Register, vote, and volunteer to make an impact during U.S. 2020 elections. Learn more.

linksfor.dev(s)

Posts for 'encryption'

  1. Using Azure RBAC with Azure Key Vault
  2. Uncomfortable Questions About App Signing
  3. Python behind the scenes #2: how the CPython compiler works
  4. 71.177.243.54
  5. Google Interview Questions Deconstructed: The Knight’s Dialer
  6. Simple Anomaly Detection Using Plain SQL
  7. Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  8. VPNs from first principles
  9. No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  10. Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  11. dwmkerr/hacker-laws
  12. Revenue Model, not Culture, is the Dominant Term
  13. CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  14. When double.Epsilon can equal 0
  15. Let's Encrypt's New Root and Intermediate Certificates
  16. A Thanksgiving Carol
  17. Nvidia’s Integration Dreams
  18. Phosphine gas in the cloud decks of Venus
  19. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  20. Some Great Books For Programmers That StackOverflow Cannot Replace
  21. Security by Obscurity is Underrated
  22. What Clojure spec is and what you can do with it (an illustrated guide)
  23. Raccoon Attack
  24. BashPitfalls - Greg's Wiki
  25. Oracle Developer Live—Java
  26. TLS certificate lifespan cut short: A win for security, or cause for chaos?
  27. Things I Learned to Become a Senior Software Engineer
  28. Verizon achieves milestone in future-proofing data from hackers
  29. Why you want to encrypt password hashes
  30. Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  31. Attention is your scarcest resource
  32. Key exchange standards - Manning
  33. Key exchange standards - Manning
  34. connorferster/handcalcs
  35. The Why and How of Privacy and Security — This Too Shall Grow
  36. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  37. A Saudi Prince's Attempt to Silence Critics on Twitter
  38. I've decided to pursue a Bootstrap MBA
  39. Why I’m Writing A Book On Cryptography
  40. Minimal React: getting started with the frontend library
  41. Soatok’s Guide to Side-Channel Attacks
  42. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  43. So you want to roll your own crypto?
  44. Zoom is now critical infrastructure. That’s a concern
  45. Pure and Applied Chess
  46. It Took 2 Years To Make My First Dollar Selling A Product
  47. The Five Pillars Of Wealth Building - Darius Foroux
  48. Providers | PrivacyTools
  49. Is cloud security too easy to screw up? | A Cloud Guru
  50. A New Botnet Is Covertly Targeting Millions of Servers
  51. Cross-platform cryptography in .NET Core and .NET 5
  52. degoogle
  53. drduh/macOS-Security-and-Privacy-Guide
  54. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  55. What's new in the Windows Store client
  56. fast.ai releases new deep learning course, four libraries, and 600-page book
  57. Transfer a Software Project - Lessons Learned - dcaulfield
  58. jesseduffield/horcrux
  59. Obfuscating your email on the web
  60. A Guide to Autodidactism | Jack Kinsella
  61. Symmetric and Asymmetric Encryption in .NET Core
  62. You Need a Password Manager. Here Are the Best Ones
  63. Graphical Linear Algebra
  64. Let's Learn x86-64 Assembly! Part 0
  65. Nintendo DS Architecture | A Practical Analysis
  66. Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  67. JWTs: Which Signing Algorithm Should I Use?
  68. Data Breach Statement - Utah Gun Exchange
  69. 2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  70. Why I Left a Career as a Startup CTO to Become a Writer
  71. IBM Reveals Next-Generation IBM POWER10 Processor
  72. The Illustrated TLS Connection
  73. Frustrated? It's not you, it's Rust - fasterthanli.me
  74. Mozilla's failures and a path to profitability
  75. Intel® Trust Domain Extensions
  76. Handles are the better pointers
  77. Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  78. Serverless apps on AWS using F# and fable
  79. Mozilla Alumni Network
  80. The CompSci Pub
  81. I don’t trust Signal
  82. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  83. Mobile Phone Streams
  84. bulletproofs::notes::range_proof - Rust
  85. How to encrypt and decrypt shared folders on my Synology NAS
  86. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  87. Building dashboards for operational visibility | Amazon Builders' Library
  88. A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  89. Proof of X
  90. hephaest0s/usbkill
  91. 1Password for Linux development preview
  92. 27-inch iMac gets a major update
  93. Tales of the Autistic Developer - Senior Developer
  94. Physical Attractiveness Bias in the Legal System — The Law Project
  95. How it works - Briar
  96. Azure Cloud Shell Tips And Tricks | Build5Nines
  97. Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  98. David Wong
  99. swyx Writing | Slack is Fumbling Developers
  100. Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  101. .NET R&D Digest (July, 2020)
  102. Chessprogramming wiki
  103. Polymorphic Encryption Algorithms — Generating Code Dynamically
  104. Some SQL Tricks of an Application DBA
  105. You Want Options
  106. Tip 272 - Azure Security Best Practices
  107. Joe Bergeron | Java Obfuscation: A Pattern Language
  108. p410n3 blog
  109. Dropping Out of College to Join Facebook: 3 Years Later
  110. Storage 101: Data Security and Privacy - Simple Talk
  111. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  112. Exploring Fully Homomorphic Encryption
  113. Essays on programming I think about a lot
  114. You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  115. Designing a New Old Home: Part 1
  116. The encrypted homelab
  117. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  118. MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  119. What’s New in Thunderbird 78
  120. 100 Best Kubernetes Books of All Time
  121. Poor feedback from readers
  122. Hacking Reolink cameras for fun and profit
  123. Welcome to Element!
  124. Data Structures & Algorithms I Actually Used Working at Tech Companies
  125. Digicert revokes a raft of web security certificates
  126. A few thoughts about Signal’s Secure Value Recovery
  127. Trending
  128. crypto_stories.md
  129. Disabling Google 2FA Doesn't Need 2FA
  130. New German law would force ISPs to allow secret service to install trojans on user devices
  131. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  132. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  133. Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  134. A Team
  135. Clean Architecture, 2 years later - Elton Minetto
  136. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  137. A Concurrency Cost Hierarchy
  138. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  139. Why I’m Writing A Book On Cryptography
  140. nabeelqu
  141. Why Can't I Reproduce Their Results?
  142. The true cost of knowledge | RoyalSloth
  143. Beware the Google Password Manager - fasterthanli.me
  144. Apple Lightning
  145. Oppose the EARN IT Act
  146. New Mac ransomware spreading through piracy - Malwarebytes Labs
  147. foambubble/foam
  148. How to get the best out of your Yubikey with GPG
  149. New US Bill would require makers of encrypted devices to leave a backdoor
  150. US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News
  151. Why AES-GCM Sucks
  152. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  153. Navigating Power & Status
  154. Journalist’s phone hacked by new ‘invisible’ technique: All he had to do was visit one website. Any website.
  155. Which Database should I use in my Azure Serverless App?
  156. Avoiding exposing identifier details to your users
  157. jonathan-laurent/AlphaZero.jl
  158. Do you CI? | Benji's Blog -
  159. How is NSA breaking so much crypto?
  160. Discovering Dennis Ritchie’s Lost Dissertation - CHM
  161. The smartest password policy enforcer for Active Directory
  162. Making your data residency choices easier with Azure
  163. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  164. End-to-End Encryption Update - Zoom Blog
  165. Zoom to Introduce New Censorship Features After Doing China's Bidding
  166. GitHub Terms of Service - GitHub Help
  167. Reasoning by Lego: The wrong way to think about cryptography.
  168. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  169. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  170. #FuckDiscord | Cadence's Blog
  171. May 2020 news · Gwern.net
  172. Exploration Strategies in Deep Reinforcement Learning
  173. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  174. DRY vs DAMP in Unit Tests
  175. How to set compensation using commonsense principles
  176. Playing Around With The Fuchsia Operating System
  177. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  178. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  179. Google got rich from your data. DuckDuckGo is fighting back
  180. Discret 11, the French TV encryption of the 80's
  181. Hacking Windows with F# 5.0 Scripts
  182. Byzantine and non-Byzantine distributed systems
  183. Logging with Decorators in TypeScript
  184. How are you improving your technology skills today? Start by reading articles
  185. The Dictator's Army and charismatic founders
  186. Is a trillion-dollar worth of programming lying on the ground
  187. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  188. Introducing P2P Matrix | Matrix.org
  189. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  190. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  191. ScottHolden/BFSourceGen
  192. A Guide to Threat Modelling for Developers
  193. Against an Increasingly User-Hostile Web
  194. A Guide to Threat Modelling for Developers
  195. Obsidian
  196. Messaging with Azure Service Bus - Part 9 - Premium Features
  197. A Guide to Threat Modelling for Developers
  198. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  199. Org Mode - Organize Your Life In Plain Text!
  200. Implementing simple cooperative threads in C - Stephen Brennan
  201. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  202. TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10
  203. NIST Special Publication 800-63-3
  204. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  205. A Guide to Threat Modelling for Developers
  206. Introduction to quantum computing with Q# – Part 3, Single qubit gates
  207. Turning Signal App into a Coarse Tracking Device
  208. A Guide to Threat Modelling for Developers
  209. OpenBSD 6.7
  210. Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  211. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  212. A Guide to Threat Modelling for Developers
  213. Cryptology ePrint Archive: Report 2020/572
  214. How Not to Store Passwords
  215. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  216. Replacing JWTs with Branca and PASETO in .NET Core
  217. Meshing with LinkerD2 using gRPC-enabled .NET Core services
  218. Lockdown Course: Introduction to Cryptography - James Grime
  219. Asgard Systems uses ML.NET to reduce food waste | .NET
  220. Make LLVM fast again
  221. Zoom buys Keybase to help it build end-to-end encryption
  222. Alternatives to PGP
  223. Cryptology ePrint Archive: Report 2018/607
  224. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  225. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  226. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  227. April Extensions for Firefox Preview
  228. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  229. Modern SAT solvers: fast, neat and underused (part 1 of N)
  230. Startup financial models - 12 templates compared for SaaS
  231. OpenPGP Message Format
  232. SailfishOS - Sailfish OS
  233. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  234. Why not "Why not WireGuard?"
  235. Messaging with Azure Service Bus - Part 5 - Message Sending Options
  236. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  237. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  238. Barbie typewriter
  239. Preventing Software Rot
  240. Search Results - Springer
  241. Build a C# App with CockroachDB and the .NET Npgsql Driver
  242. This is what end-to-end encryption should look like! - Jitsi
  243. FocalFossa/ReleaseNotes - Ubuntu Wiki
  244. How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  245. ZEIT is now Vercel - Vercel
  246. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  247. Scuttlebot peer-to-peer log store
  248. Saving Money on Internation Payments as a Remote Freelancer
  249. This is what end-to-end encryption should look like! - Jitsi
  250. Technical reasons to choose FreeBSD over GNU/Linux
  251. The limitations of Android N Encryption
  252. Hacking my Sixth Form College network in 1991
  253. Temporal circuit of macroscale dynamic brain activity supports human consciousness
  254. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  255. Messaging App Signal Threatens to Dump US Market if Anti-Encryption Bill Passes
  256. Learn dbatools in a Month of Lunches
  257. Running your own secure communication service with Matrix and Jitsi | Matrix.org
  258. Hack yourself first – how to go on the offence before online attackers do
  259. OnCheckin - Continuous Deployment for ASP.Net websites.
  260. Welcome · Real-World Cryptography MEAP V05
  261. How we recovered over $300K of Bitcoin
  262. Reassuring Words and Good Intentions Don't Mean Good Security
  263. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  264. A Message to Our Users - Zoom Blog
  265. The EARN IT Act Violates the Constitution
  266. Perspectives & gaps between theory, practice & industry research in cryptography
  267. .NET R&D Digest (March, 2020)
  268. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  269. US Government Wages War on Encryption
  270. Await | Writing an OS in Rust
  271. patents in crypto
  272. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  273. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  274. New grad vs senior dev
  275. Released: Microsoft.Data.SqlClient 2.0 Preview 2
  276. Speeding up Linux disk encryption
  277. Unsure Calculator
  278. [15] RFR 8172680: Support SHA-3 based Hmac algorithms
  279. A Quick Garbled Circuits Primer
  280. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  281. Software Engineer - Jobs at Apple
  282. How Tailscale works
  283. Scott Helme
  284. MacBook Air
  285. Ryan_Connolly_Resume.docx
  286. EARN IT bill is aiming at destroying encryption. We must take action now.
  287. Async ValueTask Pooling in .NET 5 | .NET Blog
  288. US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News
  289. ploeh blog
  290. The polygons of Another World: Atari Jaguar
  291. MakerDAO gets stress tested as ETH price plummets
  292. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  293. EARN IT Must Not Happen
  294. What is Meshtastic?
  295. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  296. How I Survived Being A $220k/year Intern
  297. draft-ietf-mls-protocol-09
  298. Keybase
  299. EARN IT is a direct attack on end-to-end encryption
  300. Intel x86 Root of Trust: loss of trust
  301. Enhancing Pwned Passwords Privacy with Padding
  302. The growth of command line options, 1979-Present
  303. Re: SMB over QUIC: Files Without the VPN
  304. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  305. WireGuard Gives Linux a Faster, More Secure VPN
  306. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  307. zkMesh
  308. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  309. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  310. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  311. An Intuitive Guide to Linear Algebra – BetterExplained
  312. It’s 2020. Is your code ready for leap day?
  313. pwn.college BETA
  314. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  315. How can I create a password protected .zip file in Windows 10?
  316. The Zen of Go | Dave Cheney
  317. A Simple Range Proof From Polynomial Commitments - HackMD
  318. microsoft/electionguard
  319. TimeSnapper, automatic screenshot software, auto screen capture
  320. hassio-addons/addon-ssh
  321. Welcome to the UK .NET Tour 2020
  322. Source Code | OpenVPN
  323. A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  324. Fundamental Concepts for Elastic Jobs in Azure SQL Database
  325. Messaging Layer Security: Towards a New Era of Secure Group Messaging
  326. Cryptologie
  327. Update on our new and upcoming security keys
  328. Latacora - Stop Using Encrypted Email
  329. dwmkerr/hacker-laws
  330. Real-World Cryptography
  331. The NuGet Blog
  332. How HTTPS works Part 1 — Building Blocks
  333. google/tink
  334. damienbod/AspNetCoreCertificates
  335. Serious Cryptography | No Starch Press
  336. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  337. Dino 0.1 Release - Dino. Communicating happiness.
  338. Ryujinx/Ryujinx
  339. Searching For New Adventures In Software Development
  340. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  341. Building personal search infrastructure for your knowledge and code | beepb00p
  342. Authentication, What The Fuck?
  343. How to write a simple operating system in assembly language
  344. Welcome to the UK .NET Tour 2020
  345. Pascal's wager - Wikipedia
  346. v5.8 Release Notes
  347. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  348. .NET Core, .NET 5; the exodus of .NET Framework?
  349. Autocrypt 1.1.0 documentation
  350. On Privacy versus Freedom | Matrix.org
  351. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  352. Google gives up on US carriers, will roll out its own RCS chat system
  353. .NET R&D Digest (November – December, 2019)
  354. Signal >> Blog >> Technology Preview for secure value recovery
  355. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  356. Zero allocation code in C# and Unity - Seba's Lab
  357. How to generate random numbers using water bubbles
  358. tmds/Tmds.Ssh
  359. oqtane/oqtane.framework
  360. Data breach disclosure 101: How to succeed after you've failed
  361. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  362. Why IVPN - What makes IVPN the best privacy protection service
  363. GateHub Investigation - Final Statement
  364. Stop surveillance and preserve your privacy with IVPN
  365. Isogeny crypto
  366. Homepage | ZKProof Standards
  367. dotnet/SqlClient
  368. Real World Crypto 2020 Program
  369. Thoughts on DNS-over-HTTPS
  370. x86/x64 SIMD Instruction List (SSE to AVX512)
  371. bye: FTP Support Is Going Away
  372. Verzekeraar Allianz informeert klanten over datalek - Security.NL
  373. Commas in big numbers everywhere: An OpenType adventure
  374. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  375. OceanLibrary/Ocean
  376. The Lines of Code That Changed Everything
  377. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  378. A detailed look at Ubuntu’s new experimental ZFS installer
  379. Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
  380. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  381. Peddle the Pedal to the Metal
  382. praeclarum/sqlite-net
  383. beemdevelopment/Aegis
  384. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  385. PrivacySafe: The Anti-Cloud Appliance
  386. awslabs/s2n
  387. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  388. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  389. OWASP/CheatSheetSeries
  390. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  391. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  392. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  393. Why didn't the Romans contribute much to mathematics? | Hacker News
  394. Security Incident - Please Change Your Password
  395. Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards — Krebs on Security
  396. EV SSL Certificates Phased Out of New Browser Updates | Venafi
  397. Learn UI Design: The Complete Online Video Course
  398. KNOB Attack
  399. Gone forEVer!
  400. Extended Validation Certificates are (Really, Really) Dead
  401. Spying on HTTPS
  402. Online syntax highlighting for the masses!
  403. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  404. Canva Security Incident - May 24 FAQs
  405. Architecture for humans - Ayende @ Rahien
  406. Pwnie Awards
  407. More on Backdooring (or Not) WhatsApp - Schneier on Security
  408. ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  409. Kazakhstan’s HTTPS Interception
  410. When a rewrite isn’t: rebuilding Slack on the desktop
  411. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  412. Digital Driver’s Licenses Could Become a Real Option in Some States
  413. CRYPTO-LAB
  414. Real-World Cryptography
  415. Scunthorpe problem - Wikipedia
  416. Proving security at scale with automated reasoning - All Things Distributed
  417. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  418. The Ultra Secure Crypto Storage & Communication Device
  419. Security advisory 2019-06-13 | Yubico
  420. I wanna go fast: HTTPS' massive speed advantage
  421. Fixing Random, part 34
  422. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  423. dotnet/coreclr
  424. Apple CryptoKit | Apple Developer Documentation
  425. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  426. Accessing UNIX sockets remotely from .NET - Red Hat Developer
  427. Changing my Mind about AI, Universal Basic Income, and the Value of Data – The Art of Research
  428. Building Facebook's service encryption infrastructure - Facebook Engineering
  429. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  430. Ethical Alternatives & Resources - ethical.net
  431. dotnet/coreclr
  432. Top SSL Certificates Buyer's Guide
  433. Using Ed25519 signing keys for encryption
  434. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  435. Performance Improvements in .NET Core 3.0 | .NET Blog
  436. ZombieLoad Attack
  437. Domain Randomization for Sim2Real Transfer
  438. Your most sensitive data is likely exposed online. These people try to find it
  439. eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  440. ZkVM: a new design for fast, confidential smart contracts
  441. Thank you Waitrose, now fix your insecure site
  442. Community and Communication going forward
  443. Do we need effects to get abstraction?
  444. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  445. A doorbell company owned by Amazon wants to start producing “crime news” and it’ll definitely end well
  446. mpm guide - niall t.l.
  447. The .NET Abstraction Pile
  448. A Recipe for Training Neural Networks
  449. Twisted Oak
  450. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  451. Peddle the Pedal to the Metal
  452. JDK 12 Security Enhancements
  453. Understanding the Limitations of HTTPS
  454. How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch
  455. Cryptologie
  456. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  457. Direct3D 11.3 Functional Specification
  458. Website enumeration insanity: how our personal data is leaked
  459. Verified cryptographic provider a triple threat
  460. The story of the Rendition Vérité 1000
  461. Scott Helme
  462. Dotnet-Boxed/Templates
  463. BoringTun, a userspace WireGuard implementation in Rust
  464. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  465. The WhibOx Contest Edition 2 - CYBERCRYPT
  466. Understanding STIR/SHAKEN
  467. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  468. We need to talk about Session Tickets
  469. Introduction
  470. Cybersecurity for the Public Interest - Schneier on Security
  471. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  472. Data Leakage from Encrypted Databases - Schneier on Security
  473. kelseyhightower/kubernetes-the-hard-way
  474. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  475. Crypto Canon - Andreessen Horowitz
  476. Blockchain Governance: Programming Our Future
  477. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  478. Keybase launches encrypted git
  479. AI Progress Measurement
  480. Microsecond Resolution Time Services for Windows
  481. vivri/Adjective
  482. On the Security of Password Managers - Schneier on Security
  483. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  484. Reconstructing SIGSALY - Schneier on Security
  485. Public-Interest Tech at the RSA Conference - Schneier on Security
  486. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  487. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  488. Hacking the GCHQ Backdoor - Schneier on Security
  489. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  490. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  491. El Chapo's Encryption Defeated by Turning His IT Consultant - Schneier on Security
  492. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  493. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  494. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  495. New Australian Backdoor Law - Schneier on Security
  496. Security Risks of Chatbots - Schneier on Security
  497. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  498. Security of Solid-State-Drive Encryption - Schneier on Security
  499. ID Systems Throughout the 50 States - Schneier on Security
  500. Cell Phone Security and Heads of State - Schneier on Security
  501. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  502. Ext4 Disk Layout - Ext4
  503. Modern Alternatives to PGP
  504. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  505. Real World Crypto 2019
  506. The year in post-quantum crypto
  507. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  508. The Case Against Quantum Computing - IEEE Spectrum
  509. Mathematics of Public Key Cryptography
  510. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  511. D. J. Bernstein / Talks
  512. Security in Times of Surveillance
  513. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  514. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  515. Pitching security vs. privacy is asking the wrong question
  516. libpqcrypto: Intro
  517. Security in Times of Surveillance
  518. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  519. The ROBOT Attack
  520. Unity Labs Publications | Unity
  521. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  522. Cloud Data Backup for Small Businesses | CrashPlan
  523. nucypher/nufhe
  524. RUB-NDS/TLS-Padding-Oracles
  525. [paper review] A faster, more efficient cryptocurrency
  526. mimoo/eureka
  527. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  528. Database Encryption
  529. Kerckhoffs’ principles – Why should I make my cipher public?
  530. Proxy re-encryption and FHE with NuCypher
  531. Attack of the week: searchable encryption and the ever-expanding leakage function
  532. Introducing Adiantum: Encryption for the Next Billion Users
  533. Quantum computing as a field is obvious bullshit
  534. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  535. Why Facts Don’t Change Our Minds
  536. Going old school: how I replaced Facebook with email
  537. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  538. » Agrippa (A Book of the Dead) The Digital Antiquarian
  539. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  540. » The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian
  541. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  542. .NET Design Review: GitHub Quick Reviews
  543. Tuning a Runtime for Both Productivity and Performance
  544. We didn’t see this coming
  545. dotnet/coreclr
  546. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  547. no dogma podcast - powered by FeedBurner
  548. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  549. Software Tokens Won't Save You
  550. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1