, Most Security Is Based on The Honor System
  1701. 99%What is an inner product argument?
  1702. 97%An Attempt at Demystifying Graph Deep Learning
  1703. 94%GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
  1704. 64%Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  1705. 64%Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  1706. 97%Full-Time Open Source - CoRecursive Podcast
  1707. 89%TODO apps are meant for robots
  1708. 98%PyTorch Tutorial for Beginners - Building Neural Networks
  1709. 99%Wormhole - Simple, private file sharing
  1710. 71%Looking between the lines: how media is control.
  1711. 99%GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
  1712. 70%Tech spec experts seek allies to tear down ISO standards paywall
  1713. 98%How I store my files and why you should not rely on fancy tools for backup
  1714. 99%Zip - How not to design a file format.
  1715. 79%Cloudflare's Athenian Project Expands Internationally
  1716. 97%From Stolen Laptop to Inside the Company Network — Dolos Group
  1717. 97%Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
  1718. 97%IPv4 pricing - Hetzner Docs
  1719. 99%Netcat - All you need to know
  1720. 83%A new chapter for Google’s Vulnerability Reward Program
  1721. 99%Securing your development environment
  1722. 99%K-9 Mail is back
  1723. 74%Welcome to Cloudflare Impact Week
  1724. 93%Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
  1725. 98%Syncing all the things
  1726. 89%Google pushed a one-character typo to production, bricking Chrome OS devices
  1727. 76%Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
  1728. 99%Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
  1729. 96%Germany’s national healthcare system adopts Matrix! | Matrix.org
  1730. 99%How does TLS work?
  1731. 97%The Game Developers Guide to NFTs
  1732. 98%Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
  1733. 73%Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
  1734. 99%Cryptanalysis of Meow Hash
  1735. 98%How To Learn Stuff Quickly
  1736. 99%A framework for Front End System Design interviews - draft
  1737. 89%Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
  1738. 97%HashWires: Range Proofs from Hash Functions | ZKProof Standards
  1739. 97%Why we need to do more to reduce certificate lifetimes
  1740. 95%TLS - The Cloudflare Blog
  1741. 98%ongoing by Tim Bray · Algorithm Agility?
  1742. 97%Security Analysis of Telegram (Symmetric Part)
  1743. 99%Pa(dding rtitioning) oracles, and another hot take on PAKEs
  1744. 97%Building a Trustless and Private Internet for Everyone
  1745. 91%Building a Vision of Life Without Work
  1746. 97%The EFAIL Hoax [The Call of the Open Sidewalk]
  1747. 96%Behind the scenes, AWS Lambda
  1748. 97%r/crypto - My breakdown on Partition Oracle Attacks
  1749. 99%Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
  1750. 87%Ways of reading without the influence of community
  1751. 95%The Myth of the Expert Reviewer
  1752. 99%An incomplete list of practices to improve security of your (micro)services · m's blog
  1753. 99%Sam Lewis
  1754. 97%More Secret Codes: A History of Cryptography (Part 2)
  1755. 92%A new macroeconomics? – J. W. Mason
  1756. 98%Stuff I wish I knew before I went Independent
  1757. 99%Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
  1758. 98%Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
  1759. 97%Write a time-series database engine from scratch
  1760. 84%BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
  1761. 99%Blazor Flash Cards - State Management with Fluxor
  1762. 88%Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
  1763. 99%Cryptology ePrint Archive: Report 2021/626
  1764. 95%The Missing Email Service For Domains
  1765. 92%How to Build a Giant Carmaker
  1766. 99%angularsen/UnitsNet
  1767. 93%Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
  1768. 95%OpenPGP Identity Structure [The Call of the Open Sidewalk]
  1769. 98%Yes, the network is hostile, even yours (or: how to lose your data in three steps)
  1770. 96%An Elixir Adoption Success Story
  1771. 88%New Release: Fiddler Everywhere 2.0 Is Here!
  1772. 96%NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
  1773. 96%Update on Windows 11 minimum system requirements
  1774. 98%Temporal: getting started with JavaScript’s new date time API
  1775. 99%cirosantilli/x86-bare-metal-examples
  1776. 57%Voice AI is scary good now. Video game actors hate it.
  1777. 98%Production Threshold Signing Service
  1778. 97%Windows 11, Amazon, and Uncomfortable Questions
  1779. 98%Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
  1780. 97%Taking the (quantum) leap with go
  1781. 69%Messaging app Signal not in compliance with new rules, say officials
  1782. 98%Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
  1783. 94%Designing a duress PIN: plausible deniability (part II)
  1784. 94%Zero Knowledge from the Discrete Logarithm Problem
  1785. 97%Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
  1786. 99%Remote Desktop Connection Manager - Windows Sysinternals
  1787. 98%Hacker's guide to deep-learning side-channel attacks: the theory
  1788. 96%Internet-in-a-Box
  1789. 98%How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
  1790. 99%dsprenkels/sss
  1791. 99%Croc Full Plaintext Recovery - CVE-2021-31603
  1792. 97%A response to "Did we market Knative wrong?"
  1793. 98%streetcomplete/StreetComplete
  1794. 98%Cryptographic shuffle | Brain on Fire
  1795. 88%Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
  1796. 95%I wish I could write this well
  1797. 97%Cryptology ePrint Archive: Report 2021/819
  1798. 98%Welcome · Real-World Cryptography MEAP V14
  1799. 98%Richard Feynman's Integral Trick
  1800. 83%[Last Week in .NET #46] – Exceptionally Useful
  1801. 92%google/fully-homomorphic-encryption
  1802. 96%Automonous Biology
  1803. 96%Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
  1804. 95%Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
  1805. 99%How to Handle Secrets on the Command Line
  1806. 99%Taildrop was kind of easy, actually
  1807. 98%Answering Community Questions and What’s Ahead for Mina
  1808. 95%Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
  1809. 99%From KEMs to protocols
  1810. 98%Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  1811. 98%Kerckhoffs’s Law for Security Engineers
  1812. 98%Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
  1813. 99%Althttpd: The Althttpd Webserver
  1814. 99%Exploring android development on iPad
  1815. 98%Certificates Confuse Everything
  1816. 59%It’s time to ditch Chrome
  1817. 94%Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  1818. 83%FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
  1819. 99%Password Managers.
  1820. 99%Kate polynomial commitments
  1821. 99%Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
  1822. 99%The best cryptographic protocol ever!
  1823. 99%Linux Security Hardening and Other Tweaks
  1824. 98%Leaky Abstractions
  1825. 93%Vinod Vaikuntanathan - Real World Cryptographers Podcast
  1826. 98%Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
  1827. 98%Using Wikipedia as an Impromptu RottenTomatoes API
  1828. 98%Mikkel Paulson
  1829. 96%ongoing by Tim Bray · Testing in the Twenties
  1830. 85%The Most Expensive Number in Engineering
  1831. 99%Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
  1832. 95%Amazon devices will soon automatically share your Internet with neighbors
  1833. 99%Contributing to Gemini ecosystem
  1834. 98%Elliptic Curve Cryptography Explained
  1835. 99%Code Maze Weekly #78 - Code Maze
  1836. 96%Episode 77 - Application Security with Tanya Janka
  1837. 90%QUIC is now RFC 9000
  1838. 98%A UDP-Based Multiplexed and Secure Transport
  1839. 95%Is MDPI a predatory publisher?
  1840. 96%Messaging and Chat Control
  1841. 98%New Storage Providers for Azure Durable Functions
  1842. 99%The best API design principles inspired by nature - andre.schweighofer
  1843. 98%Blockchain voting is overrated among uninformed people but underrated among informed people
  1844. 96%DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
  1845. 98%Cryptography from the Ground Up
  1846. 96%255: What is encryption anyways?
  1847. 99%Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  1848. 98%How to Get Rich
  1849. 97%Heartbleed Revisited
  1850. 99%Secure Search Over Encrypted Data
  1851. 92%Indian job portal IIMJobs hacked; 46GB worth of database leaked online
  1852. 87%How the UK's Online Safety Bill threatens Matrix | Matrix.org
  1853. 99%Authenticated Encryption in .NET with AES-GCM
  1854. 95%I am sick and tired of hearing tech companies complain about a developer shortage
  1855. 96%Welcoming Linux to the 1Password Family | 1Password
  1856. 99%zkSessions: The ZK Languages Roundup - May 19 | Hopin
  1857. 99%Constructing a sponge function from MD5 - Gokberk Yaltirakli
  1858. 90%Zcon2Lite
  1859. 93%I Have a Lot to Say About Signal’s Cellebrite Hack
  1860. 99%Password Storage - OWASP Cheat Sheet Series
  1861. 98%The stack monoid revisited
  1862. 99%Running a .NET 5 web app on Railway
  1863. 96%A day at work
  1864. 97%Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  1865. 99%BLS12-381 For The Rest Of Us - HackMD
  1866. 99%Reverse Engineering an Unknown Microcontroller - Dmitry.GR
  1867. 97%Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  1868. 96%Building an Event Driven .NET Application: The Fundamentals – Wrapt
  1869. 86%Peter Thiel's Religion - David Perell
  1870. 99%<p>The Node.js CA Footgun</p>
  1871. 98%Security flaws in all Wi-Fi devices
  1872. 99%Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  1873. 99%Beware of Applications Misusing Root Stores – Mozilla Security Blog
  1874. 97%Hell site
  1875. 99%Minecraft Modding: Laser Gun - Alan Zucconi
  1876. 95%Dear EU: Please Don't Ruin the Root - Articles
  1877. 98%Realizing the Mina vision in Rust
  1878. 90%Personal Data of 3 Million+ People Exposed In DriveSure Hack
  1879. 99%Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
  1880. 98%Introducing the Pinecone overlay network | Matrix.org
  1881. 99%Understanding Extended-Nonce Constructions
  1882. 94%Amazon Fake Reviews Scam Exposed in Data Breach
  1883. 98%--this is a no-knowledge proof--
  1884. 98%Introduction to JSON Web Tokens (JWT)
  1885. 97%timvisee/send
  1886. 92%ZK languages with Alex Ozdemir
  1887. 97%Is abstraction killing civilization? | datagubbe.se
  1888. 97%What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  1889. 99%Mixed Boolean Arithmetic Obfuscation
  1890. 93%Update: Security Notification - March 2021
  1891. 98%Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  1892. 98%Content Marketing for Bootstrappers | James Chambers
  1893. 95%Dabbling in Cryptography
  1894. 96%We were promised Strong AI, but instead we got metadata analysis
  1895. 99%HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
  1896. 99%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  1897. 99%Rust Language Cheat Sheet
  1898. 99%Setting up a Cardano Producer node using Kubernetes/microk8s
  1899. 96%Customer Notice FAQs
  1900. 86%In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  1901. 97%Make better predictions, stop estimating - andre.schweighofer
  1902. 98%Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
  1903. 90%Apple introduces AirTag
  1904. 88%Minimum Viable State: Building a Nomad Internet Country
  1905. 99%Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
  1906. 99%dotnet/runtime
  1907. 99%What's in the box? - fasterthanli.me
  1908. 99%Thoughts on writing a wayland window manager with wlroots
  1909. 85%Why should you care about privacy - even if you had nothing to hide
  1910. 85%Vanquished Vaccines and Vetocracies – We Are Not Saved
  1911. 94%Eat a Peach for Engineers
  1912. 99%Standard Notes | A Simple And Private Notes App
  1913. 98%Node.js support in Cloudflare Workers
  1914. 98%What on Earth is this Encryption Scheme?
  1915. 99%Security Control: Implement security best practices
  1916. 99%Serving up zero-knowledge proofs
  1917. 94%Machine Learning With ML.NET - Evaluation Metrics
  1918. 61%The Cursed Computer Iceberg Meme
  1919. 96%My Vim Notes Setup
  1920. 85%Meet the patent troll that won a $308 million jury trial against Apple
  1921. 98%My programming principles • Borislav Grigorov
  1922. 99%The Architecture Behind A One-Person Tech Startup
  1923. 99%BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
  1924. 99%WTF are these security chips?
  1925. 99%A pretty good guide to pretty good privacy
  1926. 99%Goodbye OpenSSL, and Hello To Google Tink
  1927. 99%MPC-Over-Signal
  1928. 81%The Unparalleled Genius of John von Neumann
  1929. 82%Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  1930. 99%Dumping user data from cheap tablets in minutes
  1931. 98%How I Got Into Computers AppDev Edition
  1932. 96%(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
  1933. 98%Legalizing Gay Marriage in Crusader Kings III with Ghidra
  1934. 99%PostgreSQL Security Hardening
  1935. 99%The Exception Model
  1936. 95%Zero click vulnerability in Apple’s macOS Mail
  1937. 99%C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  1938. 75%Apple's cooperation with authoritarian governments
  1939. 98%Some opinionated thoughts on SQL databases
  1940. 89%Cloudflare’s WAF is recognized as customers’ choice for 2021
  1941. 99%Peace of mind backup - boa.nu
  1942. 91%Creation vs. Consumption
  1943. 95% Git
  1944. 97%A new Cloudflare Web Application Firewall
  1945. 99%Getting started with Self Sovereign Identity SSI
  1946. 99%.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
  1947. 98%OpenPGP Message Format
  1948. 98%PGP is a Form of Minimalism [The Call of the Open Sidewalk]
  1949. 87%About | Mina Illuminate
  1950. 99%Single-primitive authenticated encryption for fun
  1951. 98%It doesn't work | Frank DENIS random thoughts.
  1952. 99%janroesner/sixty5o2
  1953. 99%APT Encounters of the Third Kind
  1954. 99%Building a phone book: Part I
  1955. 99%C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  1956. 95%facebookresearch/Cupcake
  1957. 99%The Evolution of Distributed Systems on Kubernetes
  1958. 97%Is There a Case for Programmers to Unionize? - Qvault
  1959. 98%On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  1960. 97%CoinList
  1961. 97%Browser Isolation for teams of all sizes
  1962. 97%suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  1963. 97%Crystal 1.0 - What to expect
  1964. 89%Welcome to Cloudflare Security Week 2021!
  1965. 98%My self-study plan for electrical engineering
  1966. 99%r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  1967. 99%Hybrid encryption and the KEM/DEM paradigm
  1968. 97%Episode 72 - Emulating a Video Game System in .NET with Ryujinx
  1969. 99%The missing explanation of ZK-SNARKs: Part 1
  1970. 98%Can we talk about client-side certificates?
  1971. 97%Zero Knowledge Proof (with Avi Wigderson) - Numberphile
  1972. 97%A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
  1973. 97%Can an economy keep on growing? - Inverted Passion
  1974. 98%What It Means to Learn to Code
  1975. 97%Surreptitious Forwarding [The Call of the Open Sidewalk]
  1976. 58%The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
  1977. 98% A Simple Personal Data Backup Setup
  1978. 98%How are zlib, gzip and zip related? What do they have in common and how are they different?
  1979. 95%YouTube
  1980. 99%Key Exchange Standards
  1981. 99%Becoming physically immune to brute-force attacks
  1982. 98%About the March 8 & 9, 2021 Verkada camera hack
  1983. 99%Block Cipher Structures: Ranked
  1984. 98%Getting started with Dapr for .NET Developers
  1985. 96%I want a Computer that I Own
  1986. 89%4 Times I Felt Discriminated Against for Being a Female Developer
  1987. 98%Notion is not a knowledge base
  1988. 98%A flamegraph of Real-World Cryptography
  1989. 77%It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
  1990. 94%The Teams Dashboard: Finding a Product Voice
  1991. 98%A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
  1992. 98%Online tool to generate and check bcrypt hashed passwords.
  1993. 99%Hotpatch for Windows Server Azure Edition (preview)
  1994. 98%February 2021 - Killing Turbotax
  1995. 98%How I Might Have Hacked Any Microsoft Account - The Zero Hack
  1996. 95%How Nacon Cracked and Pirated The Sinking City - Frogwares
  1997. 98%Cryptology ePrint Archive: Report 2020/1491
  1998. 99%Goodbye Client Affinity, Hello Data Protection with Azure
  1999. 97%5 tools I use to protect my privacy online
  2000. 99%Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
  2001. 99%How I cut GTA Online loading times by 70%
  2002. 99%The security of the "Pass" password manager
  2003. 71%The Economics of Biodiversity
  2004. 99%Cryptology ePrint Archive: Report 2020/1610
  2005. 99%How often should I rotate my ssh keys?
  2006. 99%Microsoft Releases Azure Firewall Premium in Public Preview
  2007. 98%[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  2008. 97%Understanding how Leela Chess Zero works
  2009. 99%Cryptography Interface Design is a Security Concern
  2010. 97%Zero Bug Tolerance
  2011. 99%Cryptographic Wear-Out for Symmetric Encryption
  2012. 98%C#'s Functional Journey
  2013. 99%The Azure Security Architect Map
  2014. 99%Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
  2015. 92%Cryptology ePrint Archive: Report 2020/1581
  2016. 98%Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
  2017. 94%How to destroy the Earth
  2018. 99%GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
  2019. 98%Cryptology ePrint Archive: Report 2020/1533
  2020. 98%Using HPKE to Encrypt Request Payloads
  2021. 99%Urbit :: the good, the bad, and the insane
  2022. 98%Cryptology ePrint Archive: Report 2020/1536
  2023. 96%Distributed Application Runtime (Dapr) v1.0 Announced
  2024. 99%Making Easy Auth tokens survive releases on Linux Azure App Service
  2025. 92%upgundecha/howtheysre
  2026. 99%ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
  2027. 94%A Visual Guide: To Sustainable Software Engineering
  2028. 95%Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
  2029. 98%Multi-asset shielded pool project (MASP)
  2030. 97%no dogma podcast - powered by FeedBurner
  2031. 92%Securing the post-quantum world
  2032. 97%Our Solo v2 launch is official!
  2033. 99%Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  2034. 98%Good-bye ESNI, hello ECH!
  2035. 92%Crackpot Cryptography and Security Theater
  2036. 97%Why should I give you my ID card
  2037. 78%2020 U.S. Election: Cybersecurity Analysis
  2038. 98%A look at GSM
  2039. 99%Reverie: An optimized zero-knowledge proof system
  2040. 93%Report: Romanian Real Estate Portal Suffers Crippling Data Breach
  2041. 88%Lessons Learned From My Last Startup: A Post Mortem
  2042. 97%Is abstraction killing civilization? | datagubbe.se
  2043. 98%Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  2044. 99%ARCHITECTURE.md
  2045. 99%Working with SSL Certificate in Azure App Service
  2046. 77%Ideas That Created the Future
  2047. 99%A Simple and Succinct Zero Knowledge Proof
  2048. 99%Help users in Iran reconnect to Signal
  2049. 99%Security: The Need-to-know principle
  2050. 92%Threshold Cryptography with Omer Shlomovits from ZenGo
  2051. 99%7 behaviours to avoid in a software architecture role - Daniel Watts
  2052. 97%Tearing Down a Humidifier - Lei's Blog
  2053. 76%Why Generation X will save the web - Hi, I'm Heather Burns.
  2054. 96%SSL/TLS connection issue troubleshooting guide
  2055. 96%The Best TLS and PKI Training Course in the World
  2056. 97%My experience passing CKA and CKAD
  2057. 97%Episode 10: Exploiting Authenticated Encryption Key Commitment!
  2058. 99%LackRack - Eth0Wiki
  2059. 93%All Stories Are Wrong, but Some Are Useful
  2060. 99%The Subtle Hazards of Real-World Cryptography
  2061. 99%I didn't install Signal for privacy
  2062. 78%The Psychology of Stock Bubbles
  2063. 99%How to properly store a password in the Database | Petre Popescu
  2064. 97%Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
  2065. 86%The EU must protect the right to privacy and not attack end-to-end encryption
  2066. 94%Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  2067. 99%No, Java is not a Secure Programming Language
  2068. 99%berty/berty
  2069. 99%Tools I Love to Not Think About
  2070. 95%What it means to be a cryptographer
  2071. 83%SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  2072. 75%survey.pdf
  2073. 99%Write Crypto Code! Don't publish it!
  2074. 99%pavlobu/deskreen
  2075. 96%Technological stagnation: Why I came around
  2076. 98%s-51: Ask Me Anything (AMA), with Joan Daemen
  2077. 97%The architecture of my life | mjwsteenbergen-blog
  2078. 90%AKS Zero To Hero - Series for everyone - Azure Greg
  2079. 99%Release Notes | Bitwarden Help & Support
  2080. 90%Stepping up for a truly open source Elasticsearch | Amazon Web Services
  2081. 99%My Backup Strategy
  2082. 99%So, You Want to CTF? (A Beginner’s Guide to CTFing)
  2083. 90%Stepping up for a truly open source Elasticsearch | Amazon Web Services
  2084. 99%Building your first Telegram Bot with ASP.NET Core
  2085. 99%Please Stop Encrypting with RSA Directly
  2086. 97%The State of State Machines
  2087. 98%The worrying trend of game technology centralization
  2088. 99%Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  2089. 94%We can do better than Signal
  2090. 99%CondensationDB/Condensation
  2091. 99%Mesmerizing Chameleon Signatures
  2092. 98%Is Writing as Important as Coding?
  2093. 99%Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  2094. 99%A history of end-to-end encryption and the death of PGP
  2095. 99%Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  2096. 99%KEMTLS: Post-quantum TLS without signatures
  2097. 99%Fully Homomorphic Encryption Part One: A Gentle Intro
  2098. 99%danso - happy-space: a whitespace-sensitive calculator
  2099. 95%Holistic web protection: industry recognition for a prolific 2020
  2100. 94%Foam
  2101. 98%Send and receive WhatsApp messages through email
  2102. 93%Learn X by doing Y - A project-based learning search engine
  2103. 99%Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  2104. 98%jukefoxer/Signal-Android
  2105. 99%An introduction to the Data Protection system in ASP.NET Core
  2106. 92%Notification of Data Security Incident - December 23, 2020
  2107. 97%My personal wishlist for a decentralized social network
  2108. 99%Machine Learning with ML.NET - Linear Regression
  2109. 96%Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  2110. 99%Wasmer - The Universal WebAssembly Runtime
  2111. 98%Signal, thank you for not collecting my data. But I won’t use you.
  2112. 90%Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  2113. 99%safepassme
  2114. 95%What I learned doing 125 public talks - Part I
  2115. 97%Steam's login method is kinda interesting
  2116. 99%.NET Rocks! vNext
  2117. 88%WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
  2118. 90%DALL·E: Creating Images from Text
  2119. 98%Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  2120. 97%HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  2121. 99%SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  2122. 99%The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  2123. 98%Cryptology ePrint Archive: Report 2020/1456
  2124. 98%s-18: FSE 2020 Rump session
  2125. 85%Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  2126. 99%Linux Hardening Guide | Madaidan's Insecurities
  2127. 98%Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  2128. 97%zkSNARKS and Cryptographic Accumulators
  2129. 94%NeurIPS 2020 Best Machine Learning Paper Awards
  2130. 99%Web Authentication Methods Compared
  2131. 96%Combating abuse in Matrix - without backdoors. | Matrix.org
  2132. 97%Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  2133. 79%Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  2134. 95%Development time is money, therefore I RAID
  2135. 86%Against Victimhood
  2136. 80%The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  2137. 95%No, Cellebrite cannot 'break Signal encryption.'
  2138. 98%Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  2139. 97%Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  2140. 96%Why I've Been Merging Microservices Back Into The Monolith At InVision
  2141. 97%My Engineering Axioms
  2142. 97%2020’s Top 15 Machine Learning & AI Research Papers
  2143. 51%You're Missing Out If You Don't Write Weekly Digests
  2144. 97%Cryptologie | Vetted Encryption
  2145. 99%Apple M1 foreshadows RISC-V
  2146. 97%Bizarre Design Choices In Zoom’S End-To-End Encryption
  2147. 94%Branding Your Own Startup | Blog of Pascal
  2148. 98%Commits are snapshots, not diffs - The GitHub Blog
  2149. 98%Giving more tools to software engineers: the reorganization of the factory
  2150. 95%How to conduct a competitive analysis - Philipp Muens
  2151. 88%Adding Encrypted Group Calls to Signal
  2152. 86%Learn about online security, privacy, and encryption
  2153. 98%The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  2154. 97%Privacy and Compliance Reading List
  2155. 92%Computers Are Bad
  2156. 96%Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  2157. 94%Google Alternatives 2020: Best Privacy Friendly Alternatives
  2158. 85%How to Build a Global Network that Complies with Local Law
  2159. 99%Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  2160. 98%There's Always More History • Hillel Wayne
  2161. 96%Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  2162. 97%Improving DNS Privacy with Oblivious DoH in
  2163. 98%From Zero to AppStore
  2164. 92%Privacy needs to be built into the Internet
  2165. 99%benwilber/boltstream
  2166. 95%Welcome to Privacy & Compliance Week
  2167. 98%InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  2168. 99%On Trusting Macintosh Hardware
  2169. 98%An introduction to three-phase power and PDUs
  2170. 91%Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  2171. 98%How to Make Your Code Reviewer Fall in Love with You
  2172. 99%Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  2173. 99%An iOS zero-click radio proximity exploit odyssey
  2174. 98%Gamedev from scratch 0: Groundwork
  2175. 91%Release OpenZFS 2.0.0 · openzfs/zfs
  2176. 93%We Need Organic Software
  2177. 99%ph1lter
  2178. 97%Are My Encryption Keys In The Cloud Really Secure?
  2179. 94%How to Think for Yourself
  2180. 98%An ex-Googler's guide to dev tools
  2181. 88%Crypto Dictionary
  2182. 90%Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  2183. 98%How do people find bugs?
  2184. 94%What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  2185. 95%Getting lucky with posting on Hacker News
  2186. 96%Productive Uncertainty - Reaction Wheel
  2187. 97%zkSummit 6 | Hopin
  2188. 98%Normal Forms - Simple Talk
  2189. 97%The book is finished, well sort of...
  2190. 71%Facebook Is Going After Its Critics in the Name of Privacy
  2191. 99% Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  2192. 97%The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  2193. 98%zfs.rent
  2194. 97%Six months of Tiny Projects
  2195. 99%Anchoring Trust: A Hardware Secure Boot Story
  2196. 98%Claims encryption for B2C tokens | Developer Support
  2197. 96%Can’t open apps on macOS: an OCSP disaster waiting to happen
  2198. 99%Using Matrix to replace proprietary and centralized chat apps
  2199. 99%Going Bark: A Furry’s Guide to End-to-End Encryption
  2200. 99%Does Apple really log every app you run? A technical look
  2201. 97%SAD DNS Explained
  2202. 83%How a Game Developer Leaked 46 Million Accounts
  2203. 99%Etebase - Your end-to-end encrypted backend
  2204. 97%Get Animal Jam for your mobile device, PC, or Mac
  2205. 98%caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  2206. 96%Notes On Owning Your Own Business
  2207. 97%How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  2208. 96%Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  2209. 80%Zoom lied to users about end-to-end encryption for years, FTC says
  2210. 97%What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  2211. 98%Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  2212. 75%Over 1M Lazada RedMart accounts sold online after data breach
  2213. 95%Productivity vs. Privacy
  2214. 99%Multithreading Handbook for Simulation Developers
  2215. 99%The missing explanation of zk-SNARKs: Part 2
  2216. 87%Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  2217. 96%Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  2218. 97%Standing on Our Own Two Feet
  2219. 99%Querying Across Databases In SQL Azure
  2220. 97%Scripts for Managing Azure Container Registry
  2221. 97%A Brief Introduction to Deniability
  2222. 99%Leaving OCaml
  2223. 99%Two workers are quadratically better than one • Hillel Wayne
  2224. 99%C# in Simple Terms - Exceptions and Exception Handling
  2225. 95%The Basis of Testing – Stories from a Software Tester
  2226. 69%Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  2227. 99%The missing explanation of ZK-SNARKs: Part 1
  2228. 90%Scott Santens - An Engineering Argument for Basic Income
  2229. 93%RedMart Data Security Incident
  2230. 97%Episode 63 - Being Productive With Jay Miller
  2231. 96%How software eats money
  2232. 97%ML Optimization pt.1 - Gradient Descent with Python
  2233. 94%Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  2234. 83%gnu.org
  2235. 99%Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  2236. 97%1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  2237. 97%Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  2238. 97%Azure CLI Oct 2020 release
  2239. 98%The accelerating adoption of Julia
  2240. 97%Personal banking needs an API | Chris Hardie's Tech and Software Blog
  2241. 87%Let's talk about fake reviews - part 1
  2242. 93%14 Popular Machine Learning Evaluation Metrics
  2243. 96%A Legislative Path to an Interoperable Internet
  2244. 94%Questioning Probability
  2245. 99%charmbracelet/glow
  2246. 98%Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  2247. 96%Exposing covert surveillance backdoors in children’s smartwatches
  2248. 99%XChaCha20-Poly1305: A Primer with Examples in .NET
  2249. 98%Event Feeds: Simple and reliable messaging infrastructure
  2250. 98%Smart male chastity lock cock-up
  2251. 87%Stop the EARN IT Bill Before It Breaks Encryption
  2252. 97%Security Of Streaming Encryption In Google's Tink Library
  2253. 96%It Didn’t Take Too Long…
  2254. 99%Fortunately, I don't squash my commits
  2255. 97%Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  2256. 98%Wiki - RustStarterKit2020
  2257. 97%Episode 61 - Azure and Live Conferences With Andy Morrell
  2258. 99%Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  2259. 66%Coinbase offers exit package to those uncomfortable with new direction
  2260. 97%Doing discourse better: Stuff I wish I knew
  2261. 98%is it worth it? — Martin Kleppmann’s blog
  2262. 93%Advisory: security issues in AWS KMS and AWS Encryption SDKs
  2263. 96%This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  2264. 96%Zig's New Relationship with LLVM
  2265. 99%How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  2266. 98%Using Azure RBAC with Azure Key Vault
  2267. 95%Uncomfortable Questions About App Signing
  2268. 98%
  2269. 98%Google Interview Questions Deconstructed: The Knight’s Dialer
  2270. 96%Simple Anomaly Detection Using Plain SQL
  2271. 88%Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  2272. 99%VPNs from first principles
  2273. 98%No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  2274. 97%Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  2275. 97%dwmkerr/hacker-laws
  2276. 97%Revenue Model, not Culture, is the Dominant Term
  2277. 99%CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  2278. 99%When double.Epsilon can equal 0
  2279. 96%Let's Encrypt's New Root and Intermediate Certificates
  2280. 97%A Thanksgiving Carol
  2281. 95%Nvidia’s Integration Dreams
  2282. 98%Phosphine gas in the cloud decks of Venus
  2283. 97%GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  2284. 97%Some Great Books For Programmers That StackOverflow Cannot Replace
  2285. 97%Security by Obscurity is Underrated
  2286. 99%What Clojure spec is and what you can do with it (an illustrated guide)
  2287. 99%Raccoon Attack
  2288. 99%BashPitfalls - Greg's Wiki
  2289. 74%TLS certificate lifespan cut short: A win for security, or cause for chaos?
  2290. 98%Things I Learned to Become a Senior Software Engineer
  2291. 67%Verizon achieves milestone in future-proofing data from hackers
  2292. 97%Why you want to encrypt password hashes
  2293. 87%Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  2294. 87%Attention is your scarcest resource
  2295. 99%Key exchange standards - Manning
  2296. 99%Key exchange standards - Manning
  2297. 99%connorferster/handcalcs
  2298. 95%The Why and How of Privacy and Security — This Too Shall Grow
  2299. 99%Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  2300. 96%I've decided to pursue a Bootstrap MBA
  2301. 98%Why I’m Writing A Book On Cryptography
  2302. 99%Minimal React: getting started with the frontend library
  2303. 99%Soatok’s Guide to Side-Channel Attacks
  2304. 98%Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  2305. 99%So you want to roll your own crypto?
  2306. 84%Zoom is now critical infrastructure. That’s a concern
  2307. 93%Pure and Applied Chess
  2308. 97%It Took 2 Years To Make My First Dollar Selling A Product
  2309. 95%The Five Pillars Of Wealth Building - Darius Foroux
  2310. 95%Heyyyyyyyyyyyy.com | email with *nuance*
  2311. 94%Providers | PrivacyTools
  2312. 98%Is cloud security too easy to screw up? | A Cloud Guru
  2313. 65%A New Botnet Is Covertly Targeting Millions of Servers
  2314. 99%Cross-platform cryptography in .NET Core and .NET 5
  2315. 98%degoogle
  2316. 99%drduh/macOS-Security-and-Privacy-Guide
  2317. 99%Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  2318. 95%July 11, 2020 - LiveAuctioneers Account Security
  2319. 98%What's new in the Windows Store client
  2320. 97%fast.ai releases new deep learning course, four libraries, and 600-page book
  2321. 98%Transfer a Software Project - Lessons Learned - dcaulfield
  2322. 99%jesseduffield/horcrux
  2323. 99%Obfuscating your email on the web
  2324. 96%A Guide to Autodidactism | Jack Kinsella
  2325. 99%Symmetric and Asymmetric Encryption in .NET Core
  2326. 96%You Need a Password Manager. Here Are the Best Ones
  2327. 88%Graphical Linear Algebra
  2328. 99%Let's Learn x86-64 Assembly! Part 0
  2329. 98%Nintendo DS Architecture | A Practical Analysis
  2330. 99%Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  2331. 98%JWTs: Which Signing Algorithm Should I Use?
  2332. 98%Data Breach Statement - Utah Gun Exchange
  2333. 79%2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  2334. 90%Why I Left a Career as a Startup CTO to Become a Writer
  2335. 93%IBM Reveals Next-Generation IBM POWER10 Processor
  2336. 97%Hiding messages in x86 binaries using semantic duals
  2337. 98%The Illustrated TLS Connection
  2338. 99%Frustrated? It's not you, it's Rust - fasterthanli.me
  2339. 91%Mozilla's failures and a path to profitability
  2340. 98%Intel® Trust Domain Extensions
  2341. 97%Handles are the better pointers
  2342. 99%Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  2343. 99%Serverless apps on AWS using F# and fable
  2344. 97%Mozilla Alumni Network
  2345. 99%The CompSci Pub
  2346. 96%I don’t trust Signal
  2347. 91%Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  2348. 99%Mobile Phone Streams
  2349. 97%bulletproofs::notes::range_proof - Rust
  2350. 99%How to encrypt and decrypt shared folders on my Synology NAS
  2351. 91%Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  2352. 98%Building dashboards for operational visibility | Amazon Builders' Library
  2353. 94%A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  2354. 98%Proof of X
  2355. 99%hephaest0s/usbkill
  2356. 98%1Password for Linux development preview
  2357. 96%27-inch iMac gets a major update
  2358. 95%Tales of the Autistic Developer - Senior Developer
  2359. 97%How it works - Briar
  2360. 99%Azure Cloud Shell Tips And Tricks | Build5Nines
  2361. 60%Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  2362. 90%David Wong
  2363. 96%swyx Writing | Slack is Fumbling Developers
  2364. 99%Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  2365. 99%.NET R&D Digest (July, 2020)
  2366. 95%Chessprogramming wiki
  2367. 99%Polymorphic Encryption Algorithms — Generating Code Dynamically
  2368. 99%Some SQL Tricks of an Application DBA
  2369. 82%You Want Options
  2370. 99%Tip 272 - Azure Security Best Practices
  2371. 99%Joe Bergeron | Java Obfuscation: A Pattern Language
  2372. 98%p410n3 blog
  2373. 93%Dropping Out of College to Join Facebook: 3 Years Later
  2374. 97%Storage 101: Data Security and Privacy - Simple Talk
  2375. 98%Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  2376. 99%Exploring Fully Homomorphic Encryption
  2377. 98%Essays on programming I think about a lot
  2378. 95%You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  2379. 95%Designing a New Old Home: Part 1
  2380. 99%The encrypted homelab
  2381. 99%Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  2382. 96%MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  2383. 98%What’s New in Thunderbird 78
  2384. 97%100 Best Kubernetes Books of All Time
  2385. 97%Poor feedback from readers
  2386. 98%Hacking Reolink cameras for fun and profit
  2387. 95%Welcome to Element!
  2388. 95%Data Structures & Algorithms I Actually Used Working at Tech Companies
  2389. 94%Digicert revokes a raft of web security certificates
  2390. 99%Python Malware On The Rise
  2391. 99%A few thoughts about Signal’s Secure Value Recovery
  2392. 97%Trending
  2393. 97%Disabling Google 2FA Doesn't Need 2FA
  2394. 56%New German law would force ISPs to allow secret service to install trojans on user devices
  2395. 98%[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  2396. 88%VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  2397. 99%Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  2398. 98%A Team
  2399. 99%Clean Architecture, 2 years later - Elton Minetto
  2400. 99%Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  2401. 99%A Concurrency Cost Hierarchy
  2402. 88%VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  2403. 97%Why I’m Writing A Book On Cryptography
  2404. 81%nabeelqu
  2405. 97%Why Can't I Reproduce Their Results?
  2406. 97%The true cost of knowledge | RoyalSloth
  2407. 96%Beware the Google Password Manager - fasterthanli.me
  2408. 99%Apple Lightning
  2409. 89%Oppose the EARN IT Act
  2410. 97%New Mac ransomware spreading through piracy - Malwarebytes Labs
  2411. 97%How CDNs Generate Certificates
  2412. 98%foambubble/foam
  2413. 99%How to get the best out of your Yubikey with GPG
  2414. 80%New US Bill would require makers of encrypted devices to leave a backdoor
  2415. 98%Why AES-GCM Sucks
  2416. 90%There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  2417. 94%Navigating Power & Status
  2418. 98%Which Database should I use in my Azure Serverless App?
  2419. 99%Avoiding exposing identifier details to your users
  2420. 99%jonathan-laurent/AlphaZero.jl
  2421. 99%Do you CI? | Benji's Blog -
  2422. 96%How is NSA breaking so much crypto?
  2423. 95%Discovering Dennis Ritchie’s Lost Dissertation - CHM
  2424. 98%The smartest password policy enforcer for Active Directory
  2425. 96%Making your data residency choices easier with Azure
  2426. 99%Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  2427. 89%End-to-End Encryption Update - Zoom Blog
  2428. 97%GitHub Terms of Service - GitHub Help
  2429. 98%Reasoning by Lego: The wrong way to think about cryptography.
  2430. 85%GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  2431. 97%Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  2432. 89%May 2020 news · Gwern.net
  2433. 98%Exploration Strategies in Deep Reinforcement Learning
  2434. 85%How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  2435. 99%DRY vs DAMP in Unit Tests
  2436. 98%How to set compensation using commonsense principles
  2437. 99%Playing Around With The Fuchsia Operating System
  2438. 98%Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  2439. 94%12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  2440. 79%Google got rich from your data. DuckDuckGo is fighting back
  2441. 96%Discret 11, the French TV encryption of the 80's
  2442. 99%Hacking Windows with F# 5.0 Scripts
  2443. 99%Byzantine and non-Byzantine distributed systems
  2444. 99%Logging with Decorators in TypeScript
  2445. 99%How are you improving your technology skills today? Start by reading articles
  2446. 70%The Dictator's Army and charismatic founders
  2447. 95%Is a trillion-dollar worth of programming lying on the ground
  2448. 91%Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  2449. 98%Introducing P2P Matrix | Matrix.org
  2450. 96%Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  2451. 99%CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  2452. 99%ScottHolden/BFSourceGen
  2453. 98%A Guide to Threat Modelling for Developers
  2454. 98%Against an Increasingly User-Hostile Web
  2455. 98%A Guide to Threat Modelling for Developers
  2456. 92%Obsidian
  2457. 97%Messaging with Azure Service Bus - Part 9 - Premium Features
  2458. 98%A Guide to Threat Modelling for Developers
  2459. 99%Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  2460. 99%Org Mode - Organize Your Life In Plain Text!
  2461. 99%Implementing simple cooperative threads in C - Stephen Brennan
  2462. 87%Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  2463. 98%NIST Special Publication 800-63-3
  2464. 90%An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  2465. 99%A Guide to Threat Modelling for Developers
  2466. 97%Introduction to quantum computing with Q# – Part 3, Single qubit gates
  2467. 96%Turning Signal App into a Coarse Tracking Device
  2468. 98%A Guide to Threat Modelling for Developers
  2469. 99%OpenBSD 6.7
  2470. 96%Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  2471. 99%The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  2472. 98%A Guide to Threat Modelling for Developers
  2473. 98%Cryptology ePrint Archive: Report 2020/572
  2474. 99%How Not to Store Passwords
  2475. 66%Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  2476. 99%Replacing JWTs with Branca and PASETO in .NET Core
  2477. 99%Meshing with LinkerD2 using gRPC-enabled .NET Core services
  2478. 98%Lockdown Course: Introduction to Cryptography - James Grime
  2479. 96%Asgard Systems uses ML.NET to reduce food waste | .NET
  2480. 98%Make LLVM fast again
  2481. 88%Zoom buys Keybase to help it build end-to-end encryption
  2482. 99%Alternatives to PGP
  2483. 98%Cryptology ePrint Archive: Report 2018/607
  2484. 75%A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  2485. 93%Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  2486. 96%Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  2487. 98%April Extensions for Firefox Preview
  2488. 90%Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  2489. 99%Modern SAT solvers: fast, neat and underused (part 1 of N)
  2490. 98%Startup financial models - 12 templates compared for SaaS
  2491. 98%OpenPGP Message Format
  2492. 98%How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  2493. 91%SailfishOS - Sailfish OS
  2494. 97%IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  2495. 99%Why not "Why not WireGuard?"
  2496. 99%Messaging with Azure Service Bus - Part 5 - Message Sending Options
  2497. 99%keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  2498. 98%Barbie typewriter
  2499. 95%Preventing Software Rot
  2500. 96%Search Results - Springer
  2501. 99%Build a C# App with CockroachDB and the .NET Npgsql Driver
  2502. 97%This is what end-to-end encryption should look like! - Jitsi
  2503. 99%FocalFossa/ReleaseNotes - Ubuntu Wiki
  2504. 99%How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  2505. 97%ZEIT is now Vercel - Vercel
  2506. 99%Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  2507. 96%Scuttlebot peer-to-peer log store
  2508. 89%Saving Money on Internation Payments as a Remote Freelancer
  2509. 96%This is what end-to-end encryption should look like! - Jitsi
  2510. 99%Technical reasons to choose FreeBSD over GNU/Linux
  2511. 99%The limitations of Android N Encryption
  2512. 98%Hacking my Sixth Form College network in 1991
  2513. 98%Temporal circuit of macroscale dynamic brain activity supports human consciousness
  2514. 96%Learn dbatools in a Month of Lunches
  2515. 99%Running your own secure communication service with Matrix and Jitsi | Matrix.org
  2516. 95%OnCheckin - Continuous Deployment for ASP.Net websites.
  2517. 97%Welcome · Real-World Cryptography MEAP V05
  2518. 96%How we recovered over $300K of Bitcoin
  2519. 72%Reassuring Words and Good Intentions Don't Mean Good Security
  2520. 93%Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  2521. 88%A Message to Our Users - Zoom Blog
  2522. 84%The EARN IT Act Violates the Constitution
  2523. 98%Perspectives & gaps between theory, practice & industry research in cryptography
  2524. 99%.NET R&D Digest (March, 2020)
  2525. 93%Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  2526. 89%US Government Wages War on Encryption
  2527. 99%Await | Writing an OS in Rust
  2528. 56%patents in crypto
  2529. 99%Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  2530. 99%The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  2531. 98%New grad vs senior dev
  2532. 96%Released: Microsoft.Data.SqlClient 2.0 Preview 2
  2533. 99%Speeding up Linux disk encryption
  2534. 98%Unsure Calculator
  2535. 97%[15] RFR 8172680: Support SHA-3 based Hmac algorithms
  2536. 99%A Quick Garbled Circuits Primer
  2537. 96%0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  2538. 99%Software Engineer - Jobs at Apple
  2539. 99%How Tailscale works
  2540. 90%Scott Helme
  2541. 83%MacBook Air
  2542. 97%Ryan_Connolly_Resume.docx
  2543. 91%EARN IT bill is aiming at destroying encryption. We must take action now.
  2544. 99%Async ValueTask Pooling in .NET 5 | .NET Blog
  2545. 99%ploeh blog
  2546. 96%The polygons of Another World: Atari Jaguar
  2547. 94%MakerDAO gets stress tested as ETH price plummets
  2548. 99%The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  2549. 99%EARN IT Must Not Happen
  2550. 99%What is Meshtastic?
  2551. 99%A Template for Clean Domain-Driven Design Architecture
  2552. 97%Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  2553. 91%How I Survived Being A $220k/year Intern
  2554. 99%draft-ietf-mls-protocol-09
  2555. 86%Keybase
  2556. 96%EARN IT is a direct attack on end-to-end encryption
  2557. 99%Intel x86 Root of Trust: loss of trust
  2558. 97%The growth of command line options, 1979-Present
  2559. 98%Re: SMB over QUIC: Files Without the VPN
  2560. 97%Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  2561. 93%WireGuard Gives Linux a Faster, More Secure VPN
  2562. 95%Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  2563. 68%zkMesh
  2564. 99%The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  2565. 97%CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  2566. 53%DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  2567. 99%An Intuitive Guide to Linear Algebra – BetterExplained
  2568. 99%It’s 2020. Is your code ready for leap day?
  2569. 97%pwn.college BETA
  2570. 97%If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  2571. 98%How can I create a password protected .zip file in Windows 10?
  2572. 97%The Zen of Go | Dave Cheney
  2573. 98%A Simple Range Proof From Polynomial Commitments - HackMD
  2574. 99%microsoft/electionguard
  2575. 99%TimeSnapper, automatic screenshot software, auto screen capture
  2576. 99%hassio-addons/addon-ssh
  2577. 98%Welcome to the UK .NET Tour 2020
  2578. 99%Source Code | OpenVPN
  2579. 99%A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  2580. 99%Fundamental Concepts for Elastic Jobs in Azure SQL Database
  2581. 93%Messaging Layer Security: Towards a New Era of Secure Group Messaging
  2582. 99%Cryptologie
  2583. 98%Update on our new and upcoming security keys
  2584. 98%Latacora - Stop Using Encrypted Email
  2585. 97%dwmkerr/hacker-laws
  2586. 98%Real-World Cryptography
  2587. 98%The NuGet Blog
  2588. 99%How HTTPS works Part 1 — Building Blocks
  2589. 97%google/tink
  2590. 99%damienbod/AspNetCoreCertificates
  2591. 96%Serious Cryptography | No Starch Press
  2592. 99%draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  2593. 98%Dino 0.1 Release - Dino. Communicating happiness.
  2594. 99%Ryujinx/Ryujinx
  2595. 93%Searching For New Adventures In Software Development
  2596. 98%Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  2597. 99%Building personal search infrastructure for your knowledge and code | beepb00p
  2598. 97%Authentication, What The Fuck?
  2599. 99%How to write a simple operating system in assembly language
  2600. 98%Welcome to the UK .NET Tour 2020
  2601. 99%v5.8 Release Notes
  2602. 99%The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  2603. 99%.NET Core, .NET 5; the exodus of .NET Framework?
  2604. 99%Autocrypt 1.1.0 documentation
  2605. 99%On Privacy versus Freedom | Matrix.org
  2606. 99%Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  2607. 92%Google gives up on US carriers, will roll out its own RCS chat system
  2608. 99%.NET R&D Digest (November – December, 2019)
  2609. 99%Signal >> Blog >> Technology Preview for secure value recovery
  2610. 99%Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  2611. 99%Zero allocation code in C# and Unity - Seba's Lab
  2612. 72%How to generate random numbers using water bubbles
  2613. 99%tmds/Tmds.Ssh
  2614. 99%oqtane/oqtane.framework
  2615. 95%Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  2616. 96%Why IVPN - What makes IVPN the best privacy protection service
  2617. 92%GateHub Investigation - Final Statement
  2618. 95%Stop surveillance and preserve your privacy with IVPN
  2619. 98%Isogeny crypto
  2620. 90%Homepage | ZKProof Standards
  2621. 99%dotnet/SqlClient
  2622. 98%Thoughts on DNS-over-HTTPS
  2623. 99%x86/x64 SIMD Instruction List (SSE to AVX512)
  2624. 88%bye: FTP Support Is Going Away
  2625. 93%Verzekeraar Allianz informeert klanten over datalek - Security.NL
  2626. 95%Commas in big numbers everywhere: An OpenType adventure
  2627. 95%Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  2628. 99%OceanLibrary/Ocean
  2629. 93%Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  2630. 97%A detailed look at Ubuntu’s new experimental ZFS installer
  2631. 92%Intel 545s 2.5&#34; 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive &#40;SSD&#41; SSDSC2KW256G8X1 - Newegg.com
  2632. 95%Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  2633. 97%Peddle the Pedal to the Metal
  2634. 99%praeclarum/sqlite-net
  2635. 98%beemdevelopment/Aegis
  2636. 99%draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  2637. 92%PrivacySafe: The Anti-Cloud Appliance
  2638. 98%awslabs/s2n
  2639. 99%Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  2640. 96%Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  2641. 99%OWASP/CheatSheetSeries
  2642. 99%OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  2643. 92%Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  2644. 98%Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  2645. 83%Security Incident - Please Change Your Password
  2646. 94%EV SSL Certificates Phased Out of New Browser Updates | Venafi
  2647. 98%Learn UI Design: The Complete Online Video Course
  2648. 98%KNOB Attack
  2649. 84%Gone forEVer!
  2650. 99%Spying on HTTPS
  2651. 89%Online syntax highlighting for the masses!
  2652. 97%Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  2653. 97%Canva Security Incident - May 24 FAQs
  2654. 98%Architecture for humans - Ayende @ Rahien
  2655. 80%Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
  2656. 93%Pwnie Awards
  2657. 97%More on Backdooring (or Not) WhatsApp - Schneier on Security
  2658. 99%ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  2659. 98%Kazakhstan’s HTTPS Interception
  2660. 96%When a rewrite isn’t: rebuilding Slack on the desktop
  2661. 97%Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  2662. 79%Digital Driver’s Licenses Could Become a Real Option in Some States
  2663. 97%CRYPTO-LAB
  2664. 98%Real-World Cryptography
  2665. 99%Proving security at scale with automated reasoning - All Things Distributed
  2666. 99%VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  2667. 97%The Ultra Secure Crypto Storage & Communication Device
  2668. 98%Security advisory 2019-06-13 | Yubico
  2669. 99%Fixing Random, part 34
  2670. 99%An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  2671. 98%dotnet/coreclr
  2672. 98%Apple CryptoKit | Apple Developer Documentation
  2673. 98%Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  2674. 99%Accessing UNIX sockets remotely from .NET - Red Hat Developer
  2675. 99%RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  2676. 89%Ethical Alternatives & Resources - ethical.net
  2677. 98%dotnet/coreclr
  2678. 96%Top SSL Certificates Buyer's Guide
  2679. 99%Using Ed25519 signing keys for encryption
  2680. 99%Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  2681. 99%Performance Improvements in .NET Core 3.0 | .NET Blog
  2682. 98%ZombieLoad Attack
  2683. 98%Domain Randomization for Sim2Real Transfer
  2684. 99%eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  2685. 99%ZkVM: a new design for fast, confidential smart contracts
  2686. 97%Community and Communication going forward
  2687. 99%Do we need effects to get abstraction?
  2688. 99%RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  2689. 99%mpm guide - niall t.l.
  2690. 98%The .NET Abstraction Pile
  2691. 98%A Recipe for Training Neural Networks
  2692. 99%Twisted Oak
  2693. 99%AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  2694. 97%Peddle the Pedal to the Metal
  2695. 99%JDK 12 Security Enhancements
  2696. 98%Understanding the Limitations of HTTPS
  2697. 99%Cryptologie
  2698. 99%We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  2699. 99%Direct3D 11.3 Functional Specification
  2700. 99%Verified cryptographic provider a triple threat
  2701. 95%The story of the Rendition Vérité 1000
  2702. 93%Scott Helme
  2703. 99%Dotnet-Boxed/Templates
  2704. 99%BoringTun, a userspace WireGuard implementation in Rust
  2705. 93%New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  2706. 97%The WhibOx Contest Edition 2 - CYBERCRYPT
  2707. 94%Understanding STIR/SHAKEN
  2708. 97%Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  2709. 98%We need to talk about Session Tickets
  2710. 99%Introduction
  2711. 92%Cybersecurity for the Public Interest - Schneier on Security
  2712. 89%Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  2713. 97%Data Leakage from Encrypted Databases - Schneier on Security
  2714. 94%kelseyhightower/kubernetes-the-hard-way
  2715. 95%Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  2716. 99%Crypto Canon - Andreessen Horowitz
  2717. 96%Blockchain Governance: Programming Our Future
  2718. 97%Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  2719. 97%Keybase launches encrypted git
  2720. 98%AI Progress Measurement
  2721. 97%Microsecond Resolution Time Services for Windows
  2722. 99%vivri/Adjective
  2723. 98%On the Security of Password Managers - Schneier on Security
  2724. 96%Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  2725. 95%Reconstructing SIGSALY - Schneier on Security
  2726. 95%Public-Interest Tech at the RSA Conference - Schneier on Security
  2727. 98%Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  2728. 95%Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  2729. 98%Hacking the GCHQ Backdoor - Schneier on Security
  2730. 95%Friday Squid Blogging: Squid Lollipops - Schneier on Security
  2731. 98%Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  2732. 93%Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  2733. 95%Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  2734. 92%Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  2735. 95%New Australian Backdoor Law - Schneier on Security
  2736. 92%Security Risks of Chatbots - Schneier on Security
  2737. 86%Friday Squid Blogging: Squid Sculptures - Schneier on Security
  2738. 96%Security of Solid-State-Drive Encryption - Schneier on Security
  2739. 93%ID Systems Throughout the 50 States - Schneier on Security
  2740. 67%Cell Phone Security and Heads of State - Schneier on Security
  2741. 99%draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  2742. 99%Ext4 Disk Layout - Ext4
  2743. 99%Modern Alternatives to PGP
  2744. 98%proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  2745. 98%Real World Crypto 2019
  2746. 93%The year in post-quantum crypto
  2747. 95%Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  2748. 91%The Case Against Quantum Computing - IEEE Spectrum
  2749. 99%Mathematics of Public Key Cryptography
  2750. 81%CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  2751. 92%D. J. Bernstein / Talks
  2752. 88%Security in Times of Surveillance
  2753. 51%Round 1 Submissions - Post-Quantum Cryptography | CSRC
  2754. 88%Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  2755. 79%Pitching security vs. privacy is asking the wrong question
  2756. 98%libpqcrypto: Intro
  2757. 88%Security in Times of Surveillance
  2758. 74%Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  2759. 99%The ROBOT Attack
  2760. 97%Unity Labs Publications | Unity
  2761. 92%Mersenne Prime Discovery - 2^82589933-1 is Prime!
  2762. 86%Cloud Data Backup for Small Businesses | CrashPlan
  2763. 99%nucypher/nufhe
  2764. 99%RUB-NDS/TLS-Padding-Oracles
  2765. 98%[paper review] A faster, more efficient cryptocurrency
  2766. 99%mimoo/eureka
  2767. 97%Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  2768. 98%Database Encryption
  2769. 97%Kerckhoffs’ principles – Why should I make my cipher public?
  2770. 93%Proxy re-encryption and FHE with NuCypher
  2771. 98%Attack of the week: searchable encryption and the ever-expanding leakage function
  2772. 98% Introducing Adiantum: Encryption for the Next Billion Users
  2773. 97%Quantum computing as a field is obvious bullshit
  2774. 98%Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  2775. 95%Going old school: how I replaced Facebook with email
  2776. 74%» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  2777. 72%» Agrippa (A Book of the Dead) The Digital Antiquarian
  2778. 69%» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  2779. 92%» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  2780. 99%.NET Design Review: GitHub Quick Reviews
  2781. 98%Tuning a Runtime for Both Productivity and Performance
  2782. 85%We didn’t see this coming
  2783. 99%Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  2784. 98%dotnet/coreclr
  2785. 99%MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  2786. 97%no dogma podcast - powered by FeedBurner
  2787. 99%Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  2788. 99%Software Tokens Won't Save You
  2789. 99%Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1