🎁 linksfor.dev(s)

Posts for 'encryption'

  1. Programming Books I'll be reading in 2026.
  2. Beyond the Ledger: A Case for Self-Hosted P2P Storage - Carlos Felicio
  3. Developer convenience, infrastructure cost, and losing the open web
  4. Henry's blog
  5. HackerNews Readings
  6. Mullvad VPN (@mullvadnet@mastodon.online)
  7. Backing up Spotify
  8. Helper build script to optimize and protect your Godot projects | Development Blog - Jion Interactive
  9. TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering
  10. Pseudo 3D Tunnel Effect
  11. The Revolution Will Not Make the Hacker News Front Page - Dhole Moments
  12. Supporting FLOSS: My end-of-year donations
  13. Introducing GPT-5.2-Codex
  14. What Does a Database for SSDs Look Like?
  15. What makes something 'GitHubby'
  16. Vaxry's Blog
  17. "Super secure" MAGA-themed messaging app leaks everyone's phone number
  18. The Case Against Microservices
  19. Hashcards: A Plain-Text Spaced Repetition System
  20. The 7 habits of highly ineffective agents
  21. MCP is a fad | Tom Bedor's Blog
  22. Is vibe coding the new gateway to technical debt?
  23. My Favorite Self-Hosted Apps Launched in 2025
  24. Deprecations via warnings don’t work for Python libraries
  25. The Marvel of SIM Cards
  26. Why I’m Fascinated by Package Management
  27. Troubleshooting TLS handshake failures with Docker distroless images
  28. What is a Startup CTO?
  29. 10 Years of Let's Encrypt Certificates
  30. The secure open source fallacy
  31. Multibase CLI
  32. Moving Off of Netlify
  33. Titans + MIRAS: Helping AI have long-term memory
  34. KISS vs DRY in Infrastructure as Code: Why Simple Often Beats Clever
  35. Absurdities and contradictions of my career in crypto
  36. Strategizing for my LLC
  37. One Year with ChatGPT Pro as a First Hire | Sound for Movement
  38. Production Ready Terraform with Testing, Validation and CI/CD
  39. My First Impressions of MeshCore Off-Grid Messaging
  40. Understanding ECDSA - Web3 Security Blog
  41. Price as Productive Capacity Signal
  42. How I Ported the Web to the Web!
  43. Why xor eax, eax? — Matt Godbolt’s blog
  44. The Math of Why You Can't Focus at Work
  45. Bazzite - The next generation of Linux gaming
  46. Self-hosting my photos with Immich
  47. "Courage to quit" matters more for seniors, less for juniors
  48. Molly
  49. Talk "From Bias to Bots"
  50. Daniel's Blog · People as Foundation (以民为本): The Productive Capacity Theory of Money (Part 1)
  51. On 10 Years of Writing a Blog Nobody Reads
  52. Prosody XMPP server in the home lab
  53. Not knowing is part of the path - Dmitry Kudryavtsev
  54. 'My Body Is My Passport; Verify Me': FIDO Auth via Subdermal JavaCard Platform | Jack's Brain | the blog of Jack Kingsman
  55. NSA and IETF, part 3
  56. Native Secure Enclaved backed ssh keys on MacOS
  57. Did Qualcomm kill Arduino for good? | Molecularist
  58. Olmo 3: Charting a path through the model flow to lead open-source AI | Ai2
  59. Moving Beyond the NPM elliptic Package - Dhole Moments
  60. Event Sourcing in Go: From Zero to Production
  61. Reflections on My Tech Career – Part 2
  62. n8n on FreeBSD – installation, configuration, and optimisation
  63. How I use Claude Code to manage sysadmin tasks
  64. Coinbase Data Breach Timeline Doesn't Add Up
  65. Satya Nadella — How Microsoft is preparing for AGI
  66. IBM Patented Euler's 200 year old Math Technique
  67. I left my Big Tech job at 50 to build a game
  68. Announcing .NET 10 - .NET Blog
  69. Can Elon Musk Read Your X Chat Messages?
  70. How to Train an LLM: Part 1 - Omkaar Kamath
  71. How Cops Can Get Your Private Online Data
  72. Time to start de-Appling – Hi, I'm Heather Burns
  73. LightGBM Explained
  74. Ironclad
  75. Legal Corner: Apple’s “notarisation” – blocking software freedom of developers and users - FSFE
  76. Ticker: Don’t Die of Heart Disease
  77. Why is Zig so Cool?
  78. You Need To Become A Full Stack Person · Den Delimarsky
  79. Stop Trying to Promote My Best Engineers
  80. Why 5x Engineers Don't Make 5x Teams
  81. Using CRDTs + Sync as a Database
  82. Can we hide the orange dot without disabling SIP? - Alin Panaitiu
  83. Why bcrypt Can Be Unsafe for Password Hashing ?
  84. Resurrecting valuable expired domains
  85. Masked Softmax Layers in PyTorch
  86. LLMs Caught Cheating: How AI Models Game Benchmarks and Hide Attacks
  87. Claude Code Can Debug Low-level Cryptography
  88. From Assumptions to Isolation : The BGKW Shift
  89. Text rendering and effects using GPU-computed distances
  90. Chat control proposal fails again after massive public opposition
  91. Why plain text + SQLite beat every cloud note app for my workflow - Mirat Can Bayrak
  92. The Infrastructure Stack Is Getting Faster. Terraform Is Not.
  93. Stopping kill signals against your eBPF programs
  94. Who needs Graphviz when you can build it yourself?
  95. The Illusion of Thinking – JSO
  96. Matt Rosenberg (@nthmonkey) on Threads
  97. Why IP address truncation fails at anonymization
  98. Ivan Codes & Takes Photos
  99. GitHub - rolflobker/recall-for-linux: Bring Microsoft Recall to Linux!
  100. Ossa: Towards the Next Generation Web
  101. Proof of Prompt
  102. Roc Camera
  103. Scaling Innovation: Building Ecosystems | Hazel Weakly
  104. Bitmasks, Ruby Threads and Interrupts, oh my!
  105. This is your sign to give up and just use k3s for smaller projects
  106. the bug that taught me more about PyTorch than years of using it
  107. My computing prayer
  108. Solving Regex Crosswords with Z3
  109. How to write good prompts – Dylan Castillo
  110. Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
  111. Experiments
  112. Solving SAT with Quantum Vacuum Dynamics: A Physics-Inspired Approach
  113. Exploring IRC (Internet Relay Chat)
  114. My conclusions after using Signed Exchanges on my website for 2 years
  115. Installing Proxmox on Hetzner with ZFS full-disk encryption and remote unlocking | Louis' thoughts
  116. How I made my own web server in Gleam
  117. » A Looking Glass Half Empty, Part 2: A Series of Unfortunate Events The Digital Antiquarian
  118. A non-technical CFO is shipping better code than the agencies he hired
  119. How to build an agent
  120. Andrej Karpathy — AGI is still a decade away
  121. Your startup has to be a surveillance state to automate jobs
  122. How I Bypassed Amazon's Kindle Web DRM Because Their App Sucked
  123. The Dreamseeker’s Vision of Tomorrow - Dhole Moments
  124. Owlcat Games - We create cRPGs
  125. LLMs are getting better at character-level text manipulation
  126. GitHub - chili-chips-ba/wireguard-fpga: Full-throttle, wire-speed hardware implementation of Wireguard VPN, using low-cost Artix7 FPGA with opensource toolchain. If you seek security and privacy, nothing is private in our codebase. Our door is wide open for backdoor scrutiny, be it related to RTL, embedded, build, bitstream or any other aspect of design and delivery package. Bujrum!
  127. Meta Superintelligence’s surprising first paper
  128. Update on my Case Against Microsoft
  129. Rescue me always
  130. When Will Quantum Computing Work?
  131. Why Your Simple Password Is a Mathematical Catastrophe - Tawanda Munongo
  132. Geometry of Motion
  133. Achieving period-correct graphics in personal computer emulators — Part 1: The Amiga
  134. The Demonization of DeepSeek
  135. Sutra | Portfolio
  136. A Thing or Two About RSA
  137. The UK Is Still Trying to Backdoor Encryption for Apple Users
  138. Why Data is the New Gold
  139. Fun With HyperLogLog and SIMD
  140. Tachyaction at a Distance - sean bowe
  141. Signal Protocol and Post-Quantum Ratchets
  142. The RAG Obituary: Killed by Agents, Buried by Context Windows
  143. cr.yp.to: 2025.09.30: Surreptitious surveillance
  144. GitHub - google/cdc-file-transfer: Tools for synching and streaming files from Windows to Linux
  145. Building Software Faster with LLMs: Part 1 - The Pain Points
  146. Cognitive Capital: Assets That Think
  147. Introduction to Terraform Actions | DanielMSchmidt.de
  148. In the economy of user effort, be a bargain, not a scam • Lea Verou
  149. How I Block All 26 Million Of Your Curl Requests
  150. I'll quit my job and buy a farm - Alin Panaitiu
  151. Fast UDP I/O for Firefox in Rust
  152. There is no reachable chess position with more than 218 moves.
  153. Evanston orders Flock to remove reinstalled cameras - Evanston RoundTable
  154. Notes on RL Environments
  155. ChatControl wants to scan all your private messages
  156. PostgreSQL 18 Released!
  157. 100,000,000 CROWPOWER and no horses on the moon
  158. I'm Netlify-Free! - Dmitry Kudryavtsev
  159. John Kristoff - Journeys in Hosting 1/x
  160. Frontend complexity and the HTML renaissance
  161. My computer science RELEARNING progress logs
  162. Tell the EU: Don’t Break Encryption with Chat Control
  163. DXGI debugging: Microsoft put me on a list
  164. Bringing Metal to a crypto backdoor fight! Exploiting the GPU and the 90s crypto wars to crack the APT Down code signing keys
  165. » Outcast The Digital Antiquarian
  166. How do LLMs work?
  167. StringWa.rs on GPUs: Databases & Bioinformatics 🦠
  168. Fight Chat Control (@chatcontrol@mastodon.social)
  169. From Spaghetti to Simplicity - Kool Codez
  170. How I Would Have Built Laravel Cloud
  171. Fight Chat Control (@chatcontrol@mastodon.social)
  172. ARM is great, ARM is terrible (and so is RISC-V)
  173. Harmonic - News
  174. GrapheneOS and forensic extraction of data - GrapheneOS Discussion Forum
  175. Performance Improvements in .NET 10 - .NET Blog
  176. The Case for Cowboy Coding
  177. The Business Consultant — Quarter Mile
  178. Chat Control Must Be Stopped, Act Now!
  179. The Method of Least Squares for Software Developers
  180. A look at a P2P camera (LookCam app)
  181. Introducing Signal Secure Backups
  182. Be the LetsEncrypt in your homelab with step-ca
  183. Vibe Coding Through the Berghain Challenge - Log - nibzard
  184. What to do with an old iPad
  185. Secret Storage in OCI
  186. reMarkable Paper Pro Move
  187. The maths you need to start understanding LLMs
  188. I Should Have Loved Electrical Engineering · Tony Tong
  189. Cloud tech makes sense on-prem too
  190. "This telegram must be closely paraphrased before being communicated to anyone." Why?
  191. 5 Vibe Coding Failures That Prove AI Can't Replace Developers Yet
  192. Music to Break Models By
  193. Replacing developers with GPUs
  194. How I Setup Nginx as a Reverse Proxy
  195. Remote Code Execution with LLM Agents | Aleksandr Hovhannisyan
  196. Project MiniNAS | Jadarma's Blog
  197. Using JWT to establish a trusted context for RLS
  198. The Web Does Not Need Gatekeepers
  199. Security Alert | NX Compromised to Steal Wallets and Credentials
  200. Piloting Claude for Chrome
  201. From Bug Bounties to $100M Exit: The Bootstrapped Journey of AssetNote
  202. The Bubble That Knows It’s a Bubble
  203. The Day I Logged in With a Hash
  204. It’s not wrong that "🤦🏼‍♂️".length == 7
  205. Away from Gmail | etcetera
  206. io_uring, kTLS and Rust for zero syscall HTTPS server
  207. How I built my first side project: Tubee, in 2017
  208. I gave Claude Code a folder of tax documents and used it as a professional tax agent
  209. Frank Chimero · Time is On My Side
  210. BFF in ASP.NET Core #7 - Introducing the Duende BFF Library
  211. Intel Outside: Hacking every Intel employee and various internal websites
  212. RAG-Shot Learning - Joseph Cooper
  213. Streaming Data using OCI Streams and .NET
  214. Setting up RabbitMQ on OCI
  215. How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
  216. A Case for Digital National Parks
  217. Single Sign On for Furries
  218. I’m sorry, but the solution to Online Safety Act Age-Verification age-gating & censorship blocks is *not* to call on platforms to “ban the UK”; here I shall respectfully explain why…
  219. Reflections on my founder journey
  220. Game Math 101, Writing your Own 2D Math in C++
  221. Building a web search engine from scratch in two months with 3 billion neural embeddings
  222. OpenSSH: Post-Quantum Cryptography
  223. From GPT-2 to gpt-oss: Analyzing the Architectural Advances
  224. Fight Chat Control - Protect Digital Privacy in the EU
  225. The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
  226. The 5 Most Common API Design Mistakes (and How to Avoid Them)
  227. Linear sent me down a local-first rabbit hole | Bytemash
  228. The Untapped Power of Veteran Engineers: Why Companies Are Overlooking Their Most Valuable Assets – Part 3
  229. Getting Started with Cloudflare Tunnel | David Ma
  230. When to Hire a Computer Performance Engineering Team (2025) part 1 of 2
  231. 😶‍🌫️ Controlling the weather 🌦️ » Firesphere.dev
  232. The hollow universe
  233. The Math Is Haunted — overreacted
  234. Avoid IaaS Lock-In With a SAML Proxy
  235. Popping the AGI Bubble
  236. Linux 6.16 brings faster file systems, improved confidential memory support, and more Rust support
  237. thoughts on “do 100 thing” - Tasshin
  238. LLMs can now identify public figures in images
  239. Don't use external CSS: (Maurycy's blog)
  240. How I hacked my washing machine - Nex's Blog
  241. When We Get Komooted
  242. How Not to Translate a Videogame (2025 ver.)
  243. English Writes Numbers Backwards
  244. Mathematics for Computer Science | Electrical Engineering and Computer Science | MIT OpenCourseWare
  245. The Promised LAN
  246. The Elements of Artificial Intelligence - Brady Gerber
  247. Cops say criminals use a Google Pixel with GrapheneOS — I say that’s freedom
  248. More than you wanted to know about how Game Boy cartridges work
  249. Amazon Ring Cashes in on Techno-Authoritarianism and Mass Surveillance
  250. Death by AI
  251. How I Fixed Ruby's Most Annoying Problem: 60-Second Gem Installs"
  252. My Ultimate Self-hosting Setup
  253. Zugzwang - Building Tomorrow's Software Today
  254. Fully Homomorphic Encryption and the Dawn of A Truly Private Internet
  255. The secrets we keep | willowbl00
  256. API Auth Is Deeper Than It Looks | Nango Blog
  257. How AI Vibe Coding Is Destroying Junior Developers' Careers
  258. .NET 10 Preview 6 is now available! - .NET Blog
  259. Haven Blog: Age Assurance and Bluesky
  260. What I'm working on – at work and on the side
  261. Artificial intelligence is a commodity, but understanding is a superpower
  262. Zig's New Async I/O
  263. GitHub - MoonshotAI/Kimi-K2: Kimi K2 is the large language model series developed by Moonshot AI team
  264. Why I changed my mind on t-addresses in Zcash
  265. Google can now read your WhatsApp messages, here's how to stop it
  266. New Sphere-Packing Record Stems From an Unexpected Source | Quanta Magazine
  267. The Case for Secrets as Code: Stop Click-Managing Secrets
  268. One Year With a Framework Laptop 16 and Fedora KDE Plasma Desktop
  269. GitHub - jackjackbits/bitchat: bluetooth mesh chat, IRC vibes
  270. GitHub - BlueFalconHD/apple_generative_model_safety_decrypted: Decrypted Generative Model safety files for Apple Intelligence containing filters
  271. SSH Honeypot Insights: 11,599 Login Attempts Recorded on Ubuntu
  272. Stop Hiding My Controls: Hidden Interface Controls Are Affecting Usability | IX Magazine Issue XXXII.4 July - August 2025
  273. Predicting Average IMDb Movie Ratings Using Text Embeddings of Movie Metadata
  274. Not being federated and E2E as an advantage | Die wunderbare Welt von Isotopp
  275. Opening up ‘Zero-Knowledge Proof’ technology to promote privacy in age assurance
  276. PyTorch in One Hour: From Tensors to Training Neural Networks on Multiple GPUs
  277. Exploiting the IKKO Activebuds "AI powered" earbuds, running DOOM, stealing their OpenAI API key and customer data.
  278. What is automatable and who is replaceable? Thoughts from my morning commute
  279. I Shipped a macOS App Built Entirely by Claude Code
  280. Writing Code Was Never The Bottleneck
  281. Sticky snap: a better snapping algorithm
  282. How I Used a Market Basket Analysis to Get a Job Offer - The Heasman
  283. modelling API rate limits as diophantine inequalities
  284. Daniel's Blog · Agent Lineage Evolution: A Novel Framework for Managing LLM Agent Degradation
  285. The Nature of Lisp, Code Generation and Wieldable Programming Power
  286. Getting an LLM to Set Its Own Temperature
  287. Makefile Tutorial by Example
  288. GitHub - psviderski/unregistry: Push docker images directly to remote servers without an external registry
  289. grokking NAT and packet mangling in linux
  290. Setting up a landline phone for kids - Chris Hardie's Tech and Software Blog
  291. zk: The Most Beautiful Form of Privacy
  292. Quitting Comfort: I'm attending Recurse — frankchiarulli.com
  293. matrix is cooked
  294. Start your own Internet Resiliency Club – Bow Shock Systems Consulting
  295. A2A Is For UI
  296. Endometriosis is an incredibly interesting disease
  297. How I Nearly Accessed Millions Of Maruti Suzuki Customer Records
  298. Telegram is indistinguishable from an FSB honeypot
  299. The confluence
  300. Extracting SSH private keys from Claude training data
  301. The EU Commission refuses to disclose the orchestrators behind its mass surveillance proposal, which would effectively end citizens’ online privacy.
  302. Transform Years of Content Into a Conversational Knowledge Base
  303. The Truth: What It Really Takes to Build an SaaS
  304. Chester: Reimagining LLM Benchmarking Through Programming Language Design | Aditya Bhattacharya | Blogs Website
  305. How to store data on paper?
  306. Beating the kCTF PoW with AVX512IFMA for $51k
  307. Systems Correctness Practices at Amazon Web Services – Communications of the ACM
  308. GitHub - Olow304/memvid: Video-based AI memory library. Store millions of text chunks in MP4 files with lightning-fast semantic search. No database needed.
  309. Private Money: Part 1
  310. AI: Accelerated Incompetence
  311. Exploring z.sh 🕵️ Part 1 - Storing data
  312. 10X Your AI Code Output: The Context Strategy That Beats Outdated LLM Knowledge.
  313. My $4/month self-hosted web server setup | Ethan's Wiki
  314. Reinvent the Wheel | Matthias Endler
  315. Why Algebraic Effects?
  316. Just fucking code.
  317. Introducing Claude 4
  318. Why Use Bayesian Methods for A/B Testing | Briefer
  319. Rust turns 10: How a broken elevator changed software forever
  320. Microsoft's ICC blockade: digital dependence comes at a cost
  321. DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
  322. Why We Think
  323. "We would be less confidential than Google" – Proton threatens to quit Switzerland over new surveillance law
  324. Reverse Engineering the Renpho App
  325. RAG’s big blindspot
  326. Gradients are the new intervals
  327. Disabling Indices in a -bacpac file (Sql Server)
  328. What is work?
  329. Fitting models from noisy heuristic labels - Emir's blog
  330. The Junior Developer Crisis: Why Entry-Level Coders Are Struggling and What’s at Stake
  331. Mycoria
  332. The Pocket Dimension: Motivation Now & Post AGI · Philipp Cannons
  333. Best PDF Editor | Edit, Sign, Merge & Secure
  334. Why is it taking so long to build new IP cores?
  335. How to live an intellectually rich life
  336. Vibe Coding for Existential Dread and Bankrupcy
  337. Jeeps, Ferraris, and Other Engineers
  338. How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground
  339. Michael Tsai - Blog - Revisiting ZFS for Mac
  340. Knowledge-based society, my ass
  341. How I Got Exploited At My First Startup
  342. Building the Internet of the 2030's
  343. What the heck is AEAD again?
  344. Jon Atkinson | Trust but Verify: Sensible Ways to Use LLMs in Production
  345. An end to all this prostate trouble?
  346. Your Quick Guide to Learn JWT - Coding Sonata
  347. From Hello World to Hello Customers: Why Programs Aren’t Products
  348. What If We Could Rebuild Kafka From Scratch?
  349. My Billion Dollar Idea (Seedless Torrents) is dead
  350. How I Got Hacked: A Warning about Malicious PoCs | Chocapikk's Cybersecurity Blog 🛡️💻
  351. Lode Coding
  352. This blog is hosted on a Nintendo Wii
  353. The World Is Ending. Welcome to the Spooner Revolution.
  354. Better error handling
  355. Part 6: How OneNote Storage works, in-depth | Daniel Sada Caraveo | Developer Productivity & Culture
  356. Writing an LLM from scratch, part 11 -- batches
  357. In-memory free-text search is a super-power for LLMs | sgnt.ai
  358. 15,000 lines of verified cryptography now in Python
  359. What We Mean When We Say “Think”
  360. Love your competitors
  361. Two Years of Rust
  362. LLMs Don’t Reward Originality, They Flatten It
  363. Implementing AES Encryption in .NET - EXPLAINED
  364. Hallucinations in LLMs: A Side Effect of Being Trained to Be Right?
  365. So, I Wrote a Book
  366. My day in 2035
  367. Cyc – Yuxi on the Wired
  368. The YAML Engineer
  369. Power to the people: How LLMs flip the script on technology diffusion
  370. This website is available without encryption, and yours should be too
  371. Gmail E2E is as terrible as expected
  372. MCP Tool Poisoning: Taking over your Favorite MCP Client
  373. GitHub - lwthiker/curl-impersonate: curl-impersonate: A special build of curl that can impersonate Chrome & Firefox
  374. Why I'm Building a Climbing App (and Why Knowing Your Community Actually Matters)
  375. The Golden Age of Modularity
  376. Garmin Connect+ and the Beginning of the End
  377. Stop syncing everything
  378. Building a search engine from scratch, in Rust: introduction
  379. Ente Photos v1
  380. I'm an American software developer and the "broligarchs" don't speak for me
  381. Don't Walk with Rocks in Your Shoes
  382. OTP in Your Password Manager Is Not 2FA
  383. What every computer science major should know
  384. Tim Severien
  385. HN Popularity Contest
  386. Post Apocalyptic Computing
  387. Breaking and Fixing Content-Defined Chunking
  388. Notes on coreutils in Rust · Alex Gaynor
  389. Visual-Focused Algorithms Cheat Sheet
  390. Improving Recommendation Systems & Search in the Age of LLMs
  391. How NixOS and reproducible builds could have detected the xz backdoor for the benefit of all
  392. Don’t use Telegram, but if you have to, at least use Partisan Telegram
  393. "Vibe Coding" vs Reality
  394. I made an app for competitive hot air balloon pilots
  395. A Win for Encryption: France Rejects Backdoor Mandate
  396. Vibe Coding is a Dangerous Fantasy
  397. Does unsafe undermine Rust's guarantees?
  398. Comptime Zig ORM
  399. Redundancy
  400. .NET 10 Preview 2 is now available! - .NET Blog
  401. Michael Tsai - Blog - Rotten
  402. Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
  403. AI on Windows: Detecting NPU - Nick's .NET Travels
  404. Rotten for a while now
  405. Capchan – solving captcha with image classification
  406. Model Merging
  407. Browse No More
  408. Timothy J. Baek - my true purpose
  409. Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data Leak
  410. 📗 On Testing Hypotheses Instead of Setting Goals
  411. Verifiability is the Limit
  412. GitHub - kern/filepizza: :pizza: Peer-to-peer file transfers in your browser
  413. Engineering reasoning LLMs: Notes and Observations
  414. Truth Functional Logic for Hackers - Part One
  415. Ultimate Web Development Guide For Clients | My Blog | Enindu Alahapperuma
  416. Kratix for Database Management: A Step-by-Step Guide to Amazon RDS Deployment
  417. How Language Models Understand Nullability
  418. The ESP32 "backdoor" that wasn't | Dark Mentor LLC
  419. Everything You Think You Know About DeltaChat Is Wrong – Makefile.feld
  420. GitHub - vxfemboy/purrcrypt: A fur-ociously secure encryption tool that encodes your secrets as adorable cat and dog sounds, using real elliptic curve cryptography with a playful disguise.
  421. Synchronising files across machines – The Dan MacKinlay stable of variably-well-consider’d enterprises
  422. Why Local-First Software Is the Future and its Limitations | RxDB - JavaScript Database
  423. Differentiable Logic Cellular Automata: From Game of Life to pattern generation with learned recurrent circuits
  424. Age and cognitive skills: Use it or lose it
  425. Terraform Power-Ups: The Best Tools to Supercharge Your IaC Workflow - Chris Woody Woodruff
  426. Apple takes UK to court over 'backdoor' order
  427. ARC-AGI Without Pretraining
  428. Use Firefox in 2025
  429. Prosthetics that don't betray
  430. LLMs, Game Theory, and Market Dynamics
  431. Introduction to Dapr for .NET Developers
  432. GitHub - LadybirdBrowser/ladybird: Truly independent web browser
  433. Coffee and Open Source Conversation - Key Jefferys
  434. The Raster Tragedy in Skia
  435. Benchoff Design Portfolio
  436. App over file
  437. There Isn’t Much Point to HTTP/2 Past The Load Balancer
  438. Lock It Down: Security Ideas for Terraform Deployments - Chris Woody Woodruff
  439. How I Saved $1,900 by Ditching Kajabi and Building My Own Learning Platform on Replit
  440. How the UK is Weakening Safety Worldwide
  441. A Minimal Hash-Based Symmetric Encryption Protocol
  442. Terraform Power Moves: Unlocking Advanced Features for Smarter Infrastructure - Chris Woody Woodruff
  443. Scream Cipher
  444. The Infinite Game Meets Azure Security with Bojan Magušić
  445. Magma: A Foundation Model for Multimodal AI Agents
  446. Is Hallucination a Vehicle for Creativity?
  447. Nuclear fusion: WEST beats the world record for plasma duration!
  448. XOR
  449. Direnv - and reinventing the wheel with envloader
  450. The State of Terraform: Keeping Your Cloud Empire in Check - Chris Woody Woodruff
  451. m-onz
  452. Deterministic signatures are not your friends
  453. The 20 year old PSP can now connect to WPA2 Wifi Networks - Wololo.net
  454. Introducing Privacy Pass authentication for Kagi Search
  455. League of Legends data scraping the hard and tedious way for fun
  456. Par Part 2: Linear Logic
  457. Backblaze Drive Stats for 2024
  458. GitHub - Grubre/smol-gpu: An rv32i inspired ISA, SIMT GPU implementation in system-verilog.
  459. C# .NET 9: Deep Dive into the Technical Beast 🚀
  460. In 1920s Quantum Physics, True Particles Do Not Exist
  461. Linear Relationships in the Transformer’s Positional Encoding
  462. On Not Being Immutable
  463. Static analysis of the DeepSeek Android App
  464. Understanding Reasoning LLMs
  465. The future belongs to idea guys who can just do things
  466. Understanding Reasoning LLMs
  467. Infosec 101 for Activists
  468. Optimizing with Novel Calendrical Algorithms
  469. Are reasoning benchmarks today actually reliable? Introducing the JustLogic benchmark
  470. There is still plenty of low-hanging fruit in science
  471. Best Simple System for Now
  472. ryanbuening.com | Bits of Wisdom
  473. Avoid ISP routers - RouterSecurity.org
  474. What is SwiGLU?
  475. Falsehoods programmers believe about null pointers
  476. The First Ten Years
  477. The GenAI Product Manager
  478. Lessons on Creative Work | Daniel Saewitz
  479. Antiqua et nova. Note on the Relationship Between Artificial Intelligence and Human Intelligence (28 January 2025)
  480. A few words about indie app business – Charlie Monroe
  481. How To Avoid Malware Rabbitholes
  482. Eric Chiang | Confidential Compute and GPUs
  483. 17-445 Machine Learning in Production
  484. The Illustrated DeepSeek-R1
  485. How we built Ellipsis (or: Lessons from 27 months building LLM coding agents) - Ellipsis.dev | Automated code reviews
  486. The State of WebAssembly – 2024 and 2025
  487. GitHub - seemoo-lab/openhaystack: Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
  488. The Protesters' Guide to Smartphone Security
  489. But But, You Were Supposed to Be a GPT Wrapper?!
  490. Digital Signature Algorithms - Ronkathon: Cryptography Educational Foundations
  491. Implementing AES Encryption With C#
  492. Rust's Superpower: Speed Meets Smarts - Chris Woody Woodruff
  493. TechThreads · Secrets Management w/ Firebase App Hosting and NextJS
  494. next.js: an honest review
  495. The Closed Web
  496. Paul Romer
  497. Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
  498. Looking Beyond HackerNews
  499. Reverse Engineering Call Of Duty Anti-Cheat
  500. Testing a handful of sensors for your next DIY project
  501. I am (not) a Failure: Lessons Learned From Six (and a half) Failed Startup Attempts
  502. Block AI scrapers with Anubis
  503. Investigating an "evil" RJ45 dongle
  504. Private Keys in the Fortigate Leak
  505. UofTCTF 2025: An AES Timing Side-Channel
  506. On-Chain Randomness Gotchas | drand
  507. The documentation problem in development
  508. structured decoding, a guide for the impatient
  509. Beating cuBLAS in Single-Precision General Matrix Multiplication
  510. End-to-end encrypted email is bad for you
  511. Tracking and Personalizing Connections – Chris Woody Woodruff
  512. Don't use cosine similarity carelessly - Piotr Migdał
  513. The 2025 AI Engineering Reading List
  514. How I Use LLMs for Coding and Writing
  515. HOW TO TRACK WEBSITE ANALYTICS USING ONLY NGINX AND PURE BASH
  516. Password Cracking 101: From DES to ZIP
  517. How outdated information hides in LLM token generation probabilities and creates logical inconsistencies
  518. Deniable Knowledge
  519. Creating a simple free website in 2025
  520. How We Cracked a 512-Bit DKIM Key for Less Than $8 in the Cloud
  521. Zero to One Hundred Thousand Tests
  522. Üllar Maasik - Learning Laravel by building a postal code finder
  523. Pick 3 or Get None
  524. What Makes a Good Automated Test?
  525. Efficiently factoring RSA modulus from public private keys
  526. Beyond the Random Class: Cryptographic Randomness in .NET 6+
  527. Why is Open Source important? And is it free?
  528. What LLMs mean for EBITDA margins | Notes
  529. Do it in jeans first
  530. How Websockets are Scaled
  531. How we speed up filtered vector search with ACORN | Weaviate
  532. There's no good reason for signing webhooks
  533. Programming a GPU on bare metal
  534. Generative AI is not going to build your engineering team for you - Stack Overflow
  535. mjg59 | The GPU, not the TPM, is the root of hardware DRM
  536. Blockchain-as-a-Backend
  537. The Backstory of Backpropagation – Yuxi on the Wired
  538. What changed in Rails this year?
  539. Things we learned about LLMs in 2024
  540. Jonot's Blog
  541. Intro
  542. Getting gpt-4o-mini to perform like gpt-4o
  543. Passkey technology is elegant, but it’s most definitely not usable security
  544. GitHub - lexiforest/curl-impersonate: An active fork of curl-impersonate with more versions and build targets.
  545. Improving RAG Pipelines with Hybrid Search
  546. Apple Photos phones home on iOS 18 and macOS 15
  547. MonKafka: Building a Kafka Broker from Scratch with Zero Dependencies (So Far)
  548. Notes on China
  549. matthewsinclair.com · Intelligence. Innovation. Leadership. Influence.
  550. Write your Own Virtual Machine
  551. GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
  552. String Matching. Beginning
  553. Memetic Culture
  554. Tech Trends 2025 - scapellato.dev
  555. Talking To Your Mailserver Is Not as Hard as You Think!
  556. Dec 22: Why we use our own hardware at Fastmail
  557. Building Custom RSS Feeds for LWN.net
  558. Finally, a Replacement for BERT: Introducing ModernBERT
  559. How types make hard problems easy
  560. Failing Randomly: Linux Seccomp and Kernel Hacking
  561. No, You can’t bet on everything (and that’s okay)
  562. Breaking into Vision
  563. Parallel vector graphics rasterization on CPU.
  564. GitHub - markmoxon/elite-source-code-commodore-64: Fully documented and annotated source code for Elite on the Commodore 64
  565. Bluesky and Decentralization -- Dustycloud Brainstorms
  566. Terraform Rules of Thumb
  567. VC will be the best way finance learning
  568. Sharing new research, models, and datasets from Meta FAIR
  569. Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag | Evan Pratten
  570. All Your Codebase
  571. Google Announces Quantum Chip - Willow
  572. Zero to CMake | Fred's Blog
  573. Intel on the Brink of Death | Culture Rot, Product Focus Flawed, Foundry Must Survive
  574. Becoming (more) Afraid To Post Online
  575. nrdlg | From Nix to Eos
  576. Librebooting the ThinkPad T480
  577. Strategy is Not War; It’s Gardening
  578. Lies I was Told About Collaborative Editing, Part 1: Algorithms for offline editing / Moment devlog
  579. Writing down (and searching through) every UUID · eieio.games
  580. meta-llama/Llama-3.3-70B-Instruct · Hugging Face
  581. How I Built the World's Largest Database of LEGO Minifigure Ratings
  582. Lessons Learned from Working at Startups
  583. Teaching Elderly People to Use Android - Lessons Learned
  584. The fascinating security model of dark web marketplaces
  585. 1934361 - ICP-Brasil: Mis-issued certificate
  586. Procedural Knowledge in Pretraining Drives LLM Reasoning
  587. GitHub - privastead/privastead
  588. Weaponizing SSO for profit - Raz Blog
  589. A Vanity VNC server (or Joke over RFB) - ache
  590. 100 Bushels of Corn, Revisited – R Works
  591. Setting up listmonk, an open-source newsletter & mailing list manager - Yasoob Khalid
  592. Solving LeetCode™ problems with Racket
  593. How decentralized is Bluesky really? -- Dustycloud Brainstorms
  594. Mathematical Thinking Isn’t What You Think It Is | Quanta Magazine
  595. How to Build a Chess Engine and Fail
  596. Security means securing people where they are
  597. Reverse Engineering iOS 18 Inactivity Reboot
  598. fleetwood.dev
  599. What To Use Instead of PGP - Dhole Moments
  600. The fallacies of distributed systems
  601. ‘Reflections on Trusting Trust’, but completely by accident this time
  602. Why I Quit Google to Work for Myself
  603. Escape the Surveillance Web with Gemini
  604. What I learned from 130 hours in a Waymo
  605. Traceroute Isn't Real
  606. Former Bayesian captain offers insight
  607. Our First Generalist Policy
  608. House of Nettles • A Non-Technical Intro to Webmentions
  609. Authenticating People With Certificate Chains
  610. Matrix 2.0 Is Here!
  611. delroth's homepage - One weird trick to get the whole planet to send abuse complaints to your best friend(s)
  612. Scheduling Model in LLVM - Part II
  613. llama-recipes/recipes/quickstart/NotebookLlama at main · meta-llama/llama-recipes
  614. Managing Secrets in NixOS Home Manager with SOPS
  615. Challenges deploying PostgreSQL (9.2) for high availability · Dave Pacheco's Blog
  616. OpenZFS deduplication is good now and you shouldn't use it
  617. Vulnerabilities of Realtek SD card reader driver, part 1
  618. A decade of WiFi
  619. Betting on Bali: My Journey Into the Offshoring Business
  620. Is Your Security Posture Holding Your Healthcare Startup Back? - Hadi Javeed's blog
  621. I got dysentery so you don’t have to
  622. Jujutsu (jj), a git compatible VCS
  623. Clone your building key fob
  624. Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
  625. BearerToken: The new Authentication handler in ASP.NET Core 8
  626. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
  627. Improving ASP.NET Core Security By Putting Your Cookies On A Diet
  628. Exploring what is inside the ASP.NET Core cookies
  629. Improving ASP.NET Core Security By Putting Your Cookies On A Diet
  630. Exploring what is inside the ASP.NET Core cookies
  631. Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
  632. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
  633. BearerToken: The new Authentication handler in ASP.NET Core 8
  634. Trust Rules Everything Around Me
  635. HTML Whitespace is Broken - Devel without a Cause
  636. The Stallman report
  637. Turn your old laptop into low-end gaming machine
  638. UDP, A Disclaimer, And QUIC
  639. Large language models reduce public knowledge sharing on online Q&A platforms
  640. Every bug/quirk of the Windows resource compiler (rc.exe), probably
  641. Taste and Tradeoffs
  642. Seven for a secret never to be told
  643. OpenBSD 7.6
  644. Can You Get Root With Only a Cigarette Lighter?
  645. ~200GB Free Cloud for Your files [ENG 🇬🇧] – Tomasz Dunia Blog
  646. Purity is Great for Collaboration
  647. Beware UserDefaults: a tale of hard to find bugs, and lost data
  648. Node vs Bun: no backend performance difference
  649. Getting my daily news from a dot matrix printer
  650. Why I Prefer Errors to Exceptions
  651. Reverse Engineering and Dismantling Kekz Headphones
  652. Why laptop support, why now: FreeBSD’s strategic move toward broader adoption | FreeBSD Foundation
  653. Evaluating the Effectiveness of LLM-Evaluators (aka LLM-as-Judge)
  654. How Mobile Networks Work
  655. A friendly introduction to assembly for high-level programmers — Conditionals
  656. Hypercomputation without bothering the cactus people: Software development for the DMT headspace
  657. “Bad Romance”: How Kaspersky Lab Failed to Conquer the Western Cybersecurity Market
  658. Cryptographic Innuendos - Dhole Moments
  659. Digital signatures and how to avoid them
  660. Using YouTube to steal your files
  661. Warning: macOS Sequoia 15 may bypass DNS encryption
  662. macOS Sequoia is available today
  663. Solene'% : I moved my emails to Proton Mail
  664. Notes on OpenAI’s new o1 chain-of-thought models
  665. Arrays of Wisdom of the Ancients
  666. Performance Improvements in .NET 9 - .NET Blog
  667. The Integration of Hardware, Software and Services
  668. Making a game for my friend's retro console — Nick Girardo
  669. Radicle
  670. Kafka protocol practical guide - Ivan Yurchenko
  671. Keeping your Dotfiles in Sync and your Secrets in Gopass
  672. Exploiting CI / CD Pipelines for fun and profit – Razz Security Blog
  673. Managing dotfiles with chezmoi | Daniel Stoddart
  674. Keyhole | MAS
  675. I Never Expected To Run For Office—Here's What I Learned
  676. By request from the jobs thread: why my job is to watch dreams die.
  677. Effective Spaced Repetition
  678. Programming ZKPs: From Zero to Hero
  679. My Software Bookshelf
  680. To Nerves from Elixir
  681. Air Con: $1697 for an on/off switch
  682. We've Been Lied To About Work
  683. Exploring inner workings of a random free android VPN
  684. How I’d Set Up My Tech If I Were Tate: Ensuring the Police Have Zero Evidence
  685. Danny O'Brien's Oblomovka » Blog Archive
  686. Why should anyone boot you up?
  687. Why Solid?
  688. Emulating the early Macintosh floppy drive
  689. Is Telegram really an encrypted messaging app?
  690. "What is marketing all about?" - Thoughts on marketing from a developer and rookie marketer
  691. Continuous reinvention: A brief history of block storage at AWS
  692. An unordered list of hidden gems inside NixOS — kokada
  693. Running an LLM on a simple Raspberry Pi
  694. .:: Phrack Magazine ::.
  695. Cache Grab: How Much Are You Leaving on the Table? – CSS Wizardry
  696. Reckoning: Part 2 — Object Lesson - Infrequently Noted
  697. VHS to Digital
  698. An underrated software engineering interview question – Jake Zimmerman
  699. That's the Sound of Devs Working on the Chain Gang
  700. How I won $2,750 using JavaScript, AI, and a can of WD-40
  701. Why I am stuck using Dropbox?
  702. Vector Stores Are Dumb - Tim Kellogg
  703. Hacking a VoIP Phone
  704. Details about METR’s brief initial evaluation of GPT-4o
  705. CrowdStrike: Risk assessment is better off at the sharp end
  706. Dual-Boot NetBSD And Archlinux
  707. Tony Hawk's Pro Strcpy
  708. 1fps.video - Hassle-free Screen Sharing
  709. Leaving Stripe: Parting Thoughts
  710. LLM-centric Software Paradigms
  711. A primer on how End-to-End Encryption IS NOT PREVENTING policing, arrest, or conviction of the rioters in the UK race riots (HT @shashj @DmitryOpines @AntiRacismDay @arusbridger)
  712. Linux backup workflow for hackers with restic, rclone, Backblaze B2
  713. Create your own DIY Password Manager with Vim and Syncthing
  714. You Can't Spell WebRTC without RCE - Part 1
  715. Against XMPP+OMEMO - Dhole Moments
  716. Netninja.com
  717. Advice to Young Engineers - Robotic Sea Bass
  718. 2024-07-31 just disconnect the internet
  719. On software as an "in-discipline"
  720. Why are open source nonprofits so weird?
  721. Windows resiliency: Best practices and the path forward
  722. Windows Security best practices for integrating and managing security tools | Microsoft Security Blog
  723. Why can't I stop eating?
  724. The New Internet
  725. Quantifying Prospective Jobs
  726. NuGetAudit 2.0: Elevating Security and Trust in Package Management - The NuGet Blog
  727. Panic! at the Tech Job Market
  728. Software is more like a garden
  729. ComplexType vs JSON Columns: Choosing the Right Data Storage Approach
  730. Samsung Galaxy NX: a decade's review
  731. Writing GUI apps doesn't have to be painful
  732. Not so Secret: Analysis of KakaoTalk's Secret Chat E2EE Feature
  733. Pretty pictures, bootable floppy disks, and the first Canon Cat demo?
  734. Building a WoW server in Elixir
  735. The Experience of Deploying Next.js Apps on Cloudflare
  736. system logs aggregation with postgres
  737. The Tragedies of Reality Are Coming for You
  738. Exploring TLS certificates and their limits
  739. Using aerc-mail with Outlook
  740. Announcing SSMS 20.2 ... and getting feedback for SSMS 21
  741. Evict Your Darlings: Banish dotfiles from your home directory
  742. gRPC Over HTTP/3
  743. Extrinsic Hallucinations in LLMs
  744. How LLMs Learn: What We Know, What We Don't (Yet) Know, and What Comes Next
  745. Machine Learning and the triumph of GOFAI
  746. Ente - Private cloud for your photos, videos and more
  747. 17 vulnerabilities in Sharp Multi-Function Printers
  748. I Have No Constructor, and I Must Initialize
  749. Batteries: how cheap can they get?
  750. Proton launches its own version of Google Docs
  751. Binary Classification Using LightGBM -- Visual Studio Magazine
  752. Amateur Mathematicians Find Fifth ‘Busy Beaver’ Turing Machine | Quanta Magazine
  753. Ladybird
  754. Creating hashes in .NET
  755. Exorcising us of the Primer
  756. Ladybird
  757. Automating my gate door
  758. Do a firmware update for your AirPods – now – Jonas’ Blog
  759. Mako - Mako is Now Open Source
  760. Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
  761. A Eulogy for DevOps
  762. Rabbit hole full of hardcoded credentials by Mārtiņš Irbe
  763. Skip and Kotlin Multiplatform
  764. My .gitconfig file dissected | Kiran Rao
  765. On Claude 3.5 Sonnet
  766. Y292B bug
  767. Training a 70B model from scratch: open-source tools, evaluation datasets, and learnings
  768. Cognitive Architectures for Business Decision Making in Supply Chain Management
  769. Why I attack
  770. Profiling with Ctrl-C
  771. How I Organize My Work As a Solo Founder
  772. Why strand.spreen.co is Now Offline
  773. How to Build a Fullstack Webapp with F#
  774. How my weekend project turned into a 3 years journey
  775. Inside the tiny chip that powers Montreal subway tickets
  776. quackland.kr
  777. Exploring How Cache Memory Really Works
  778. Ladybird browser spreads its wings [LWN.net]
  779. EU Council has withdrawn the vote on Chat Control
  780. Why and how to run your own FreeBSD package cache.
  781. Chat Control: The EU's CSEM scanner proposal
  782. What is HSTS and why is it in my ASP.NET Core app?
  783. Hack the Hacker - How to Setup an SSH Honeypot
  784. Chat Control Must Be Stopped – Now!
  785. Chat control: incompatible with fundamental rights
  786. GitHub - nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
  787. What You Get After Running an SSH Honeypot for 30 Days
  788. Update on the Recall preview feature for Copilot+ PCs
  789. Land value tax in online games and virtual worlds: A how-to guide
  790. My experience crafting an interpreter with Rust
  791. cr.yp.to: 2024.06.12: Bibliography keys
  792. How To Encrypt ASP.NET Core Route Parameters
  793. Solene'% : OpenBSD extreme privacy setup
  794. Blog - Private Cloud Compute: A new frontier for AI privacy in the cloud - Apple Security Research
  795. From Chaos to Clarity: My Journey with Obsidian
  796. The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
  797. So You Want To Build A Browser Engine
  798. 12 years of the com.lihaoyi Scala Platform
  799. 0.13.0 Release Notes ⚡ The Zig Programming Language
  800. When I Realized I Was Not That Guy
  801. What is PID 0? · blog.dave.tf
  802. Towards Federated Key Transparency - Dhole Moments
  803. A Picture is Worth 170 Tokens: How Does GPT-4o Encode Images? - OranLooney.com
  804. Bouncy Castle Cryptography Library for .NET - Code Maze
  805. From Scratch - Generative Adversarial Networks
  806. Blazor in .NET 9 Takes Shape (Preview 4 Highlights)
  807. Encryption At Rest: Whose Threat Model Is It Anyway?
  808. Attacking NIST SP 800-108
  809. A beginner's guide to mapping arrays in EF Core 8 - .NET Blog
  810. Even more Opentelemetry!
  811. Rationalizing Latency Competition in High-Frequency Trading – Headlands Technologies LLC Blog
  812. Encryption At Rest: Whose Threat Model Is It Anyway?
  813. Setting up a local reverse proxy on Proxmox with Traefik and Cloudflare
  814. Majority for chat control possible – Users who refuse scanning to be prevented from sharing photos and links
  815. Lizzy Banks. This story must be heard.
  816. Make Chrome go brrrrrr....
  817. htmx: Simplicity in an Age of Complicated Solutions
  818. Moving Beyond Type Systems | Vhyrro's Digital Garden
  819. Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
  820. What We've Learned From A Year of Building with LLMs
  821. Things you wish you didn't need to know about S3
  822. Building a serverless secured dead drop
  823. Length Extension Attacks | Tiago Neto
  824. Startup Risk
  825. Opinion: Ottawa wants the power to create secret backdoors in our networks to allow for surveillance
  826. re: Secure Drop protocol
  827. Web App Security—Broken Authentication vs Session Management
  828. Demystifying Golang Slices
  829. Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs
  830. Understanding Coupling in Software Development
  831. Windows Recall sounds like a privacy nightmare – here's why I'm worried
  832. Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
  833. The Decorator Pattern in Modern C# [2024]
  834. Mathematics and literature, really?
  835. Designing a Scalable OCPP server - Siddharth Sabron
  836. Build android apk from command line without gradle
  837. The WAF Swiss-Knife – Pomba Labs
  838. Thinking out loud about 2nd-gen Email – Gabriel Sieben
  839. Stuff I know about ZIP | orchid.pink
  840. New in .NET 8: ASP.NET Core Identity and How to Implement It
  841. 100 Exercises To Learn Rust
  842. BashFu - Open X11 window with netcat, echo, pipes and file system
  843. Localizing a .NET console or desktop application
  844. Wolverine’s HTTP Model Does More For You
  845. 🚲 alden.page
  846. 16 years of CVE-2008-0166 - Debian OpenSSL Bug
  847. PeaZip free archiver utility, open extract RAR TAR ZIP files
  848. Dancing on the Shoulders of Giants
  849. using golang's crypto/aes and crypto/cipher packages
  850. Disaster recovery with ZFS and zrepl
  851. Proton Mail Discloses User Data Leading to Arrest in Spain
  852. CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
  853. Deniable Encryption
  854. Conservative codomain conjecture
  855. Using age with org-journal
  856. Hallucination-Free RAG: Making LLMs Safe for Healthcare
  857. Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
  858. My Home Server Journey - From Raspberry Pi to Ryzen
  859. No, I don’t want to fill out your contact form
  860. Deniable Encryption
  861. Cost efficient alternative to databricks lock-in | Georg Heiler
  862. Woodworking as an escape from the absurdity of software
  863. Multi-Class Classification Using LightGBM -- Visual Studio Magazine
  864. Ansible is a Lisp
  865. Online Cryptography Course by Dan Boneh
  866. The Disappearance of Lived Time
  867. How to Train Diffusion for Text from Scratch
  868. Direct Preference Optimization Explained In-depth
  869. Verifying Slack Requests in Phoenix
  870. Lateral Thinking: examples of creative solutions
  871. 1000x the telemetry at 0.01x the cost
  872. the Stabilizer Problem
  873. The Simplest Thing In The World: Modifing Keymaps in Wayland
  874. Harry Chapin and RATM: the problem with bleeding interests
  875. Anneal autopsy
  876. C isn’t a Hangover; Rust isn’t a Hangover Cure
  877. open letter to the NixOS foundation
  878. What is the Metropolis algorithm?
  879. Id30 – magnushoff.com
  880. Good Ideas in Computer Science
  881. Why you shouldn't run a BSD on a PC
  882. Why Everything is Becoming a Game
  883. 10x Engineers vs -10x Burdens
  884. GoFetch: Will people ever learn?
  885. How do electronic passports work? | Burak Can's Blog
  886. Basic Things Mar 22, 2024
  887. Diffusion Models for Video Generation
  888. I launched a new startup and shut it down in two weeks - Andrew Miracle
  889. Big Integer in Zig
  890. #ChatControl: EU ministers want to exempt themselves
  891. Is Attention All You Need?
  892. PuTTY vulnerability vuln-p521-bias
  893. The Making of Side 7 | GUNDAM EVOLUTION Private Server Project
  894. What is OpenID Connect Authentication? A Practical Guide - Developer Friendly Blog
  895. Building a GPS Receiver, Part 1: Hearing Whispers
  896. Responses to Rabble on ActivityPub
  897. The golden rule of PR reviews
  898. Kaspersky analysis of the backdoor in XZ
  899. Common pitfalls of digital health startups & advice on how to avoid them
  900. Our Response to Hashicorp's Cease and Desist Letter | OpenTofu
  901. Nightmare on Lemmy Street (A Fediverse GDPR Horror Story) - Michael Altfield's Tech Blog
  902. Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
  903. Extracting curve coordinates from a bitmap
  904. Habitually - I’ve Been Tracking Everything in My Life for A Year
  905. How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
  906. What it’s like to run HTMX in Production
  907. Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
  908. smeso - MIPS stacktrace: an unexpected journey
  909. How to securely reverse-proxy ASP.NET Core web apps
  910. 'If this one guy got hit by a bus, the world's software would fall apart.'
  911. Generative transformer from first principles in Julia - Lior Sinai
  912. OpenBSD 7.5
  913. xz backdoor - Dmitry Kudryavtsev
  914. LLM Task-Specific Evals that Do & Don't Work
  915. Performance insights: Engineering for high performance
  916. XZ Backdoor: Not the End of Open Source
  917. Automatic differentiation with dual numbers
  918. What we know about the xz Utils backdoor that almost infected the world
  919. GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
  920. LLaMA Now Goes Faster on CPUs
  921. Refurb weekend: Data General/One (and the worst LCD in the world)
  922. Mental Health in Software Engineering
  923. xz/liblzma: Bash-stage Obfuscation Explained
  924. Tell the LLM the business context
  925. Filippo Valsorda (@filippo.abyssdomain.expert)
  926. Urgent Alert: Stealthy Backdoor Discovered in XZ Compression Utilities - Cyber Kendra
  927. security - backdoor in upstream xz/liblzma leading to ssh server compromise
  928. Solving the “Are You a Millionaire?” Problem with ZK certificates
  929. Notes on EndeavourOS
  930. Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
  931. Malicious email .ics attachments
  932. ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms - Computer Security Group
  933. Protect your ASP.NET site using WebAuthn Passkeys
  934. GitHub - janmojzis/tinyssh: TinySSH is small server (less than 100000 words of code)
  935. Sealed: Custom Wax Seal NFC Tags
  936. My 12 Favorite Problems
  937. Roll your own ZFS NAS
  938. Knee Deep in tree-sitter Queries
  939. A better jittering approach for discretization acknowledgment in density estimation
  940. The Linux Desktop Is Finally Great (both Ubuntu and Firefox)
  941. IP Geolocation Is Twenty-Five Years Old
  942. Senior Security Analyst, Threat Intelligence in Remote, United States | GitHub, Inc.
  943. How I Built a Bootstrapped Consulting Company: From Zero To 60k€ Revenue
  944. All the fallacies in the world
  945. JIT WireGuard
  946. Functional foundations ⚙️
  947. Securing WebSocket Channels in Local Development: A Guide with Soketi and Laravel Valet - AhmadYousefDev
  948. Conversational Spaced Repetition | David Bieber
  949. Building For Builders - deven.codes
  950. Cloning a laptop over NVME TCP
  951. Plugin Architecture in C# for Improved Software Design
  952. C and C++ Prioritize Performance over Correctness
  953. ZK Taipei #5: ZK Day · Luma
  954. S06E12 - nanoFramework: Unleashing the Power of C# in Embedded Systems and IoT with José Simões
  955. Make your own E-Mail server - FreeBSD, OpenSMTPD, Rspamd and Dovecot included - Part 1
  956. A Primer On Randomness
  957. Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
  958. The Pile
  959. Parallel Zero-knowledge Virtual Machine
  960. The Nature of Technology Book Review
  961. Azure Cosmos DB — Getting Started and Creating a NoSQL Database
  962. An Overview Of Quantum Computing's Possible Impact On Cryptography
  963. The Case Against Geometric Algebra
  964. Ente - Private cloud for your photos, videos and more
  965. List of 2024 Leap Day Bugs
  966. Mocking authorization tokens with WireMock.NET
  967. CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
  968. GitHub - microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
  969. The Linux CNA – Red Flags Since 2022
  970. How law firms and corporations are dealing with USPTO’s non-DOCX penalty
  971. Why I use Firefox
  972. Bcrypt Hash Generator & Verifier
  973. Nintendo is suing the creators of Switch emulator Yuzu
  974. Gemini server for 0ut3r.space
  975. Writing is hard, so I got help
  976. The Effect Existence, Its Magnitude, and the Goals
  977. GitHub - zksecurity/zkBank: zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!
  978. How Does BlueSky Work?
  979. Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault – Tore Nestenius
  980. ARCHITECTURE.md
  981. Jan-Piet Mens
  982. Language Checklist
  983. System.IO.Hashing 8.0.0
  984. ESP32 based voice assistant with wake word – Tristam
  985. OK-Robot: What Really Matters in Integrating Open-Knowledge Models for Robotics
  986. After 14 years in the industry, I still find programming difficult
  987. The Billion Row Challenge (1BRC) - Step-by-step from 71s to 1.7s
  988. ZK Mini Summit · Luma
  989. What is Scrum and is Scrum good for startups? — todo.space blog
  990. Large Language Models Are Drunk at the Wheel
  991. Interesting Uses of Ansible’s ternary filter
  992. Atuin - Magical Shell History
  993. Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
  994. Open Source: Current State and Future Hopes
  995. Using Azure Key Vault for signing and encrypting JSON Web Tokens
  996. Introducing Safecat
  997. How Google is killing independent sites like ours - HouseFresh
  998. ActivityPub Server in a Single PHP File
  999. Diseconomies of scale in fraud, spam, support, and moderation
  1000. Using a CSP nonce in Blazor Web
  1001. Share a private key without using passwords
  1002. Plus and Times Set Free
  1003. AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
  1004. Muse retrospective · Adam Wiggins
  1005. Tech Support Stories Part 2
  1006. How I did the layout for my self-published book
  1007. Climbing out of the rabbit hole
  1008. E2EE on the web: is the web really that bad?
  1009. varoa.net | Galo Navarro
  1010. Episode 486 - Azure Savings Plans
  1011. A love letter to the Internet
  1012. Synthetic Data for Finetuning: Distillation and Self-Improvement
  1013. Secure Yo Self
  1014. European Court of Human Rights bans weakening of secure end-to-endencryption - the end of EU‘s chat control CSAR mass surveillance plans?
  1015. Engineering Practices for LLM Application Development
  1016. Hello world, and the future for PyO3
  1017. I worry our Copilot is leaving some passengers behind
  1018. Sign and Verify Messages with HMAC Using the Web Crypto API
  1019. Lunar reflections during SLIM landing – Daniel Estévez
  1020. Episode 485 - Copilot for Azure
  1021. Ransomware Hit $1 Billion in 2023
  1022. Does it matter where you live?
  1023. 'Prompt Engineering' Jokes Abound when GitHub Asks Devs for Tips -- Visual Studio Magazine
  1024. How to Get the Number of Files in a Folder With C# - Code Maze
  1025. .NET Rocks! gRPC Update with Irina Scurtu
  1026. How to Use Dapper in Your .NET Projects
  1027. From Zero to .NET MAUI: Seeking One Codebase to Run Everywhere -- Visual Studio Magazine
  1028. Reverse engineering Skylanders' Toys-to-life mechanics
  1029. The Noise Protocol Framework
  1030. (Mis)estimation – why estimation does not work
  1031. Go 1.22 Release Notes - The Go Programming Language
  1032. Introducing Citrea: Bitcoin’s First ZK Rollup
  1033. Finding New Mountains to Climb
  1034. When sorting your data costs more than cracking AES-128
  1035. Tools and Best Practices for Secret Management in .NET - Code Maze
  1036. Hacking a Smart Home Device
  1037. Remaking the app store — Benedict Evans
  1038. Issue 46: Is Being Well Read Actually a Thing? Pt III: The Well-Read Archetypes
  1039. A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
  1040. Infrastructure: From Zero to Enterprise
  1041. Reverse-engineering the Synacor Challenge
  1042. Embracing Functional Programming in C#
  1043. Your Security Program Is Shit
  1044. The end of my childhood
  1045. The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
  1046. The end of my Elastic/optimyze journey ...
  1047. Snowpipe Streaming Deep Dive
  1048. Self-hosted media center
  1049. Why Certificate Lifecycle Automation Matters
  1050. Playing with Nom and parser combinators
  1051. Supporting modern https on Windows XP
  1052. Error categories and category errors
  1053. 41 Years in UX: A Career Retrospective
  1054. Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
  1055. Crypto is not cryptocurrency
  1056. Crypto is not cryptocurrency
  1057. Unleashing the Cloud: A Historical Odyssey of Cloud Storage
  1058. Want to learn more about zkBitcoin? I've made some videos
  1059. Rclone syncs your files to cloud storage
  1060. What I Learned from Indie Consulting - jxnl.co
  1061. Ruby on Rails load testing habits
  1062. zkBitcoin: Zero-Knowledge Applications for Bitcoin
  1063. GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  1064. 2023 letter | Dan Wang
  1065. Corax, Lucene, Benchmarks and lies!
  1066. The ZK update conflict issue in multi-user applications
  1067. Zero-knowledge proofs in stateful applications
  1068. Public Key Encryption with the JavaScript Web Crypto API
  1069. Being Intentional in 2024
  1070. zero-knowledge proof apps on Bitcoin
  1071. Improving ASP.NET Core Security By Putting Your Cookies On A Diet – Tore Nestenius
  1072. Learn to code. Or don’t.
  1073. There is still cool stuff on the internet
  1074. Ceph: A Journey to 1 TiB/s - Ceph
  1075. GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
  1076. Nethermind client: 3 Experimental Approaches to State Database Change
  1077. Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
  1078. RSA is deceptively simple (and fun)
  1079. OpenAI drops ban on military tools to partner with the Pentagon | Semafor
  1080. Postgres password encryption without leaking credentials
  1081. Maybe don't use Blake3 on Short Inputs
  1082. NixOS on Hetzner Dedicated - mhu.dev
  1083. Exploring .NET frozen segments
  1084. Episode 484 - Production LiveSite Review
  1085. High-speed 10Gbps full-mesh network based on USB4 for just $47.98
  1086. Authenticating a .NET GitHub App using a JSON Web Token (JWT) - Steve Gordon - Code with Steve
  1087. The Best C# Books For Beginner Developers: Top 6 Picks
  1088. asmBB Forum "What is AsmBB?"
  1089. The Slow Frontier of Genetic Choice
  1090. What's out there for ECDSA threshold signatures
  1091. </> htmx ~ Is htmx Just Another JavaScript Framework?
  1092. The ZK update conflict issue in multi-user applications
  1093. JSON Web Tokens are actually great, just not for sessions
  1094. Smartphone
  1095. Outlook is Microsoft’s new data collection service | Proton
  1096. Binius: a Hardware-Optimized SNARK
  1097. SSH-Snake: Automatic traversal of networks using SSH private keys
  1098. Language Modeling Reading List (to Start Your Paper Club)
  1099. Gmail And Yahoo Inbox Updates & What They Mean For Senders | Mailgun
  1100. Released: Security updates for Microsoft.Data.SqlClient and System.Data.SqlClient
  1101. runtime/src/libraries/System.Net.WebSockets/src/System/Net/WebSockets/WebSocket.cs at 1d5f483fa4344328fb85fd67fc482b70b31e6c4d · dotnet/runtime
  1102. Tokenization, or How I Learned to Stop Worrying and Love the Vault
  1103. What Is Linux Mobile
  1104. Nino
  1105. 1BRC in .NET · gunnarmorling/1brc · Discussion #44
  1106. Questionable Advice: “My boss says we don’t need any engineering managers. Is he right?”
  1107. Artificial Knowledge Creation
  1108. You shouldn’t run NSA-grade Wi-Fi at home. Here’s how to do it
  1109. How Standard Ebooks serves millions of requests per month with a 2GB VPS; or, a paean to the classic web
  1110. Add sample of integrating client apps (WinForms & WPF) into an Aspire app by DamianEdwards · Pull Request #78 · dotnet/aspire-samples
  1111. RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
  1112. .NET 8 — New Randomness Methods
  1113. Hacking a CTF: Do not use ECB mode for encryption
  1114. How to Speak the Language of the Internet: A Introduction to the Most Common Network Protocols
  1115. Major performance (I/O?) issue in /mnt/* and in ~ (home) · Issue #873 · microsoft/WSL
  1116. Mozilla CEO wants business to pick up the pace
  1117. Trustlessness and the left
  1118. Aleo completes security audits of snarkOS & snarkVM
  1119. How to Format a String as Base64 in CSharp – Beginner’s Guide
  1120. Compiling Success: My Aspirations for a Transformative Year Ahead - Chris Woodruff's Blog
  1121. GitHub - ublue-os/bazzite: Bazzite is an OCI image that serves as an alternative operating system for the Steam Deck, and a ready-to-game SteamOS-like for desktop computers, living room home theater PCs, and numerous other handheld PCs.
  1122. How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT
  1123. commit signing in 2023 is kinda wack
  1124. The Art of HPC
  1125. Linux Boomers
  1126. What if I paid for all my free software?
  1127. EP 38 : How to use Guard Clauses in C#
  1128. "Attention", "Transformers", in Neural Network "Large Language Models"
  1129. Security at Startup
  1130. xmas.c, 1988
  1131. Update in Thrussh: the SSH Terrapin attack
  1132. Don’t Believe Your Eyes - A WhatsApp Clickjacking Vulnerability
  1133. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1134. Beeper - Moving Forward
  1135. Episode 482 - Network Watcher
  1136. Announcing the Aleo Foundation
  1137. New capabilities help simplify and streamline the experience with Microsoft Dev Box
  1138. Empirically sup code review best practices
  1139. Colliding Secure Hashes | Blog
  1140. GitHub - francoismichel/ssh3: SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/pdf/2312.08396.pdf
  1141. Steering at the Frontier: Extending the Power of Prompting - Microsoft Research
  1142. Bricked Xmas
  1143. ZFS Profiling on Arch Linux | Bin Wang
  1144. Announcing the first Arecibo release
  1145. How to Get an Access Token from HttpContext in ASP.NET Core
  1146. htmx is a erlang
  1147. Kubernetes v1.29: Mandala
  1148. Adopting Rust: the missing playbook for managers and CTOs - Mainmatter
  1149. Architecting Observability in a Cloud-Native World With eBPF
  1150. Demystifying OpenID Connect’s State and Nonce Parameters in ASP.NET Core – Tore Nestenius
  1151. Good Docs Take Great Effort
  1152. GNU ASCII armor: send encrypted data in plain text
  1153. Beeper Mini Is Back
  1154. RFC 9330: Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture
  1155. 6 lessons from building 6 projects, while nomading for 6 months - Dmitry Kudryavtsev
  1156. zkLogin | Sui Documentation
  1157. GitHub - openbao/openbao at development
  1158. Why Team Leaders Give Up
  1159. Unveiling secrets of the ESP32: creating an open-source MAC Layer
  1160. 💸 Sending a file in 2017 | Zack Scholl
  1161. iMessage, explained
  1162. Beeper Mini - iMessage on Android
  1163. bips/bip-0341.mediawiki at master · bitcoin/bips
  1164. I Hacked Magic the Gathering: Arena for a 100% Winrate
  1165. Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
  1166. I Started With Nix, NixOS, Home Manager and Flakes
  1167. Monocypher 4: The Clean Break
  1168. Remote collaboration fuses fewer breakthrough ideas? Probably not.
  1169. Vicyyn - Simple Obsidian System for 99% of Your Needs
  1170. EP rejects mass scanning of private messages - European Digital Rights (EDRi)
  1171. Y Combinator's Future in the Software Slowdown
  1172. I got top 20 on my first product hunt launch by doing a homework assignment
  1173. How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
  1174. Restic Backups on Backblaze B2 with NixOS
  1175. Exploring Generative AI
  1176. My Personal Data Backup Pipeline – Justin Paulin
  1177. construct0, the first steps of an organisation with great aspirations.
  1178. Matrix vs. XMPP | Luke's Webpage
  1179. My techno-optimism
  1180. Demystifying Web Push Notifications
  1181. Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
  1182. Communication Ministry studying report of IndiHome data leak - ANTARA News
  1183. Discover the Magic of .NET 8 and Beyond!
  1184. Docker Security Principles Overview - Simple Talk
  1185. Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
  1186. Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
  1187. “Shift left”—wtf does it mean?
  1188. Sqids (formerly Hashids) · Generate Short IDs from Numbers
  1189. The Bond villain compliance strategy
  1190. All that Infocom interpreter code
  1191. Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
  1192. How STARKs work if you don't care about FRI
  1193. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  1194. Things Programmers Can Do in One Week | Blog | build-your-own.org
  1195. What Is Refactoring And Understanding Why You Need It
  1196. Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
  1197. Back up your Bitwarden vault in a future-proof and secure way
  1198. Exploring macOS private frameworks
  1199. Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
  1200. Things Programmers Can Do in One Week | Blog | build-your-own.org
  1201. ConcurrentStack in C# - Code Maze
  1202. Cryptographers Solve Decades-Old Privacy Problem
  1203. Sunbird Security Isn’t Nothing
  1204. Sunbird / ‘Nothing Chats’ is Not Secure.
  1205. All of the writing I did in a week as a software engineer
  1206. Every software is messy and has skeletons
  1207. Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
  1208. Mainframe and midrange modernization - Azure Logic Apps
  1209. Built a bunch of apps, here's what I learned
  1210. Privacy is Priceless, but Signal is Expensive
  1211. Fiat-Shamir security of FRI and related SNARKs — Part 1
  1212. The OSI Model Revisited
  1213. Making a nice API of Amtrak's ugly API
  1214. Data-as-a-Product: the keystone of the data-mesh
  1215. Is the Reversal Curse Real?
  1216. CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
  1217. Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
  1218. Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
  1219. Read the docs like a book - Aaron Francis
  1220. Frameworks Cover Up Skill Issues, And That's a Good Thing | jakelazaroff.com
  1221. Building an occupancy sensor with an ESP32 and a serverless DB
  1222. OpenAI Platform
  1223. HSG: Funded PhD student in Applied Cryptography & Privacy-preserving authentication (m/f/d) (m/w/d)
  1224. Data Oriented Blogging
  1225. An important step towards secure and interoperable messaging
  1226. Blockchains and the Future of AI
  1227. Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
  1228. Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
  1229. Hare aims to become a 100-year programming language
  1230. A clarification on the multithreading constraints of the Encrypt­Message function - The Old New Thing
  1231. Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
  1232. Article 45 Will Roll Back Web Security by 12 Years
  1233. Seeing like a Bank
  1234. Live Coding a containerized web app for event management
  1235. 2023-11-04 nuclear safety
  1236. Social Networking
  1237. GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
  1238. Why I Ran Away from Philosophy Because of Sam Bankman-Fried
  1239. Your Loved Ones Are Prisoners, and You Made the Chain
  1240. Getting our focus back
  1241. Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
  1242. Episode 477 - Azure cloud within a cloud
  1243. Visual Studio 2022 17.8 Preview 3: Structured Diagnostics, SQL Server Data Tools Upgrade and More
  1244. Mechanistic interpretability of LLM analogy-making
  1245. Last Chance to fix eIDAS
  1246. Using WebAuthn for non-repudiation
  1247. Giopler | Easy C++ Profile Debug Trace
  1248. Why I Am a Pluralist
  1249. How To Rob a Bank
  1250. General Knowledge Poker — Drawn In Perspective
  1251. Self-Signed locally trusted certificates with cert-manager
  1252. An Open Letter to Cryptographers: Please Work Together
  1253. Have I Been Pwned: API v3
  1254. .NET 8 Top 10 New Features - NDepend Blog
  1255. Why is there a hash of a weak password in the Windows cryptographic libraries? - The Old New Thing
  1256. Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
  1257. Azure: the cloud platform that is changing the world
  1258. From CSS madness to CSS Hooks
  1259. An Analysis of Signal's PQXDH
  1260. A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
  1261. Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
  1262. Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
  1263. Episode 476 - Azure HDInsight on AKS
  1264. Hampton Blog
  1265. AppSec loves Agile
  1266. How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
  1267. GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
  1268. Nobody knows what a good password looks like
  1269. Some concerns with OpenPubKey
  1270. SQL Server Security Primer - Simple Talk
  1271. Encrypt. Now. — blog.tripu.info
  1272. Creating a Variable Color Font From Scratch
  1273. 'OpenBSD 7.4 released -- Oct 16, 2023'
  1274. Memory alignment of doubles in C#
  1275. Security: The Impact of Time
  1276. The Present Should Be Signed
  1277. SSH Hardening with ssh-audit
  1278. Intercepting Allocations with the Global Allocator
  1279. GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
  1280. Massive input and/or spaced repetition
  1281. LSP could have been better
  1282. Radical Energy Abundance
  1283. How I built a MVP in 14 hours
  1284. Drivechains: A Detailed Analysis
  1285. An Intuitive Explanation Of Hashing
  1286. The Linux Foundation Member Summit | Linux Foundation Events
  1287. Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
  1288. Polylang – Polylang by Polybase Labs
  1289. Strikeout (ꓘ) Blog - Security Researcher
  1290. How to Perform Case-Insensitive Substring Search in C#
  1291. Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
  1292. Building an Anomaly Detection System with Recurrent Neural Networks
  1293. A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
  1294. How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
  1295. Bitwise and Shift Operators in C#: A Deep Dive
  1296. Understand Linear regression through many facets
  1297. Announcing the $12k NIST Elliptic Curves Seeds Bounty
  1298. Store ssh keys inside the TPM: ssh-tpm-agent
  1299. Why HTTP/3 is eating the world | APNIC Blog
  1300. Converting a Hexadecimal String to a Byte Array in C# - Code Maze
  1301. Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
  1302. Security Tradeoffs: Privacy
  1303. How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
  1304. The inability to count correctly
  1305. I don't want to know IPs: encryption in TORRENTDYNE
  1306. A journey into zero-knowledge proofs
  1307. Episode 474 - Azure Chaos Studio
  1308. GitHub - reclaimprotocol/circom-chacha20
  1309. Reclaim Successfully Passed the ZK Circuit Security Audit
  1310. Buy wisely
  1311. Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
  1312. Public report of Reclaim protocol's ChaCha20 circuit
  1313. Return to Office Is Bullshit And Everyone Knows It - Dhole Moments
  1314. Free Open source disk encryption with strong security for the Paranoid
  1315. Mozilla and the burning need for clients for power users
  1316. Making a Chromecast receiver · random hacks
  1317. Guide to Timescript
  1318. Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
  1319. What the Birthday Paradox Teaches Us About Protecting Patron Privacy
  1320. zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
  1321. Security in the cloud: Whose responsibility is it?
  1322. Finding Bathroom Faucets with Embeddings
  1323. On the future of cloud services and BYOC — Jack Vanlightly
  1324. Performance Improvements in .NET 8
  1325. Binding Sigmas in Circuits for Fast Curve Operations
  1326. Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
  1327. Block reels on Instagram - Break The Scroll
  1328. Welcome to Birthday Week 2023
  1329. t3chn0tix - Your Source for the Latest Tech News
  1330. Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
  1331. Nintendo 3DS Architecture | A Practical Analysis
  1332. Signal Messenger: Speak Freely
  1333. S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
  1334. What link previews leak | aaron blog
  1335. Matrix 2.0: The Future of Matrix
  1336. Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users 
  1337. 64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
  1338. Inside New Query Engine of MongoDB
  1339. Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
  1340. Quantum Resistance and the Signal Protocol
  1341. Exploring Generative AI
  1342. ESXi on SolidRun V3000
  1343. SimulaVR
  1344. Exploring The Halo 1 System Link Protocol
  1345. Nuclear Propulsion | Charles Pellegrino
  1346. How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
  1347. Book notes & reflections: An Elegant Puzzle
  1348. The Blind Men and the Coin - Part I | Boaz Sobrado's Website
  1349. Mario Zechner (@badlogic@mastodon.gamedev.place)
  1350. ZK Security meetup with the Succinct Labs folks! · Luma
  1351. Kopia
  1352. Dymocks - Customer Notices
  1353. Onboarding Made Simple with zkLogin
  1354. Role Of Algorithms
  1355. Performance Improvements in .NET 8 - .NET Blog
  1356. Getting to Know Dapr with Mark Fussell and Yaron Schneider
  1357. Techniques for Checking Floating-Point Equality in C# - Code Maze
  1358. GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
  1359. How AES Is Implemented
  1360. Notes on Self-hosted Transactional Email
  1361. The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
  1362. GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
  1363. Learn the Basics of HTTP Web API - Coding Sonata
  1364. why not matrix?
  1365. How to Use Basic Authentication With HttpClient? - Code Maze
  1366. Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
  1367. Designing a 3D Printed Toy for My Son
  1368. A (Post-Pandemic) World Without Email
  1369. Episode 472 - Azure Vector Search Unveiled
  1370. Mullvad on Tailscale: Privately browse the web
  1371. Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
  1372. Enable passkeys in .NET with Bitwarden Passwordless.dev | Bitwarden Blog
  1373. The future headwinds
  1374. Dunghill Anti-Pattern - Why utility classes and modules smell?
  1375. How to Write a Secure JWT Library If You Absolutely Must
  1376. Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
  1377. U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
  1378. The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
  1379. Android 14 blocks all modification of system certificates, even as root
  1380. Deploying a Dapr Sidecar to Azure Container Instances
  1381. What 0 to 6 Months of Photography Has Taught Me
  1382. Support for custom headers for handshake · Issue #16 · whatwg/websockets
  1383. Introducing our summer '23 research seminars
  1384. Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
  1385. Explaining The Postgres Meme
  1386. Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
  1387. Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
  1388. GitHub - starkware-libs/stone-prover
  1389. Announcing my new blog · Higashi.blog
  1390. Wii Architecture | A Practical Analysis
  1391. Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  1392. The History of Data with Ted Neward
  1393. End-to-end encryption with Proton Mail
  1394. Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
  1395. Listen to us on zeroknowledge.fm
  1396. Measuring Unicode String Lengths with C#
  1397. Choosing Apache Kafka For A New Project – A Questionnaire
  1398. Automata Part 1: Understanding Position Automata
  1399. BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
  1400. Zero-Knowledge Proof Research | Berkeley RDI
  1401. Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
  1402. Vacation Study Ideas
  1403. How to debug linux kernel API (syscalls issues)?
  1404. The Tale of a Corrupt Backup
  1405. Introducing ChatGPT Enterprise
  1406. Demodulation of the 5G NR downlink – Daniel Estévez
  1407. Cool & Unique Cryptography Features for Modern Sui DApps
  1408. You Should Be Working On Hardware
  1409. Blockchain Applications Stanford Summit
  1410. You like Circom but you find it confusing? Introducing Circomscribe
  1411. Detecting and blocking OpenAI crawlers | aaron blog
  1412. Detecting boomerang values in zero-knowledge circuits using tag analysis
  1413. Fiat-Shamir Security of FRI and Related SNARKs
  1414. How SNARKs fall short for FHE
  1415. Getting our focus back
  1416. Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
  1417. Delendum-SBC Research Meetup
  1418. Penumbra Security Audits Q3 2023
  1419. Ergaster - Syncing Notes with Obsidian
  1420. An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful) · Graham Helton
  1421. Max Goodhart (@chromakode@mastodon.social)
  1422. Raspberry Pi x OpenWRT Travel Router – Tristam
  1423. Unlocking Discord Nitro Features for Free
  1424. Brenton Cleeland - Website Best Practices
  1425. Storing passkeys in password managers is okay, actually
  1426. Backing Up Personal Files with rclone
  1427. Exploring Generative AI
  1428. Exploring Generative AI
  1429. About GitHub Copilot for Individuals - GitHub Docs
  1430. Breaking The Mutant Language's "Encryption"
  1431. How Surround Sound for Headphones Works
  1432. Understanding Lasso and Jolt, from theory to code
  1433. North Korean Hackers Suspected in New Wave of Malicious npm Packages
  1434. Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
  1435. How the Nintendo Wii Security Was Defeated
  1436. Short session expiration does not help security
  1437. EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
  1438. Unity 4D #2: Extending Unity to 4D - Alan Zucconi
  1439. My bug finding chronicles (and how to earn money through vulnerability research)
  1440. Bare Metal Space Invaders
  1441. The BEST Moq Alternatives: NSubstitute vs FakeItEasy
  1442. Self-Discipline Examples That Don't Suck
  1443. Software Engineering at Google
  1444. Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
  1445. HalvarFlake (@HalvarFlake@mastodon.social)
  1446. Azure Storage Account: Best Practices for Efficient and Secure Storage
  1447. Chris James - Practical ways to shift QA left
  1448. Reflections on Ten Years Past the Snowden Revelations
  1449. Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
  1450. State-Issued Identifiers aren’t generally good passwords
  1451. Tailscale vs. Narrowlink | Narrowlink
  1452. Youtube-dl Site Goes Offline as Hosting Provider Enforces Court-Ordered Ban * TorrentFreak
  1453. Episode 469 - Microsoft Fabric
  1454. GitHub - id-Software/quake2-rerelease-dll
  1455. Do Machine Learning Models Memorize or Generalize?
  1456. On Moq & SponsorLink: Some thoughts
  1457. Introducing per hostname TLS settings — security fit to your needs
  1458. Android 14 introduces first-of-its-kind cellular connectivity security features
  1459. Efficient Elliptic Curve Arithmetic in OpenSSL — Store Halfword Byte-Reverse Indexed
  1460. Go 1.21 Release Notes - The Go Programming Language
  1461. Humble Tech Book Bundle: Math for Programmers 2023 by Manning
  1462. Removing Randomness with LLDB
  1463. Everyday Scientist » Replace Peer Review with “Peer Replication”
  1464. Verifiable encryption on the Blockchain
  1465. 0.11.0 Release Notes ⚡ The Zig Programming Language
  1466. My experience at the k-space hackerspace hackathon
  1467. Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
  1468. Patterns for Building LLM-based Systems & Products
  1469. The Worst API Ever Made
  1470. Shamir Secret Sharing
  1471. File distribution over DNS: (ab)using DNS as a CDN (eighty-twenty news)
  1472. I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
  1473. The Reluctant Sysadmin's Guide to Securing a Linux Server
  1474. Why do consultants invent words?
  1475. Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
  1476. Understanding Python Numeric Data Types | Pro Code Guide
  1477. Digital Bum: Finding a Home/lessness on the Internet
  1478. The U.K. Government Is Very Close To Eroding Encryption Worldwide 
  1479. Episode 468 - WordPress on Azure App Service
  1480. Worldcoin isn’t as bad as it sounds: It’s worse
  1481. Introducing GitHub Copilot X
  1482. Where are all the women?
  1483. The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
  1484. What We Know About LLMs (Primer)
  1485. Pre 2013 Data Breach - Forum Thread
  1486. How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
  1487. Women in Cryptography
  1488. RSA
  1489. Sharing encrypted data over short-form mediums
  1490. Announcing .NET 8 Preview 6 - .NET Blog
  1491. Attention Is Off By One
  1492. Zenbleed
  1493. Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  1494. Have I Been Pwned: API v3
  1495. Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
  1496. Plane - The open source project management tool
  1497. What does a CTO actually do?
  1498. Performance Improvements in .NET Core - .NET Blog
  1499. Announcing the .NET Framework 4.7.2 - .NET Blog
  1500. Announcing the .NET Framework 4.8 - .NET Blog
  1501. Announcing the .NET Framework 4.7 General Availability - .NET Blog
  1502. Announcing the .NET Framework 4.7 - .NET Blog
  1503. What Happened to Dolphin on Steam?
  1504. 1 Introduction · Real-World Cryptography
  1505. The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations | Eyal Ronen
  1506. Best crypto blog posts of 2017
  1507. Why Frustum Culling Matters, and Why It's Not Important
  1508. Tutorial 1: Hello World | Mina Documentation
  1509. Libsodium Audit Results
  1510. Live from OpenBSD in Amsterdam
  1511. ZK Security X Delendum (farewell SBC) · Luma
  1512. Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
  1513. Sharing code between Deno and Node where Bun and ts-node failed
  1514. Distributed Trust with Service-to-Service Authentication
  1515. Why the “Null” Lifetime Does Not Exist
  1516. Store age identities inside the TPM: age-plugin-tpm
  1517. Setting up PostgreSQL with Ansible
  1518. I don't know how I feel about email
  1519. Bypassing Internet Censorship Using SSH
  1520. An Alternative Approach to Deep Tech VC
  1521. Jeremy Mikkola - What makes developers productive?
  1522. Fun with DNS TXT Records
  1523. PhpMyAdmin and Azure Database for MySQL server
  1524. Living Life as a B- Student
  1525. ZK Security meetup @ Lightspeed · Luma
  1526. Episode 467 - OneStream's plans for becoming more cloud native on Azure
  1527. 17 misconceptions about SNARKs (and why they hold us back)
  1528. Cycles of curves: what are they and do we need them?
  1529. Base64 Class (System.Buffers.Text)
  1530. Regex Isn't Hard - Tim Kellogg
  1531. Put a Pin on That
  1532. .NET Framework July 2023 Security and Quality Rollup Updates - .NET Blog
  1533. Announcing .NET 8 Preview 6 - .NET Blog
  1534. Hacking LangChain For Fun and Profit - I
  1535. Euclidean Algorithm
  1536. EPAS
  1537. Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
  1538. Episode 466 - Open AI
  1539. How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
  1540. A slack clone in 5 lines of bash
  1541. GitHub - zksecurity/noname: Noname: a programming language to write zkapps
  1542. The zero-knowledge attack of the year might just have happened, or how Nova got broken
  1543. bips/bip-0042.mediawiki at master · bitcoin/bips
  1544. Exploring how Magic Link works
  1545. VerusCoin, Everything that Ethereum Isn’t
  1546. Running on a high-speed rail
  1547. Backend development is more than writing endpoints for frontend
  1548. Alpha
  1549. Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
  1550. Programming Languages Going Above and Beyond
  1551. Episode 465 - Functions on Azure Container Apps
  1552. How to do templates properly
  1553. Getting Started with API Management: A Beginner's Guide for Developers
  1554. Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
  1555. Open at Microsoft: Dapr
  1556. Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
  1557. Blocking, covariate adjustment and optimal experiment design - Emir's blog
  1558. Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
  1559. My journey into Microsoft – Unstructed.tech
  1560. How to Hash Passwords with BCrypt in C#
  1561. Using encryption to verify a license key
  1562. Red-Teaming Explained: How does it reduce toxicity in LLMs?
  1563. Based-30b
  1564. You don't take enough risks to be lucky
  1565. How (not) to compare 2D scatter plots
  1566. How to deploy your deep learning side project on a budget
  1567. Reset passwords in ASP.NET Core using delegated permissions and Microsoft Graph
  1568. The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
  1569. Working With Guid in C# - Code Maze
  1570. Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
  1571. Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
  1572. Interesting links of the week 2023-24 (#76)
  1573. The ACME Protocol in Practice and Reality - Matt Holt
  1574. Announcing .NET 8 Preview 5 - .NET Blog
  1575. Introducing the defensive statistics | Andrey Akinshin
  1576. An America-less Internet
  1577. Latest Updates for Azure App Service Presented at Microsoft Build 2023
  1578. Reset user account passwords using Microsoft Graph and application permissions in ASP.NET Core
  1579. Casey Reeves (@xogium@tech.lgbt)
  1580. /home/halosghost/blog
  1581. Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
  1582. Impagliazzo's Five Worlds
  1583. Memory Management in DBMS
  1584. Episode 464 - Azure Deployment Environments
  1585. Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
  1586. Understanding the Tech Right
  1587. Episode 463 - OneStream's journey to Azure
  1588. ZK app developers should be able to see down to the constraints
  1589. zkSecurity
  1590. Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
  1591. Generating income from open source
  1592. ZK programmability adds a whole new layer to worry about
  1593. Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
  1594. Open at Microsoft - Dapr
  1595. The Prickly Case of JavaScript Proxies
  1596. Privacy Enhancing Technologies: An Introduction for Technologists
  1597. Private delegated computation is here, and there will be bugs!
  1598. DASP - TOP 10
  1599. Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
  1600. On being paid to learn
  1601. Coin flips and most significant bits.
  1602. Using Nix with Dockerfiles
  1603. Building a baseline JIT for Lua automatically
  1604. Finding your weak spots
  1605. How to Use SFTP For Secure File Upload in .NET - Code Maze
  1606. Episode 462 - AKS LTS
  1607. Why we're bad at CSS
  1608. Free VPN Service SuperVPN Exposes 360 Million User Records
  1609. What's New for Azure App Service at Build 2023
  1610. backups (public)
  1611. How to get (micro) acquired?
  1612. Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
  1613. PGP signatures on PyPI: worse than useless
  1614. SELM: Symmetric Encryption with Language Models
  1615. Two Immortals
  1616. This Week In Security: .zip Domains, Zip Scanning
  1617. Malleable software in the age of LLMs
  1618. Understanding Passkeys
  1619. How to Unleash the Power of Multithreading in JavaScript with Web Workers
  1620. Assembling Community OS
  1621. Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
  1622. The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication
  1623. Experimenting with multi-factor encryption
  1624. How to Understand Abstract Art
  1625. transparent polynomial commitment scheme with constant opening proof size and verifier time
  1626. Level up your GPT game with prompt engineering - .NET Blog
  1627. Fast hashing, it's not that simple
  1628. Testing a new encrypted messaging app's extraordinary claims
  1629. Is .NET Still a Legitimate Technology in 2023?
  1630. How to be a Unicorn Person
  1631. API Security Checklist: How to Protect Your APIs
  1632. Managing infrastructure on Hetzner Cloud using Pulumi | Timo Zander
  1633. Story: Redis and its creator antirez
  1634. Savoring Complexity. Embracing the Infinite
  1635. PV consumption optimization – the power of software defined devices
  1636. Using The Decorator Design Pattern in .NET
  1637. Collision, Randomization and Welzl's Algorithm
  1638. Why should we read Azure Security?
  1639. Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
  1640. What is Type-Level Programming? - sulami's blog
  1641. How to design your first Solution Architecture Diagram?
  1642. Real-time charts with Blazor, SignalR and ApexCharts
  1643. Crypto: My Part In Its Downfall
  1644. The right to encrypt
  1645. Radical Incrementalism
  1646. More Design Patterns For Machine Learning Systems
  1647. Using Multiple SSH Keys at the same time - GitHub, BitBucket, etc. | no dogma blog
  1648. How To Run .NET 6, Kestrel, and Web API, on an AWS EC2 Windows Instance | no dogma blog
  1649. How To Run .NET 6, Kestrel, and Web API, on an AWS EC2 Linux Instance | no dogma blog
  1650. Create a multilingual a to z list in C#
  1651. Episode 458 - Integration Patterns
  1652. Do We Still Need Journals?
  1653. Why is OAuth still hard in 2023? | Nango Blog
  1654. Dometrain - Homepage
  1655. Introduction to ASP.NET Core Minimal APIs | The .NET Tools Blog
  1656. Bea Stollnitz - How GPT models work
  1657. Funds of every wallet created with the Trust Wallet browser extension could have been stolen without any user interaction
  1658. Sending Signal messages
  1659. The Most Annoying Math Problem
  1660. SLP: a new DDoS amplification vector in the wild
  1661. Episode 457 - Data API Builder
  1662. Local license key verification - Theory
  1663. Manning
  1664. Internexit?
  1665. The Importance of TLS with SQL Server
  1666. Playing devil's advocate on claims made in VPN adverts
  1667. Why I joined Cloudflare as Chief Security Officer
  1668. Current Issues With The Qt Project - From The Outside Looking In
  1669. Get your app to Mars!
  1670. Message-Driven Architecture: Promoting Efficient and Scalable Communication
  1671. mjg59 | PSA: upgrade your LUKS key derivation function
  1672. Nintendo Switch game modding is illegal. – Gabriel Sieben
  1673. Hot Takes on the Modern Data Stack
  1674. Make It Memory Safe: Adapting curl to use Rustls
  1675. Data Driven Detection Engineering
  1676. What do Solution Architects do?
  1677. (The Futility of) Keeping Secrets from Yourself
  1678. How I fix flaky tests - Code with Jason
  1679. 5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
  1680. Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
  1681. Prompt Engineering vs. Blind Prompting
  1682. Curiously Confused
  1683. TLS 1.3—What is It and Why Use It?
  1684. Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
  1685. Recipes For Product Failure: Obsess Over Competitors
  1686. Sponge API for Field Elements
  1687. ‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
  1688. Experimenting with LLMs to Research, Reflect, and Plan
  1689. Climate Tech Checklist
  1690. iconicexpress-mag.com (Powered by Qualys SSL Labs)
  1691. Rethinking Type I/II error rates
  1692. 11 API Security Best Practices to Secure Your Business
  1693. OpenBSD 7.3
  1694. My Love/Hate Relationship with Cloud Custodian
  1695. GPT Voyage: Part 2
  1696. Linux and Baikal Electronics: Why Postgres Should not Follow that Path
  1697. Overconfidence, and Executives as Personality Defect — Ludicity
  1698. Do Less, Better (with leverage!)
  1699. What We Learnt Building the Largest GPT-Telegram Bot
  1700. If It's So Good, Why Isn't Everyone Doing It?
  1701. Towards a Nova-based ZK VM
  1702. Sponsored ISO standards for PDF technology
  1703. Outperforming Warren Buffet
  1704. Make Your CLI Demos a Breeze with Zero Stress and Zero Mistakes
  1705. irhum.github.io - Tensor Parallelism with jax.pjit
  1706. I Quit Programming (or did I?)
  1707. I Didn't Read 17 Books So You Don't Have To 😩
  1708. Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
  1709. Unlimited Powers
  1710. Ben Howdle - Software Engineering Consultant and Advisor
  1711. Paillier's cryptosystem - Addtive homomorphic encryption
  1712. Paillier's cryptosystem - Addtive homomorphic encryption
  1713. Paillier's additively homomorphic cryptosystem
  1714. Paillier's cryptosystem - Addtive homomorphic encryption
  1715. So, You Want To Build A DBaaS
  1716. GitHub Quick Reviews
  1717. Permutation-based Cryptography 2023 – Lyon, France
  1718. Permutation-based Cryptography 2023 – Lyon, France
  1719. How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
  1720. Nix Turns 20. What the Hell Is It?
  1721. Cuttings / Moving Away from Todoist - to Taskwarrior, SSH & Dropbox - Part 2
  1722. Nobody’s on the ball on AGI alignment
  1723. Breaking a PRNG: Is it Called Xor Shift or Xor Shit?
  1724. New for Devs in SQL Server 2022: Ledger for Blockchain-Backed Security -- Visual Studio Magazine
  1725. ChatGPT's Plugin System Poses an Existential Risk to the Open Web
  1726. Synology NAS Backups with Minimal Bus Factor
  1727. Education - Mutable Instruments Documentation
  1728. Zig And Rust Mar 26, 2023
  1729. Sparks of Artificial General Intelligence (AGI) in GPT-4
  1730. Building a DOS ChatGPT client in 2023
  1731. The Artificial in AI - Pravesh Koirala
  1732. Just update rules between neurons
  1733. Symbolic vs Connectionist Machine Learning
  1734. (PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
  1735. Let’s Talk About TikTok - Black Hills Information Security
  1736. No more custom domains in Microsoft Outlook?
  1737. mjg59 | We need better support for SSH host certificates
  1738. We updated our RSA SSH host key | The GitHub Blog
  1739. None of Your Business - Why, I Wonder?
  1740. Implementing and Exploiting Cryptography
  1741. zkSummit - Zero Knowledge Summit
  1742. fhur
  1743. The Randomness Summit 2023 · Luma
  1744. Notes on FFTs: for users
  1745. Loading RSA Keys in .NET
  1746. Distributed Application Runtime (Dapr) v1.10 Released
  1747. Aria: A Fast and Practical Deterministic OLTP Database
  1748. Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
  1749. HaveIBeenPwned, DevSecOps, and Other Security Things with Troy Hunt
  1750. Head of Marketing
  1751. Geometry in Text-to-Image Diffusion Models
  1752. Microsoft.Bcl.Cryptography 8.0.0-preview.2.23128.3
  1753. Boosting password security! Pwned Passwords, zxcvbn, and more!
  1754. 9 years of open-source database development
  1755. How I burnt out in FAANG, but it is not what you think
  1756. Is OpenBSD for you? - Marián Mižik
  1757. Sunsetting Aztec Connect
  1758. Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
  1759. Sapphire Rapids: Golden Cove Hits Servers
  1760. cURL, the omnipresent data tool, is getting a 25th birthday party this month
  1761. QR Code Generator in Laravel 10 Tutorial
  1762. Losing Signal
  1763. Daily links from Cory Doctorow
  1764. My Backup Strategy
  1765. The Kids are Not Okay
  1766. Tech Notes: Polymorphic shellcode
  1767. Announcing new security and observability features in Azure Database for PostgreSQL
  1768. Were We All Gaslit About Content Being King?
  1769. Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
  1770. Warnings-as-errors friction
  1771. Veraport: Inside Korea’s dysfunctional application management
  1772. I made JSON.parse() 2x faster
  1773. Caveat Implementor! Key Recovery Attacks on MEGA
  1774. TimeSpan in C# - Code Maze
  1775. Cryptography without Security - Cronokirby
  1776. Quantum computing shorts
  1777. zk-SNARK Concepts Explained Like You’re 15
  1778. Block Breakers
  1779. ChatGPT Explained: A Normie's Guide To How It Works
  1780. A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
  1781. Use GNU Emacs The Plain Text Computing Environment
  1782. Digital Market Act workshop in Brussels
  1783. Overview | Mina Documentation
  1784. zkVMs are cool, but have you heard of zkCPUs?
  1785. How To Deploy EF Database Migrations
  1786. Database Cryptography Fur the Rest of Us - Dhole Moments
  1787. On mindsets, mind shifts and wins
  1788. Dealing with the unknown
  1789. Thief in the car
  1790. LattePanda V1 - my experience with a Raspberry Pi alternative
  1791. Zero-knowledge proof composition and recursion. Part 7: Deferred values
  1792. Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
  1793. Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
  1794. On Relearning to Code as an Adult
  1795. Zero-knowledge proof composition and recursion. Part 6: cycles of curves
  1796. Convert a File to a Byte Array in C# - Code Maze
  1797. Cryptography 101 - PHINUG Online Dev Sessions 2023.03
  1798. A new series of videos on zero-knowledge proof composition and recursion (part 1)
  1799. Real-World Cryptography, a bit more than a year later
  1800. 87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
  1801. Developer Relations
  1802. Cryptography Attacks and Defenses, Reloaded
  1803. NixOS as a server, part 1: Impermanence | Guekka's blog
  1804. Episode 454 - Sustainability and Azure
  1805. what is the randomart image for?
  1806. Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
  1807. Asking ChatGPT to Design Its Next Generation, ChatGPT 2
  1808. 『 0x61 』- /var/log
  1809. Sangria: a Folding Scheme for PLONK - Geometry Research
  1810. Haiku Package Management
  1811. Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
  1812. How Safe is the Cloud? What Businesses Need to Know
  1813. Lessons Learned from Re-rolling 60+ Production Credentials
  1814. Gamebert: a Game Boy emulator built by Robert | Robert Heaton
  1815. <div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
  1816. Google’s Fully Homomorphic Encryption Compiler — A Primer
  1817. Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
  1818. Novel Proofs of the Infinitude of Primes
  1819. Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
  1820. Keeping up with The Thiel Fellows
  1821. <3 Deno Feb 12, 2023
  1822. The unsafe language doom principle
  1823. CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
  1824. My most important email filter that helps me control my chaos
  1825. The Joy Of Duplexes
  1826. NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
  1827. [Apply by 02/15] Future Computing Research Workshop
  1828. Episode 453 - In the Real World
  1829. Challenges 7-12: Implementing and breaking AES ECB
  1830. Contributing to open source projects and about learning zero-knowledge proofs
  1831. The KZG/Kate Polynomial Commitment Scheme
  1832. Ian Norris - Blog - Understanding the limits of large language models
  1833. .NET Security Headers: A Senior Developer’s Guide✨
  1834. Reversing UK mobile rail tickets
  1835. Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
  1836. Python’s “Disappointing” Superpowers
  1837. Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
  1838. Anker admits to lying about Eufy security camera encryption; describes future plans
  1839. The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  1840. Various Ways of Sending Mail via SMTP
  1841. My first recession
  1842. Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
  1843. Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
  1844. Can GPT-3 Solve CTF Problems?
  1845. Deciphering my Dead Mother’s Cipher
  1846. Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
  1847. Making sense of TypeScript using set theory
  1848. Encrypting Data in the Browser Using WebAuthn
  1849. Introducing Zero to Nix — Determinate Systems
  1850. How to debug
  1851. Bitwarden design flaw: Server side iterations
  1852. Degrees of Open Source
  1853. 1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
  1854. How to Implement Google Authentication in Next with NextAuth
  1855. Implementing Zero Trust: A Guide to Securing Your Data
  1856. How You Respond to Security Researchers Says Everything About You - Dhole Moments
  1857. An incomplete guide to stealth addresses
  1858. Securely store secrets in Git using SOPS and Azure Key Vault
  1859. zkalc: a cryptographic calculator | EF Cryptography Research
  1860. Breaking EA Desktop's pathetic Encryption
  1861. How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
  1862. Zero Knowledge Proofs MOOC
  1863. Some thoughts on the ETH's Threema Analysis
  1864. The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
  1865. zkIgnite, Cohort 1 Program Overview
  1866. What's the deal with zkapps?
  1867. The PLONK zero-knowledge proof system
  1868. How to Secure Your .NET Application Against Common Threats
  1869. Terraform Industries Whitepaper 2.0
  1870. .NET 7 Brings Networking Improvements
  1871. Implementing secure Microsoft Graph application clients in ASP.NET Core
  1872. Encrypting and Decrypting a String in C# - Code Maze
  1873. Profiling .NET on Linux with BenchmarkDotNet
  1874. Episode 451 - Landing Zones
  1875. Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
  1876. Machine Learning in .NET with F# and ML.NET 2.0
  1877. What is Zero Trust and is it the Future of Cybersecurity?
  1878. ZK System Benchmarking
  1879. Writing a TLA⁺ tree-sitter grammar
  1880. Large Transformer Model Inference Optimization
  1881. Cryptography Implementations in .NET - Code Maze
  1882. MINA zkApp staking pool - HackMD
  1883. How I went from 0 to Hacking in SF as a high-schooler
  1884. Is it worth encrypting? | Matthew Linkous
  1885. Using client side encrypted fields in RavenDB
  1886. GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
  1887. On PBKDF2 iterations
  1888. Renato Athaydes
  1889. Azure DevOps Server - Switch from HTTP to HTTPS–Part 3
  1890. Debugging Architects
  1891. Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
  1892. Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
  1893. Ancient Apocalypse reviewed
  1894. Machine Learning in .NET with F# and ML.NET 2.0
  1895. Forming the habit of analog journaling - Why the digital format did not work for me
  1896. David Wong
  1897. Join Mina's zkIgnite, Cohort 1
  1898. Fast Accumulation on Streams (2018) - bkase
  1899. Vitalik Buterin's website
  1900. Hardware-friendliness of HyperPlonk - HackMD
  1901. Raspberry Pi security alarm — the basics
  1902. HTTPS explained with carrier pigeons
  1903. RE: False Rumors on API Leaks or Exposure of our Database
  1904. Your Pa$$word doesn't matter
  1905. Lastpass Breach - Everything you need to know
  1906. The Matrix Holiday Update 2022 | Matrix.org
  1907. The Service and the Beast: Building a Windows Service that Does Not Fail to Restart
  1908. 20 Best Cryptography Algorithms Books of All Time
  1909. 2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
  1910. IncrementalHash Class (System.Security.Cryptography)
  1911. AI assistants help developers produce code that's insecure
  1912. Reverse Engineering Tiktok's VM Obfuscation (Part 1)
  1913. Nix on the Steam Deck — Determinate Systems
  1914. LastPass users: Your info and password vault data are now in hackers’ hands
  1915. Notice of Recent Security Incident - The LastPass Blog
  1916. Soatok Dreamseeker (@soatok@furry.engineer)
  1917. Password requirements: myths and madness
  1918. Not Getting Hacked
  1919. Personal backups and file archival
  1920. Implementing the MySQL server protocol for fun and profit
  1921. Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
  1922. Yubikeys & PKI: What Are They For? | Charlton's Blog
  1923. Episode 450 - Twitter Live Spaces Discussion
  1924. Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
  1925. How to Secure Passwords with BCrypt.NET - Code Maze
  1926. Why Current Wormhole Research is So Important
  1927. Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
  1928. How Cloudflare advocates for a better Internet
  1929. Why you can’t build a web browser and why you should anyway.
  1930. Is San Francisco “back”? I audited its parties to find out
  1931. Technical Writer
  1932. The limited utility of the phrase “GNU/Linux”
  1933. Playing with ActivityPub
  1934. Real-World Cryptography
  1935. ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
  1936. Dev environments in the cloud are a half-baked solution
  1937. ChatGPT - Current state for .NET - and in general
  1938. Apple iCloud, and why encrypted backup is the only issue
  1939. Apple advances user security with powerful new data protections
  1940. Installing Guix on a 10th gen Thinkpad X1 — dthompson
  1941. Making an RC Roomba
  1942. SBF is Crypto Personified
  1943. What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
  1944. Episode 448 - Azure and OSS
  1945. Pratyush Mishra
  1946. Notice of Recent Security Incident - The LastPass Blog
  1947. Choosing your chat application
  1948. Be less scared of overconfidence
  1949. Real-World Cryptography: Wong, David + Free Shipping
  1950. Mutual Contact Discovery
  1951. [Apply by 12/08] Introducing our fellowship program
  1952. Autonomy, packet size, friction, fanout, and velocity
  1953. Episode 111 - RavenDB with Oren Eini
  1954. zkapp-cli
  1955. How I over-engineered a Fast Fourier Transform for Arduino.
  1956. You Must Be 64-Bit to Ride This Ferry
  1957. Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
  1958. OpenIddict
  1959. Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
  1960. ongoing by Tim Bray · AWS and Blockchain
  1961. The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
  1962. Cloud-Native Application Security - DZone Refcardz
  1963. Quest for my perfect watch.
  1964. Dear Crypto & Fiat Bros - An open letter to the confused and dismissive. | dergigi.com
  1965. zero to connection string
  1966. 4 Strategies for Dealing with Bad Code
  1967. The C Pointer Game
  1968. Weekly Update 322
  1969. Weekly Update 322
  1970. Intro to LiteDB for .NET Developers. Sample WebApp Included
  1971. GitHub - teslamotors/liblithium: A lightweight and portable cryptography library.
  1972. Example: Oracle | Mina Documentation
  1973. Mina Launches zkApps Era
  1974. Authorization and Authentication in Minimal APIs
  1975. Why take and make notes
  1976. Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
  1977. S1 Ep2: Data Breaches, DNA & the Future of Privacy
  1978. My take on self-hosting
  1979. Intro to Zero-knowledge & Building zkApps w/Mina Protocol
  1980. Live system DD backup, with encryption and compression!
  1981. Reverse engineering an EV charger
  1982. The Curse of Intelligence
  1983. Episode 446 - Security & L7 DDoS protection @ Edge, DNS Security, and Private DNS
  1984. GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
  1985. Weil Pairing and the MOV attack on Elliptic Curve Cryptography
  1986. The intuition behind the sum-check protocol in 5 minutes
  1987. Too Much Crypto
  1988. NSA urges orgs to use memory-safe programming languages
  1989. Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
  1990. Brave New Trusted Boot World
  1991. End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
  1992. How to contribute to Kimchi
  1993. Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
  1994. Mina zkApp Developers Meetup - San Francisco
  1995. Zero to App Store in 7 weeks
  1996. Generate Random Numbers with .NET 6
  1997. Neural Network Pruning Explained
  1998. Wii U Architecture | A Practical Analysis
  1999. 0.10.0 Release Notes ⚡ The Zig Programming Language
  2000. Improving Git protocol security on GitHub | The GitHub Blog
  2001. Encrypt and Decrypt Text Values in .NET
  2002. 5 ways to boost your collaborative app development
  2003. Real-World Cryptography: Wong, David + Free Shipping
  2004. Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
  2005. Encryption
  2006. Example: Anonymous Message Board Tutorial | Mina Documentation
  2007. We Must Professionalize Programming to Preserve Society and Computing Freedom
  2008. Running a law firm on Linux - a year or so in
  2009. Jett Hays
  2010. How I built and sold a successful startup with fractional hires
  2011. OpenBSD 7.2
  2012. Separation of Concerns in Node.js
  2013. 10 essentials to mitigating API security risks | Red Hat Developer
  2014. In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
  2015. What's the deal with zkapps?
  2016. LiteDB - A .NET embedded NoSQL database
  2017. Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
  2018. Episode 442 - Azure IP Services
  2019. Delivering consistency and transparency for cloud hardware security
  2020. ✂️ The ideal blockchain
  2021. Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  2022. Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
  2023. What to know about Zero Knowledge
  2024. Jira Pricing - Monthly and Annual Subscription Cost per User
  2025. The UNIX Pipe Card Game
  2026. Lucid Multi-Key Deputies Require Commitment
  2027. Let's watch videos with David - HackMD
  2028. Microsoft Office 365 email encryption could expose message content
  2029. How observability-driven development creates elite performers
  2030. The magic words are squeamish ossifrage
  2031. Public Preview: Disabling Weaker TLS Cipher Suites for Web Apps on Multi-tenant Premium App Service Plans
  2032. The Rails SaaS Conference
  2033. yara signatures converted from trufflehog regexes for identifying secrets in text files
  2034. OAuth client authentication - more than just client secrets
  2035. Seven years in the life of Hypergiants' off-nets
  2036. How does the key exchange in HTTPS work?
  2037. Threshold ECDSA in Excessive Detail
  2038. Machine Identity Management Summit 2022
  2039. GitHub - woodrush/lambda-8cc: x86 C compiler written in untyped lambda calculus
  2040. Comparing Semgrep and CodeQL · Doyensec's Blog
  2041. Machine Identity Management Summit 2022
  2042. E-commerce platform Bhinneka.com reported to be latest target of data theft
  2043. Shamir's Secret Sharing Visualised — Blog — Evervault
  2044. Yubikey Madness
  2045. Privacy is a business imperative
  2046. .NET R&D Digest (September, 2022)
  2047. Amazon Best Sellers: Best Computer Cryptography
  2048. Scoreboard Hacking Part 2 - Getting the AES Key
  2049. The Lens Of Asymmetry
  2050. age and Authenticated Encryption
  2051. Episode 107 - Unstructured Data With Kirk Marple
  2052. Evaluating New Tools
  2053. Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
  2054. Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
  2055. The many problems with implementing Single Sign-On
  2056. 'Berkeley' Testnet Alpha Participation Guide
  2057. Outdated vs. Complete
  2058. RegEx match open tags except XHTML self-contained tags
  2059. the sad state of debug performance in c++
  2060. Aging programmer
  2061. Help people in Iran reconnect to Signal – a request to our community
  2062. ImperialViolet - Passkeys
  2063. 06 SnarkyJS
  2064. BEAST: An Explanation of the CBC Attack on TLS
  2065. How does PLONK work? Part 1: What's PLONK?
  2066. What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
  2067. 0xPARC
  2068. What is security?
  2069. CK's Cold Dive
  2070. Introducing LiteFS
  2071. How hashing and cryptography made the internet possible | Red Hat Developer
  2072. An Introduction to Ansible Inventory
  2073. IN/"juels; ari" in US Patent Collection
  2074. Release CoreWCF v1.2.0 · CoreWCF/CoreWCF
  2075. Push notification two-factor auth considered harmful
  2076. A few thoughts about Uber&#39;s breach
  2077. How I manage my passwords
  2078. Google removed our website from search because it uses youtube-dl
  2079. FileSystemWatcher in C# - Code Maze
  2080. noname developer updates: structs are working!
  2081. 35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
  2082. Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
  2083. Visual Cryptography For Physical Keyrings
  2084. It pays to be Circomspect
  2085. Ethereum activates The Merge as it shifts to proof of stake
  2086. A beginner’s guide to regular expressions with grep | Red Hat Developer
  2087. Episode 438 - Azure NAT Gateway
  2088. Enstil Postmortem
  2089. Attacking the Android kernel using the Qualcomm TrustZone
  2090. Basic Cryptography Without Fluff - Cronokirby
  2091. Announcing .NET 7 Release Candidate 1
  2092. The subtleties of proper B+Tree implementation
  2093. githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
  2094. 6 Simple and Useful PostgreSQL Features that I wish I knew when I started
  2095. Narrative driven development
  2096. GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
  2097. Offshore Information Services Ltd.
  2098. Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
  2099. Ed25519 Deep Dive Addendum
  2100. The Sender Policy Framework (SPF)
  2101. learning about zero-knowledge apps and circuits using the noname educational DSL
  2102. Security of ZK Systems
  2103. An overview of Node.js: architecture, APIs, event loop, concurrency
  2104. Predict steel quality with Azure AutoML in manufacturing
  2105. Two And A Half Coins episode 5: More on Bitcoin: 51% attacks and Merkle trees!
  2106. On Security Against Time Traveling Adversaries
  2107. Someone’s Been Messing With My Subnormals!
  2108. Replicant: Reproducing a Fault Injection Attack on the Trezor One
  2109. fxhash - Lessons Learned from Implementing "Wave Function Collapse"
  2110. One Year With the Framework Laptop and NixOS
  2111. What Is A Blockchain
  2112. Cloudflare named a Leader by Gartner
  2113. Episode 437 - Azure CXP CRE Low Code Automation
  2114. Formal Verification of ZK Constraint Systems
  2115. Top 10 skills every programmer should know
  2116. Implement a GRPC API with OpenIddict and the OAuth client credentials flow
  2117. GitHub - mimoo/noname: Noname: a programming language to write zkapps
  2118. Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
  2119. Announcing the Open Sourcing of Paranoid's Library
  2120. Security of ZK Systems
  2121. Kagi status update: First three months
  2122. Performance Improvements in .NET 7
  2123. What Every Programmer Should Know About Optical Fiber
  2124. Review: The This by Adam Roberts
  2125. My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
  2126. We Are All Nerds: The Literary Works of Neal Stephenson
  2127. Technical Evaluation of a Startup
  2128. What You Should Learn Before Building a zkApp
  2129. champonthis | dev/rand/lack-of-attention
  2130. 2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
  2131. Performance isolation in a multi-tenant database environment
  2132. Cryptography R&D Security Engineer
  2133. Raytracing and Raycasting with Signed Distance Functions
  2134. Cryptographic Agility and Superior Alternatives - Dhole Moments
  2135. Define “better”
  2136. Deep dives & how the Internet works
  2137. How SQLite Scales Read Concurrency
  2138. Should You Buy an EV?
  2139. A Heavy Lift: Bringing Kestrel + YARP to Azure App Services
  2140. Ask Cryptography
  2141. “10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
  2142. ASP.NET validation revisited
  2143. A Dive in to Hyper-V Architecture & Vulnerabilities
  2144. How much customer service is too much? - Joydeep's Corner
  2145. GitHub - bootdotdev/curriculum: A roadmap for Boot.dev's CS curriculum for backend developers
  2146. GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
  2147. What is Lattice-based Cryptography?
  2148. The Paper that Keeps Showing Up
  2149. Add BWK's email. · onetrueawk/awk@9ebe940
  2150. Understanding JSON Web Encryption (JWE)
  2151. Why don't we do email verification in reverse?
  2152. How I Learned to Stop Worrying and Love Macros
  2153. Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
  2154. A Heavy Lift: Bringing Kestrel + YARP to Azure App Services
  2155. 6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
  2156. How Did I Become Database Engineer at 23
  2157. Workshop at SBC'22 | Tse Lab at Stanford University
  2158. GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
  2159. There aren't that many uses for blockchains
  2160. Brute Force Development · Matt Layman
  2161. Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
  2162. SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
  2163. zkEVMs: Not a Panacea
  2164. GitHub - filecoin-project/neptune: Rust Poseidon implementation.
  2165. The quick and practical "MSI" hash table
  2166. ASP.NET Core updates in .NET 7 Preview 7
  2167. Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
  2168. How does PLONK work? Part 1: What's PLONK?
  2169. Module Three – ZK Whiteboard Sessions
  2170. GitHub - openairplay/airplay2-receiver: AirPlay 2 Receiver - Python implementation
  2171. On Giving Technical Guidance to Others
  2172. NSA, NIST, and post-quantum cryptography
  2173. MPC In The Head Special
  2174. Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
  2175. NSA, NIST, and post-quantum cryptography
  2176. Home Network Part 1 - DIY Home Router with NixOS
  2177. Prevent Forwarded header spoofing with HTTP message signature
  2178. Experiment with post-quantum cryptography today
  2179. An intro to Open Telemetry in .NET - James World
  2180. BrainSTARK, Part 0: Introduction
  2181. ZK Whiteboard Sessions
  2182. The Castryck-Decru Attack on SIDH
  2183. Post-quantum encryption contender is taken out by single-core PC and 1 hour
  2184. Microsoft Previews Azure Premium SSD V2 Disk Storage
  2185. Use One Big Server - Speculative Branches
  2186. What happened to the inventors?
  2187. Document Scanner with OpenCV Using Video Footage
  2188. What I'm frustrated by in crypto
  2189. Shor, I’ll do it
  2190. Recommended settings for Wi-Fi routers and access points
  2191. An efficient key recovery attack on SIDH (preliminary version)
  2192. Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
  2193. The many flavors of hashing
  2194. x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
  2195. Total Fleet Visibility with Kolide
  2196. GitHub - o1-labs/proof-systems: The proof systems used by Mina
  2197. When the window is not fully open, your TCP stack is doing more than you think
  2198. CFF22 trip report
  2199. The dangers of Microsoft Pluton – Gabriel Sieben
  2200. I quit my business to start an open-source dev tool
  2201. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2202. How I Hacked my Car
  2203. British recycle old arguments for bypassing E2E encryption
  2204. What are zkVMs? And what's the difference with a zkEVM?
  2205. The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
  2206. Authentication is Difficult
  2207. GitHub - MystenLabs/narwhal: Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform
  2208. GitHub - chip-red-pill/MicrocodeDecryptor
  2209. Using Apache Kafka to process 1 trillion messages
  2210. Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
  2211. The First Secret Problem
  2212. Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
  2213. prose.sh
  2214. Commercial music media, a tier list · brhfl.com
  2215. I've started using Mozilla Firefox and now I can never go back to Google Chrome
  2216. Mina zkApp Developers Meetup - Paris
  2217. Get Compliant with Kolide
  2218. GitHub - nalinbhardwaj/zordle
  2219. We Need Non-Interactive Post-Quantum KEMs
  2220. Checklist For Evaluating Cloud Backup Services
  2221. Compiler and Composability in ZKP
  2222. FizzBuzz is FizzBuzz years old (and still a powerful tool)
  2223. ASP.NET Core updates in .NET 7 Preview 6
  2224. System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
  2225. Dmitry.GR: Projects
  2226. AWS Summit - Virtual EMEA Recap
  2227. Custom Blazor Elements No Longer Experimental in .NET 7 Preview 6 -- Visual Studio Magazine
  2228. Statements Vs. Expressions
  2229. ASP.NET Core updates in .NET 7 Preview 6
  2230. ASP.NET Core updates in .NET 7 Preview 6
  2231. ASP.NET Core updates in .NET 7 Preview 6
  2232. mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
  2233. Alan Howard-Backed Cryptography Investor Geometry Emerges From Stealth
  2234. CS101 Introduction to Computing Principles
  2235. Issues in Replacing OpenSSL – Security Poodle
  2236. GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
  2237. NIST’s pleasant post-quantum surprise
  2238. Introducing: the ZK Whiteboard Sessions! - ZK Podcast
  2239. Sam Jaques
  2240. Episode 430 - Multi-tenant Architectures
  2241. Web3, why? – Gautam Dhameja
  2242. How to get a job in a new industry without experience | Jason Tu
  2243. NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
  2244. Dual EC or the NSA's Backdoor: Explanations
  2245. Use OS-provided RSA OAEP implementation for Android by vcsjones · Pull Request #71670 · dotnet/runtime
  2246. The PeerTube instance tube.hamnet.io on HAMNET
  2247. On the use of a life
  2248. This website is hacky AF
  2249. Composability of Data
  2250. The best books for cryptography apprentices
  2251. Bookchor data breach of over 5 lakh users: What we know so far
  2252. Web3: What they are not telling you! – Gautam Dhameja
  2253. Advanced Dashes
  2254. Why I left Android Development after 10 years and became a Backend Developer
  2255. Using Graphs to Search for Code · Nick Gregory
  2256. CloudFormation is Dead, Long Live Terraform
  2257. Testimonials | The F# Software Foundation
  2258. Episode 429 - Azure Native Independent Software Vendor (ISV) Solutions
  2259. Italy declares Google Analytics illegal
  2260. GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
  2261. Thomas H. Ptacek
  2262. Huobi Global Lists Mina Protocol
  2263. Undefined behavior in C is a reading error. – keeping simple
  2264. MEGA: Malleable Encryption Goes Awry
  2265. Introducing Tailscale SSH
  2266. What I'm excited for this build cycle
  2267. SnarkyJS Week 2022 - Crowdcast
  2268. Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
  2269. Facebook Says Apple is Too Powerful. They're Right.
  2270. Join Us For the First Ever SnarkyJS Week
  2271. Matrix notes - anarcat
  2272. The Animated Elliptic Curve
  2273. My other database is a compiler
  2274. Some ways to use ZK-SNARKs for privacy
  2275. find an anon friendly job today
  2276. Eurocrypt 2022 program
  2277. The hunt for the cluster-killer Erlang bug
  2278. First impressions of Web5
  2279. Class-groups – USF Crypto
  2280. Hertzbleed Attack
  2281. core/known-issues.md at main · dotnet/core
  2282. Real World Cryptography Study Group
  2283. OneService Journey to .NET 6
  2284. New UUID Formats
  2285. Foreword — ZK Jargon Decoder
  2286. Specifying Spring '83
  2287. The Web PKI 2.0
  2288. Hands-on: X25519 Key Exchange
  2289. Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
  2290. Remove old macOS compatibility code for RSA decryption by vcsjones · Pull Request #70397 · dotnet/runtime
  2291. In defense of crypto(currency)
  2292. HTTP/3 becomes a standard, at last
  2293. On BFT Consensus Evolution: From Monolithic to DAG
  2294. GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
  2295. What Makes a Good Research Proposal?
  2296. What's OpenIddict?
  2297. A new portal for Project Galileo participants
  2298. Several Improvements on BKZ Algorithm
  2299. GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
  2300. Episode 426 - Defender for the Cloud
  2301. Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
  2302. About the security of passkeys
  2303. HTTP/3 From A To Z: Core Concepts — Smashing Magazine
  2304. RFC 9113: HTTP/2
  2305. This is not normal
  2306. How Effective Abstractions Are Opinionated | 8th Light
  2307. Cloudflare observations of Confluence zero day (CVE-2022-26134)
  2308. Orhun's Blog
  2309. Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
  2310. Zero-Day Exploitation of Atlassian Confluence | Volexity
  2311. A concise summary of amazing and great ideas · johnpfeiffer
  2312. Microsoft Retools 'Untapped Superpower' Low-Code Push with Power Pages -- Visual Studio Magazine
  2313. Countering the Crypto Lobbyists
  2314. A Gentle(-ish) Introduction to Worst-Case Optimal Joins
  2315. Why Seafile is unique among file sync solutions
  2316. Episode 425 - BUILD 2022 Updates
  2317. Security in MySQL: Part Two - Simple Talk
  2318. Welcoming Rocket.Chat to Matrix! | Matrix.org
  2319. Losing your cookies
  2320. Using WebTransport
  2321. Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
  2322. Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
  2323. Announcing .NET 7 Preview 3
  2324. Cloudflare’s approach to handling BMC vulnerabilities
  2325. PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
  2326. Ghost in the Shellcode
  2327. A Kernel Hacker Meets Fuchsia OS
  2328. The power of tech debt
  2329. Patch: Zoom chat messages can infect devices with malware
  2330. Create AWS resources with Kubernetes and Operators | Red Hat Developer
  2331. Preliminary Learning ON Kimchi: PLONK
  2332. Cryptology ePrint Archive: Report 2022/621
  2333. Site Reliability Engineering – Monitoring Distributed Systems
  2334. RustDesk | Open source remote desktop software
  2335. Why wireguard is NOT safe, and you should NOT use it.
  2336. Automating Well-Architected Principles
  2337. Features of the Windows Process Activation Service (WAS)
  2338. 50 shades of .NET on AWS
  2339. Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
  2340. Weekly Update 296
  2341. Monitoring our monitoring: how we validate our Prometheus alert rules
  2342. Laurence Tratt: Static Integer Types
  2343. Quick comparison of pricing of Simple Storage Services
  2344. Proof of Stake and our next experiments in web3
  2345. ‎KDE Connect
  2346. 25 Gbit/s HTTP and HTTPS download speeds
  2347. Some Cryptography Books I Like
  2348. Introducing Lurk: A programming language for recursive zk-SNARKs
  2349. Laptopia
  2350. Support for custom headers for handshake · Issue #16 · whatwg/websockets
  2351. Practical bruteforce of AES-1024 military grade encryption
  2352. The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.
  2353. Announcing Pub/Sub: Programmable MQTT-based Messaging
  2354. C# Method to Check if a Number is Prime
  2355. European Commission prefers breaking privacy to protecting kids
  2356. A Beginner's Guide to Application Security
  2357. Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
  2358. Cryptology ePrint Archive: Report 2022/566
  2359. GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
  2360. Cryptology ePrint Archive: Report 2016/163
  2361. Building a Stack Overflow browser as a VS extension
  2362. Fitting Everything Together
  2363. zsh-autoquoter makes shell quoting slightly less annoying
  2364. Bridging Web 2 and Web 3: an identity perspective - Blog by Damian Schenkelman
  2365. Patenting Your Perpetual Motion Machine
  2366. Multiplying polynomials with Fast Fourier Transform
  2367. The Two Generals Problem
  2368. Topographical Maps in Unity: Edge Detection - Alan Zucconi
  2369. Themes from Real World Crypto 2022
  2370. When Negotiating a Price, Never Bid with a Round Number
  2371. Why I joined Cloudflare in Latin America
  2372. Darlings of the self-hosted, open-source world
  2373. Learn to code. Or don't.
  2374. GitHub - onceupon/Bash-Oneliner: A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
  2375. Implementing a ZK-focused authenticated-encryption scheme
  2376. What's two-adicity?
  2377. Senior Product Security Engineer
  2378. Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
  2379. Announcing Bolt & Forte partnership
  2380. Explaining Yao's Garbled Circuits - Cronokirby
  2381. Why the fediverse is stuck.
  2382. Seeking good work-life balance and avoiding burnout
  2383. A File Format to Aid in Security Vulnerability Disclosure
  2384. Lies we tell ourselves to keep using Golang
  2385. Real World Cryptography Conference 2022
  2386. Episode 422 - Open Service Mesh
  2387. Secret Management with HashiCorp Vault
  2388. Secret Management with HashiCorp Vault
  2389. Personal Knowledge Management is Bullshit
  2390. Building many private virtual networks through Cloudflare Zero Trust
  2391. Monolith in Cloud
  2392. Announcing the Hare programming language
  2393. Why LSP?
  2394. Canetti et al's Paradoxical Encryption Scheme
  2395. Implementing JWT Authentication in Golang REST API - Detailed Guide
  2396. How SHA-256 Works Step-By-Step
  2397. A list of all my projects - Patrick Zhong
  2398. Production postmortem: The encrypted database that was too big to replicate
  2399. I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
  2400. OpenBSD 7.1
  2401. Physical Threshold Encryption
  2402. Linearization in Plonk and Kimchi. Why?
  2403. The 10 Commandments .NET Developers Must apply for Secure Applications
  2404. Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
  2405. Things I would like to see in a computer algebra system
  2406. CVE-2022-21449: Psychic Signatures in Java
  2407. Fintech and Practical Utopianism
  2408. Production postmortem: Misleading security and other production snafus
  2409. Taxonomy Of In-The-Wild Exploitation
  2410. Exponentially Better Rotations
  2411. Using dotnet format Command to Format the C#/.NET Code - Code Maze
  2412. A clearer lens on Zero Trust security strategy: Part 1 - Microsoft Security Blog
  2413. ClickHouse Keeper | Cupper
  2414. GitHub - freenet/locutus: Declare your digital independence
  2415. The games Nintendo didn't want you to play: Tengen
  2416. Cryptographic Assumptions in Hidden-Order Groups
  2417. The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
  2418. Episode 96 - The Programmer's Brain with Felienne Hermans
  2419. Ethereum Has Issues
  2420. An overview of my threat model
  2421. Let’s Encrypt Receives the Levchin Prize for Real-World Cryptography
  2422. Announcing .NET 7 Preview 3
  2423. Watch People Doing the Thing
  2424. Requests for comment/Stop accepting cryptocurrency donations - Meta
  2425. Automate Public Certificate Lifecycle Management via ACME Client API | Google Cloud Blog
  2426. Impressions from a first-time Mac user
  2427. Dapr v1.7 is now available
  2428. Git Credential Manager: authentication for everyone | The GitHub Blog
  2429. zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
  2430. Random Class in C# - Code Maze
  2431. Private Classification · The Decentralized Robot
  2432. O(1) Labs
  2433. OpenSSH: Release Notes
  2434. Episode 419 - Azure Front Door
  2435. Coinbase Lists Mina Protocol
  2436. The (r)Evolution of FHE
  2437. Optimizing for Luck
  2438. How to run a Digital Platform at Scale
  2439. placeholder
  2440. Motivating and Retaining People
  2441. Random number generator enhancements for Linux 5.17 and 5.18
  2442. zkHappyHour with Mina Protocol
  2443. What I learned as a hired consultant for autodidact physicists | Aeon Ideas
  2444. In response to Moxie's doubts on web3, and about ultra light clients
  2445. Troubleshooting HTTP/3 in http.sys
  2446. Introduction
  2447. Essential Cryptography for JavaScript Developers | With Blue Ink
  2448. Sofía Celi - cryptographer
  2449. Episode 95 - Avalonia UI with Dan Walmsley
  2450. PKC Test-of-Time Award
  2451. Webinar next week: Clean Architecture with RavenDB
  2452. Future-proofing SaltStack
  2453. A Deep dive into Ed25519 Signatures
  2454. Introducing Caddy-SSH
  2455. Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
  2456. EPAS
  2457. BAT: a Fast and Small Key Encapsulation Mechanism
  2458. It Looks Like You’re Trying To Take Over The World · Gwern.net
  2459. [Crypto] Cracking Diffie–Hellman key exchange using CADO-NFS + Logjam SSL/TLS attack
  2460. Year in Review: 2020 laid the groundwork for zero knowledge proofs
  2461. 2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
  2462. The (Edited) Latecomer's Guide to Crypto
  2463. Postico – a modern PostgreSQL client for the Mac
  2464. Ridiculously easy to use Tunnels
  2465. Decentralized Identity: The Basics of Decentralized Identity
  2466. Implementing a toy version of TLS 1.3
  2467. The Problem With Note-Taking - More To That
  2468. If you’re not using SSH certificates you’re doing SSH wrong
  2469. The Projects That Matter The Most To Me Are Small
  2470. NSA algorithm for PX-1000 broken
  2471. mimoo - Overview
  2472. GitHub - natemcmaster/dotnet-serve: Simple command-line HTTPS server for the .NET Core CLI
  2473. Announcing Sui
  2474. Using RavenDB from Serverless applications
  2475. James Stanley - Librem 5: first impressions
  2476. Using RSA Securely in 2022 - Dhole Moments
  2477. Windows Needs a Change in Priorities
  2478. Decrypting your own HTTPS traffic with Wireshark – Trickster Dev
  2479. Passkeys: How multi-device FIDO credentials can replace passwords
  2480. The first Asahi Linux Alpha Release is here! - Asahi Linux
  2481. Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
  2482. Zotero Blog » Blog Archive
  2483. Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
  2484. $92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
  2485. Be a part of the world's lightest blockchain.
  2486. O(1) Labs
  2487. Roll your own crypto, then smoke it.
  2488. The Aptos Vision
  2489. ImperialViolet - Picking parameters
  2490. FTC Takes Action Against CafePress for Data Breach Cover Up
  2491. ssh package - golang.org/x/crypto/ssh - pkg.go.dev
  2492. WAF for everyone: protecting the web from high severity vulnerabilities
  2493. The code is the specification? Introducing cargo spec
  2494. How not to build a secure plugins architecture | Crafting Privacy
  2495. Rocky Jaiswal | Fun with function composition
  2496. Recording: Database Security in a Hostile World
  2497. How to Write a Golang App Remotely on a Raspberry Pi Using Atom
  2498. ...A Farm Upstate Where He Can Run and Run
  2499. In praise of opinionated frameworks
  2500. Why should you use a random testing library in C#? · Anthony Lloyd
  2501. A Comprehensive Primer · Michael Straka
  2502. GitHub - facebookresearch/narwhal: Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus.
  2503. Cooking with credentials - pepper - Eric Mann's Blog
  2504. I can probably hack your password in MINUTES!
  2505. Reintroducing Snapps as zkApps
  2506. Search results – Add-ons for Firefox (en-US)
  2507. EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
  2508. Things I hate about Rust, redux
  2509. An Illustrated Guide to Elliptic Curve Cryptography Validation
  2510. How Cloudflare verifies the code WhatsApp Web serves to users
  2511. crt.sh | 6316640888
  2512. Request for comments: Removing graph queries from RavenDB
  2513. Deep Learning Is Hitting a Wall
  2514. Optimizing code by understanding usage
  2515. Put an io_uring on it: Exploiting the Linux Kernel - Blog
  2516. Announcing experimental DDR in 1.1.1.1
  2517. Open Banking for OAuth Developers
  2518. Use a message envelope
  2519. We Cannot Live Without Cryptography!
  2520. Webinar: Database Security in a Hostile World
  2521. Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
  2522. The technological case against Bitcoin and blockchain
  2523. Telenot Complex: Insecure AES Key Generation
  2524. Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
  2525. Introducing Native Matrix VoIP with Element Call!
  2526. Part 2: Improving crypto code in Rust using LLVM’s optnone
  2527. Never Change Your Password - TidBITS
  2528. Part 1: The life of an optimization barrier
  2529. The Controversy Surrounding Hybrid Cryptography - Dhole Moments
  2530. Recording: RavenDB–a really boring database
  2531. iCloud Private Relay: information for Cloudflare customers
  2532. Blockchain Cryptography | Gary Woodfine
  2533. Security for package maintainers
  2534. Plagiarism as a patent amplifier
  2535. GNU Taler Documentation — GNU Taler 0.8.2 documentation
  2536. Using the .NET JIT to reduce abstraction overhead
  2537. Performance optimizations in production
  2538. Transport Layer Security (5/6)
  2539. Fuzzing for wolfSSL
  2540. Security | Fleet handbook
  2541. Introducing the OpenIddict client
  2542. Zig Build System Internals
  2543. The post-quantum future: challenges and opportunities
  2544. Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
  2545. RavenDB: Domain Modeling and Data Persistency
  2546. HPKE: Standardizing public-key encryption (finally!)
  2547. GitHub Previews Faster Codespaces Creation with Prebuilds -- Visual Studio Magazine
  2548. Building Confidence in Cryptographic Protocols
  2549. Badly implementing encryption: Part X-Additional data
  2550. zkSync 2.0: Public Testnet is Live!
  2551. Why the OAuth mTLS spec is more interesting than you might think
  2552. Badly implementing encryption: Part IX–SIV
  2553. Making protocols post-quantum
  2554. OpenSSH: Release Notes
  2555. Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
  2556. Migrating from Redis-64 to Memurai
  2557. GitHub - brouberol/marcel: Le docker français
  2558. aes-gcm-nonce-reuse.rb
  2559. Badly implementing encryption: Part VIII–timings attacks and side channels
  2560. Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
  2561. How bad it is using the same IV twice with AES/GCM?
  2562. Mac Setup for Web Development [2022]
  2563. Sign up for weekly tips
  2564. The Post-Quantum State: a taxonomy of challenges
  2565. Badly implementing encryption: Part VII–implementing authenticated encryption
  2566. AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
  2567. 7 Improvements You Might Have Missed in .NET 6
  2568. HTB - DevOops
  2569. Why learn Racket? A student's perspective - Micah Cantor
  2570. Programming things that have gotten easier
  2571. Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
  2572. Is Datalog a good language for authorization?
  2573. Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
  2574. Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
  2575. .NET 7 WebAssembly Plans: Mixed-Mode AOT, Multi-Threading, Web Crypto -- Visual Studio Magazine
  2576. Badly implementing encryption: Part VI–malleable encryption
  2577. Episode 412 - Azure Database for Postgres
  2578. How to capture book notes and turn those into smart notes
  2579. Improving the US financial system
  2580. Badly implementing encryption: Part V–nonce reuse
  2581. on training
  2582. Cryptology ePrint Archive: Report 2021/1641
  2583. 1Password for SSH & Git (Beta) | 1Password Developer Documentation
  2584. redbean – single-file distributable web server
  2585. Badly implementing encryption: Part IV–keyed hash function
  2586. Pure-Impure Segregation Principle | Oleksii Holub
  2587. The right thing for the wrong reasons: FLOSS doesn't imply security
  2588. Learn Privacy-Enhancing Techniques with Cryptographic Games
  2589. Badly implementing encryption: Part III–breaking your encryption apart
  2590. Security of BLS batch verification - Cryptography - Ethereum Research
  2591. How Perl Saved the Human Genome Project
  2592. Badly implementing encryption: Part II–breaking the code
  2593. Android 13 virtualization lets Pixel 6 run Windows 11, Linux distributions - CNX Software
  2594. 00
  2595. DNS Security, Part VII: Blockchain-based Name Systems and Transparency
  2596. GitHub - blowdart/dotnetSigningWithKeyVaultCertificates: Demonstrating how to sign .net assemblies and nuget packages in azdo
  2597. Staking
  2598. Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
  2599. Kimchi: The latest update to Mina’s proof system
  2600. Badly implementing encryption: Part I
  2601. Key Senators Have Voted For The Anti-Encryption EARN IT Act
  2602. Episode 411 - Event Driven Architectures on Azure
  2603. BeyondCorp is dead, long live BeyondCorp
  2604. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
  2605. How we optimized Python API server code 100x
  2606. Dolphin Progress Report: November and December 2021, January 2022
  2607. BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
  2608. r/hearthstone - How I hacked Hearthstone
  2609. A Developer's Guide to Dogfooding
  2610. Chat Control
  2611. John Battelle's Search Blog On Building A Better Web: The Marlinspike Threads
  2612. The Federal Reserve Bank of Boston and Massachusetts Institute of Technology release technological research on a central bank digital currency
  2613. It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
  2614. CS 251 Cryptocurrencies and Blockchain Technologies: Syllabus
  2615. Episode 410 - Fusion Dev
  2616. Estimating the Bit Security of Pairing-Friendly Curves
  2617. Jay's Blog
  2618. Why and how I got my own ASN!
  2619. Visual Studio 2022 - with Kendra Havens
  2620. RWC 2022 program
  2621. Remote Pair Programming - Demir Delic
  2622. The GNU Name System
  2623. .NET R&D Digest (January, 2022)
  2624. PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
  2625. X.520: What’s in a name?
  2626. Basic cryptography - the Vigenere cipher - Eric Mann's Blog
  2627. Knowledge Base - your company’s undervalued asset
  2628. I finally understand Declarative Programming 🍀
  2629. Fold inbox crypto into one assembly by bartonjs · Pull Request #64307 · dotnet/runtime
  2630. It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
  2631. Tor Browser: a legacy of advancing private browsing innovation | Tor Project
  2632. Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
  2633. LTO Tape data storage for Linux nerds
  2634. BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
  2635. PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
  2636. Testnet #4: Shielded Staking Is Here
  2637. Run Ordinary Rails Apps Globally
  2638. The State of Zero Knowledge
  2639. Landscape of API Traffic
  2640. 2022 Tech Predictions · Ted Neward's Blog
  2641. Biscuit 2.0 release
  2642. The Curse of NixOS
  2643. [Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
  2644. On Leaving Facebook
  2645. GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
  2646. Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
  2647. GitHub - 425show/verifiable-credential-demo
  2648. Code Maze Weekly #110 - Code Maze
  2649. Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
  2650. Don’t assume the result of read()
  2651. David Wong
  2652. David Wong
  2653. Securing Sensitive Data in an Event Driven Architecture
  2654. Why is the Nuclear Power Industry Stagnant?
  2655. Bulletproof SSL and TLS | Feisty Duck
  2656. CC #9: A Wild ECDSA Appears!
  2657. Bitwarden Open Source Password Manager
  2658. FBI document shows what data can be obtained from encrypted messaging apps
  2659. How to use Org Mode and Hugo for a better scientific blogging – STRM
  2660. No Place to Hide
  2661. You're running untrusted code!
  2662. You should probably be building a web app
  2663. Arm A64 Instruction Set Architecture
  2664. Let's Encrypt SSL certificate overview
  2665. Some Techniques to Enhance Your Terraform Proficiency
  2666. Switching from macOS to Pop!_OS
  2667. GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
  2668. Clear communication
  2669. An extremely casual code review of MetaMask’s crypto
  2670. Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
  2671. SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
  2672. Life at 800MHz
  2673. Music industry is suing youtube-dl hosters
  2674. Episode 408 - Azure Load Testing
  2675. Publishing and consuming ECMAScript modules via packages – the big picture
  2676. When NOT to write an Abstraction Layer
  2677. CryptoHack – Home
  2678. Tips for More Efficient .NET Logs
  2679. Introduction to Model Predictive Control · Arnav's Weblog
  2680. Opinion: Is Web3 a Scam? - Stack Diary
  2681. Introducing Plonky2 — Polygon | Blog
  2682. XMPP: the secure communication protocol that respects privacy
  2683. Episode 407 - Container Apps
  2684. Make the Internet Yours Again With an Instant Mesh Network
  2685. dmca/2022-01-04-readium.md at master · github/dmca
  2686. Donald Knuth - The Patron Saint of Yak Shaves
  2687. Hashing is not encryption - Eric Mann's Blog
  2688. In response to Moxie's doubts on web3
  2689. My first impressions of web3
  2690. XML Encryption Syntax and Processing
  2691. Weekly Update 277
  2692. Real-World Cryptography by David Wong Book Review
  2693. 6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
  2694. The Relativity of Wrong by Isaac Asimov
  2695. Coming Clean
  2696. The Cryptography of Orphan Annie and Captain Midnight
  2697. Neural Network From Scratch
  2698. If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
  2699. PagerDuty’s Security Training for Engineers! Part Deux
  2700. Compiling a Go program into a native binary for Nintendo Switch™ - Ebiten
  2701. A Succinct Story of Zero Knowledge
  2702. Breaking change: Partial and zero-byte reads in DeflateStream, GZipStream, and CryptoStream - .NET
  2703. How I built a WFH Shed
  2704. Fixing stutters in Papers Please on Linux – Blog
  2705. The Case Against Crypto
  2706. The Modern Guide to OAuth
  2707. Stupid Patterns
  2708. GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
  2709. Looking Forward: Some Predictions for 2022
  2710. .NET's Cryptographic One-Shots
  2711. Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
  2712. Fix stack overflow with X509Certificate FriendlyName by vcsjones · Pull Request #63179 · dotnet/runtime
  2713. crt.sh | 1491512298
  2714. A Year In Review · Jethro Kuan
  2715. GitHub - trailofbits/zkdocs
  2716. Fight for privacy — an interview with Troy Hunt
  2717. How to Generate Random Numbers From a Range in C# - Code Maze
  2718. Cloud Security Breaches and Vulnerabilities: 2021 in Review
  2719. Dear Self; We Need To Talk About Social Media
  2720. MS Teams: 1 feature, 4 vulnerabilities | Positive Security
  2721. Introduction
  2722. Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
  2723. What Problem Blockchains Actually Solve
  2724. How did the Enigma Machine work?
  2725. LISP with GC in 436 bytes
  2726. GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
  2727. Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
  2728. CCPA Scam November 2021 from Princeton University
  2729. Episode 406 - Azure Bastion
  2730. GitHub - rkeene/hunter2: The "hunter2" password manager is a simple script-oriented password manager.
  2731. Don’t start with microservices – monoliths are your friend – Arnold Galovics
  2732. Rails 7.0: Fulfilling a vision
  2733. How to build large-scale end-to-end encrypted group video calls
  2734. Secure Containerized Browser
  2735. Research Notes on Humanoid Robots
  2736. "Alpha-Rays" behind the scenes - HackMD
  2737. Cryptology ePrint Archive: Report 2021/1621
  2738. Scrt.link vs. One-Time Secret
  2739. How to Write a Technical Book
  2740. Meet Kryptology: Coinbase’s Open Source Cryptography Library
  2741. Tech Solvency: The Story So Far: CVE-2021-44228 (Log4Shell log4j vulnerability).
  2742. Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
  2743. "Open source" is not broken
  2744. Testing constant-timeness using Valgrind: case of the NSS library
  2745. .NET 6 Networking Improvements
  2746. Calculating my open source blast radius
  2747. crawshaw - 2021-12-11
  2748. Solene'% : What are the VPN available on OpenBSD
  2749. Redefining Scalability
  2750. Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
  2751. Post-Quantum Signatures in TLS will be challenging | Bulletproof TLS Newsletter
  2752. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2753. A Call to Build Models Like We Build Open-Source Software
  2754. Avoiding Internet Centralization
  2755. TLS Crawler Report: Top 1 Million Analysis 2021 | Venafi
  2756. ‎Security. Cryptography. Whatever.: WireGuard, feat. Jason Donenfeld on Apple Podcasts
  2757. Twitter Suspension
  2758. Connection Failures with Microsoft.Data.SqlClient 4 and later
  2759. Episode 404 - When Windows is nowhere to be found
  2760. Gravatar "Breach" Exposes Data of 100+ Million Users
  2761. Is “KAX17” performing de-anonymization Attacks against Tor Users?
  2762. Why your cloud infrastructure should be immutable
  2763. Blockchains don't solve problems that are interesting to me
  2764. uBlock, I exfiltrate: exploiting ad blockers with CSS
  2765. Security | 2021 | The Web Almanac by HTTP Archive
  2766. Understanding HKDF - Dhole Moments
  2767. Welcome to CIO Week and the future of corporate networks
  2768. Understanding Zero-knowledge proofs through simple examples
  2769. Don't Make My Mistakes: Common Infrastructure Errors I've Made
  2770. Understanding Zero-knowledge proofs through simple examples
  2771. On the Use of Pedersen Commitments for Confidential Payments
  2772. This shouldn't have happened: A vulnerability postmortem
  2773. Securing Sensitive Data in an Event Driven Architecture
  2774. Memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures
  2775. Why I have settled on XChaCha20+Blake3 as the AE suite of choice for my projects
  2776. Don't Let the Internet Dupe You, Event Sourcing is Hard
  2777. Released: General Availability of Microsoft.Data.SqlClient 4.0
  2778. Proof of stake is a scam and the people promoting it are scammers
  2779. Build software better, together
  2780. How did this paypal spoof email pass SPF, DKIM and DMARC
  2781. Bank transfers as a payment method
  2782. Bitslicing for Constant Time Cryptography
  2783. Why does Web 3.0 Exist? - Web3 Oversimplified
  2784. How to configure verified GitHub commits?
  2785. Notebook on nbviewer
  2786. The best Task+Note system
  2787. Understanding identity tokens
  2788. An intensive introduction to cryptography: index
  2789. An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
  2790. The Great Internet Mystery - Cicada 3301 by Dave Plummer
  2791. RSA vs ECDSA for DNSSEC | APNIC Blog
  2792. ZK-Hack Puzzle #4 Writeup - HackMD
  2793. Speculative Autobiographies
  2794. Mentoring junior programmers: What I tell them is job number one - Vallified
  2795. The Joy of Cryptography
  2796. Implement certificate authentication in ASP.NET Core for an Azure B2C API connector
  2797. GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
  2798. hacspec [![hacspec chat][chat-image]][chat-link]
  2799. Episode 403 - GitHub and Azure
  2800. 80386DX ISA SINGLE BOARD MICROCOMPUTER
  2801. Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
  2802. Model-based Testing
  2803. How to install any distrib on a Gandi VPS
  2804. RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
  2805. XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
  2806. Regex Learn - Step by step, from zero to advanced.
  2807. Cracking the Adventure Time Cipher
  2808. ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
  2809. ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
  2810. Practical attacks against attribute-based encryption
  2811. Blacksmith – Computer Security Group
  2812. Azure Active Directory's gateway is on .NET 6.0!
  2813. Writing new system software
  2814. Using a framework can make you stupid!
  2815. Yes, Programming is Hard
  2816. restic · Backups done right!
  2817. Email From FBI Looks Odd
  2818. It's Now Possible To Sign Arbitrary Data With Your SSH Keys
  2819. Implement PEM exports for RSA PKCS#1 and ECPrivateKey by vcsjones · Pull Request #61487 · dotnet/runtime
  2820. No one knows what's coming next
  2821. Five Great (free!) Ways to Get Started With Cloudflare
  2822. Threshold Digital Signatures
  2823. Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
  2824. ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
  2825. The Surreal Horror of PAM
  2826. Reflecting on 11 years of side projects
  2827. Announcing YARP 1.0 Release
  2828. Libra Shrugged — Chapter 15: Central bank digital currencies
  2829. Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
  2830. .NET 6 Is Here -- Visual Studio Magazine
  2831. Matter Labs Announces $50M in New Funding for zkSync
  2832. Sizing Up Post-Quantum Signatures
  2833. Zillow, Prophet, Time Series, & Prices
  2834. HOWTO: Get tenure
  2835. Signal is losing
  2836. How To Learn Stuff Quickly
  2837. GitHub - axelarnetwork/tofn: A threshold cryptography library in Rust
  2838. Random Oracles in Cryptography
  2839. Episode 401 - Ignite 2021 Wrap-Up
  2840. Breaking changes in .NET 6 - .NET
  2841. Threema: Three Strikes, You’re Out
  2842. Timeline of the human condition
  2843. How (Not) to Design a Hash Function
  2844. PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
  2845. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2846. The Future of Work and the Workplace
  2847. Do-nothing scripting: the key to gradual automation
  2848. Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
  2849. Simple Product Management Tricks - Jacob Kaplan-Moss
  2850. The Strange Path of Accepting How Your Brain Works · Caffeinspiration
  2851. You Are What You Consume - Priyam Mohanty
  2852. Pairings in CIRCL
  2853. SectorLISP Now Fits in One Sector
  2854. Please change your mind about your announced release plans
  2855. Pipelines - Runs for runtime
  2856. Handshake Encryption: Endgame (an ECH update)
  2857. mazzo.li — Backing up WhatsApp data through the multi-device web client
  2858. Anatomy of a STARK, Part 0: Introduction
  2859. Episode 400 - A view from Azure's Core
  2860. Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
  2861. HTTPS Everywhere plug-in no longer needed | Bulletproof TLS Newsletter
  2862. You want Tor Browser ... not a VPN
  2863. Element One - Matrix, WhatsApp, Signal and Telegram in one place
  2864. Privacy is a Human Right | Tor Blog
  2865. GitHub - pubkey/client-side-databases: An implementation of the exact same app in Firestore, AWS Datastore, PouchDB, RxDB and WatermelonDB
  2866. bitbottle
  2867. FROST: Flexible Round-Optimized Schnorr Threshold Signatures
  2868. Why aviation’s compass is shifting towards True navigation
  2869. Choosing a cache
  2870. The AEGIS family of authenticated encryption algorithms
  2871. Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
  2872. Bevel Work | Rounding Sharp Corners
  2873. Looking into convergent encryption
  2874. .NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
  2875. F# eXchange 2021 | Skills Matter
  2876. 8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
  2877. Implement RSA-PSS signature for CmsSigner by vcsjones · Pull Request #60316 · dotnet/runtime
  2878. SRP is Now Deprecated - TobTu
  2879. Episode 85 - Clean Code in C# With Jason Alls
  2880. SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
  2881. A Tour Through the OWASP Top 10
  2882. PlayStation 3 Architecture | A Practical Analysis
  2883. Why Nano
  2884. A Critique [The Call of the Open Sidewalk]
  2885. How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
  2886. Code quality: a concern for businesses, bottom lines, and empathetic programmers
  2887. A Graduate Course in Applied Cryptography
  2888. Episode 17: Breaking Wi-Fi With Frame Attacks!
  2889. Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
  2890. On the Word “Nonce” in Cryptography and the UK
  2891. Critical security flaw exposed Joburg residents’ private info
  2892. JSON Web Token (JWT) Implementation Using Node.js
  2893. NixOS on Framework laptop
  2894. Vimarsh Shah - The best way to self host
  2895. It's time for the Permanent Web
  2896. Episode 398 - Hear ye! Hear ye!
  2897. Introducing Nuntius - Cronokirby
  2898. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  2899. On the Optimization of PLONK – ZK Podcast
  2900. Geo Key Manager: Setting up a service for scale
  2901. Everything That Every .NET Developer Needs to Know About Disposable Types: Properly Disposing Objects
  2902. How to use certificates in ASP.NET Core
  2903. Signatures From Identification Schemes - Cronokirby
  2904. Avoid Authy, Use Aegis
  2905. OpenBSD 7.0
  2906. Privacy-Preserving Compromised Credential Checking
  2907. What if Performance Advertising is Just an Analytics Scam? - SparkToro
  2908. Cloudflare and the IETF
  2909. Canonicalization Attacks Against MACs and Signatures
  2910. Working around expired Root Certificates
  2911. 1Password Refugee’s Guide to KeePass
  2912. A Tale Of Two Optimisations
  2913. mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
  2914. A PKI-less secure communication channel: Using TLS
  2915. Introducing SSL/TLS Recommender
  2916. The efficiency of Microsoft.
  2917. ongoing by Tim Bray · Worst Case
  2918. You're Doing IoT RNG
  2919. Designing technologies with Values? Possibility - Necessity - and European story.
  2920. Announcing Cloudflare Research Hub
  2921. HD wallets and the Legendrery PRF in MPC - HackMD
  2922. Sending emails to myself
  2923. What is SSH Tunneling, SSH Reverse Tunneling and SSH Port Forwarding?
  2924. Cloudflare Research: Two Years In
  2925. Web3 Architecture and How It Compares to Traditional Web Apps - The New Stack
  2926. Privacy is sexy 🍑🍆 - Enforce privacy & security on Windows and macOS
  2927. What happened on the Internet during the Facebook outage
  2928. Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
  2929. Episode 397 - Capacity Reservation
  2930. Scheduling Backups To OneDrive For Paperless-ng Using RClone
  2931. Lightning Round
  2932. A PKI-less secure communication channel: Implementing the record stream
  2933. Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!
  2934. A PKI-less secure communication channel: Coding the handshake
  2935. Staging TLS Certificate: Make every deployment a safe deployment
  2936. Overview | ChessCoach
  2937. The most counterintuitive facts in all of mathematics, computer science, and physics
  2938. A PKI-less secure communication channel: The record layer
  2939. Implicit Overflow Considered Harmful (and how to fix it)
  2940. Ordinal Classification Using PyTorch -- Visual Studio Magazine
  2941. A PKI-less secure communication channel: The record layer
  2942. New study reveals iPhones aren't as private as you think
  2943. Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
  2944. Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
  2945. Effective Go - The Go Programming Language
  2946. The secret to Cloudflare’s pace of Innovation
  2947. Vulnerabilities show fragility of STARTTLS | Bulletproof TLS Newsletter
  2948. Copycats and Endurance - The Bootstrapped Founder
  2949. A PKI-less secure communication channel: design
  2950. Cybersecurity threats - Simple Talk
  2951. Automatic cipher suite ordering in crypto/tls
  2952. Snapps on Mina with Emre and Izaak – ZK Podcast
  2953. CSAW Quals 2021 Bits
  2954. Introduction — pyNomo Documentation 0.3.2.0 documentation
  2955. The Bi-Symmetric Encryption Fraud
  2956. A World Without Sci-Hub
  2957. GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
  2958. Five ways I handled my OutOfMemoryErrors
  2959. Postmortem: Partial RavenDB Cloud outage
  2960. Q6 How do you manage your time? How do you allocate your time between work and other things?
  2961. OpenSSH: Release Notes
  2962. No, We Won’t Have a Video Call for That!
  2963. Code Maze Weekly #94 - Code Maze
  2964. Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  2965. Authenticated Boot and Disk Encryption on Linux
  2966. Patreon
  2967. The First Rule of Machine Learning: Start without Machine Learning
  2968. ECDSA and Custom XML Signatures in .NET
  2969. How to sign XML using RSA in .NET
  2970. Guide to Autoencoders with TensorFlow & Keras | Rubik's Code
  2971. Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
  2972. Let's Encrypt's Root Certificate is expiring!
  2973. Linux on the Desktop: Part Two
  2974. Cloudflare Pages is Lightning Fast
  2975. Weekly Update 261
  2976. Splitting up trust
  2977. The long-term consequences of maintainers’ actions – Ariadne's Space
  2978. HTTP/3 support in .NET 6
  2979. How We Made Playable Quotes for the Game Boy
  2980. Episode 394 - Quantum Update
  2981. If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
  2982. “Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
  2983. ACSC Annual Cyber Threat Report 2020-21
  2984. WebSocket per-message compression in ASP.NET Core 6
  2985. Why Monero
  2986. Advanced Git Workflow Tips | The .NET Tools Blog
  2987. Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
  2988. FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
  2989. Cloud Providers Publish Ransomware Mitigation Strategies
  2990. Welcome to Speed Week and a Waitless Internet
  2991. Write code that's easy to delete, and easy to debug too.
  2992. Why Flask will teach you more about software engineering than Django
  2993. Constant-time code verification with Memory Sanitizer
  2994. A resource for the OpenBSD community
  2995. Sylvain Kerkour
  2996. CFAIL Session 4 Talk #1: Incorrectly Generated RSA Keys, by Daniel Shumow
  2997. Part 4: Notifiable Data Breach (NDB) Scheme
  2998. Certified Application Security Specialist (CASS)
  2999. Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
  3000. AWS SIGv4 and SIGv4A — shufflesharding.com
  3001. Q6 How do you manage your time? How do you allocate your time between work and other things?
  3002. Weekly Update 260
  3003. OWASP Top 10
  3004. Rewilding: 60 years ago, scientists let a farm go wild – the results are in
  3005. WhatsApp “end-to-end encrypted” messages aren’t that private after all
  3006. About
  3007. Maintain it With Zig
  3008. GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
  3009. How to be a Certificate Authority, feat. Ryan Sleevi - Security. Cryptography. Whatever.
  3010. Welcome · Real-World Cryptography MEAP V14
  3011. ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
  3012. Release age v1.0.0 🏁 · FiloSottile/age
  3013. Why not ZFS
  3014. Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
  3015. Saving a restic backup the hard way
  3016. A meditation on three dead side projects
  3017. ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
  3018. Important clarifications regarding arrest of climate activist
  3019. NO STARTTLS
  3020. certreq.cs
  3021. Proxy vs Reverse Proxy - using a real life example!
  3022. Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
  3023. Minimal Viable Developer: acing your first month in software
  3024. WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
  3025. Zero Trust Security Architecture Overview | Developer.com
  3026. www.opendesktop.org
  3027. Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
  3028. Refactor symmetric one-shots for improved performance by vcsjones · Pull Request #58270 · dotnet/runtime
  3029. Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
  3030. How I re-over-engineered my home network for privacy and security
  3031. NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  3032. zkMesh: Aug 2021 recap
  3033. Improving Git protocol security on GitHub
  3034. Recover Password Sync for a Domain Joined Mac
  3035. Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
  3036. Writing Programs with NCURSES
  3037. The Design and Evolution of OCB - Journal of Cryptology
  3038. You’re Not Too Late
  3039. on terminal control
  3040. NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
  3041. Episode 391 - AI/ML for Process Automation
  3042. The Lenovo IdeaPad Flex 5
  3043. Aggregatable Distributed Key Generation
  3044. Released: Microsoft.Data.SqlClient 4.0 Preview 1
  3045. The All-Seeing "i": Apple Just Declared War on Your Privacy
  3046. Azure SDK: Goodbye QnA Maker, Hello AI 'Question Answering' -- Visual Studio Magazine
  3047. Cryptography Engineer
  3048. 59a34eabe31910abfb06f308 - Apple NeuralHash Collision
  3049. Programmers Don’t Understand Hash Functions
  3050. The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
  3051. API Tokens: A Tedious Survey
  3052. Principal Technical Product Manager, Amazon Corretto - Virtual Location (Level 7)
  3053. The Linux Kernel Module Programming Guide
  3054. r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
  3055. Golem keyboard project
  3056. Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
  3057. Loading Elliptic Curve (EC) Keys in .NET
  3058. Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
  3059. EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
  3060. Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
  3061. GitHub - JetBrains/projector-installer: Install, configure and run JetBrains IDEs with Projector Server on Linux or in WSL
  3062. Here's another free CA as an alternative to Let's Encrypt!
  3063. Performance Improvements in .NET 6
  3064. Adventures in fuzzing libolm | Matrix.org
  3065. How does PLONK work? Part 11: Our final protocol! (Without the copy constraints)
  3066. Thinking of the children
  3067. How does PLONK work? Part 10: The Kate polynomial commitment scheme
  3068. How ephemeral keys validate possession of a static key
  3069. Safer Illinois, Isn’t
  3070. How does PLONK work? Part 9: What's a polynomial commitment scheme (PCS)?
  3071. Auditing Cryptography: #Zcon2Lite
  3072. How does PLONK work? Part 8: A polynomial dance
  3073. How does PLONK work? Part 7: A sketch protocol with our polynomial
  3074. How does PLONK work? Part 5: From arithmetic circuits to constraint systems
  3075. How does PLONK work? Part 6: From constraint systems to polynomials
  3076. Performance Improvements in .NET 6
  3077. 6 New Ways to Validate Device Posture
  3078. How does PLONK work? Part 1: What's PLONK?
  3079. Cryptology ePrint Archive: Report 2021/923
  3080. Reddit Interview Problems: The Game of Life
  3081. Thinking of the children
  3082. Why is Learning Functional Programming So Damned Hard?
  3083. 10×10%
  3084. Introducing Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field - Cryptography - Ethereum Research
  3085. Stewardship of Ourselves
  3086. Exploring the password policy rabbit hole — Sun Knudsen
  3087. The world in which IPv6 was a good design
  3088. ‎Security. Cryptography. Whatever.: The Great "Roll Your Own Crypto" Debate, feat. Filippo Valsorda on Apple Podcasts
  3089. GitHub picks Friday 13th to kill off password-based Git authentication
  3090. What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
  3091. The Deceptive PR Behind Apple’s “Expanded Protections for Children”
  3092. .NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
  3093. How to never type passwords when using Git
  3094. More devices, fewer CAPTCHAs, happier users
  3095. If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
  3096. Why Doesn't Software Show Up in Productivity?
  3097. Australia is becoming a surveillance state
  3098. Announcing .NET 6 Preview 7
  3099. Implementing ‘le chiffre indéchiffrable’ in Scheme
  3100. Apple’s Mistake
  3101. One Bad Apple - The Hacker Factor Blog
  3102. Hey Signal! Great Encryption Needs Great Authentication
  3103. The logic behind three random words
  3104. How does FaceTime Work?
  3105. Apple to scan U.S. iPhones for images of child sexual abuse
  3106. Apple explains how iPhones will scan photos for child-sexual-abuse images
  3107. draft-peabody-dispatch-new-uuid-format-01
  3108. Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
  3109. HTTP/2: The Sequel is Always Worse
  3110. Episode 18: Optimizing Cryptography for Microcontrollers!
  3111. Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
  3112. The Drunken Bishop Algorithm – Barely Functional Theories
  3113. Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
  3114. When You Get Right Down to It, Most Security Is Based on The Honor System
  3115. designs/blazor-wasm-crypto.md at main · dotnet/designs
  3116. GitHub - veorq/cryptocoding: Guidelines for low-level cryptography software
  3117. What is an inner product argument?
  3118. An Attempt at Demystifying Graph Deep Learning
  3119. GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
  3120. Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  3121. Beyond OAuth? GNAP for Next Generation Authentication - The New Stack
  3122. Shtetl-Optimized » Blog Archive
  3123. Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
  3124. Full-Time Open Source - CoRecursive Podcast
  3125. TODO apps are meant for robots
  3126. PyTorch Tutorial for Beginners - Building Neural Networks
  3127. Wormhole - Simple, private file sharing
  3128. Looking between the lines: how media is control.
  3129. GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
  3130. Tech spec experts seek allies to tear down ISO standards paywall
  3131. Verkle trees
  3132. NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
  3133. Comparing dotnet:main...vcsjones:16df4edc7215a9521eda2c7a8aa3fa5f1bcecfef · dotnet/runtime
  3134. The Future of Work at Cloudflare
  3135. How I store my files and why you should not rely on fancy tools for backup
  3136. Zip - How not to design a file format.
  3137. Cloudflare's Athenian Project Expands Internationally
  3138. From Stolen Laptop to Inside the Company Network — Dolos Group
  3139. Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
  3140. IPv4 pricing - Hetzner Docs
  3141. Netcat - All you need to know
  3142. A new chapter for Google’s Vulnerability Reward Program
  3143. Securing your development environment
  3144. K-9 Mail is back
  3145. Welcome to Cloudflare Impact Week
  3146. Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
  3147. Syncing all the things
  3148. Google pushed a one-character typo to production, bricking Chrome OS devices
  3149. Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
  3150. How to Build Multi-Platform Apps with Uno Platform and Blockchain
  3151. Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
  3152. Germany’s national healthcare system adopts Matrix! | Matrix.org
  3153. How does TLS work?
  3154. The Game Developers Guide to NFTs
  3155. Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
  3156. Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
  3157. Cryptanalysis of Meow Hash
  3158. How To Learn Stuff Quickly
  3159. A framework for Front End System Design interviews - draft
  3160. Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
  3161. How the blockchain will break up Big Tech
  3162. HashWires: Range Proofs from Hash Functions | ZKProof Standards
  3163. Why we need to do more to reduce certificate lifetimes
  3164. TLS - The Cloudflare Blog
  3165. Is TLS Fast Yet?
  3166. ongoing by Tim Bray · Algorithm Agility?
  3167. Security Analysis of Telegram (Symmetric Part)
  3168. Pa(dding rtitioning) oracles, and another hot take on PAKEs
  3169. Building a Trustless and Private Internet for Everyone
  3170. Cryptography @ Google
  3171. dotnet/apireviews
  3172. Building a Vision of Life Without Work
  3173. Adventures in mTLS Debugging
  3174. The EFAIL Hoax [The Call of the Open Sidewalk]
  3175. Behind the scenes, AWS Lambda
  3176. r/crypto - My breakdown on Partition Oracle Attacks
  3177. Announcing Arti, a pure-Rust Tor implementation | Tor Blog
  3178. Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
  3179. Episode 384 - Safe Deployment Practices
  3180. Decrypt Secrets Into ASP.NET Core MVC Action Arguments Using Action Filters
  3181. Ways of reading without the influence of community
  3182. The Myth of the Expert Reviewer
  3183. An incomplete list of practices to improve security of your (micro)services · m's blog
  3184. How SHA-256 Works Step-By-Step - Qvault
  3185. Sam Lewis
  3186. More Secret Codes: A History of Cryptography (Part 2)
  3187. Dumping and extracting the SpaceX Starlink User Terminal firmware
  3188. A new macroeconomics? – J. W. Mason
  3189. Episode 15: Bringing Secure Multiparty Computation to the Real World!
  3190. Kaspersky Password Manager: All your passwords are belong to us
  3191. Stuff I wish I knew before I went Independent
  3192. ossu/computer-science
  3193. Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
  3194. Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
  3195. Write a time-series database engine from scratch
  3196. RSA Conference goes full blockchain, for a moment
  3197. BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
  3198. Episode 16: Contact Discovery in Mobile Messengers!
  3199. Constant-Time Big Numbers: An Introduction
  3200. Blazor Flash Cards - State Management with Fluxor
  3201. Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
  3202. Cryptology ePrint Archive: Report 2021/626
  3203. Explaining blockchains to developers
  3204. The Missing Email Service For Domains
  3205. How to Build a Giant Carmaker
  3206. angularsen/UnitsNet
  3207. Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
  3208. Coding, Cloud & Technology | An In Depth Look into Random Number Generation in .NET
  3209. OpenPGP Identity Structure [The Call of the Open Sidewalk]
  3210. Yes, the network is hostile, even yours (or: how to lose your data in three steps)
  3211. An Elixir Adoption Success Story
  3212. New Release: Fiddler Everywhere 2.0 Is Here!
  3213. NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
  3214. irsl/gcp-dhcp-takeover-code-exec
  3215. Update on Windows 11 minimum system requirements
  3216. Temporal: getting started with JavaScript’s new date time API
  3217. cirosantilli/x86-bare-metal-examples
  3218. Voice AI is scary good now. Video game actors hate it.
  3219. Production Threshold Signing Service
  3220. Windows 11, Amazon, and Uncomfortable Questions
  3221. Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
  3222. TPM recommendations (Windows 10) - Microsoft 365 Security
  3223. Taking the (quantum) leap with go
  3224. Messaging app Signal not in compliance with new rules, say officials
  3225. Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
  3226. Designing a duress PIN: plausible deniability (part II)
  3227. The Era Of Customized Blockchains Is Rising Because Smart Contracts Aren’t Really ‘Smart’
  3228. Episode 18: Optimizing Cryptography for Microcontrollers!
  3229. Using SSH and localhost.run to test GitHub webhooks locally
  3230. Zero Knowledge from the Discrete Logarithm Problem
  3231. Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
  3232. Remote Desktop Connection Manager - Windows Sysinternals
  3233. A from-scratch tour of Bitcoin in Python
  3234. Hacker's guide to deep-learning side-channel attacks: the theory
  3235. Internet-in-a-Box
  3236. How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
  3237. dsprenkels/sss
  3238. Croc Full Plaintext Recovery - CVE-2021-31603
  3239. A response to "Did we market Knative wrong?"
  3240. Episode 382 - Reducing Carbon Emissions with Spot VMs
  3241. streetcomplete/StreetComplete
  3242. Announcing .NET 6 Preview 5 | .NET Blog
  3243. Cryptographic shuffle | Brain on Fire
  3244. Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
  3245. Productivity is Paramount: Why Independent Work is Set Up to Fail, And How To Overcome It
  3246. I wish I could write this well
  3247. Cryptography updates in OCaml and MirageOS
  3248. Cryptology ePrint Archive: Report 2021/819
  3249. Welcome · Real-World Cryptography MEAP V14
  3250. [Cryptography] Apple's iCloud+ "VPN"
  3251. Richard Feynman's Integral Trick
  3252. [Last Week in .NET #46] – Exceptionally Useful
  3253. google/fully-homomorphic-encryption
  3254. Cryptology ePrint Archive: Report 2021/507
  3255. Automonous Biology
  3256. Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
  3257. Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
  3258. How to Handle Secrets on the Command Line
  3259. Taildrop was kind of easy, actually
  3260. Answering Community Questions and What’s Ahead for Mina
  3261. Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
  3262. From KEMs to protocols
  3263. Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
  3264. Kerckhoffs’s Law for Security Engineers
  3265. Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
  3266. The ARM processor (Thumb-2), part 7: Bitwise operations | The Old New Thing
  3267. Althttpd: The Althttpd Webserver
  3268. Exploring android development on iPad
  3269. Certificates Confuse Everything
  3270. It’s time to ditch Chrome
  3271. The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams
  3272. Cryptology ePrint Archive: Report 2021/428
  3273. about:joel
  3274. accounts.makerbot.com (Powered by Qualys SSL Labs)
  3275. Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
  3276. FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
  3277. Secret Codes: A History of Cryptography (Part 1)
  3278. Password Managers.
  3279. Kate polynomial commitments
  3280. Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
  3281. Episode 14: Schnorr, Factoring and Lattices!
  3282. The best cryptographic protocol ever!
  3283. Linux Security Hardening and Other Tweaks
  3284. .NET Rocks! vNext
  3285. Leaky Abstractions
  3286. Vinod Vaikuntanathan - Real World Cryptographers Podcast
  3287. Episode 380 - App Service Environments
  3288. Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
  3289. Using Wikipedia as an Impromptu RottenTomatoes API
  3290. Lightweight Cryptography Standardization: Finalists Announced
  3291. Mikkel Paulson
  3292. Conversation about .NET interop | .NET Blog
  3293. ongoing by Tim Bray · Testing in the Twenties
  3294. The Most Expensive Number in Engineering
  3295. The Roslyn analyzers I use in my projects - Gérald Barré
  3296. Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
  3297. Amazon devices will soon automatically share your Internet with neighbors
  3298. Contributing to Gemini ecosystem
  3299. Elliptic Curve Cryptography Explained
  3300. QUIC Version 1 is live on Cloudflare
  3301. Code Maze Weekly #78 - Code Maze
  3302. Episode 77 - Application Security with Tanya Janka
  3303. QUIC is now RFC 9000
  3304. A UDP-Based Multiplexed and Secure Transport
  3305. Is MDPI a predatory publisher?
  3306. The state of tooling for verifying constant-timeness of cryptographic implementations
  3307. Messaging and Chat Control
  3308. New Storage Providers for Azure Durable Functions
  3309. The best API design principles inspired by nature - andre.schweighofer
  3310. Blockchain voting is overrated among uninformed people but underrated among informed people
  3311. Chris's Wiki :: blog/programming/RustInOurFuture
  3312. DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
  3313. magic-wormhole/magic-wormhole
  3314. Cryptography from the Ground Up
  3315. 255: What is encryption anyways?
  3316. Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
  3317. How to Get Rich
  3318. Heartbleed Revisited
  3319. Secure Search Over Encrypted Data
  3320. Indian job portal IIMJobs hacked; 46GB worth of database leaked online
  3321. Factoring in logarithmic time: a mathemagic trick
  3322. How the UK's Online Safety Bill threatens Matrix | Matrix.org
  3323. Authenticated Encryption in .NET with AES-GCM
  3324. SecureString obsoletions and shrouded buffer proposal by GrabYourPitchforks · Pull Request #147 · dotnet/designs
  3325. I am sick and tired of hearing tech companies complain about a developer shortage
  3326. Tink  |  Google Developers
  3327. Avoiding the Frigid Hellscape of Online Marketing
  3328. The tools and tech I use to run a one-woman hardware company - Thea Flowers
  3329. Welcoming Linux to the 1Password Family | 1Password
  3330. zkSessions: The ZK Languages Roundup - May 19 | Hopin
  3331. Are you a victim of terrible API documentation? - Note Canvas
  3332. Constructing a sponge function from MD5 - Gokberk Yaltirakli
  3333. Zcon2Lite
  3334. I Have a Lot to Say About Signal’s Cellebrite Hack
  3335. Password Storage - OWASP Cheat Sheet Series
  3336. The stack monoid revisited
  3337. Running a .NET 5 web app on Railway
  3338. A day at work
  3339. Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
  3340. BLS12-381 For The Rest Of Us - HackMD
  3341. Reverse Engineering an Unknown Microcontroller - Dmitry.GR
  3342. Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
  3343. Building an Event Driven .NET Application: The Fundamentals – Wrapt
  3344. Peter Thiel's Religion - David Perell
  3345. <p>The Node.js CA Footgun</p>
  3346. Security flaws in all Wi-Fi devices
  3347. Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
  3348. Beware of Applications Misusing Root Stores – Mozilla Security Blog
  3349. The 0-RTT Feature of TLS 1.3 Can Be Used As an Encrypted Steganographic Channel to Operate a Backdoor into an Enterprise Network – Pomcor
  3350. Hell site
  3351. Minecraft Modding: Laser Gun - Alan Zucconi
  3352. Dear EU: Please Don't Ruin the Root - Articles
  3353. Realizing the Mina vision in Rust
  3354. Security keys are now supported for SSH Git operations | The GitHub Blog
  3355. Personal Data of 3 Million+ People Exposed In DriveSure Hack
  3356. Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
  3357. Why does Cryptography use Polynomial Modular Arithmetic in Finite Fields?
  3358. Introducing the Pinecone overlay network | Matrix.org
  3359. Understanding Extended-Nonce Constructions
  3360. Amazon Fake Reviews Scam Exposed in Data Breach
  3361. --this is a no-knowledge proof--
  3362. SharpLab
  3363. Episode 376 - Azure Media Services
  3364. Introduction to JSON Web Tokens (JWT)
  3365. timvisee/send
  3366. Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
  3367. Clarifying the "blockchain"
  3368. ZK languages with Alex Ozdemir
  3369. Is abstraction killing civilization? | datagubbe.se
  3370. .NET API browser
  3371. OpenBSD 6.9
  3372. Cryptology ePrint Archive: Report 2021/323
  3373. What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
  3374. Mixed Boolean Arithmetic Obfuscation
  3375. Update: Security Notification - March 2021
  3376. Episode 375 - The Case of the Dangling Domain
  3377. Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
  3378. Content Marketing for Bootstrappers | James Chambers
  3379. Dabbling in Cryptography
  3380. We were promised Strong AI, but instead we got metadata analysis
  3381. HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
  3382. Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
  3383. Rust Language Cheat Sheet
  3384. Setting up a Cardano Producer node using Kubernetes/microk8s
  3385. Customer Notice FAQs
  3386. IDE > Language > Protocol
  3387. In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  3388. Make better predictions, stop estimating - andre.schweighofer
  3389. What is a Merkle Tree?
  3390. Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
  3391. Rust and cryptographic code | Bulletproof TLS Newsletter
  3392. Apple introduces AirTag
  3393. Minimum Viable State: Building a Nomad Internet Country
  3394. Adventures with RSA Blind Signing
  3395. Episode 373 - GitHub Actions
  3396. A Full Circle Journey: Introducing Cloudflare Canada
  3397. Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
  3398. dotnet/runtime
  3399. What's in the box? - fasterthanli.me
  3400. Thoughts on writing a wayland window manager with wlroots
  3401. Why should you care about privacy - even if you had nothing to hide
  3402. Vanquished Vaccines and Vetocracies – We Are Not Saved
  3403. Eat a Peach for Engineers
  3404. Problems | Project Lovelace
  3405. Standard Notes | A Simple And Private Notes App
  3406. FTP is 50 years old
  3407. Node.js support in Cloudflare Workers
  3408. What on Earth is this Encryption Scheme?
  3409. The FreeBSD Project | FreeBSD 13.0-RELEASE Release Notes
  3410. Security Control: Implement security best practices
  3411. Lock and Code
  3412. Serving up zero-knowledge proofs
  3413. Machine Learning With ML.NET - Evaluation Metrics
  3414. The Cursed Computer Iceberg Meme
  3415. In defense of Signal
  3416. mratsim/constantine
  3417. My Vim Notes Setup
  3418. Meet the patent troll that won a $308 million jury trial against Apple
  3419. Show dotnet: Animating 40 LEDs with charlieplexing | .NET Blog
  3420. My programming principles • Borislav Grigorov
  3421. 16 Where cryptography fails and final words · Real-World Cryptography MEAP V12
  3422. The Architecture Behind A One-Person Tech Startup
  3423. BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
  3424. WTF are these security chips?
  3425. A pretty good guide to pretty good privacy
  3426. The Cursed Certificate
  3427. Goodbye OpenSSL, and Hello To Google Tink
  3428. Cryptology ePrint Archive: Report 2021/442
  3429. MPC-Over-Signal
  3430. Update on git.php.net incident - Externals
  3431. The Unparalleled Genius of John von Neumann
  3432. Signal Adds Payments—With a Privacy-Focused Cryptocurrency
  3433. Dumping user data from cheap tablets in minutes
  3434. How I Got Into Computers AppDev Edition
  3435. Breaking GitHub Private Pages for $35k
  3436. (PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
  3437. Legalizing Gay Marriage in Crusader Kings III with Ghidra
  3438. Episode 371 - Cloud Native Machine Learning
  3439. Cryptology ePrint Archive: Report 2021/123
  3440. Obvious and possible software innovations nobody does
  3441. PostgreSQL Security Hardening
  3442. The Exception Model
  3443. Cryptology ePrint Archive: Report 2021/418
  3444. Zero click vulnerability in Apple’s macOS Mail
  3445. A categorized list of all Java and JVM features since JDK 8 to 16
  3446. Cryptography and assembly code
  3447. AES was worth $250 billion dollars
  3448. MakAir Series: Engineering Focus on Ventilator Software
  3449. C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  3450. Apple's cooperation with authoritarian governments
  3451. Some opinionated thoughts on SQL databases
  3452. Cloudflare’s WAF is recognized as customers’ choice for 2021
  3453. Recovering a full PEM Private Key when half of it is redacted
  3454. Peace of mind backup - boa.nu
  3455. Creation vs. Consumption
  3456. 208.43.231.11 Git
  3457. A new Cloudflare Web Application Firewall
  3458. Getting started with Self Sovereign Identity SSI
  3459. SSL/TLS connection issue troubleshooting test tools
  3460. .NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
  3461. OpenPGP Message Format
  3462. PGP is a Form of Minimalism [The Call of the Open Sidewalk]
  3463. About | Mina Illuminate
  3464. Single-primitive authenticated encryption for fun
  3465. Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers
  3466. It doesn't work | Frank DENIS random thoughts.
  3467. janroesner/sixty5o2
  3468. APT Encounters of the Third Kind
  3469. Building a phone book: Part I
  3470. News & Events - Release of draft Applied Cryptography knowledge area for public consultation
  3471. C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
  3472. /news/vulnerabilities.html
  3473. facebookresearch/Cupcake
  3474. The Evolution of Distributed Systems on Kubernetes
  3475. The Solution of the Zodiac Killer’s 340-Character Cipher—Wolfram Blog
  3476. Is There a Case for Programmers to Unionize? - Qvault
  3477. RFC 8996 - Deprecating TLS 1.0 and TLS 1.1
  3478. On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
  3479. CoinList
  3480. Browser Isolation for teams of all sizes
  3481. Easy generation of fake/dummy data in C# with Faker.Net
  3482. suite - Privacy-Enhancing Cryptography | CSRC | CSRC
  3483. Crystal 1.0 - What to expect
  3484. mratsim/constantine
  3485. Welcome to Cloudflare Security Week 2021!
  3486. My self-study plan for electrical engineering
  3487. r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
  3488. Hybrid encryption and the KEM/DEM paradigm
  3489. Episode 72 - Emulating a Video Game System in .NET with Ryujinx
  3490. The missing explanation of ZK-SNARKs: Part 1
  3491. Can we talk about client-side certificates?
  3492. Zero Knowledge Proof (with Avi Wigderson) - Numberphile
  3493. We bootstrapped to $11 million in ARR
  3494. A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
  3495. Can an economy keep on growing? - Inverted Passion
  3496. What It Means to Learn to Code
  3497. Surreptitious Forwarding [The Call of the Open Sidewalk]
  3498. The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
  3499. A Simple Personal Data Backup Setup
  3500. How are zlib, gzip and zip related? What do they have in common and how are they different?
  3501. Add and manage TLS/SSL certificates - Azure App Service
  3502. YouTube
  3503. r/crypto - What kind of careers can I pursue with a PhD?
  3504. Key Exchange Standards
  3505. Episode 368 - Azure Load Balancer
  3506. Becoming physically immune to brute-force attacks
  3507. ARMs Race: Ampere Altra takes on the AWS Graviton2
  3508. GNU coreutils – MaiZure's Projects
  3509. About the March 8 & 9, 2021 Verkada camera hack
  3510. Block Cipher Structures: Ranked
  3511. Getting started with Dapr for .NET Developers
  3512. I want a Computer that I Own
  3513. 4 Times I Felt Discriminated Against for Being a Female Developer
  3514. Notion is not a knowledge base
  3515. A flamegraph of Real-World Cryptography
  3516. It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
  3517. Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!
  3518. The Teams Dashboard: Finding a Product Voice
  3519. A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
  3520. Did Schnorr destroy RSA? Show me the factors.
  3521. Online tool to generate and check bcrypt hashed passwords.
  3522. "This destroyes the RSA cryptosystem"
  3523. Cryptology ePrint Archive: Report 2021/015
  3524. Hotpatch for Windows Server Azure Edition (preview)
  3525. February 2021 - Killing Turbotax
  3526. How I Might Have Hacked Any Microsoft Account - The Zero Hack
  3527. Semantic Versioning Will Not Save You
  3528. Configuring HTTPS using a custom TLS certificate with Netlify and Cloudflare
  3529. How Nacon Cracked and Pirated The Sinking City - Frogwares
  3530. Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
  3531. nullpo-head/WSL-Hello-sudo
  3532. Cryptology ePrint Archive: Report 2020/1491
  3533. Goodbye Client Affinity, Hello Data Protection with Azure
  3534. Weird architectures weren't supported to begin with
  3535. 5 tools I use to protect my privacy online
  3536. Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
  3537. How I cut GTA Online loading times by 70%
  3538. The security of the "Pass" password manager
  3539. 2021 Tech Predictions · Ted Neward's Blog
  3540. The Economics of Biodiversity
  3541. Cryptology ePrint Archive: Report 2020/1610
  3542. How often should I rotate my ssh keys?
  3543. Microsoft Releases Azure Firewall Premium in Public Preview
  3544. Librsvg, Rust, and non-mainstream architectures
  3545. [JDK-8262273] Deprecate 3DES and RC4 in Kerberos
  3546. Understanding how Leela Chess Zero works
  3547. Cryptology ePrint Archive: Report 2020/1608
  3548. Cryptography Interface Design is a Security Concern
  3549. Zero Bug Tolerance
  3550. Cryptographic Wear-Out for Symmetric Encryption
  3551. C#'s Functional Journey
  3552. The Azure Security Architect Map
  3553. Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
  3554. Add static PBKDF2 one-shot methods · dotnet/runtime@0c47471
  3555. Cryptology ePrint Archive: Report 2020/1581
  3556. Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
  3557. How to destroy the Earth
  3558. Double-Odd Elliptic Curves - Double-Odd Elliptic Curves
  3559. GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
  3560. Cryptology ePrint Archive: Report 2020/1533
  3561. Using HPKE to Encrypt Request Payloads
  3562. Urbit :: the good, the bad, and the insane
  3563. Cryptology ePrint Archive: Report 2020/1536
  3564. Cryptology ePrint Archive: Report 2020/1535
  3565. Declassified spacecrafts and orbital weapons of the USSR &#8211; Russia
  3566. Distributed Application Runtime (Dapr) v1.0 Announced
  3567. Go 1.16 Release Notes - The Go Programming Language
  3568. Making Easy Auth tokens survive releases on Linux Azure App Service
  3569. Cryptology ePrint Archive: Report 2020/1541
  3570. upgundecha/howtheysre
  3571. ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
  3572. A Visual Guide: To Sustainable Software Engineering
  3573. Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
  3574. Cryptology ePrint Archive: Report 2020/1545
  3575. Multi-asset shielded pool project (MASP)
  3576. A Billion Mockingbirds: The Role of Journalists in Destroyed Civilization
  3577. no dogma podcast - powered by FeedBurner
  3578. Securing the post-quantum world
  3579. Our Solo v2 launch is official!
  3580. Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
  3581. Quantum cryptography network spans 4600 km in China – Physics World
  3582. Good-bye ESNI, hello ECH!
  3583. PemEncoding Class (System.Security.Cryptography)
  3584. Crackpot Cryptography and Security Theater
  3585. Why should I give you my ID card
  3586. 2020 U.S. Election: Cybersecurity Analysis
  3587. Turning an old Amazon Kindle into a eink development platform
  3588. What's an SPF Record? - Ultimate Guide to Email
  3589. A look at GSM
  3590. Reverie: An optimized zero-knowledge proof system
  3591. Report: Romanian Real Estate Portal Suffers Crippling Data Breach
  3592. Lessons Learned From My Last Startup: A Post Mortem
  3593. Is abstraction killing civilization? | datagubbe.se
  3594. Protect your accounts from data breaches with Password Checkup
  3595. Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
  3596. ARCHITECTURE.md
  3597. How to automatically set up a development machine with Ansible
  3598. Working with SSL Certificate in Azure App Service
  3599. Ideas That Created the Future
  3600. A Simple and Succinct Zero Knowledge Proof
  3601. Help users in Iran reconnect to Signal
  3602. Building Product Intelligence Platform with Cloudflare Workers
  3603. Security: The Need-to-know principle
  3604. Threshold Cryptography with Omer Shlomovits from ZenGo
  3605. 7 behaviours to avoid in a software architecture role - Daniel Watts
  3606. Tearing Down a Humidifier - Lei's Blog
  3607. Cryptology ePrint Archive: Report 2020/1506
  3608. Getting better at Linux with 10 mini-projects
  3609. Why Generation X will save the web - Hi, I'm Heather Burns.
  3610. Cryptology ePrint Archive: Report 2006/069
  3611. SSL/TLS connection issue troubleshooting guide
  3612. The Best TLS and PKI Training Course in the World
  3613. My experience passing CKA and CKAD
  3614. Episode 10: Exploiting Authenticated Encryption Key Commitment!
  3615. LackRack - Eth0Wiki
  3616. All Stories Are Wrong, but Some Are Useful
  3617. Neural Networks Explained from Scratch using Python
  3618. Index of /map
  3619. The Subtle Hazards of Real-World Cryptography
  3620. I didn't install Signal for privacy
  3621. The Psychology of Stock Bubbles
  3622. How to properly store a password in the Database | Petre Popescu
  3623. Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
  3624. The EU must protect the right to privacy and not attack end-to-end encryption
  3625. Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
  3626. No, Java is not a Secure Programming Language
  3627. berty/berty
  3628. mRNA Vaccines: Questions & Misconceptions
  3629. Aggregate (Root) Design: Separate Behavior & Data for Persistence
  3630. Tools I Love to Not Think About
  3631. What it means to be a cryptographer
  3632. The **Simplest** Web Developer Path for 2021
  3633. SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  3634. survey.pdf
  3635. ThreadPool Blocking Mitigation by benaadams · Pull Request #47366 · dotnet/runtime
  3636. Write Crypto Code! Don't publish it!
  3637. pavlobu/deskreen
  3638. Technological stagnation: Why I came around
  3639. s-51: Ask Me Anything (AMA), with Joan Daemen
  3640. Firecracker: start a VM in less than a second
  3641. The architecture of my life | mjwsteenbergen-blog
  3642. AKS Zero To Hero - Series for everyone - Azure Greg
  3643. Release Notes | Bitwarden Help & Support
  3644. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  3645. My Backup Strategy
  3646. So, You Want to CTF? (A Beginner’s Guide to CTFing)
  3647. The widening gyre
  3648. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  3649. Cryptography 101 with Oso's Dr. Sam Scott | Hanselminutes with Scott Hanselman
  3650. Building your first Telegram Bot with ASP.NET Core
  3651. Please Stop Encrypting with RSA Directly
  3652. Update: youtube-dl reinstantiated thanks to EFF
  3653. The State of State Machines
  3654. The worrying trend of game technology centralization
  3655. Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  3656. We can do better than Signal
  3657. CondensationDB/Condensation
  3658. Mesmerizing Chameleon Signatures
  3659. Is Writing as Important as Coding?
  3660. Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  3661. A history of end-to-end encryption and the death of PGP
  3662. Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  3663. KEMTLS: Post-quantum TLS without signatures
  3664. Fully Homomorphic Encryption Part One: A Gentle Intro
  3665. source.winehq.org Git - wine.git/blob - ANNOUNCE
  3666. danso - happy-space: a whitespace-sensitive calculator
  3667. Holistic web protection: industry recognition for a prolific 2020
  3668. Foam
  3669. Send and receive WhatsApp messages through email
  3670. VeriCrypt: An Introduction to Tools for Verified Cryptography
  3671. Learn X by doing Y - A project-based learning search engine
  3672. Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  3673. Episode 360 - Microsoft Solutions with Corey
  3674. jukefoxer/Signal-Android
  3675. An introduction to the Data Protection system in ASP.NET Core
  3676. Kernel Root Exploit via a ptrace() and execve() Race Condition
  3677. Notification of Data Security Incident - December 23, 2020
  3678. My personal wishlist for a decentralized social network
  3679. .NET 5 Networking Improvements | .NET Blog
  3680. Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen
  3681. Machine Learning with ML.NET - Linear Regression
  3682. Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  3683. Death to the document
  3684. Wasmer - The Universal WebAssembly Runtime
  3685. Signal, thank you for not collecting my data. But I won’t use you.
  3686. Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  3687. David Wong - What is Applied Cryptography? #121 - Develomentor
  3688. David Wong – What is Applied Cryptography? #121
  3689. safepassme
  3690. What I learned doing 125 public talks - Part I
  3691. Cryptology ePrint Archive: Report 2020/1390
  3692. Steam's login method is kinda interesting
  3693. .NET Rocks! vNext
  3694. WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
  3695. JavaScript Complete Course - Array Push, Pop, Shift and Unshift Methods - Part 36
  3696. JavaScript Complete Course - Array Concat, Reverse & IndexOf - Part 37
  3697. JavaScript Complete Course - Array Iterations - Part 34
  3698. JavaScript Complete Course - Array Slice & Splice - Part 38
  3699. JavaScript Complete Course - Number Methods - Part 31
  3700. JavaScript Complete Course - Array Map - Part 40
  3701. JavaScript Complete Course - Object Arrays - Part 33
  3702. Episode‌ ‌8:‌ ‌Breaking‌ ‌Elliptic-Curve‌ ‌Signatures‌ ‌With‌ ‌LadderLeak!‌
  3703. DALL·E: Creating Images from Text
  3704. JavaScript Complete Course - Objects - Part 29
  3705. JavaScript Complete Course - Creating Classes - Part 27
  3706. Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  3707. HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  3708. SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  3709. The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  3710. Episode 9: Off-the-Record Messaging and PKI Implementations!
  3711. "Live" Coding A NES Emulator in C++!
  3712. Cryptology ePrint Archive: Report 2020/1456
  3713. s-18: FSE 2020 Rump session
  3714. [Cryptography] Bitcoin is a disaster.
  3715. How mRNA Vaccines Work - Simply Explained
  3716. Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  3717. Linux Hardening Guide | Madaidan's Insecurities
  3718. Introducing Thrift VPN
  3719. START with a Monolith, NOT Microservices
  3720. Colin Stebbins Gordon
  3721. Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  3722. Year in Review: 2020
  3723. zkSNARKS and Cryptographic Accumulators
  3724. AI Unlocks all trophies in ZigZag using Python and OpenCV.
  3725. NeurIPS 2020 Best Machine Learning Paper Awards
  3726. Web Authentication Methods Compared
  3727. Combating abuse in Matrix - without backdoors. | Matrix.org
  3728. Tal Rabin - Real World Cryptographers Podcast
  3729. I am Filippo Valsorda, Go cryptography lead and tool author, Ask Me Anything
  3730. Making an OS - Update, Resources, Future of the Series
  3731. Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  3732. Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  3733. Development time is money, therefore I RAID
  3734. Against Victimhood
  3735. The Mystery of Deceased Hiker 'Mostly Harmless' Is At Long Last Solved
  3736. The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  3737. No, Cellebrite cannot 'break Signal encryption.'
  3738. Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  3739. Splitting up a Monolith to (micro)Services
  3740. Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  3741. Introduction to quantum computing with Q# – Part 12, Bell’s inequality
  3742. Why I've Been Merging Microservices Back Into The Monolith At InVision
  3743. My Engineering Axioms
  3744. 2-adic Logarithms and Fast Exponentiation
  3745. What's Serverless in #Shorts and why should you care?
  3746. Steve Blank Startup Stock Options – Why A Good Deal Has Gone Bad
  3747. 2020’s Top 15 Machine Learning & AI Research Papers
  3748. You're Missing Out If You Don't Write Weekly Digests
  3749. Cryptologie | Vetted Encryption
  3750. Counterfactual communication and intimidation
  3751. Apple M1 foreshadows RISC-V
  3752. Episode 5: Isogeny-Based Cryptography For Dummies!
  3753. Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security
  3754. Bizarre Design Choices In Zoom’S End-To-End Encryption
  3755. Bouncy Castle crypto authentication bypass vulnerability revealed
  3756. Branding Your Own Startup | Blog of Pascal
  3757. Cryptography Dispatches: Re-Deriving the edwards25519 Decoding Formulas
  3758. Commits are snapshots, not diffs - The GitHub Blog
  3759. Giving more tools to software engineers: the reorganization of the factory
  3760. jwasham/coding-interview-university
  3761. How to conduct a competitive analysis - Philipp Muens
  3762. Adding Encrypted Group Calls to Signal
  3763. Learn about online security, privacy, and encryption
  3764. Files and directories to exclude from antivirus scanning for Orion Platform products (AV exceptions and exclusions)
  3765. The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  3766. Cryptohack: A Fun Platform For Learning Modern Cryptography
  3767. Last Week in .NET #22 – Microsoft Parrots Google
  3768. Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
  3769. Privacy and Compliance Reading List
  3770. Computers Are Bad
  3771. Real World String Validation in JavaScript - Scrimba 24 Days of #JavaScriptmas Challenge
  3772. Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  3773. Google Alternatives 2020: Best Privacy Friendly Alternatives
  3774. How to Build a Global Network that Complies with Local Law
  3775. Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  3776. #104 – David Wong: Many Layers of Complexity
  3777. There's Always More History • Hillel Wayne
  3778. Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  3779. Cryptography Improvements in .NET 5 - Support for PEM
  3780. OPAQUE: The Best Passwords Never Leave your Device
  3781. Improving DNS Privacy with Oblivious DoH in 1.1.1.1
  3782. Episode 357 - Verifiable Identity with Blockchain
  3783. From Zero to AppStore
  3784. #104 – David Wong: Many Layers of Complexity
  3785. Privacy needs to be built into the Internet
  3786. benwilber/boltstream
  3787. Understand The .NET 5 Runtime Environment
  3788. Welcome to Privacy & Compliance Week
  3789. InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  3790. On Trusting Macintosh Hardware
  3791. Workshop On Elliptic Curve Cryptography Ecc 2020 (Videos)
  3792. An introduction to three-phase power and PDUs
  3793. Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  3794. Analyzing firmware from embedded devices
  3795. Cryptologie | International Olympiad In Cryptography
  3796. How to Make Your Code Reviewer Fall in Love with You
  3797. Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  3798. The Cryptopals Crypto Challenges
  3799. Radicle - Peer-to-peer code collaboration
  3800. An iOS zero-click radio proximity exploit odyssey
  3801. Gamedev from scratch 0: Groundwork
  3802. Release OpenZFS 2.0.0 · openzfs/zfs
  3803. Pyecsca: Python Elliptic Curve Cryptography Side-Channel Analysis Toolkit
  3804. We Need Organic Software
  3805. ph1lter
  3806. Are My Encryption Keys In The Cloud Really Secure?
  3807. Episode 356 - Sustainability solutions in Azure
  3808. How to Think for Yourself
  3809. An ex-Googler's guide to dev tools
  3810. Crypto Dictionary
  3811. Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  3812. How do people find bugs?
  3813. What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  3814. Getting lucky with posting on Hacker News
  3815. Productive Uncertainty - Reaction Wheel
  3816. zkSummit 6 | Hopin
  3817. Normal Forms - Simple Talk
  3818. The book is finished, well sort of...
  3819. Facebook Is Going After Its Critics in the Name of Privacy
  3820. A Taste of OCaml's Predictable Performance - Dev.Poga
  3821. Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  3822. The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  3823. [JDK-8254713] Disable TLS 1.0 and 1.1
  3824. Episode 355 - Splunk, Blockchain and Azure
  3825. zfs.rent
  3826. Six months of Tiny Projects
  3827. Anchoring Trust: A Hardware Secure Boot Story
  3828. Api diff between net5.0 and netcoreapp3.1 & netstandard2.1 by Anipik · Pull Request #5610 · dotnet/core
  3829. GitHub Reinstates Youtube-DL and Puts $1M in Takedown Defense Fund * TorrentFreak
  3830. Episode 2: Breaking Lightweight Symmetric Cryptography!
  3831. Ok Google: please publish your DKIM secret keys
  3832. Claims encryption for B2C tokens | Developer Support
  3833. Can’t open apps on macOS: an OCSP disaster waiting to happen
  3834. Using Matrix to replace proprietary and centralized chat apps
  3835. Going Bark: A Furry’s Guide to End-to-End Encryption
  3836. Does Apple really log every app you run? A technical look
  3837. SAD DNS Explained
  3838. Your Computer Isn't Yours
  3839. github/dmca
  3840. How a Game Developer Leaked 46 Million Accounts
  3841. Generate a Service Bus SAS Token and Manage Token renewal using Azure Runbooks | Developer Support
  3842. Etebase - Your end-to-end encrypted backend
  3843. Get Animal Jam for your mobile device, PC, or Mac
  3844. caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  3845. Notes On Owning Your Own Business
  3846. How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  3847. Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  3848. Zoom lied to users about end-to-end encryption for years, FTC says
  3849. What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  3850. net5-contrib.diff
  3851. Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  3852. Over 1M Lazada RedMart accounts sold online after data breach
  3853. Productivity vs. Privacy
  3854. Cryptologie | The Joy Of Cryptography
  3855. Implement a Web APP and an ASP.NET Core Secure API using Azure AD which delegates to second API
  3856. Multithreading Handbook for Simulation Developers
  3857. The missing explanation of zk-SNARKs: Part 2
  3858. Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  3859. Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  3860. Standing on Our Own Two Feet
  3861. Episode 353 - WVD Updates
  3862. Spending political capital
  3863. Querying Across Databases In SQL Azure
  3864. erebe/personal-server
  3865. Scripts for Managing Azure Container Registry
  3866. A Brief Introduction to Deniability
  3867. GitHub warns devs face ban if they fork DMCA'd YouTube download tool... while hinting how to beat the RIAA
  3868. Leaving OCaml
  3869. Two workers are quadratically better than one • Hillel Wayne
  3870. Cryptography Dispatches: Reconstruct Instead Of Validating
  3871. C# in Simple Terms - Exceptions and Exception Handling
  3872. Blazor and Azure B2C: The Big Picture
  3873. The Basis of Testing – Stories from a Software Tester
  3874. Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  3875. The missing explanation of ZK-SNARKs: Part 1
  3876. Isogeny-Based Cryptography: Past, Present, And Future
  3877. Scott Santens - An Engineering Argument for Basic Income
  3878. Adi Shamir 2002 Acm A.m. Turing Award Lecture, "cryptography: State Of The Science"
  3879. RedMart Data Security Incident
  3880. Episode 63 - Being Productive With Jay Miller
  3881. .NET libraries and the art of backward compatibility – Part 3
  3882. How software eats money
  3883. RIAA's YouTube-DL Takedown Ticks Off Developers and GitHub's CEO * TorrentFreak
  3884. ML Optimization pt.1 - Gradient Descent with Python
  3885. Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  3886. gnu.org
  3887. github/dmca
  3888. The physiological effects of slow breathing in the healthy human
  3889. Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  3890. 1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  3891. Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  3892. United States v. Google
  3893. Azure CLI Oct 2020 release
  3894. The accelerating adoption of Julia
  3895. X509Certificate2.CreateFromPem(ReadOnlySpan<Char>, ReadOnlySpan<Char>) Method (System.Security.Cryptography.X509Certificates)
  3896. dotnet/runtime
  3897. Personal banking needs an API | Chris Hardie's Tech and Software Blog
  3898. Let's talk about fake reviews - part 1
  3899. Home
  3900. 14 Popular Machine Learning Evaluation Metrics
  3901. OpenBSD 6.8
  3902. A Legislative Path to an Interoperable Internet
  3903. Questioning Probability
  3904. charmbracelet/glow
  3905. Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  3906. Breaking changes, version 3.1 to 5.0 - .NET Core
  3907. Cryptography Dispatches: Nacl Is Not A High-Level Api
  3908. JDK 15 Security Enhancements
  3909. Exposing covert surveillance backdoors in children’s smartwatches
  3910. XChaCha20-Poly1305: A Primer with Examples in .NET
  3911. Decentralized Finance will reshape (or eat?) Centralized Finance
  3912. The .NET Stacks #20: Route to Code, IdentityServer, community links
  3913. Event Feeds: Simple and reliable messaging infrastructure
  3914. Cryptography Dispatches: Reconstruct Instead of Validating
  3915. Smart male chastity lock cock-up
  3916. Stop the EARN IT Bill Before It Breaks Encryption
  3917. Security Of Streaming Encryption In Google's Tink Library
  3918. It Didn’t Take Too Long…
  3919. Consensus is Harder Than It Looks
  3920. Fortunately, I don't squash my commits
  3921. Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  3922. Robots, Oracles And Protocols; Breaking Cryptography Through Information Leakage
  3923. Wiki - RustStarterKit2020
  3924. LLVM provides no side-channel resistance
  3925. ASP.NET Core breaking changes
  3926. The Kyber/Dilithium NTT
  3927. Episode 61 - Azure and Live Conferences With Andy Morrell
  3928. Implement Azure AD Client credentials flow using Client Certificates for service APIs
  3929. Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  3930. Coinbase offers exit package to those uncomfortable with new direction
  3931. Provisioning resources on AWS using AWS CDK and Azure DevOps Pipelines
  3932. A categorized list of all Java and JVM features since JDK 8 to 15
  3933. Doing discourse better: Stuff I wish I knew
  3934. is it worth it? — Martin Kleppmann’s blog
  3935. Advisory: security issues in AWS KMS and AWS Encryption SDKs
  3936. This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  3937. Zig's New Relationship with LLVM
  3938. How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  3939. Using Azure RBAC with Azure Key Vault
  3940. Uncomfortable Questions About App Signing
  3941. Python behind the scenes #2: how the CPython compiler works
  3942. 71.177.243.54
  3943. Google Interview Questions Deconstructed: The Knight’s Dialer
  3944. Simple Anomaly Detection Using Plain SQL
  3945. Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  3946. VPNs from first principles
  3947. No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  3948. Top 10 .NET 5.0 new APIs - NDepend
  3949. Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  3950. PEM Loading in .NET Core and .NET 5
  3951. On the use of a life
  3952. dwmkerr/hacker-laws
  3953. Revenue Model, not Culture, is the Dominant Term
  3954. CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  3955. When double.Epsilon can equal 0
  3956. Let's Encrypt's New Root and Intermediate Certificates
  3957. Episode 346 - Autonomous Systems
  3958. A Thanksgiving Carol
  3959. Nova
  3960. Nvidia’s Integration Dreams
  3961. ASP.NET Core Configuration – Azure Key Vault - Code Maze
  3962. Phosphine gas in the cloud decks of Venus
  3963. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  3964. Announcing .NET 5.0 RC 1 | .NET Blog
  3965. Your Phone Is Your Castle – Purism
  3966. Support ECDiffieHellman on X509Certificate2 by vcsjones · Pull Request #42180 · dotnet/runtime
  3967. Some Great Books For Programmers That StackOverflow Cannot Replace
  3968. coin_artist – 34700 $coin Puzzle Write-Up ($20,000)
  3969. Security by Obscurity is Underrated
  3970. What Clojure spec is and what you can do with it (an illustrated guide)
  3971. Raccoon Attack
  3972. State of Cybersecurity Industry Exposure at Dark Web
  3973. BashPitfalls - Greg's Wiki
  3974. Oracle Developer Live—Java
  3975. TLS certificate lifespan cut short: A win for security, or cause for chaos?
  3976. Things I Learned to Become a Senior Software Engineer
  3977. Verizon achieves milestone in future-proofing data from hackers
  3978. Preventing Insecure Network Connections | Apple Developer Documentation
  3979. Why you want to encrypt password hashes
  3980. Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  3981. Attention is your scarcest resource
  3982. Key exchange standards - Manning
  3983. Key exchange standards - Manning
  3984. A history of elliptic curves in tweets
  3985. connorferster/handcalcs
  3986. The Why and How of Privacy and Security — This Too Shall Grow
  3987. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  3988. I've decided to pursue a Bootstrap MBA
  3989. Why I’m Writing A Book On Cryptography
  3990. Minimal React: getting started with the frontend library
  3991. Soatok’s Guide to Side-Channel Attacks
  3992. Cryptologie | Links
  3993. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  3994. So you want to roll your own crypto?
  3995. florinpop17/app-ideas
  3996. Zoom is now critical infrastructure. That’s a concern
  3997. Pure and Applied Chess
  3998. It Took 2 Years To Make My First Dollar Selling A Product
  3999. Call For Presentations – PasswordsCon
  4000. The Five Pillars Of Wealth Building - Darius Foroux
  4001. Heyyyyyyyyyyyy.com | email with *nuance*
  4002. Providers | PrivacyTools
  4003. Is cloud security too easy to screw up? | A Cloud Guru
  4004. A New Botnet Is Covertly Targeting Millions of Servers
  4005. Cross-platform cryptography in .NET Core and .NET 5
  4006. NuGet and long file name support · Issue #3324 · NuGet/Home
  4007. degoogle
  4008. drduh/macOS-Security-and-Privacy-Guide
  4009. Cryptography Dispatches
  4010. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  4011. July 11, 2020 - LiveAuctioneers Account Security
  4012. What's new in the Windows Store client
  4013. fast.ai releases new deep learning course, four libraries, and 600-page book
  4014. Transfer a Software Project - Lessons Learned - dcaulfield
  4015. NGINX Config | DigitalOcean
  4016. How to contact Google SRE: Dropping a shell in cloud SQL
  4017. jesseduffield/horcrux
  4018. Obfuscating your email on the web
  4019. A Guide to Autodidactism | Jack Kinsella
  4020. Symmetric and Asymmetric Encryption in .NET Core
  4021. You Need a Password Manager. Here Are the Best Ones
  4022. Graphical Linear Algebra
  4023. Web Scraping without getting blocked
  4024. Let's Learn x86-64 Assembly! Part 0
  4025. Nintendo DS Architecture | A Practical Analysis
  4026. Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  4027. JWTs: Which Signing Algorithm Should I Use?
  4028. Data Breach Statement - Utah Gun Exchange
  4029. 2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  4030. Introduction to quantum computing with Q# – Part 6, No-cloning theorem
  4031. Why I Left a Career as a Startup CTO to Become a Writer
  4032. IBM Reveals Next-Generation IBM POWER10 Processor
  4033. Hiding messages in x86 binaries using semantic duals
  4034. Stateful Hash-Based Signatures | CSRC | CSRC
  4035. The Illustrated TLS Connection
  4036. Frustrated? It's not you, it's Rust - fasterthanli.me
  4037. Mozilla's failures and a path to profitability
  4038. Intel® Trust Domain Extensions
  4039. Write your Own Virtual Machine
  4040. If the NSA has been hacking everything, how has nobody seen them coming?
  4041. Handles are the better pointers
  4042. Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  4043. Serverless apps on AWS using F# and fable
  4044. Mozilla Alumni Network
  4045. The CompSci Pub
  4046. I don’t trust Signal
  4047. crt.sh | 2427368505
  4048. Devcontainers AKA performance in a secure sandbox
  4049. terrajobst/HarvestPlatformSupport
  4050. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  4051. Mobile Phone Streams
  4052. bulletproofs::notes::range_proof - Rust
  4053. How to encrypt and decrypt shared folders on my Synology NAS
  4054. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  4055. Building dashboards for operational visibility | Amazon Builders' Library
  4056. A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  4057. Proof of X
  4058. acidanthera/OpenCorePkg
  4059. WASM: Add MD5 and SHA* hash functions by akoeplinger · Pull Request #40486 · dotnet/runtime
  4060. hephaest0s/usbkill
  4061. 1Password for Linux development preview
  4062. 27-inch iMac gets a major update
  4063. Tales of the Autistic Developer - Senior Developer
  4064. The .NET Core Journey at Criteo
  4065. How it works - Briar
  4066. Azure Cloud Shell Tips And Tricks | Build5Nines
  4067. Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  4068. David Wong Portfolio
  4069. David Wong
  4070. swyx Writing | Slack is Fumbling Developers
  4071. Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  4072. .NET R&D Digest (July, 2020)
  4073. Chessprogramming wiki
  4074. Polymorphic Encryption Algorithms — Generating Code Dynamically
  4075. Some SQL Tricks of an Application DBA
  4076. You Want Options
  4077. Tip 272 - Azure Security Best Practices
  4078. Small Mailserver Best Current Practices
  4079. Joe Bergeron | Java Obfuscation: A Pattern Language
  4080. p410n3 blog
  4081. Dropping Out of College to Join Facebook: 3 Years Later
  4082. Add CBOR property-based tests by eiriktsarpalis · Pull Request #39828 · dotnet/runtime
  4083. Storage 101: Data Security and Privacy - Simple Talk
  4084. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  4085. Exploring Fully Homomorphic Encryption
  4086. Essays on programming I think about a lot
  4087. You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  4088. Designing a New Old Home: Part 1
  4089. Creating Elliptical Curve Keys using OpenSSL
  4090. Cryptography Dispatches: DSA Is Past Its Prime
  4091. The encrypted homelab
  4092. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  4093. MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  4094. What’s New in Thunderbird 78
  4095. 100 Best Kubernetes Books of All Time
  4096. dotnet/designs
  4097. Poor feedback from readers
  4098. pimbrouwers/Falco
  4099. How SHA-2 Works Step-By-Step (SHA-256)
  4100. Hacking Reolink cameras for fun and profit
  4101. Oracle JRE and JDK Cryptographic Roadmap
  4102. Welcome to Element!
  4103. Data Structures & Algorithms I Actually Used Working at Tech Companies
  4104. Digicert revokes a raft of web security certificates
  4105. All .Net Exceptions List
  4106. Python Malware On The Rise
  4107. A few thoughts about Signal’s Secure Value Recovery
  4108. Trending
  4109. Disabling Google 2FA Doesn't Need 2FA
  4110. New German law would force ISPs to allow secret service to install trojans on user devices
  4111. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  4112. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  4113. Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  4114. A Team
  4115. Clean Architecture, 2 years later - Elton Minetto
  4116. 1650910 - DigiCert: Inconsistent EV audits
  4117. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  4118. A Concurrency Cost Hierarchy
  4119. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  4120. Why I’m Writing A Book On Cryptography
  4121. nabeelqu
  4122. Why Can't I Reproduce Their Results?
  4123. Bitcoin From Scratch - Part 1
  4124. The true cost of knowledge | RoyalSloth
  4125. Beware the Google Password Manager - fasterthanli.me
  4126. Apple Lightning
  4127. Oppose the EARN IT Act
  4128. New Mac ransomware spreading through piracy - Malwarebytes Labs
  4129. How CDNs Generate Certificates
  4130. Load Balancing an ASP.NET Core Web App using Nginx and Docker
  4131. foambubble/foam
  4132. How to get the best out of your Yubikey with GPG
  4133. New US Bill would require makers of encrypted devices to leave a backdoor
  4134. Why AES-GCM Sucks
  4135. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  4136. Breaking changes, version 3.1 to 5.0 - .NET Core
  4137. Navigating Power & Status
  4138. TechEmpower/FrameworkBenchmarks
  4139. Path Building vs Path Verifying: The Chain of Pain
  4140. Which Database should I use in my Azure Serverless App?
  4141. Avoiding exposing identifier details to your users
  4142. jonathan-laurent/AlphaZero.jl
  4143. Do you CI? | Benji's Blog -
  4144. How is NSA breaking so much crypto?
  4145. Teach Yourself Computer Science
  4146. Discovering Dennis Ritchie’s Lost Dissertation - CHM
  4147. The smartest password policy enforcer for Active Directory
  4148. Making your data residency choices easier with Azure
  4149. Let's Encrypt: Senior Software Engineer
  4150. 11 User Authentication · Real-World Cryptography MEAP V07
  4151. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  4152. End-to-End Encryption Update - Zoom Blog
  4153. Proxyjump, the SSH option you probably never heard of
  4154. GitHub Terms of Service - GitHub Help
  4155. Reasoning by Lego: The wrong way to think about cryptography.
  4156. jbp.io :: Third-party audit of rustls
  4157. A collection of free books from Springer
  4158. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  4159. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  4160. May 2020 news · Gwern.net
  4161. Getting Started with Nix
  4162. ECDSA: Handle with Care
  4163. dotnet/pinvoke
  4164. Exploration Strategies in Deep Reinforcement Learning
  4165. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  4166. 25 Years of PHP History
  4167. DRY vs DAMP in Unit Tests
  4168. How to set compensation using commonsense principles
  4169. Playing Around With The Fuchsia Operating System
  4170. CacheOut
  4171. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  4172. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  4173. Google got rich from your data. DuckDuckGo is fighting back
  4174. Discret 11, the French TV encryption of the 80's
  4175. Ladies and Gentlemen… Cloudflare TV!
  4176. Hacking Windows with F# 5.0 Scripts
  4177. Byzantine and non-Byzantine distributed systems
  4178. Logging with Decorators in TypeScript
  4179. Peeking under the hood of Command & Conquer
  4180. How are you improving your technology skills today? Start by reading articles
  4181. The Dictator's Army and charismatic founders
  4182. Is a trillion-dollar worth of programming lying on the ground
  4183. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  4184. Introducing P2P Matrix | Matrix.org
  4185. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  4186. (Very) Basic Intro To Elliptic Curve Cryptography
  4187. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  4188. crt.sh | 1
  4189. ScottHolden/BFSourceGen
  4190. The radix 2^51 trick
  4191. A Guide to Threat Modelling for Developers
  4192. Against an Increasingly User-Hostile Web
  4193. A Guide to Threat Modelling for Developers
  4194. Obsidian
  4195. Node v12.17.0 (LTS) | Node.js
  4196. Messaging with Azure Service Bus - Part 9 - Premium Features
  4197. A Guide to Threat Modelling for Developers
  4198. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  4199. Org Mode - Organize Your Life In Plain Text!
  4200. Implementing simple cooperative threads in C - Stephen Brennan
  4201. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  4202. TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10
  4203. NIST Special Publication 800-63-3
  4204. User authentication with passwords, What’s SRP?
  4205. HTTP Server - LanguageTool Wiki
  4206. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  4207. A Guide to Threat Modelling for Developers
  4208. Introduction to quantum computing with Q# – Part 3, Single qubit gates
  4209. Turning Signal App into a Coarse Tracking Device
  4210. SSH Agent Explained
  4211. A Guide to Threat Modelling for Developers
  4212. OpenBSD 6.7
  4213. Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  4214. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  4215. A Guide to Threat Modelling for Developers
  4216. ACME End User Client and Code Signing Certificates
  4217. Cryptology ePrint Archive: Report 2020/572
  4218. How Not to Store Passwords
  4219. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  4220. Erlang Programming Language
  4221. The Janet Programming Language
  4222. Replacing JWTs with Branca and PASETO in .NET Core
  4223. Meshing with LinkerD2 using gRPC-enabled .NET Core services
  4224. Credential Loading and the AWS SDK for .NET (Deep Dive) - Steve Gordon
  4225. Lockdown Course: Introduction to Cryptography - James Grime
  4226. Asgard Systems uses ML.NET to reduce food waste | .NET
  4227. Make LLVM fast again
  4228. Zoom buys Keybase to help it build end-to-end encryption
  4229. Alternatives to PGP
  4230. Cryptology ePrint Archive: Report 2018/607
  4231. Keybase joins Zoom
  4232. Create a .NET Core Deamon app that calls MSGraph with a certificate
  4233. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  4234. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  4235. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  4236. April Extensions for Firefox Preview
  4237. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  4238. Modern SAT solvers: fast, neat and underused (part 1 of N)
  4239. Startup financial models - 12 templates compared for SaaS
  4240. Before proceeding • IACR
  4241. OpenPGP Message Format
  4242. A Warm Welcome to ASN.1 and DER
  4243. How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  4244. SailfishOS - Sailfish OS
  4245. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  4246. Why not "Why not WireGuard?"
  4247. Messaging with Azure Service Bus - Part 5 - Message Sending Options
  4248. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  4249. Remove certificate pinning for Australia Goverment Covidsafe Android Application
  4250. Barbie typewriter
  4251. Preventing Software Rot
  4252. Search Results - Springer
  4253. Build a C# App with CockroachDB and the .NET Npgsql Driver
  4254. This is what end-to-end encryption should look like! - Jitsi
  4255. FocalFossa/ReleaseNotes - Ubuntu Wiki
  4256. How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  4257. ZEIT is now Vercel - Vercel
  4258. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  4259. Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
  4260. 500 Free Computer Science Courses from the World’s Top CS Universities
  4261. Scuttlebot peer-to-peer log store
  4262. Is BGP safe yet? · Cloudflare
  4263. Using Certificates from Azure Key Vault in ASP.NET Core
  4264. Erase your darlings: immutable infrastructure for mutable systems
  4265. Saving Money on Internation Payments as a Remote Freelancer
  4266. This is what end-to-end encryption should look like! - Jitsi
  4267. Technical reasons to choose FreeBSD over GNU/Linux
  4268. The limitations of Android N Encryption
  4269. Hacking my Sixth Form College network in 1991
  4270. Temporal circuit of macroscale dynamic brain activity supports human consciousness
  4271. Learn dbatools in a Month of Lunches
  4272. The Power of Prolog
  4273. Running your own secure communication service with Matrix and Jitsi | Matrix.org
  4274. Transport Layer Security (TLS) best practices with the .NET Framework
  4275. OnCheckin - Continuous Deployment for ASP.Net websites.
  4276. Welcome · Real-World Cryptography MEAP V05
  4277. How we recovered over $300K of Bitcoin
  4278. Reassuring Words and Good Intentions Don't Mean Good Security
  4279. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  4280. A Message to Our Users - Zoom Blog
  4281. The EARN IT Act Violates the Constitution
  4282. How to SSH Properly
  4283. Perspectives & gaps between theory, practice & industry research in cryptography
  4284. .NET R&D Digest (March, 2020)
  4285. Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by default - Microsoft Edge Blog
  4286. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  4287. US Government Wages War on Encryption
  4288. Await | Writing an OS in Rust
  4289. patents in crypto
  4290. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  4291. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  4292. New grad vs senior dev
  4293. Taking Back What Is Already Yours: Router Wars Episode I
  4294. Released: Microsoft.Data.SqlClient 2.0 Preview 2
  4295. Speeding up Linux disk encryption
  4296. A categorized list of all Java and JVM features since JDK 8 to 14
  4297. Setting Up Git Identities
  4298. Unsure Calculator
  4299. [15] RFR 8172680: Support SHA-3 based Hmac algorithms
  4300. .NET Platforms Feature Comparison | Premier Developer
  4301. A Quick Garbled Circuits Primer
  4302. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  4303. Software Engineer - Jobs at Apple
  4304. How Tailscale works
  4305. Scott Helme
  4306. OpsAI – OpsAI can help you optimize your infrastructure landscape, improve your security and compliance throughout the IT environment, and eliminates wasteful spending.
  4307. MacBook Air
  4308. Ryan_Connolly_Resume.docx
  4309. EARN IT bill is aiming at destroying encryption. We must take action now.
  4310. Async ValueTask Pooling in .NET 5 | .NET Blog
  4311. ploeh blog
  4312. The polygons of Another World: Atari Jaguar
  4313. MakerDAO gets stress tested as ETH price plummets
  4314. HTTP Desync Attacks: Request Smuggling Reborn
  4315. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  4316. DevOps'ish
  4317. EARN IT Must Not Happen
  4318. What is Meshtastic?
  4319. What's a key exchange?
  4320. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  4321. How I Survived Being A $220k/year Intern
  4322. draft-ietf-mls-protocol-09
  4323. Keybase
  4324. MYBP (Maybe You’ve Been Pwned)
  4325. EARN IT is a direct attack on end-to-end encryption
  4326. Intel x86 Root of Trust: loss of trust
  4327. The growth of command line options, 1979-Present
  4328. How to set up a tab profile in Windows Terminal to automatically SSH into a Linux box
  4329. Re: SMB over QUIC: Files Without the VPN
  4330. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  4331. WireGuard Gives Linux a Faster, More Secure VPN
  4332. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  4333. zkMesh
  4334. Stack Exchange Data Explorer
  4335. [Cado-nfs-discuss] Factorization of RSA-250
  4336. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  4337. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  4338. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  4339. #444 – An Interview with Ben Eater
  4340. An Intuitive Guide to Linear Algebra – BetterExplained
  4341. Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months
  4342. It’s 2020. Is your code ready for leap day?
  4343. crt.sh | cert-populations
  4344. pwn.college BETA
  4345. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  4346. How can I create a password protected .zip file in Windows 10?
  4347. The Zen of Go | Dave Cheney
  4348. A Simple Range Proof From Polynomial Commitments - HackMD
  4349. Am I generating email link tokens correctly?
  4350. microsoft/electionguard
  4351. TimeSnapper, automatic screenshot software, auto screen capture
  4352. hassio-addons/addon-ssh
  4353. Welcome to the UK .NET Tour 2020
  4354. Source Code | OpenVPN
  4355. Hash functions and security | Manning
  4356. home | CFAIL
  4357. A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  4358. Fundamental Concepts for Elastic Jobs in Azure SQL Database
  4359. Provisioning X.509 Devices for Azure IoT Hub using .NET Core
  4360. Messaging Layer Security: Towards a New Era of Secure Group Messaging
  4361. Cryptologie
  4362. Update on our new and upcoming security keys
  4363. X25519 in Web Cryptography · Issue #271 · mozilla/standards-positions
  4364. February 2020 SDK Release
  4365. Hash functions and security | Manning
  4366. Latacora - Stop Using Encrypted Email
  4367. Peter Lawrence Montgomery, 1947-2020
  4368. IdentityServer4: Building a Simple Token Server and Protecting Your ASP.NET Core APIs with JWT
  4369. CertificateManager 1.0.3
  4370. dwmkerr/hacker-laws
  4371. Real-World Cryptography
  4372. The NuGet Blog
  4373. How HTTPS works Part 1 — Building Blocks
  4374. google/tink
  4375. London Crypto Day 2020
  4376. Create Certificates for IdentityServer4 signing using .NET Core
  4377. Creating Certificates for X.509 security in Azure IoT Hub using .NET Core
  4378. ASP.NET Core 2.1 Supported Packages
  4379. damienbod/AspNetCoreCertificates
  4380. Serious Cryptography | No Starch Press
  4381. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  4382. Dino 0.1 Release - Dino. Communicating happiness.
  4383. Ryujinx/Ryujinx
  4384. Searching For New Adventures In Software Development
  4385. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  4386. Building personal search infrastructure for your knowledge and code | beepb00p
  4387. Authentication, What The Fuck?
  4388. Permutation-based Cryptography 2020 – Zagreb, Croatia
  4389. damienbod/AspNetCoreCertificates
  4390. Showtime | BenchmarkDotNet
  4391. How to write a simple operating system in assembly language
  4392. NorthSec 2020
  4393. Welcome to the UK .NET Tour 2020
  4394. Workshops | Insomni'Hack
  4395. Whose Curve Is It Anyway
  4396. Critical Windows 10 vulnerability used to Rickroll the NSA and Github
  4397. 18.783 Home
  4398. Real World Crypto 2020
  4399. v5.8 Release Notes
  4400. Supersingular Isogeny Key Exchange for Not-Quite Beginners
  4401. SHA-1 is a Shambles
  4402. FROST — Flexible Round-Optimized Schnorr Threshold Signatures | Cryptography, Security, and Privacy (CrySP) | University of Waterloo
  4403. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  4404. .NET Core, .NET 5; the exodus of .NET Framework?
  4405. Tracing .NET Core applications - Red Hat Developer
  4406. The Hidden Number Problem – kel.bz
  4407. $1000 TCR hashing competition
  4408. Autocrypt 1.1.0 documentation
  4409. On Privacy versus Freedom | Matrix.org
  4410. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  4411. Google gives up on US carriers, will roll out its own RCS chat system
  4412. .NET R&D Digest (November – December, 2019)
  4413. On Linux's Random Number Generation
  4414. Signal >> Blog >> Technology Preview for secure value recovery
  4415. Building a new Win 3.1 app in 2019 Part 1: Slack client
  4416. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  4417. Zero allocation code in C# and Unity - Seba's Lab
  4418. How to generate random numbers using water bubbles
  4419. tmds/Tmds.Ssh
  4420. oqtane/oqtane.framework
  4421. Base64 to hex: Encode and decode bytes online
  4422. VPN Service for Serious Privacy & Security | IVPN
  4423. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  4424. Why IVPN - What makes IVPN the best privacy protection service
  4425. GateHub Investigation - Final Statement
  4426. Stop surveillance and preserve your privacy with IVPN
  4427. Isogeny crypto
  4428. Homepage | ZKProof Standards
  4429. dotnet/SqlClient
  4430. Maintaining cryptographic library for 12 languages
  4431. Thoughts on DNS-over-HTTPS
  4432. Facebook Libra is Architecturally Unsound
  4433. x86/x64 SIMD Instruction List (SSE to AVX512)
  4434. bye: FTP Support Is Going Away
  4435. TLS Post-Quantum Experiment
  4436. Have I Been Pwned: API v3
  4437. Creating Random Numbers With .NET Core
  4438. Verzekeraar Allianz informeert klanten over datalek - Security.NL
  4439. cr.yp.to: 2019.10.24: Why EdDSA held up better than ECDSA against Minerva
  4440. Commas in big numbers everywhere: An OpenType adventure
  4441. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  4442. Meet Algo, the VPN that works
  4443. trailofbits/algo
  4444. Writing a book is hard
  4445. OceanLibrary/Ocean
  4446. Ed25519 Keys | Brian Warner
  4447. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  4448. A detailed look at Ubuntu’s new experimental ZFS installer
  4449. The Insecure Elephant in the Room - CA Security Council
  4450. Intel 545s 2.5&#34; 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive &#40;SSD&#41; SSDSC2KW256G8X1 - Newegg.com
  4451. Algorand's cryptographic sortition
  4452. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  4453. novotnyllc/NuGetKeyVaultSignTool
  4454. .NET Core 3.0 -- Post Launch Blog Posts
  4455. Peddle the Pedal to the Metal
  4456. What's my birthday?
  4457. praeclarum/sqlite-net
  4458. CryptographicException on .NET Core 3, Windows only "The specified RSA parameters are not valid; both Exponent and Modulus are required fields." · Issue #30914 · dotnet/runtime
  4459. beemdevelopment/Aegis
  4460. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  4461. PrivacySafe: The Anti-Cloud Appliance
  4462. September 10, 2019—KB4515384 (OS Build 18362.356)
  4463. awslabs/s2n
  4464. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  4465. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  4466. OWASP/CheatSheetSeries
  4467. Kestrel server does not get grade A in SSL tests because it has no cipher suit preference · Issue #30767 · dotnet/runtime
  4468. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  4469. cr.yp.to: 2017.07.23: Fast-key-erasure random-number generators
  4470. jedisct1/dsvpn
  4471. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  4472. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  4473. Padloc - A Modern Password Manager For Individuals And Teams
  4474. Please do not use the .NET 2.0 HMACSHA512 and HMACSHA384 Classes
  4475. Security Incident - Please Change Your Password
  4476. EV SSL Certificates Phased Out of New Browser Updates | Venafi
  4477. Learn UI Design: The Complete Online Video Course
  4478. draft-truskovsky-lamps-pq-hybrid-x509-01 - Multiple Public-Key Algorithm X.509 Certificates
  4479. KNOB Attack
  4480. Potentially unsafe uses of unsafe · Issue #145 · mozilla/neqo
  4481. Gone forEVer!
  4482. Spying on HTTPS
  4483. Online syntax highlighting for the masses!
  4484. !(Spotting the promising cryptography-related start ups)
  4485. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  4486. Canva Security Incident - May 24 FAQs
  4487. Random Thoughts
  4488. Architecture for humans - Ayende @ Rahien
  4489. Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
  4490. JDK 13 Security Enhancements
  4491. Pwnie Awards
  4492. More on Backdooring (or Not) WhatsApp - Schneier on Security
  4493. ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  4494. JWT Signing using RSASSA-PSS in .NET Core
  4495. Security Engineering - A Guide to Building Dependable Distributed Systems
  4496. Kazakhstan’s HTTPS Interception
  4497. When a rewrite isn’t: rebuilding Slack on the desktop
  4498. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  4499. Sometimes valid RSA signatures in .NET
  4500. Manning Publications
  4501. Block Breakers
  4502. Package torgo
  4503. Digital Driver’s Licenses Could Become a Real Option in Some States
  4504. Host unreachable in https due to weak Http2 cipher · Issue #8952 · dotnet/aspnetcore
  4505. CRYPTO-LAB
  4506. Deprecation errors compiling native projects on macOS Catalina · Issue #30109 · dotnet/runtime
  4507. Mozilla SSL Configuration Generator
  4508. Real-World Cryptography
  4509. Using Chained Certificates for Certificate Authentication in ASP.NET Core 3.1
  4510. Support additional OIDs for SignedCms digest algorithms by vcsjones · Pull Request #38845 · dotnet/corefx
  4511. Proving security at scale with automated reasoning - All Things Distributed
  4512. Archive
  4513. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  4514. Add methods to convert between hexadecimal strings and bytes · Issue #17837 · dotnet/runtime
  4515. The Ultra Secure Crypto Storage & Communication Device
  4516. A book in preparation
  4517. Security advisory 2019-06-13 | Yubico
  4518. Certificate Authentication in ASP.NET Core 3.1
  4519. RAMBleed
  4520. Fixing Random, part 34
  4521. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  4522. dotnet/coreclr
  4523. Apple's 'Find My' Feature Uses Some Very Clever Cryptography
  4524. Requirements for trusted certificates in iOS 13 and macOS 10.15
  4525. Apple CryptoKit | Apple Developer Documentation
  4526. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  4527. Will it cluster? k3s on your Raspberry Pi
  4528. Accessing UNIX sockets remotely from .NET - Red Hat Developer
  4529. Revocation Tracker
  4530. How Hackers Get your Password? | Dr. Erdal Ozkaya Personal Blog
  4531. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  4532. Cryptography Dispatches • Buttondown
  4533. Ethical Alternatives & Resources - ethical.net
  4534. GitHub Enterprise - The best way to build and ship software
  4535. dotnet/coreclr
  4536. Top SSL Certificates Buyer's Guide
  4537. Using Ed25519 signing keys for encryption
  4538. SMS for 2FA: What Are Your Security Options? - Authy
  4539. brunoproduit/roca
  4540. Enable C# mode command line diff by terrajobst · Pull Request #1196 · dotnet/standard
  4541. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  4542. Performance Improvements in .NET Core 3.0 | .NET Blog
  4543. ZombieLoad Attack
  4544. Domain Randomization for Sim2Real Transfer
  4545. [Cryptography] Bitcoin - closing the coin
  4546. Why 2f+1
  4547. eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  4548. ZkVM: a new design for fast, confidential smart contracts
  4549. nothings/single_file_libs
  4550. Community and Communication going forward
  4551. dotnet/extensions
  4552. The Tail of the Serpent by Le Slo
  4553. Do we need effects to get abstraction?
  4554. Azure Monitor HTTP Data Collector API - Azure Monitor
  4555. Edge79+ vs. Edge18 vs. Chrome
  4556. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  4557. mpm guide - niall t.l.
  4558. n0fate/chainbreaker
  4559. The LLVM Compiler Infrastructure Project
  4560. A Recipe for Training Neural Networks
  4561. Twisted Oak
  4562. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  4563. Peddle the Pedal to the Metal
  4564. JDK 12 Security Enhancements
  4565. proposal: crypto/tls: Expose maps for cipher suite IDs/names · Issue #30325 · golang/go
  4566. Understanding the Limitations of HTTPS
  4567. Cryptologie
  4568. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  4569. Lies, darn lies and sampling bias
  4570. Direct3D 11.3 Functional Specification
  4571. Verified cryptographic provider a triple threat
  4572. .NET API browser
  4573. A Go implementation of Poly1305 that makes sense
  4574. The story of the Rendition Vérité 1000
  4575. Scott Helme
  4576. Dotnet-Boxed/Templates
  4577. BoringTun, a userspace WireGuard implementation in Rust
  4578. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  4579. Possible bug with RSACng hash verification · Issue #29061 · dotnet/runtime
  4580. gRPC Bi-directional streaming with Razor Pages and a Hosted Service gRPC client
  4581. The WhibOx Contest Edition 2 - CYBERCRYPT
  4582. On the S-Box of Streebog and Kuznyechik
  4583. Understanding STIR/SHAKEN
  4584. Include System.Security.Cryptography.RandomNumberGenerator.GetInt32 · Issue #1101 · dotnet/standard
  4585. Go 1.12 Release Notes - The Go Programming Language
  4586. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  4587. Running Local Azure Functions in Visual Studio with HTTPS
  4588. Alexa Top 1 Million Analysis - February 2019
  4589. We need to talk about Session Tickets
  4590. Introduction
  4591. Security Experiments with gRPC and ASP.NET Core 3.1
  4592. Cybersecurity for the Public Interest - Schneier on Security
  4593. Added Range Manipulation APIs to Collection<T> and ObservableCollection<T> by ahoefling · Pull Request #35772 · dotnet/corefx
  4594. Past, Present, Future: From Co-ops to Cryptonetworks - Andreessen Horowitz
  4595. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  4596. Data Leakage from Encrypted Databases - Schneier on Security
  4597. kelseyhightower/kubernetes-the-hard-way
  4598. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  4599. Neowin
  4600. a16z Podcast: Voting, Security, and Governance in Blockchains - Andreessen Horowitz
  4601. Crypto Canon - Andreessen Horowitz
  4602. Blockchain Governance: Programming Our Future
  4603. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  4604. Keybase launches encrypted git
  4605. Bitcoin's Academic Pedigree - ACM Queue
  4606. How Information Got Re-Invented - Issue 51: Limits - Nautilus
  4607. AI Progress Measurement
  4608. Microsecond Resolution Time Services for Windows
  4609. vivri/Adjective
  4610. On the Security of Password Managers - Schneier on Security
  4611. Details on Recent DNS Hijacking - Schneier on Security
  4612. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  4613. Reconstructing SIGSALY - Schneier on Security
  4614. Blockchain and Trust - Schneier on Security
  4615. Public-Interest Tech at the RSA Conference - Schneier on Security
  4616. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  4617. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  4618. Hacking the GCHQ Backdoor - Schneier on Security
  4619. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  4620. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  4621. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  4622. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  4623. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  4624. New Australian Backdoor Law - Schneier on Security
  4625. Security Risks of Chatbots - Schneier on Security
  4626. The DoJ's Secret Legal Arguments to Break Cryptography - Schneier on Security
  4627. Three-Rotor Enigma Machine Up for Auction Today - Schneier on Security
  4628. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  4629. Hiding Secret Messages in Fingerprints - Schneier on Security
  4630. Security of Solid-State-Drive Encryption - Schneier on Security
  4631. ID Systems Throughout the 50 States - Schneier on Security
  4632. Cell Phone Security and Heads of State - Schneier on Security
  4633. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  4634. Ext4 Disk Layout - Ext4
  4635. Modern Alternatives to PGP
  4636. Go 1.12 Release Notes - The Go Programming Language
  4637. Archive
  4638. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  4639. CBC 2019
  4640. Real World Crypto 2019
  4641. The year in post-quantum crypto
  4642. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  4643. SPY --- Surveillance, Privacy, and You
  4644. The Case Against Quantum Computing - IEEE Spectrum
  4645. Quantum algorithms for analysis of public-key crypto | American Inst. of Mathematics
  4646. Mathematics of Public Key Cryptography
  4647. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  4648. Programme
  4649. PQCRYPTO ICT-645622
  4650. D. J. Bernstein / Talks
  4651. djbsort: Intro
  4652. Security in Times of Surveillance
  4653. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  4654. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  4655. Eurocrypt 2018 rump session
  4656. Classic McEliece: Talks
  4657. PQCrypto 2018 Conference : Florida Atlantic University - Charles E. Schmidt College of Science
  4658. Pitching security vs. privacy is asking the wrong question
  4659. libpqcrypto: Intro
  4660. Security in Times of Surveillance
  4661. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  4662. Post-Quantum Cryptography
  4663. CBC Workshop 2018 : Florida Atlantic University - Charles E. Schmidt College of Science
  4664. SPHINCS+
  4665. The ROBOT Attack
  4666. NTRU Prime: NIST submission
  4667. Unity Labs Publications | Unity
  4668. dalek-cryptography/ed25519-dalek
  4669. The CCC: Men Who Hate Women
  4670. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  4671. Cloud Data Backup for Small Businesses | CrashPlan
  4672. nucypher/nufhe
  4673. RUB-NDS/TLS-Padding-Oracles
  4674. Cryptologie | Links
  4675. [paper review] A faster, more efficient cryptocurrency
  4676. mimoo/eureka
  4677. crypto/tls: enable TLS 1.3 and update tests · golang/go@30cc978
  4678. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  4679. Database Encryption
  4680. Kerckhoffs’ principles – Why should I make my cipher public?
  4681. Proxy re-encryption and FHE with NuCypher
  4682. Cryptologie | Links
  4683. Attack of the week: searchable encryption and the ever-expanding leakage function
  4684. Archive
  4685. Introducing Adiantum: Encryption for the Next Billion Users
  4686. Quantum computing as a field is obvious bullshit
  4687. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  4688. Stanford Blockchain Conference 2019 - Day 1
  4689. arXiv.org e-Print archive
  4690. DEF CON® 27 Hacking Conference - Call For Papers
  4691. Going old school: how I replaced Facebook with email
  4692. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  4693. » Agrippa (A Book of the Dead) The Digital Antiquarian
  4694. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  4695. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  4696. Meow Hash
  4697. .NET Design Review: GitHub Quick Reviews
  4698. Tuning a Runtime for Both Productivity and Performance
  4699. We didn’t see this coming
  4700. Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  4701. dotnet/coreclr
  4702. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  4703. Creating a GitHub app with create-probot-app: Creating my first GitHub app with Probot - Part 1
  4704. no dogma podcast - powered by FeedBurner
  4705. Manning Publications
  4706. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  4707. Software Tokens Won't Save You
  4708. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1