Explore other dev related sites in this ring. If you would like to join this ring click here.
devring.club Previous Random Next

linksfor.dev(s)

Posts for 'encryption'

  1. 57%Twitter Suspension
  2. 95%Connection Failures with Microsoft.Data.SqlClient 4 and later
  3. 54%Gravatar "Breach" Exposes Data of 100+ Million Users
  4. 92%uBlock, I exfiltrate: exploiting ad blockers with CSS
  5. 91%Security | 2021 | The Web Almanac by HTTP Archive
  6. 98%Understanding HKDF - Dhole Moments
  7. 87%Welcome to CIO Week and the future of corporate networks
  8. 86%Understanding Zero-knowledge proofs through simple examples
  9. 86%Understanding Zero-knowledge proofs through simple examples
  10. 67%On the Use of Pedersen Commitments for Confidential Payments
  11. 94%Securing Sensitive Data in an Event Driven Architecture
  12. 76%Don't Let the Internet Dupe You, Event Sourcing is Hard
  13. 98%Released: General Availability of Microsoft.Data.SqlClient 4.0
  14. 89%Bank transfers as a payment method
  15. 95%Bitslicing for Constant Time Cryptography
  16. 71%How to configure verified GitHub commits?
  17. 93%The best Task+Note system
  18. 95%Understanding identity tokens
  19. 95%An intensive introduction to cryptography: index
  20. 91%An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
  21. 92%RSA vs ECDSA for DNSSEC | APNIC Blog
  22. 99%ZK-Hack Puzzle #4 Writeup - HackMD
  23. 59%Speculative Autobiographies
  24. 96%Mentoring junior programmers: What I tell them is job number one - Vallified
  25. 96%The Joy of Cryptography
  26. 98%GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
  27. 91%80386DX ISA SINGLE BOARD MICROCOMPUTER
  28. 82%Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
  29. 99%Model-based Testing
  30. 98%RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
  31. 97%XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
  32. 89%Regex Learn - Step by step, from zero to advanced.
  33. 97%Cracking the Adventure Time Cipher
  34. 96%ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
  35. 81%ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
  36. 93%Practical attacks against attribute-based encryption
  37. 93%Using a framework can make you stupid!
  38. 84%Yes, Programming is Hard
  39. 84%No one knows what's coming next
  40. 87%Five Great (free!) Ways to Get Started With Cloudflare
  41. 87%Threshold Digital Signatures
  42. 98%Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
  43. 95%ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
  44. 91%Reflecting on 11 years of side projects
  45. 99%Announcing YARP 1.0 Release
  46. 64%Libra Shrugged — Chapter 15: Central bank digital currencies
  47. 99%Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
  48. 69%Matter Labs Announces $50M in New Funding for zkSync
  49. 95%Sizing Up Post-Quantum Signatures
  50. 90%Zillow, Prophet, Time Series, & Prices
  51. 66%HOWTO: Get tenure
  52. 96%How To Learn Stuff Quickly
  53. 95%Random Oracles in Cryptography
  54. 98%Threema: Three Strikes, You’re Out
  55. 60%Timeline of the human condition
  56. 98%How (Not) to Design a Hash Function
  57. 91%PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
  58. 98%Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  59. 90%The Future of Work and the Workplace
  60. 88%Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
  61. 93%Simple Product Management Tricks - Jacob Kaplan-Moss
  62. 68%You Are What You Consume - Priyam Mohanty
  63. 96%Pairings in CIRCL
  64. 99%SectorLISP Now Fits in One Sector
  65. 98%Handshake Encryption: Endgame (an ECH update)
  66. 98%mazzo.li — Backing up WhatsApp data through the multi-device web client
  67. 98%Anatomy of a STARK, Part 0: Introduction
  68. 97%Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
  69. 99%You want Tor Browser ... not a VPN
  70. 95%Element One - Matrix, WhatsApp, Signal and Telegram in one place
  71. 87%Privacy is a Human Right | Tor Blog
  72. 99%bitbottle
  73. 98%FROST: Flexible Round-Optimized Schnorr Threshold Signatures
  74. 64%Why aviation’s compass is shifting towards True navigation
  75. 98%The AEGIS family of authenticated encryption algorithms
  76. 99%Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
  77. 99%Bevel Work | Rounding Sharp Corners
  78. 98%Looking into convergent encryption
  79. 97%.NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
  80. 99%F# eXchange 2021 | Skills Matter
  81. 98%8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
  82. 93%Episode 85 - Clean Code in C# With Jason Alls
  83. 76%SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
  84. 95%A Tour Through the OWASP Top 10
  85. 98%PlayStation 3 Architecture | A Practical Analysis
  86. 97%A Critique [The Call of the Open Sidewalk]
  87. 96%How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
  88. 97%Code quality: a concern for businesses, bottom lines, and empathetic programmers
  89. 96%A Graduate Course in Applied Cryptography
  90. 91%Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
  91. 73%Critical security flaw exposed Joburg residents’ private info
  92. 98%NixOS on Framework laptop
  93. 77%Is Nuclear Power Our Best Bet Against Climate Change?
  94. 99%Vimarsh Shah - The best way to self host
  95. 99%Episode 398 - Hear ye! Hear ye!
  96. 98%Introducing Nuntius - Cronokirby
  97. 98%On the Optimization of PLONK – ZK Podcast
  98. 95%Geo Key Manager: Setting up a service for scale
  99. 99%How to use certificates in ASP.NET Core
  100. 99%Avoid Authy, Use Aegis
  101. 99%Privacy-Preserving Compromised Credential Checking
  102. 92%What if Performance Advertising is Just an Analytics Scam? - SparkToro
  103. 99%Cloudflare and the IETF
  104. 99%Canonicalization Attacks Against MACs and Signatures
  105. 97%1Password Refugee’s Guide to KeePass
  106. 99%A Tale Of Two Optimisations
  107. 99%mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
  108. 98%Introducing SSL/TLS Recommender
  109. 97%The efficiency of Microsoft.
  110. 99%You're Doing IoT RNG
  111. 97%Designing technologies with Values? Possibility - Necessity - and European story.
  112. 97%HD wallets and the Legendrery PRF in MPC - HackMD
  113. 98%Sending emails to myself
  114. 98%Cloudflare Research: Two Years In
  115. 90%What happened on the Internet during the Facebook outage
  116. 97%Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
  117. 99%Scheduling Backups To OneDrive For Paperless-ng Using RClone
  118. 90%Lightning Round
  119. 99%A PKI-less secure communication channel: Implementing the record stream
  120. 99%A PKI-less secure communication channel: Coding the handshake
  121. 98%Overview | ChessCoach
  122. 99%The most counterintuitive facts in all of mathematics, computer science, and physics
  123. 99%A PKI-less secure communication channel: The record layer
  124. 99%Ordinal Classification Using PyTorch -- Visual Studio Magazine
  125. 99%A PKI-less secure communication channel: The record layer
  126. 74%New study reveals iPhones aren't as private as you think
  127. 96%Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
  128. 91%Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
  129. 99%Effective Go - The Go Programming Language
  130. 95%The secret to Cloudflare’s pace of Innovation
  131. 95%Copycats and Endurance - The Bootstrapped Founder
  132. 99%A PKI-less secure communication channel: design
  133. 93%Cybersecurity threats - Simple Talk
  134. 98%Automatic cipher suite ordering in crypto/tls
  135. 95%Snapps on Mina with Emre and Izaak – ZK Podcast
  136. 96%Introduction — pyNomo Documentation 0.3.2.0 documentation
  137. 98%The Bi-Symmetric Encryption Fraud
  138. 62%A World Without Sci-Hub
  139. 99%GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
  140. 97%Five ways I handled my OutOfMemoryErrors
  141. 93%How Big Tech Runs Tech Projects and the Curious Absence of Scrum
  142. 97%No, We Won’t Have a Video Call for That!
  143. 99%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  144. 99%Authenticated Boot and Disk Encryption on Linux
  145. 98%The First Rule of Machine Learning: Start without Machine Learning
  146. 94%Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
  147. 95%Let's Encrypt's Root Certificate is expiring!
  148. 97%Linux on the Desktop: Part Two
  149. 97%Cloudflare Pages is Lightning Fast
  150. 99%Splitting up trust
  151. 99%HTTP/3 support in .NET 6
  152. 98%How We Made Playable Quotes for the Game Boy
  153. 99%If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
  154. 99%“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
  155. 94%ACSC Annual Cyber Threat Report 2020-21
  156. 99%WebSocket per-message compression in ASP.NET Core 6
  157. 96%Why Monero
  158. 97%Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
  159. 90%FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
  160. 95%Cloud Providers Publish Ransomware Mitigation Strategies
  161. 98%Welcome to Speed Week and a Waitless Internet
  162. 98%Why Flask will teach you more about software engineering than Django
  163. 98%Part 4: Notifiable Data Breach (NDB) Scheme
  164. 98%Certified Application Security Specialist (CASS)
  165. 84%Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
  166. 74%Rewilding: 60 years ago, scientists let a farm go wild – the results are in
  167. 67%WhatsApp “end-to-end encrypted” messages aren’t that private after all
  168. 99%GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
  169. 98%Welcome · Real-World Cryptography MEAP V14
  170. 50%ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
  171. 97%Release age v1.0.0 🏁 · FiloSottile/age
  172. 99%Why not ZFS
  173. 96%Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
  174. 99%Saving a restic backup the hard way
  175. 97%A meditation on three dead side projects
  176. 67%ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
  177. 94%Important clarifications regarding arrest of climate activist
  178. 92%NO STARTTLS
  179. 98%Proxy vs Reverse Proxy - using a real life example!
  180. 69%Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
  181. 61%WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
  182. 98%Zero Trust Security Architecture Overview | Developer.com
  183. 99%www.opendesktop.org
  184. 99%Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
  185. 95%Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
  186. 79%NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  187. 74%zkMesh: Aug 2021 recap
  188. 99%Improving Git protocol security on GitHub
  189. 99%Recover Password Sync for a Domain Joined Mac
  190. 90%Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
  191. 99%Writing Programs with NCURSES
  192. 96%The Design and Evolution of OCB - Journal of Cryptology
  193. 89%You’re Not Too Late
  194. 99%on terminal control
  195. 99%Aggregatable Distributed Key Generation
  196. 98%Released: Microsoft.Data.SqlClient 4.0 Preview 1
  197. 77%The All-Seeing "i": Apple Just Declared War on Your Privacy
  198. 98%Azure SDK: Goodbye QnA Maker, Hello AI 'Question Answering' -- Visual Studio Magazine
  199. 98%59a34eabe31910abfb06f308 - Apple NeuralHash Collision
  200. 99%Programmers Don’t Understand Hash Functions
  201. 98%The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
  202. 93%r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
  203. 94%Golem keyboard project
  204. 88%Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
  205. 98%Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
  206. 67%EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
  207. 96%Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
  208. 99%Adventures in fuzzing libolm | Matrix.org
  209. 93%Thinking of the children
  210. 98%Safer Illinois, Isn’t
  211. 98%6 New Ways to Validate Device Posture
  212. 98%How does PLONK work? Part 1: What's PLONK?
  213. 99%Cryptology ePrint Archive: Report 2021/923
  214. 97%Reddit Interview Problems: The Game of Life
  215. 93%Thinking of the children
  216. 97%Why is Learning Functional Programming So Damned Hard?
  217. 98%10×10%
  218. 95%Stewardship of Ourselves
  219. 99%Exploring the password policy rabbit hole — Sun Knudsen
  220. 98%The world in which IPv6 was a good design
  221. 94%GitHub picks Friday 13th to kill off password-based Git authentication
  222. 97%What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
  223. 96%The Deceptive PR Behind Apple’s “Expanded Protections for Children”
  224. 98%.NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
  225. 99%How to never type passwords when using Git
  226. 97%More devices, fewer CAPTCHAs, happier users
  227. 85%If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
  228. 97%Why Doesn't Software Show Up in Productivity?
  229. 64%Australia is becoming a surveillance state
  230. 96%Parallelising (LINQ) work in C#
  231. 99%Announcing .NET 6 Preview 7
  232. 99%Implementing ‘le chiffre indéchiffrable’ in Scheme
  233. 97%Apple’s Mistake
  234. 98%One Bad Apple - The Hacker Factor Blog
  235. 98%Hey Signal! Great Encryption Needs Great Authentication
  236. 98%The logic behind three random words
  237. 99%How does FaceTime Work?
  238. 72%Apple to scan U.S. iPhones for images of child sexual abuse
  239. 80%Apple explains how iPhones will scan photos for child-sexual-abuse images
  240. 99%draft-peabody-dispatch-new-uuid-format-01
  241. 58%Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
  242. 97%HTTP/2: The Sequel is Always Worse
  243. 91%Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
  244. 91%Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
  245. 94%When You Get Right Down to It, Most Security Is Based on The Honor System
  246. 99%What is an inner product argument?
  247. 97%An Attempt at Demystifying Graph Deep Learning
  248. 94%GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
  249. 64%Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  250. 64%Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  251. 97%Full-Time Open Source - CoRecursive Podcast
  252. 89%TODO apps are meant for robots
  253. 98%PyTorch Tutorial for Beginners - Building Neural Networks
  254. 99%Wormhole - Simple, private file sharing
  255. 71%Looking between the lines: how media is control.
  256. 99%GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
  257. 70%Tech spec experts seek allies to tear down ISO standards paywall
  258. 98%How I store my files and why you should not rely on fancy tools for backup
  259. 99%Zip - How not to design a file format.
  260. 79%Cloudflare's Athenian Project Expands Internationally
  261. 97%From Stolen Laptop to Inside the Company Network — Dolos Group
  262. 97%Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
  263. 97%IPv4 pricing - Hetzner Docs
  264. 99%Netcat - All you need to know
  265. 83%A new chapter for Google’s Vulnerability Reward Program
  266. 99%Securing your development environment
  267. 99%K-9 Mail is back
  268. 74%Welcome to Cloudflare Impact Week
  269. 93%Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
  270. 98%Syncing all the things
  271. 89%Google pushed a one-character typo to production, bricking Chrome OS devices
  272. 76%Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
  273. 99%Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
  274. 96%Germany’s national healthcare system adopts Matrix! | Matrix.org
  275. 99%How does TLS work?
  276. 97%The Game Developers Guide to NFTs
  277. 98%Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
  278. 73%Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
  279. 99%Cryptanalysis of Meow Hash
  280. 98%How To Learn Stuff Quickly
  281. 99%A framework for Front End System Design interviews - draft
  282. 89%Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
  283. 97%HashWires: Range Proofs from Hash Functions | ZKProof Standards
  284. 97%Why we need to do more to reduce certificate lifetimes
  285. 95%TLS - The Cloudflare Blog
  286. 98%ongoing by Tim Bray · Algorithm Agility?
  287. 97%Security Analysis of Telegram (Symmetric Part)
  288. 99%Pa(dding rtitioning) oracles, and another hot take on PAKEs
  289. 97%Building a Trustless and Private Internet for Everyone
  290. 91%Building a Vision of Life Without Work
  291. 97%The EFAIL Hoax [The Call of the Open Sidewalk]
  292. 96%Behind the scenes, AWS Lambda
  293. 97%r/crypto - My breakdown on Partition Oracle Attacks
  294. 99%Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
  295. 87%Ways of reading without the influence of community
  296. 95%The Myth of the Expert Reviewer
  297. 99%An incomplete list of practices to improve security of your (micro)services · m's blog
  298. 99%Sam Lewis
  299. 97%More Secret Codes: A History of Cryptography (Part 2)
  300. 92%A new macroeconomics? – J. W. Mason
  301. 98%Stuff I wish I knew before I went Independent
  302. 99%Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
  303. 98%Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
  304. 97%Write a time-series database engine from scratch
  305. 84%BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
  306. 99%Blazor Flash Cards - State Management with Fluxor
  307. 88%Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
  308. 99%Cryptology ePrint Archive: Report 2021/626
  309. 95%The Missing Email Service For Domains
  310. 92%How to Build a Giant Carmaker
  311. 99%angularsen/UnitsNet
  312. 93%Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
  313. 95%OpenPGP Identity Structure [The Call of the Open Sidewalk]
  314. 98%Yes, the network is hostile, even yours (or: how to lose your data in three steps)
  315. 96%An Elixir Adoption Success Story
  316. 88%New Release: Fiddler Everywhere 2.0 Is Here!
  317. 96%NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
  318. 96%Update on Windows 11 minimum system requirements
  319. 98%Temporal: getting started with JavaScript’s new date time API
  320. 99%cirosantilli/x86-bare-metal-examples
  321. 57%Voice AI is scary good now. Video game actors hate it.
  322. 98%Production Threshold Signing Service
  323. 97%Windows 11, Amazon, and Uncomfortable Questions
  324. 98%Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
  325. 97%Taking the (quantum) leap with go
  326. 69%Messaging app Signal not in compliance with new rules, say officials
  327. 98%Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
  328. 94%Designing a duress PIN: plausible deniability (part II)
  329. 94%Zero Knowledge from the Discrete Logarithm Problem
  330. 97%Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
  331. 99%Remote Desktop Connection Manager - Windows Sysinternals
  332. 98%Hacker's guide to deep-learning side-channel attacks: the theory
  333. 96%Internet-in-a-Box
  334. 98%How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
  335. 99%dsprenkels/sss
  336. 99%Croc Full Plaintext Recovery - CVE-2021-31603
  337. 97%A response to "Did we market Knative wrong?"
  338. 98%streetcomplete/StreetComplete
  339. 98%Cryptographic shuffle | Brain on Fire
  340. 88%Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
  341. 95%I wish I could write this well
  342. 97%Cryptology ePrint Archive: Report 2021/819
  343. 98%Welcome · Real-World Cryptography MEAP V14
  344. 98%Richard Feynman's Integral Trick
  345. 83%[Last Week in .NET #46] – Exceptionally Useful
  346. 92%google/fully-homomorphic-encryption
  347. 96%Automonous Biology
  348. 96%Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
  349. 95%Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
  350. 99%How to Handle Secrets on the Command Line
  351. 99%Taildrop was kind of easy, actually
  352. 98%Answering Community Questions and What’s Ahead for Mina
  353. 95%Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
  354. 99%From KEMs to protocols
  355. 98%Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  356. 98%Kerckhoffs’s Law for Security Engineers
  357. 98%Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
  358. 99%Althttpd: The Althttpd Webserver
  359. 99%Exploring android development on iPad
  360. 98%Certificates Confuse Everything
  361. 59%It’s time to ditch Chrome
  362. 94%Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  363. 83%FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
  364. 99%Password Managers.
  365. 99%Kate polynomial commitments
  366. 99%Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
  367. 99%The best cryptographic protocol ever!
  368. 99%Linux Security Hardening and Other Tweaks
  369. 98%Leaky Abstractions
  370. 93%Vinod Vaikuntanathan - Real World Cryptographers Podcast
  371. 97%From Competitive Programming to APL - CoRecursive Podcast
  372. 98%Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
  373. 98%Using Wikipedia as an Impromptu RottenTomatoes API
  374. 98%Mikkel Paulson
  375. 96%ongoing by Tim Bray · Testing in the Twenties
  376. 85%The Most Expensive Number in Engineering
  377. 99%Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
  378. 95%Amazon devices will soon automatically share your Internet with neighbors
  379. 99%Contributing to Gemini ecosystem
  380. 98%Elliptic Curve Cryptography Explained
  381. 99%Code Maze Weekly #78 - Code Maze
  382. 96%Episode 77 - Application Security with Tanya Janka
  383. 90%QUIC is now RFC 9000
  384. 98%A UDP-Based Multiplexed and Secure Transport
  385. 95%Is MDPI a predatory publisher?
  386. 96%Messaging and Chat Control
  387. 98%New Storage Providers for Azure Durable Functions
  388. 99%The best API design principles inspired by nature - andre.schweighofer
  389. 98%Blockchain voting is overrated among uninformed people but underrated among informed people
  390. 96%DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
  391. 98%Cryptography from the Ground Up
  392. 96%255: What is encryption anyways?
  393. 99%Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  394. 98%How to Get Rich
  395. 97%Heartbleed Revisited
  396. 99%Secure Search Over Encrypted Data
  397. 92%Indian job portal IIMJobs hacked; 46GB worth of database leaked online
  398. 87%How the UK's Online Safety Bill threatens Matrix | Matrix.org
  399. 99%Authenticated Encryption in .NET with AES-GCM
  400. 95%I am sick and tired of hearing tech companies complain about a developer shortage
  401. 96%Welcoming Linux to the 1Password Family | 1Password
  402. 99%zkSessions: The ZK Languages Roundup - May 19 | Hopin
  403. 99%Constructing a sponge function from MD5 - Gokberk Yaltirakli
  404. 90%Zcon2Lite
  405. 93%I Have a Lot to Say About Signal’s Cellebrite Hack
  406. 99%Password Storage - OWASP Cheat Sheet Series
  407. 98%The stack monoid revisited
  408. 99%Running a .NET 5 web app on Railway
  409. 96%A day at work
  410. 97%Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  411. 99%BLS12-381 For The Rest Of Us - HackMD
  412. 99%Reverse Engineering an Unknown Microcontroller - Dmitry.GR
  413. 97%Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  414. 96%Building an Event Driven .NET Application: The Fundamentals – Wrapt
  415. 86%Peter Thiel's Religion - David Perell
  416. 99%<p>The Node.js CA Footgun</p>
  417. 98%Security flaws in all Wi-Fi devices
  418. 99%Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  419. 99%Beware of Applications Misusing Root Stores – Mozilla Security Blog
  420. 97%Hell site
  421. 99%Minecraft Modding: Laser Gun - Alan Zucconi
  422. 95%Dear EU: Please Don't Ruin the Root - Articles
  423. 98%Realizing the Mina vision in Rust
  424. 90%Personal Data of 3 Million+ People Exposed In DriveSure Hack
  425. 99%Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
  426. 98%Introducing the Pinecone overlay network | Matrix.org
  427. 99%Understanding Extended-Nonce Constructions
  428. 94%Amazon Fake Reviews Scam Exposed in Data Breach
  429. 98%--this is a no-knowledge proof--
  430. 98%Introduction to JSON Web Tokens (JWT)
  431. 97%timvisee/send
  432. 92%ZK languages with Alex Ozdemir
  433. 97%Is abstraction killing civilization? | datagubbe.se
  434. 97%What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  435. 99%Mixed Boolean Arithmetic Obfuscation
  436. 93%Update: Security Notification - March 2021
  437. 98%Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  438. 98%Content Marketing for Bootstrappers | James Chambers
  439. 95%Dabbling in Cryptography
  440. 96%We were promised Strong AI, but instead we got metadata analysis
  441. 99%HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
  442. 99%Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  443. 99%Rust Language Cheat Sheet
  444. 99%Setting up a Cardano Producer node using Kubernetes/microk8s
  445. 96%Customer Notice FAQs
  446. 86%In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  447. 97%Make better predictions, stop estimating - andre.schweighofer
  448. 98%Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
  449. 90%Apple introduces AirTag
  450. 88%Minimum Viable State: Building a Nomad Internet Country
  451. 99%Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
  452. 99%dotnet/runtime
  453. 99%What's in the box? - fasterthanli.me
  454. 99%Thoughts on writing a wayland window manager with wlroots
  455. 85%Why should you care about privacy - even if you had nothing to hide
  456. 85%Vanquished Vaccines and Vetocracies – We Are Not Saved
  457. 94%Eat a Peach for Engineers
  458. 99%Standard Notes | A Simple And Private Notes App
  459. 98%Node.js support in Cloudflare Workers
  460. 98%What on Earth is this Encryption Scheme?
  461. 99%Security Control: Implement security best practices
  462. 99%Serving up zero-knowledge proofs
  463. 94%Machine Learning With ML.NET - Evaluation Metrics
  464. 61%The Cursed Computer Iceberg Meme
  465. 96%My Vim Notes Setup
  466. 85%Meet the patent troll that won a $308 million jury trial against Apple
  467. 98%My programming principles • Borislav Grigorov
  468. 99%The Architecture Behind A One-Person Tech Startup
  469. 99%BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
  470. 99%WTF are these security chips?
  471. 99%A pretty good guide to pretty good privacy
  472. 99%Goodbye OpenSSL, and Hello To Google Tink
  473. 99%MPC-Over-Signal
  474. 81%The Unparalleled Genius of John von Neumann
  475. 82%Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  476. 99%Dumping user data from cheap tablets in minutes
  477. 98%How I Got Into Computers AppDev Edition
  478. 96%(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
  479. 98%Legalizing Gay Marriage in Crusader Kings III with Ghidra
  480. 99%PostgreSQL Security Hardening
  481. 99%The Exception Model
  482. 95%Zero click vulnerability in Apple’s macOS Mail
  483. 99%C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  484. 75%Apple's cooperation with authoritarian governments
  485. 98%Some opinionated thoughts on SQL databases
  486. 89%Cloudflare’s WAF is recognized as customers’ choice for 2021
  487. 99%Peace of mind backup - boa.nu
  488. 91%Creation vs. Consumption
  489. 95%208.43.231.11 Git
  490. 97%A new Cloudflare Web Application Firewall
  491. 99%Getting started with Self Sovereign Identity SSI
  492. 99%.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
  493. 98%OpenPGP Message Format
  494. 98%PGP is a Form of Minimalism [The Call of the Open Sidewalk]
  495. 87%About | Mina Illuminate
  496. 99%Single-primitive authenticated encryption for fun
  497. 98%It doesn't work | Frank DENIS random thoughts.
  498. 99%janroesner/sixty5o2
  499. 99%APT Encounters of the Third Kind
  500. 99%Building a phone book: Part I
  501. 99%C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  502. 95%facebookresearch/Cupcake
  503. 99%The Evolution of Distributed Systems on Kubernetes
  504. 97%Is There a Case for Programmers to Unionize? - Qvault
  505. 98%On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  506. 97%CoinList
  507. 97%Browser Isolation for teams of all sizes
  508. 97%suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  509. 97%Crystal 1.0 - What to expect
  510. 89%Welcome to Cloudflare Security Week 2021!
  511. 98%My self-study plan for electrical engineering
  512. 99%r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  513. 99%Hybrid encryption and the KEM/DEM paradigm
  514. 97%Episode 72 - Emulating a Video Game System in .NET with Ryujinx
  515. 99%The missing explanation of ZK-SNARKs: Part 1
  516. 98%Can we talk about client-side certificates?
  517. 97%Zero Knowledge Proof (with Avi Wigderson) - Numberphile
  518. 97%A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
  519. 97%Can an economy keep on growing? - Inverted Passion
  520. 98%What It Means to Learn to Code
  521. 97%Surreptitious Forwarding [The Call of the Open Sidewalk]
  522. 58%The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
  523. 98% A Simple Personal Data Backup Setup
  524. 98%How are zlib, gzip and zip related? What do they have in common and how are they different?
  525. 95%YouTube
  526. 99%Key Exchange Standards
  527. 99%Becoming physically immune to brute-force attacks
  528. 98%About the March 8 & 9, 2021 Verkada camera hack
  529. 99%Block Cipher Structures: Ranked
  530. 98%Getting started with Dapr for .NET Developers
  531. 96%I want a Computer that I Own
  532. 89%4 Times I Felt Discriminated Against for Being a Female Developer
  533. 98%Notion is not a knowledge base
  534. 98%A flamegraph of Real-World Cryptography
  535. 77%It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
  536. 94%The Teams Dashboard: Finding a Product Voice
  537. 98%A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
  538. 98%Online tool to generate and check bcrypt hashed passwords.
  539. 99%Hotpatch for Windows Server Azure Edition (preview)
  540. 98%February 2021 - Killing Turbotax
  541. 98%How I Might Have Hacked Any Microsoft Account - The Zero Hack
  542. 95%How Nacon Cracked and Pirated The Sinking City - Frogwares
  543. 98%Cryptology ePrint Archive: Report 2020/1491
  544. 99%Goodbye Client Affinity, Hello Data Protection with Azure
  545. 97%5 tools I use to protect my privacy online
  546. 99%Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
  547. 99%How I cut GTA Online loading times by 70%
  548. 99%Camera Response Function
  549. 99%The security of the "Pass" password manager
  550. 71%The Economics of Biodiversity
  551. 99%Cryptology ePrint Archive: Report 2020/1610
  552. 99%How often should I rotate my ssh keys?
  553. 99%Microsoft Releases Azure Firewall Premium in Public Preview
  554. 98%[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  555. 97%Understanding how Leela Chess Zero works
  556. 99%Cryptography Interface Design is a Security Concern
  557. 97%Zero Bug Tolerance
  558. 99%Cryptographic Wear-Out for Symmetric Encryption
  559. 98%C#'s Functional Journey
  560. 99%The Azure Security Architect Map
  561. 99%Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
  562. 92%Cryptology ePrint Archive: Report 2020/1581
  563. 98%Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
  564. 94%How to destroy the Earth
  565. 99%GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
  566. 98%Cryptology ePrint Archive: Report 2020/1533
  567. 98%Using HPKE to Encrypt Request Payloads
  568. 99%Urbit :: the good, the bad, and the insane
  569. 98%Cryptology ePrint Archive: Report 2020/1536
  570. 96%Distributed Application Runtime (Dapr) v1.0 Announced
  571. 99%Making Easy Auth tokens survive releases on Linux Azure App Service
  572. 92%upgundecha/howtheysre
  573. 99%ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
  574. 94%A Visual Guide: To Sustainable Software Engineering
  575. 95%Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
  576. 98%Multi-asset shielded pool project (MASP)
  577. 97%no dogma podcast - powered by FeedBurner
  578. 92%Securing the post-quantum world
  579. 97%Our Solo v2 launch is official!
  580. 99%Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  581. 98%Good-bye ESNI, hello ECH!
  582. 92%Crackpot Cryptography and Security Theater
  583. 97%Why should I give you my ID card
  584. 78%2020 U.S. Election: Cybersecurity Analysis
  585. 98%A look at GSM
  586. 99%Reverie: An optimized zero-knowledge proof system
  587. 99%Writing high performance F# code
  588. 93%Report: Romanian Real Estate Portal Suffers Crippling Data Breach
  589. 88%Lessons Learned From My Last Startup: A Post Mortem
  590. 97%Is abstraction killing civilization? | datagubbe.se
  591. 98%Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  592. 99%ARCHITECTURE.md
  593. 99%Working with SSL Certificate in Azure App Service
  594. 77%Ideas That Created the Future
  595. 99%A Simple and Succinct Zero Knowledge Proof
  596. 99%Help users in Iran reconnect to Signal
  597. 99%Security: The Need-to-know principle
  598. 92%Threshold Cryptography with Omer Shlomovits from ZenGo
  599. 99%7 behaviours to avoid in a software architecture role - Daniel Watts
  600. 97%Tearing Down a Humidifier - Lei's Blog
  601. 76%Why Generation X will save the web - Hi, I'm Heather Burns.
  602. 96%SSL/TLS connection issue troubleshooting guide
  603. 96%The Best TLS and PKI Training Course in the World
  604. 97%My experience passing CKA and CKAD
  605. 97%Episode 10: Exploiting Authenticated Encryption Key Commitment!
  606. 99%LackRack - Eth0Wiki
  607. 93%All Stories Are Wrong, but Some Are Useful
  608. 99%The Subtle Hazards of Real-World Cryptography
  609. 99%I didn't install Signal for privacy
  610. 78%The Psychology of Stock Bubbles
  611. 99%How to properly store a password in the Database | Petre Popescu
  612. 97%Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
  613. 86%The EU must protect the right to privacy and not attack end-to-end encryption
  614. 94%Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  615. 99%No, Java is not a Secure Programming Language
  616. 99%berty/berty
  617. 99%Tools I Love to Not Think About
  618. 95%What it means to be a cryptographer
  619. 83%SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  620. 75%survey.pdf
  621. 99%Write Crypto Code! Don't publish it!
  622. 99%pavlobu/deskreen
  623. 96%Technological stagnation: Why I came around
  624. 98%s-51: Ask Me Anything (AMA), with Joan Daemen
  625. 97%The architecture of my life | mjwsteenbergen-blog
  626. 90%AKS Zero To Hero - Series for everyone - Azure Greg
  627. 99%Release Notes | Bitwarden Help & Support
  628. 90%Stepping up for a truly open source Elasticsearch | Amazon Web Services
  629. 99%My Backup Strategy
  630. 99%So, You Want to CTF? (A Beginner’s Guide to CTFing)
  631. 90%Stepping up for a truly open source Elasticsearch | Amazon Web Services
  632. 99%Building your first Telegram Bot with ASP.NET Core
  633. 99%Please Stop Encrypting with RSA Directly
  634. 98%The worrying trend of game technology centralization
  635. 99%Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  636. 94%We can do better than Signal
  637. 99%CondensationDB/Condensation
  638. 99%Mesmerizing Chameleon Signatures
  639. 98%Is Writing as Important as Coding?
  640. 99%Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  641. 99%A history of end-to-end encryption and the death of PGP
  642. 99%Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  643. 99%KEMTLS: Post-quantum TLS without signatures
  644. 99%Fully Homomorphic Encryption Part One: A Gentle Intro
  645. 99%danso - happy-space: a whitespace-sensitive calculator
  646. 95%Holistic web protection: industry recognition for a prolific 2020
  647. 94%Foam
  648. 98%Send and receive WhatsApp messages through email
  649. 93%Learn X by doing Y - A project-based learning search engine
  650. 99%Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  651. 98%jukefoxer/Signal-Android
  652. 99%An introduction to the Data Protection system in ASP.NET Core
  653. 92%Notification of Data Security Incident - December 23, 2020
  654. 97%My personal wishlist for a decentralized social network
  655. 99%Machine Learning with ML.NET - Linear Regression
  656. 96%Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  657. 99%Wasmer - The Universal WebAssembly Runtime
  658. 98%Signal, thank you for not collecting my data. But I won’t use you.
  659. 90%Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  660. 99%safepassme
  661. 95%What I learned doing 125 public talks - Part I
  662. 97%Steam's login method is kinda interesting
  663. 99%.NET Rocks! vNext
  664. 88%WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
  665. 90%DALL·E: Creating Images from Text
  666. 98%Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  667. 97%HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  668. 99%SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  669. 99%The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  670. 98%Cryptology ePrint Archive: Report 2020/1456
  671. 98%s-18: FSE 2020 Rump session
  672. 85%Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  673. 99%Linux Hardening Guide | Madaidan's Insecurities
  674. 98%Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  675. 97%zkSNARKS and Cryptographic Accumulators
  676. 94%NeurIPS 2020 Best Machine Learning Paper Awards
  677. 99%Web Authentication Methods Compared
  678. 96%Combating abuse in Matrix - without backdoors. | Matrix.org
  679. 97%Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  680. 79%Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  681. 95%Development time is money, therefore I RAID
  682. 86%Against Victimhood
  683. 80%The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  684. 95%No, Cellebrite cannot 'break Signal encryption.'
  685. 98%Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  686. 97%Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  687. 96%Why I've Been Merging Microservices Back Into The Monolith At InVision
  688. 97%My Engineering Axioms
  689. 97%2020’s Top 15 Machine Learning & AI Research Papers
  690. 51%You're Missing Out If You Don't Write Weekly Digests
  691. 97%Cryptologie | Vetted Encryption
  692. 99%Apple M1 foreshadows RISC-V
  693. 97%Bizarre Design Choices In Zoom’S End-To-End Encryption
  694. 94%Branding Your Own Startup | Blog of Pascal
  695. 98%Commits are snapshots, not diffs - The GitHub Blog
  696. 98%Giving more tools to software engineers: the reorganization of the factory
  697. 95%How to conduct a competitive analysis - Philipp Muens
  698. 88%Adding Encrypted Group Calls to Signal
  699. 86%Learn about online security, privacy, and encryption
  700. 98%The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  701. 97%Privacy and Compliance Reading List
  702. 92%Computers Are Bad
  703. 96%Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  704. 94%Google Alternatives 2020: Best Privacy Friendly Alternatives
  705. 85%How to Build a Global Network that Complies with Local Law
  706. 99%Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  707. 98%There's Always More History • Hillel Wayne
  708. 96%Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  709. 97%Improving DNS Privacy with Oblivious DoH in 1.1.1.1
  710. 98%From Zero to AppStore
  711. 92%Privacy needs to be built into the Internet
  712. 99%benwilber/boltstream
  713. 95%Welcome to Privacy & Compliance Week
  714. 98%InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  715. 99%On Trusting Macintosh Hardware
  716. 98%An introduction to three-phase power and PDUs
  717. 91%Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  718. 98%How to Make Your Code Reviewer Fall in Love with You
  719. 99%Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  720. 99%An iOS zero-click radio proximity exploit odyssey
  721. 98%Gamedev from scratch 0: Groundwork
  722. 91%Release OpenZFS 2.0.0 · openzfs/zfs
  723. 93%We Need Organic Software
  724. 99%ph1lter
  725. 97%Are My Encryption Keys In The Cloud Really Secure?
  726. 94%How to Think for Yourself
  727. 98%An ex-Googler's guide to dev tools
  728. 88%Crypto Dictionary
  729. 90%Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  730. 98%How do people find bugs?
  731. 94%What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  732. 95%Getting lucky with posting on Hacker News
  733. 96%Productive Uncertainty - Reaction Wheel
  734. 97%zkSummit 6 | Hopin
  735. 98%Normal Forms - Simple Talk
  736. 97%The book is finished, well sort of...
  737. 71%Facebook Is Going After Its Critics in the Name of Privacy
  738. 99% Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  739. 97%The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  740. 98%zfs.rent
  741. 97%Six months of Tiny Projects
  742. 99%Anchoring Trust: A Hardware Secure Boot Story
  743. 98%Claims encryption for B2C tokens | Developer Support
  744. 96%Can’t open apps on macOS: an OCSP disaster waiting to happen
  745. 99%Using Matrix to replace proprietary and centralized chat apps
  746. 99%Going Bark: A Furry’s Guide to End-to-End Encryption
  747. 99%Does Apple really log every app you run? A technical look
  748. 97%SAD DNS Explained
  749. 83%How a Game Developer Leaked 46 Million Accounts
  750. 99%Etebase - Your end-to-end encrypted backend
  751. 97%Get Animal Jam for your mobile device, PC, or Mac
  752. 98%caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  753. 96%Notes On Owning Your Own Business
  754. 97%How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  755. 96%Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  756. 80%Zoom lied to users about end-to-end encryption for years, FTC says
  757. 97%What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  758. 98%Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  759. 75%Over 1M Lazada RedMart accounts sold online after data breach
  760. 95%Productivity vs. Privacy
  761. 99%Multithreading Handbook for Simulation Developers
  762. 99%The missing explanation of zk-SNARKs: Part 2
  763. 87%Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  764. 96%Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  765. 97%Standing on Our Own Two Feet
  766. 99%Querying Across Databases In SQL Azure
  767. 97%Scripts for Managing Azure Container Registry
  768. 97%A Brief Introduction to Deniability
  769. 99%Leaving OCaml
  770. 99%Two workers are quadratically better than one • Hillel Wayne
  771. 99%C# in Simple Terms - Exceptions and Exception Handling
  772. 98%ML Optimization - Advanced Optimizers from scratch with Python
  773. 99%Blazor and Azure B2C: The Big Picture
  774. 95%The Basis of Testing – Stories from a Software Tester
  775. 69%Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  776. 99%The missing explanation of ZK-SNARKs: Part 1
  777. 90%Scott Santens - An Engineering Argument for Basic Income
  778. 93%RedMart Data Security Incident
  779. 97%Episode 63 - Being Productive With Jay Miller
  780. 96%How software eats money
  781. 97%ML Optimization pt.1 - Gradient Descent with Python
  782. 94%Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  783. 83%gnu.org
  784. 99%Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  785. 97%1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  786. 97%Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  787. 97%Azure CLI Oct 2020 release
  788. 98%The accelerating adoption of Julia
  789. 97%Personal banking needs an API | Chris Hardie's Tech and Software Blog
  790. 87%Let's talk about fake reviews - part 1
  791. 93%14 Popular Machine Learning Evaluation Metrics
  792. 96%A Legislative Path to an Interoperable Internet
  793. 94%Questioning Probability
  794. 99%charmbracelet/glow
  795. 98%Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  796. 96%Exposing covert surveillance backdoors in children’s smartwatches
  797. 99%XChaCha20-Poly1305: A Primer with Examples in .NET
  798. 98%Event Feeds: Simple and reliable messaging infrastructure
  799. 98%Smart male chastity lock cock-up
  800. 87%Stop the EARN IT Bill Before It Breaks Encryption
  801. 97%Security Of Streaming Encryption In Google's Tink Library
  802. 96%It Didn’t Take Too Long…
  803. 99%Fortunately, I don't squash my commits
  804. 97%Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  805. 98%Wiki - RustStarterKit2020
  806. 97%Episode 61 - Azure and Live Conferences With Andy Morrell
  807. 99%Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  808. 66%Coinbase offers exit package to those uncomfortable with new direction
  809. 97%Doing discourse better: Stuff I wish I knew
  810. 98%is it worth it? — Martin Kleppmann’s blog
  811. 93%Advisory: security issues in AWS KMS and AWS Encryption SDKs
  812. 96%This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  813. 96%Zig's New Relationship with LLVM
  814. 99%How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  815. 98%Using Azure RBAC with Azure Key Vault
  816. 95%Uncomfortable Questions About App Signing
  817. 99%Python behind the scenes #2: how the CPython compiler works
  818. 98%71.177.243.54
  819. 98%Google Interview Questions Deconstructed: The Knight’s Dialer
  820. 96%Simple Anomaly Detection Using Plain SQL
  821. 88%Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  822. 99%VPNs from first principles
  823. 98%No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  824. 97%Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  825. 97%dwmkerr/hacker-laws
  826. 97%Revenue Model, not Culture, is the Dominant Term
  827. 99%CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  828. 99%When double.Epsilon can equal 0
  829. 96%Let's Encrypt's New Root and Intermediate Certificates
  830. 97%A Thanksgiving Carol
  831. 95%Nvidia’s Integration Dreams
  832. 98%Phosphine gas in the cloud decks of Venus
  833. 97%GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  834. 97%Some Great Books For Programmers That StackOverflow Cannot Replace
  835. 97%Security by Obscurity is Underrated
  836. 99%What Clojure spec is and what you can do with it (an illustrated guide)
  837. 99%Raccoon Attack
  838. 99%BashPitfalls - Greg's Wiki
  839. 92%Oracle Developer Live—Java
  840. 74%TLS certificate lifespan cut short: A win for security, or cause for chaos?
  841. 98%Things I Learned to Become a Senior Software Engineer
  842. 67%Verizon achieves milestone in future-proofing data from hackers
  843. 97%Why you want to encrypt password hashes
  844. 87%Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  845. 87%Attention is your scarcest resource
  846. 99%Key exchange standards - Manning
  847. 99%Key exchange standards - Manning
  848. 99%connorferster/handcalcs
  849. 95%The Why and How of Privacy and Security — This Too Shall Grow
  850. 99%Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  851. 96%I've decided to pursue a Bootstrap MBA
  852. 98%Why I’m Writing A Book On Cryptography
  853. 99%Minimal React: getting started with the frontend library
  854. 99%Soatok’s Guide to Side-Channel Attacks
  855. 98%Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  856. 99%So you want to roll your own crypto?
  857. 84%Zoom is now critical infrastructure. That’s a concern
  858. 93%Pure and Applied Chess
  859. 97%It Took 2 Years To Make My First Dollar Selling A Product
  860. 95%The Five Pillars Of Wealth Building - Darius Foroux
  861. 95%Heyyyyyyyyyyyy.com | email with *nuance*
  862. 94%Providers | PrivacyTools
  863. 98%Is cloud security too easy to screw up? | A Cloud Guru
  864. 65%A New Botnet Is Covertly Targeting Millions of Servers
  865. 99%Cross-platform cryptography in .NET Core and .NET 5
  866. 98%degoogle
  867. 99%drduh/macOS-Security-and-Privacy-Guide
  868. 99%Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  869. 95%July 11, 2020 - LiveAuctioneers Account Security
  870. 98%What's new in the Windows Store client
  871. 97%fast.ai releases new deep learning course, four libraries, and 600-page book
  872. 98%Transfer a Software Project - Lessons Learned - dcaulfield
  873. 99%jesseduffield/horcrux
  874. 99%Obfuscating your email on the web
  875. 96%A Guide to Autodidactism | Jack Kinsella
  876. 99%Symmetric and Asymmetric Encryption in .NET Core
  877. 96%You Need a Password Manager. Here Are the Best Ones
  878. 88%Graphical Linear Algebra
  879. 99%Let's Learn x86-64 Assembly! Part 0
  880. 98%Nintendo DS Architecture | A Practical Analysis
  881. 99%Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  882. 98%JWTs: Which Signing Algorithm Should I Use?
  883. 98%Data Breach Statement - Utah Gun Exchange
  884. 79%2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  885. 90%Why I Left a Career as a Startup CTO to Become a Writer
  886. 93%IBM Reveals Next-Generation IBM POWER10 Processor
  887. 97%Hiding messages in x86 binaries using semantic duals
  888. 98%The Illustrated TLS Connection
  889. 99%Frustrated? It's not you, it's Rust - fasterthanli.me
  890. 91%Mozilla's failures and a path to profitability
  891. 98%Intel® Trust Domain Extensions
  892. 97%Handles are the better pointers
  893. 99%Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  894. 99%Serverless apps on AWS using F# and fable
  895. 97%Mozilla Alumni Network
  896. 99%The CompSci Pub
  897. 96%I don’t trust Signal
  898. 91%Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  899. 99%Mobile Phone Streams
  900. 97%bulletproofs::notes::range_proof - Rust
  901. 99%How to encrypt and decrypt shared folders on my Synology NAS
  902. 91%Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  903. 98%Building dashboards for operational visibility | Amazon Builders' Library
  904. 94%A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  905. 98%Proof of X
  906. 99%hephaest0s/usbkill
  907. 98%1Password for Linux development preview
  908. 96%27-inch iMac gets a major update
  909. 95%Tales of the Autistic Developer - Senior Developer
  910. 97%How it works - Briar
  911. 99%Azure Cloud Shell Tips And Tricks | Build5Nines
  912. 60%Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  913. 90%David Wong
  914. 96%swyx Writing | Slack is Fumbling Developers
  915. 99%Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  916. 99%.NET R&D Digest (July, 2020)
  917. 95%Chessprogramming wiki
  918. 99%Polymorphic Encryption Algorithms — Generating Code Dynamically
  919. 99%Some SQL Tricks of an Application DBA
  920. 82%You Want Options
  921. 99%Tip 272 - Azure Security Best Practices
  922. 99%Joe Bergeron | Java Obfuscation: A Pattern Language
  923. 98%p410n3 blog
  924. 93%Dropping Out of College to Join Facebook: 3 Years Later
  925. 97%Storage 101: Data Security and Privacy - Simple Talk
  926. 98%Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  927. 99%Exploring Fully Homomorphic Encryption
  928. 98%Essays on programming I think about a lot
  929. 95%You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  930. 95%Designing a New Old Home: Part 1
  931. 99%The encrypted homelab
  932. 99%Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  933. 96%MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  934. 98%What’s New in Thunderbird 78
  935. 97%100 Best Kubernetes Books of All Time
  936. 97%Poor feedback from readers
  937. 98%Hacking Reolink cameras for fun and profit
  938. 95%Welcome to Element!
  939. 95%Data Structures & Algorithms I Actually Used Working at Tech Companies
  940. 94%Digicert revokes a raft of web security certificates
  941. 99%Python Malware On The Rise
  942. 99%A few thoughts about Signal’s Secure Value Recovery
  943. 97%Trending
  944. 97%Disabling Google 2FA Doesn't Need 2FA
  945. 56%New German law would force ISPs to allow secret service to install trojans on user devices
  946. 98%[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  947. 88%VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  948. 99%Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  949. 98%A Team
  950. 99%Clean Architecture, 2 years later - Elton Minetto
  951. 99%Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  952. 99%A Concurrency Cost Hierarchy
  953. 88%VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  954. 97%Why I’m Writing A Book On Cryptography
  955. 81%nabeelqu
  956. 97%Why Can't I Reproduce Their Results?
  957. 97%The true cost of knowledge | RoyalSloth
  958. 96%Beware the Google Password Manager - fasterthanli.me
  959. 99%Apple Lightning
  960. 89%Oppose the EARN IT Act
  961. 97%New Mac ransomware spreading through piracy - Malwarebytes Labs
  962. 97%How CDNs Generate Certificates
  963. 98%foambubble/foam
  964. 99%How to get the best out of your Yubikey with GPG
  965. 80%New US Bill would require makers of encrypted devices to leave a backdoor
  966. 98%Why AES-GCM Sucks
  967. 90%There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  968. 94%Navigating Power & Status
  969. 98%Which Database should I use in my Azure Serverless App?
  970. 99%Avoiding exposing identifier details to your users
  971. 99%jonathan-laurent/AlphaZero.jl
  972. 99%Do you CI? | Benji's Blog -
  973. 96%How is NSA breaking so much crypto?
  974. 95%Discovering Dennis Ritchie’s Lost Dissertation - CHM
  975. 98%The smartest password policy enforcer for Active Directory
  976. 96%Making your data residency choices easier with Azure
  977. 99%Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  978. 89%End-to-End Encryption Update - Zoom Blog
  979. 97%GitHub Terms of Service - GitHub Help
  980. 98%Reasoning by Lego: The wrong way to think about cryptography.
  981. 85%GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  982. 97%Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  983. 89%May 2020 news · Gwern.net
  984. 98%Exploration Strategies in Deep Reinforcement Learning
  985. 85%How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  986. 99%DRY vs DAMP in Unit Tests
  987. 98%How to set compensation using commonsense principles
  988. 99%Playing Around With The Fuchsia Operating System
  989. 98%Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  990. 94%12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  991. 79%Google got rich from your data. DuckDuckGo is fighting back
  992. 96%Discret 11, the French TV encryption of the 80's
  993. 99%Hacking Windows with F# 5.0 Scripts
  994. 99%Byzantine and non-Byzantine distributed systems
  995. 99%Logging with Decorators in TypeScript
  996. 99%How are you improving your technology skills today? Start by reading articles
  997. 70%The Dictator's Army and charismatic founders
  998. 95%Is a trillion-dollar worth of programming lying on the ground
  999. 91%Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  1000. 98%Introducing P2P Matrix | Matrix.org
  1001. 96%Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  1002. 99%CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  1003. 99%ScottHolden/BFSourceGen
  1004. 98%A Guide to Threat Modelling for Developers
  1005. 98%Against an Increasingly User-Hostile Web
  1006. 98%A Guide to Threat Modelling for Developers
  1007. 92%Obsidian
  1008. 97%Messaging with Azure Service Bus - Part 9 - Premium Features
  1009. 98%A Guide to Threat Modelling for Developers
  1010. 99%Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  1011. 99%Org Mode - Organize Your Life In Plain Text!
  1012. 99%Implementing simple cooperative threads in C - Stephen Brennan
  1013. 87%Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  1014. 98%NIST Special Publication 800-63-3
  1015. 90%An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  1016. 99%A Guide to Threat Modelling for Developers
  1017. 97%Introduction to quantum computing with Q# – Part 3, Single qubit gates
  1018. 96%Turning Signal App into a Coarse Tracking Device
  1019. 98%A Guide to Threat Modelling for Developers
  1020. 99%OpenBSD 6.7
  1021. 96%Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  1022. 99%The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  1023. 98%A Guide to Threat Modelling for Developers
  1024. 98%Cryptology ePrint Archive: Report 2020/572
  1025. 99%How Not to Store Passwords
  1026. 66%Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  1027. 99%Replacing JWTs with Branca and PASETO in .NET Core
  1028. 99%Meshing with LinkerD2 using gRPC-enabled .NET Core services
  1029. 98%Lockdown Course: Introduction to Cryptography - James Grime
  1030. 96%Asgard Systems uses ML.NET to reduce food waste | .NET
  1031. 98%Make LLVM fast again
  1032. 88%Zoom buys Keybase to help it build end-to-end encryption
  1033. 99%Alternatives to PGP
  1034. 98%Cryptology ePrint Archive: Report 2018/607
  1035. 75%A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  1036. 93%Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  1037. 96%Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  1038. 98%April Extensions for Firefox Preview
  1039. 90%Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  1040. 99%Modern SAT solvers: fast, neat and underused (part 1 of N)
  1041. 98%Startup financial models - 12 templates compared for SaaS
  1042. 98%OpenPGP Message Format
  1043. 98%How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  1044. 91%SailfishOS - Sailfish OS
  1045. 97%IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  1046. 99%Why not "Why not WireGuard?"
  1047. 99%Messaging with Azure Service Bus - Part 5 - Message Sending Options
  1048. 99%keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  1049. 98%Barbie typewriter
  1050. 95%Preventing Software Rot
  1051. 96%Search Results - Springer
  1052. 99%Build a C# App with CockroachDB and the .NET Npgsql Driver
  1053. 97%This is what end-to-end encryption should look like! - Jitsi
  1054. 99%FocalFossa/ReleaseNotes - Ubuntu Wiki
  1055. 99%How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  1056. 97%ZEIT is now Vercel - Vercel
  1057. 99%Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  1058. 99%“Stubs” in the .NET Runtime
  1059. 96%Scuttlebot peer-to-peer log store
  1060. 89%Saving Money on Internation Payments as a Remote Freelancer
  1061. 96%This is what end-to-end encryption should look like! - Jitsi
  1062. 99%Technical reasons to choose FreeBSD over GNU/Linux
  1063. 99%The limitations of Android N Encryption
  1064. 98%Hacking my Sixth Form College network in 1991
  1065. 98%Temporal circuit of macroscale dynamic brain activity supports human consciousness
  1066. 96%Learn dbatools in a Month of Lunches
  1067. 99%Running your own secure communication service with Matrix and Jitsi | Matrix.org
  1068. 95%OnCheckin - Continuous Deployment for ASP.Net websites.
  1069. 97%Welcome · Real-World Cryptography MEAP V05
  1070. 96%How we recovered over $300K of Bitcoin
  1071. 72%Reassuring Words and Good Intentions Don't Mean Good Security
  1072. 93%Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  1073. 88%A Message to Our Users - Zoom Blog
  1074. 84%The EARN IT Act Violates the Constitution
  1075. 98%Perspectives & gaps between theory, practice & industry research in cryptography
  1076. 99%.NET R&D Digest (March, 2020)
  1077. 93%Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  1078. 89%US Government Wages War on Encryption
  1079. 99%Await | Writing an OS in Rust
  1080. 56%patents in crypto
  1081. 99%Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  1082. 99%The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  1083. 98%New grad vs senior dev
  1084. 96%Released: Microsoft.Data.SqlClient 2.0 Preview 2
  1085. 99%Speeding up Linux disk encryption
  1086. 98%Unsure Calculator
  1087. 97%[15] RFR 8172680: Support SHA-3 based Hmac algorithms
  1088. 99%A Quick Garbled Circuits Primer
  1089. 96%0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  1090. 99%Software Engineer - Jobs at Apple
  1091. 99%How Tailscale works
  1092. 90%Scott Helme
  1093. 83%MacBook Air
  1094. 97%Ryan_Connolly_Resume.docx
  1095. 91%EARN IT bill is aiming at destroying encryption. We must take action now.
  1096. 99%Async ValueTask Pooling in .NET 5 | .NET Blog
  1097. 99%ploeh blog
  1098. 96%The polygons of Another World: Atari Jaguar
  1099. 94%MakerDAO gets stress tested as ETH price plummets
  1100. 99%The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  1101. 99%EARN IT Must Not Happen
  1102. 99%What is Meshtastic?
  1103. 99%A Template for Clean Domain-Driven Design Architecture
  1104. 97%Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  1105. 91%How I Survived Being A $220k/year Intern
  1106. 99%draft-ietf-mls-protocol-09
  1107. 86%Keybase
  1108. 96%EARN IT is a direct attack on end-to-end encryption
  1109. 99%Intel x86 Root of Trust: loss of trust
  1110. 97%The growth of command line options, 1979-Present
  1111. 98%Re: SMB over QUIC: Files Without the VPN
  1112. 97%Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  1113. 93%WireGuard Gives Linux a Faster, More Secure VPN
  1114. 95%Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  1115. 68%zkMesh
  1116. 99%The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  1117. 97%CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  1118. 53%DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  1119. 99%An Intuitive Guide to Linear Algebra – BetterExplained
  1120. 99%It’s 2020. Is your code ready for leap day?
  1121. 97%pwn.college BETA
  1122. 97%If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  1123. 98%How can I create a password protected .zip file in Windows 10?
  1124. 97%The Zen of Go | Dave Cheney
  1125. 98%A Simple Range Proof From Polynomial Commitments - HackMD
  1126. 99%microsoft/electionguard
  1127. 99%TimeSnapper, automatic screenshot software, auto screen capture
  1128. 99%hassio-addons/addon-ssh
  1129. 98%Welcome to the UK .NET Tour 2020
  1130. 99%Source Code | OpenVPN
  1131. 99%A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  1132. 99%Fundamental Concepts for Elastic Jobs in Azure SQL Database
  1133. 93%Messaging Layer Security: Towards a New Era of Secure Group Messaging
  1134. 99%Cryptologie
  1135. 98%Update on our new and upcoming security keys
  1136. 98%Latacora - Stop Using Encrypted Email
  1137. 97%dwmkerr/hacker-laws
  1138. 98%Real-World Cryptography
  1139. 98%The NuGet Blog
  1140. 99%How HTTPS works Part 1 — Building Blocks
  1141. 97%google/tink
  1142. 99%damienbod/AspNetCoreCertificates
  1143. 96%Serious Cryptography | No Starch Press
  1144. 99%draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  1145. 98%Dino 0.1 Release - Dino. Communicating happiness.
  1146. 99%Ryujinx/Ryujinx
  1147. 93%Searching For New Adventures In Software Development
  1148. 98%Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  1149. 99%Building personal search infrastructure for your knowledge and code | beepb00p
  1150. 97%Authentication, What The Fuck?
  1151. 99%How to write a simple operating system in assembly language
  1152. 98%Welcome to the UK .NET Tour 2020
  1153. 99%v5.8 Release Notes
  1154. 99%The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  1155. 99%.NET Core, .NET 5; the exodus of .NET Framework?
  1156. 99%Autocrypt 1.1.0 documentation
  1157. 99%On Privacy versus Freedom | Matrix.org
  1158. 99%Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  1159. 92%Google gives up on US carriers, will roll out its own RCS chat system
  1160. 99%.NET R&D Digest (November – December, 2019)
  1161. 99%Signal >> Blog >> Technology Preview for secure value recovery
  1162. 99%Building a new Win 3.1 app in 2019 Part 1: Slack client
  1163. 99%Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  1164. 99%Zero allocation code in C# and Unity - Seba's Lab
  1165. 72%How to generate random numbers using water bubbles
  1166. 99%tmds/Tmds.Ssh
  1167. 99%oqtane/oqtane.framework
  1168. 95%Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  1169. 96%Why IVPN - What makes IVPN the best privacy protection service
  1170. 92%GateHub Investigation - Final Statement
  1171. 95%Stop surveillance and preserve your privacy with IVPN
  1172. 98%Isogeny crypto
  1173. 90%Homepage | ZKProof Standards
  1174. 99%dotnet/SqlClient
  1175. 98%Thoughts on DNS-over-HTTPS
  1176. 99%x86/x64 SIMD Instruction List (SSE to AVX512)
  1177. 88%bye: FTP Support Is Going Away
  1178. 93%Verzekeraar Allianz informeert klanten over datalek - Security.NL
  1179. 95%Commas in big numbers everywhere: An OpenType adventure
  1180. 95%Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  1181. 99%OceanLibrary/Ocean
  1182. 93%Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  1183. 97%A detailed look at Ubuntu’s new experimental ZFS installer
  1184. 92%Intel 545s 2.5&#34; 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive &#40;SSD&#41; SSDSC2KW256G8X1 - Newegg.com
  1185. 99%“Stubs” in the .NET Runtime
  1186. 95%Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  1187. 97%Peddle the Pedal to the Metal
  1188. 99%praeclarum/sqlite-net
  1189. 98%beemdevelopment/Aegis
  1190. 99%draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  1191. 92%PrivacySafe: The Anti-Cloud Appliance
  1192. 98%awslabs/s2n
  1193. 99%Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  1194. 96%Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  1195. 99%OWASP/CheatSheetSeries
  1196. 99%OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  1197. 92%Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  1198. 98%Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  1199. 83%Security Incident - Please Change Your Password
  1200. 94%EV SSL Certificates Phased Out of New Browser Updates | Venafi
  1201. 98%Learn UI Design: The Complete Online Video Course
  1202. 98%KNOB Attack
  1203. 84%Gone forEVer!
  1204. 99%Spying on HTTPS
  1205. 89%Online syntax highlighting for the masses!
  1206. 97%Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  1207. 97%Canva Security Incident - May 24 FAQs
  1208. 98%Architecture for humans - Ayende @ Rahien
  1209. 80%Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
  1210. 93%Pwnie Awards
  1211. 97%More on Backdooring (or Not) WhatsApp - Schneier on Security
  1212. 99%ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  1213. 98%Kazakhstan’s HTTPS Interception
  1214. 96%When a rewrite isn’t: rebuilding Slack on the desktop
  1215. 97%Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  1216. 79%Digital Driver’s Licenses Could Become a Real Option in Some States
  1217. 97%CRYPTO-LAB
  1218. 98%Real-World Cryptography
  1219. 99%Proving security at scale with automated reasoning - All Things Distributed
  1220. 99%VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  1221. 97%The Ultra Secure Crypto Storage & Communication Device
  1222. 98%Security advisory 2019-06-13 | Yubico
  1223. 99%Fixing Random, part 34
  1224. 99%An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  1225. 98%dotnet/coreclr
  1226. 98%Apple CryptoKit | Apple Developer Documentation
  1227. 98%Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  1228. 99%Accessing UNIX sockets remotely from .NET - Red Hat Developer
  1229. 99%RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  1230. 89%Ethical Alternatives & Resources - ethical.net
  1231. 98%dotnet/coreclr
  1232. 96%Top SSL Certificates Buyer's Guide
  1233. 99%Using Ed25519 signing keys for encryption
  1234. 99%Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  1235. 99%Performance Improvements in .NET Core 3.0 | .NET Blog
  1236. 98%ZombieLoad Attack
  1237. 98%Domain Randomization for Sim2Real Transfer
  1238. 99%eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  1239. 99%ZkVM: a new design for fast, confidential smart contracts
  1240. 97%Community and Communication going forward
  1241. 99%Do we need effects to get abstraction?
  1242. 99%RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  1243. 99%mpm guide - niall t.l.
  1244. 98%The .NET Abstraction Pile
  1245. 98%A Recipe for Training Neural Networks
  1246. 99%Twisted Oak
  1247. 99%AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  1248. 97%Peddle the Pedal to the Metal
  1249. 99%JDK 12 Security Enhancements
  1250. 98%Understanding the Limitations of HTTPS
  1251. 99%Cryptologie
  1252. 99%We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  1253. 99%Direct3D 11.3 Functional Specification
  1254. 99%Verified cryptographic provider a triple threat
  1255. 95%The story of the Rendition Vérité 1000
  1256. 93%Scott Helme
  1257. 99%Dotnet-Boxed/Templates
  1258. 99%BoringTun, a userspace WireGuard implementation in Rust
  1259. 93%New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  1260. 97%The WhibOx Contest Edition 2 - CYBERCRYPT
  1261. 94%Understanding STIR/SHAKEN
  1262. 97%Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  1263. 98%We need to talk about Session Tickets
  1264. 99%Introduction
  1265. 92%Cybersecurity for the Public Interest - Schneier on Security
  1266. 89%Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  1267. 97%Data Leakage from Encrypted Databases - Schneier on Security
  1268. 94%kelseyhightower/kubernetes-the-hard-way
  1269. 95%Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  1270. 99%Crypto Canon - Andreessen Horowitz
  1271. 96%Blockchain Governance: Programming Our Future
  1272. 97%Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  1273. 97%Keybase launches encrypted git
  1274. 98%AI Progress Measurement
  1275. 97%Microsecond Resolution Time Services for Windows
  1276. 99%vivri/Adjective
  1277. 98%On the Security of Password Managers - Schneier on Security
  1278. 96%Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  1279. 95%Reconstructing SIGSALY - Schneier on Security
  1280. 95%Public-Interest Tech at the RSA Conference - Schneier on Security
  1281. 98%Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  1282. 95%Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  1283. 98%Hacking the GCHQ Backdoor - Schneier on Security
  1284. 95%Friday Squid Blogging: Squid Lollipops - Schneier on Security
  1285. 98%Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  1286. 93%Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  1287. 95%Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  1288. 92%Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  1289. 95%New Australian Backdoor Law - Schneier on Security
  1290. 92%Security Risks of Chatbots - Schneier on Security
  1291. 86%Friday Squid Blogging: Squid Sculptures - Schneier on Security
  1292. 96%Security of Solid-State-Drive Encryption - Schneier on Security
  1293. 93%ID Systems Throughout the 50 States - Schneier on Security
  1294. 67%Cell Phone Security and Heads of State - Schneier on Security
  1295. 99%draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  1296. 99%Ext4 Disk Layout - Ext4
  1297. 99%Modern Alternatives to PGP
  1298. 98%proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  1299. 98%Real World Crypto 2019
  1300. 93%The year in post-quantum crypto
  1301. 95%Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  1302. 91%The Case Against Quantum Computing - IEEE Spectrum
  1303. 99%Mathematics of Public Key Cryptography
  1304. 81%CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  1305. 92%D. J. Bernstein / Talks
  1306. 88%Security in Times of Surveillance
  1307. 51%Round 1 Submissions - Post-Quantum Cryptography | CSRC
  1308. 88%Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  1309. 79%Pitching security vs. privacy is asking the wrong question
  1310. 98%libpqcrypto: Intro
  1311. 88%Security in Times of Surveillance
  1312. 74%Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  1313. 99%The ROBOT Attack
  1314. 97%Unity Labs Publications | Unity
  1315. 92%Mersenne Prime Discovery - 2^82589933-1 is Prime!
  1316. 86%Cloud Data Backup for Small Businesses | CrashPlan
  1317. 99%nucypher/nufhe
  1318. 99%RUB-NDS/TLS-Padding-Oracles
  1319. 98%[paper review] A faster, more efficient cryptocurrency
  1320. 99%mimoo/eureka
  1321. 97%Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  1322. 98%Database Encryption
  1323. 97%Kerckhoffs’ principles – Why should I make my cipher public?
  1324. 93%Proxy re-encryption and FHE with NuCypher
  1325. 98%Attack of the week: searchable encryption and the ever-expanding leakage function
  1326. 98% Introducing Adiantum: Encryption for the Next Billion Users
  1327. 97%Quantum computing as a field is obvious bullshit
  1328. 98%Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  1329. 95%Going old school: how I replaced Facebook with email
  1330. 74%» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  1331. 72%» Agrippa (A Book of the Dead) The Digital Antiquarian
  1332. 69%» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  1333. 67%» The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian
  1334. 92%» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  1335. 99%.NET Design Review: GitHub Quick Reviews
  1336. 98%Tuning a Runtime for Both Productivity and Performance
  1337. 85%We didn’t see this coming
  1338. 99%Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  1339. 98%dotnet/coreclr
  1340. 99%MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  1341. 97%no dogma podcast - powered by FeedBurner
  1342. 99%Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  1343. 99%Software Tokens Won't Save You
  1344. 99%Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1