🎃
linksfor.dev(s)
Posts for 'encryption'
How to build an agent
Andrej Karpathy — AGI is still a decade away
Your startup has to be a surveillance state to automate jobs
How I Bypassed Amazon's Kindle Web DRM Because Their App Sucked
The Dreamseeker’s Vision of Tomorrow - Dhole Moments
Owlcat Games - We create cRPGs
LLMs are getting better at character-level text manipulation
GitHub - chili-chips-ba/wireguard-fpga: Full-throttle, wire-speed hardware implementation of Wireguard VPN, using low-cost Artix7 FPGA with opensource toolchain. If you seek security and privacy, nothing is private in our codebase. Our door is wide open for backdoor scrutiny, be it related to RTL, embedded, build, bitstream or any other aspect of design and delivery package. Bujrum!
Meta Superintelligence’s surprising first paper
Update on my Case Against Microsoft
Rescue me always
When Will Quantum Computing Work?
Why Your Simple Password Is a Mathematical Catastrophe - Tawanda Munongo
Geometry of Motion
Achieving period-correct graphics in personal computer emulators — Part 1: The Amiga
The Demonization of DeepSeek
Sutra | Portfolio
A Thing or Two About RSA
The UK Is Still Trying to Backdoor Encryption for Apple Users
Why Data is the New Gold
Fun With HyperLogLog and SIMD
Tachyaction at a Distance - sean bowe
Signal Protocol and Post-Quantum Ratchets
The RAG Obituary: Killed by Agents, Buried by Context Windows
cr.yp.to: 2025.09.30: Surreptitious surveillance
GitHub - google/cdc-file-transfer: Tools for synching and streaming files from Windows to Linux
Building Software Faster with LLMs: Part 1 - The Pain Points
Cognitive Capital: Assets That Think
Introduction to Terraform Actions | DanielMSchmidt.de
In the economy of user effort, be a bargain, not a scam • Lea Verou
How I Block All 26 Million Of Your Curl Requests
I'll quit my job and buy a farm - Alin Panaitiu
Fast UDP I/O for Firefox in Rust
There is no reachable chess position with more than 218 moves.
Evanston orders Flock to remove reinstalled cameras - Evanston RoundTable
Notes on RL Environments
ChatControl wants to scan all your private messages
PostgreSQL 18 Released!
100,000,000 CROWPOWER and no horses on the moon
I'm Netlify-Free! - Dmitry Kudryavtsev
John Kristoff - Journeys in Hosting 1/x
Frontend complexity and the HTML renaissance
My computer science RELEARNING progress logs
Tell the EU: Don’t Break Encryption with Chat Control
DXGI debugging: Microsoft put me on a list
Bringing Metal to a crypto backdoor fight! Exploiting the GPU and the 90s crypto wars to crack the APT Down code signing keys
» Outcast The Digital Antiquarian
How do LLMs work?
StringWa.rs on GPUs: Databases & Bioinformatics 🦠
Fight Chat Control (@chatcontrol@mastodon.social)
From Spaghetti to Simplicity - Kool Codez
How I Would Have Built Laravel Cloud
Fight Chat Control (@chatcontrol@mastodon.social)
ARM is great, ARM is terrible (and so is RISC-V)
Harmonic - News
GrapheneOS and forensic extraction of data - GrapheneOS Discussion Forum
Performance Improvements in .NET 10 - .NET Blog
The Case for Cowboy Coding
The Business Consultant — Quarter Mile
Chat Control Must Be Stopped, Act Now!
The Method of Least Squares for Software Developers
A look at a P2P camera (LookCam app)
Introducing Signal Secure Backups
Be the LetsEncrypt in your homelab with step-ca
Vibe Coding Through the Berghain Challenge - Log - nibzard
What to do with an old iPad
Secret Storage in OCI
reMarkable Paper Pro Move
The maths you need to start understanding LLMs
I Should Have Loved Electrical Engineering · Tony Tong
Cloud tech makes sense on-prem too
"This telegram must be closely paraphrased before being communicated to anyone." Why?
5 Vibe Coding Failures That Prove AI Can't Replace Developers Yet
Music to Break Models By
Replacing developers with GPUs
How I Setup Nginx as a Reverse Proxy
Remote Code Execution with LLM Agents | Aleksandr Hovhannisyan
Project MiniNAS | Jadarma's Blog
Using JWT to establish a trusted context for RLS
The Web Does Not Need Gatekeepers
Security Alert | NX Compromised to Steal Wallets and Credentials
Piloting Claude for Chrome
From Bug Bounties to $100M Exit: The Bootstrapped Journey of AssetNote
The Bubble That Knows It’s a Bubble
The Day I Logged in With a Hash
It’s not wrong that "🤦🏼♂️".length == 7
Away from Gmail | etcetera
io_uring, kTLS and Rust for zero syscall HTTPS server
How I built my first side project: Tubee, in 2017
I gave Claude Code a folder of tax documents and used it as a professional tax agent
Frank Chimero · Time is On My Side
BFF in ASP.NET Core #7 - Introducing the Duende BFF Library
Intel Outside: Hacking every Intel employee and various internal websites
RAG-Shot Learning - Joseph Cooper
Streaming Data using OCI Streams and .NET
Setting up RabbitMQ on OCI
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
A Case for Digital National Parks
Single Sign On for Furries
I’m sorry, but the solution to Online Safety Act Age-Verification age-gating & censorship blocks is *not* to call on platforms to “ban the UK”; here I shall respectfully explain why…
Reflections on my founder journey
Game Math 101, Writing your Own 2D Math in C++
Building a web search engine from scratch in two months with 3 billion neural embeddings
OpenSSH: Post-Quantum Cryptography
From GPT-2 to gpt-oss: Analyzing the Architectural Advances
Fight Chat Control - Protect Digital Privacy in the EU
The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
The 5 Most Common API Design Mistakes (and How to Avoid Them)
Linear sent me down a local-first rabbit hole | Bytemash
The Untapped Power of Veteran Engineers: Why Companies Are Overlooking Their Most Valuable Assets – Part 3
Getting Started with Cloudflare Tunnel | David Ma
When to Hire a Computer Performance Engineering Team (2025) part 1 of 2
😶🌫️ Controlling the weather 🌦️ » Firesphere.dev
The hollow universe
The Math Is Haunted — overreacted
Avoid IaaS Lock-In With a SAML Proxy
Popping the AGI Bubble
Linux 6.16 brings faster file systems, improved confidential memory support, and more Rust support
thoughts on “do 100 thing” - Tasshin
LLMs can now identify public figures in images
Don't use external CSS: (Maurycy's blog)
How I hacked my washing machine - Nex's Blog
When We Get Komooted
How Not to Translate a Videogame (2025 ver.)
English Writes Numbers Backwards
Mathematics for Computer Science | Electrical Engineering and Computer Science | MIT OpenCourseWare
The Promised LAN
The Elements of Artificial Intelligence - Brady Gerber
Cops say criminals use a Google Pixel with GrapheneOS — I say that’s freedom
More than you wanted to know about how Game Boy cartridges work
Amazon Ring Cashes in on Techno-Authoritarianism and Mass Surveillance
Death by AI
How I Fixed Ruby's Most Annoying Problem: 60-Second Gem Installs"
My Ultimate Self-hosting Setup
Zugzwang - Building Tomorrow's Software Today
Fully Homomorphic Encryption and the Dawn of A Truly Private Internet
The secrets we keep | willowbl00
API Auth Is Deeper Than It Looks | Nango Blog
How AI Vibe Coding Is Destroying Junior Developers' Careers
.NET 10 Preview 6 is now available! - .NET Blog
Haven Blog: Age Assurance and Bluesky
What I'm working on – at work and on the side
Artificial intelligence is a commodity, but understanding is a superpower
Zig's New Async I/O
GitHub - MoonshotAI/Kimi-K2: Kimi K2 is the large language model series developed by Moonshot AI team
Why I changed my mind on t-addresses in Zcash
Google can now read your WhatsApp messages, here's how to stop it
New Sphere-Packing Record Stems From an Unexpected Source | Quanta Magazine
The Case for Secrets as Code: Stop Click-Managing Secrets
One Year With a Framework Laptop 16 and Fedora KDE Plasma Desktop
GitHub - jackjackbits/bitchat: bluetooth mesh chat, IRC vibes
GitHub - BlueFalconHD/apple_generative_model_safety_decrypted: Decrypted Generative Model safety files for Apple Intelligence containing filters
SSH Honeypot Insights: 11,599 Login Attempts Recorded on Ubuntu
Stop Hiding My Controls: Hidden Interface Controls Are Affecting Usability | IX Magazine Issue XXXII.4 July - August 2025
Predicting Average IMDb Movie Ratings Using Text Embeddings of Movie Metadata
Not being federated and E2E as an advantage | Die wunderbare Welt von Isotopp
Opening up ‘Zero-Knowledge Proof’ technology to promote privacy in age assurance
PyTorch in One Hour: From Tensors to Training Neural Networks on Multiple GPUs
Exploiting the IKKO Activebuds "AI powered" earbuds, running DOOM, stealing their OpenAI API key and customer data.
What is automatable and who is replaceable? Thoughts from my morning commute
I Shipped a macOS App Built Entirely by Claude Code
Writing Code Was Never The Bottleneck
Sticky snap: a better snapping algorithm
How I Used a Market Basket Analysis to Get a Job Offer - The Heasman
modelling API rate limits as diophantine inequalities
Daniel's Blog · Agent Lineage Evolution: A Novel Framework for Managing LLM Agent Degradation
The Nature of Lisp, Code Generation and Wieldable Programming Power
Getting an LLM to Set Its Own Temperature
Makefile Tutorial by Example
GitHub - psviderski/unregistry: Push docker images directly to remote servers without an external registry
grokking NAT and packet mangling in linux
Setting up a landline phone for kids - Chris Hardie's Tech and Software Blog
zk: The Most Beautiful Form of Privacy
Quitting Comfort: I'm attending Recurse — frankchiarulli.com
matrix is cooked
Start your own Internet Resiliency Club – Bow Shock Systems Consulting
A2A Is For UI
Endometriosis is an incredibly interesting disease
How I Nearly Accessed Millions Of Maruti Suzuki Customer Records
Telegram is indistinguishable from an FSB honeypot
The confluence
Extracting SSH private keys from Claude training data
The EU Commission refuses to disclose the orchestrators behind its mass surveillance proposal, which would effectively end citizens’ online privacy.
Transform Years of Content Into a Conversational Knowledge Base
The Truth: What It Really Takes to Build an SaaS
Chester: Reimagining LLM Benchmarking Through Programming Language Design | Aditya Bhattacharya | Blogs Website
How to store data on paper?
Beating the kCTF PoW with AVX512IFMA for $51k
Systems Correctness Practices at Amazon Web Services – Communications of the ACM
GitHub - Olow304/memvid: Video-based AI memory library. Store millions of text chunks in MP4 files with lightning-fast semantic search. No database needed.
Private Money: Part 1
AI: Accelerated Incompetence
Exploring z.sh 🕵️ Part 1 - Storing data
10X Your AI Code Output: The Context Strategy That Beats Outdated LLM Knowledge.
My $4/month self-hosted web server setup | Ethan's Wiki
Reinvent the Wheel | Matthias Endler
Why Algebraic Effects?
Just fucking code.
Introducing Claude 4
Why Use Bayesian Methods for A/B Testing | Briefer
Rust turns 10: How a broken elevator changed software forever
Microsoft's ICC blockade: digital dependence comes at a cost
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
Why We Think
"We would be less confidential than Google" – Proton threatens to quit Switzerland over new surveillance law
Reverse Engineering the Renpho App
RAG’s big blindspot
Gradients are the new intervals
Disabling Indices in a -bacpac file (Sql Server)
What is work?
Fitting models from noisy heuristic labels - Emir's blog
The Junior Developer Crisis: Why Entry-Level Coders Are Struggling and What’s at Stake
Mycoria
The Pocket Dimension: Motivation Now & Post AGI · Philipp Cannons
Best PDF Editor | Edit, Sign, Merge & Secure
Why is it taking so long to build new IP cores?
How to live an intellectually rich life
Vibe Coding for Existential Dread and Bankrupcy
Jeeps, Ferraris, and Other Engineers
How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground
Michael Tsai - Blog - Revisiting ZFS for Mac
Knowledge-based society, my ass
How I Got Exploited At My First Startup
Building the Internet of the 2030's
What the heck is AEAD again?
Jon Atkinson | Trust but Verify: Sensible Ways to Use LLMs in Production
An end to all this prostate trouble?
Your Quick Guide to Learn JWT - Coding Sonata
From Hello World to Hello Customers: Why Programs Aren’t Products
What If We Could Rebuild Kafka From Scratch?
My Billion Dollar Idea (Seedless Torrents) is dead
How I Got Hacked: A Warning about Malicious PoCs | Chocapikk's Cybersecurity Blog 🛡️💻
Lode Coding
This blog is hosted on a Nintendo Wii
The World Is Ending. Welcome to the Spooner Revolution.
Better error handling
Part 6: How OneNote Storage works, in-depth | Daniel Sada Caraveo | Developer Productivity & Culture
Writing an LLM from scratch, part 11 -- batches
In-memory free-text search is a super-power for LLMs | sgnt.ai
15,000 lines of verified cryptography now in Python
What We Mean When We Say “Think”
Love your competitors
Two Years of Rust
LLMs Don’t Reward Originality, They Flatten It
Implementing AES Encryption in .NET - EXPLAINED
Hallucinations in LLMs: A Side Effect of Being Trained to Be Right?
So, I Wrote a Book
My day in 2035
Cyc – Yuxi on the Wired
The YAML Engineer
Power to the people: How LLMs flip the script on technology diffusion
This website is available without encryption, and yours should be too
Gmail E2E is as terrible as expected
MCP Tool Poisoning: Taking over your Favorite MCP Client
GitHub - lwthiker/curl-impersonate: curl-impersonate: A special build of curl that can impersonate Chrome & Firefox
Why I'm Building a Climbing App (and Why Knowing Your Community Actually Matters)
The Golden Age of Modularity
Garmin Connect+ and the Beginning of the End
Stop syncing everything
Building a search engine from scratch, in Rust: introduction
Ente Photos v1
I'm an American software developer and the "broligarchs" don't speak for me
Don't Walk with Rocks in Your Shoes
OTP in Your Password Manager Is Not 2FA
What every computer science major should know
Tim Severien
HN Popularity Contest
Post Apocalyptic Computing
Breaking and Fixing Content-Defined Chunking
Notes on coreutils in Rust · Alex Gaynor
Visual-Focused Algorithms Cheat Sheet
Improving Recommendation Systems & Search in the Age of LLMs
How NixOS and reproducible builds could have detected the xz backdoor for the benefit of all
Don’t use Telegram, but if you have to, at least use Partisan Telegram
"Vibe Coding" vs Reality
I made an app for competitive hot air balloon pilots
A Win for Encryption: France Rejects Backdoor Mandate
Vibe Coding is a Dangerous Fantasy
Does unsafe undermine Rust's guarantees?
Comptime Zig ORM
Redundancy
.NET 10 Preview 2 is now available! - .NET Blog
Michael Tsai - Blog - Rotten
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
AI on Windows: Detecting NPU - Nick's .NET Travels
Rotten for a while now
Capchan – solving captcha with image classification
Model Merging
Browse No More
Timothy J. Baek - my true purpose
Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data Leak
📗 On Testing Hypotheses Instead of Setting Goals
Verifiability is the Limit
GitHub - kern/filepizza: :pizza: Peer-to-peer file transfers in your browser
Engineering reasoning LLMs: Notes and Observations
Truth Functional Logic for Hackers - Part One
Ultimate Web Development Guide For Clients | My Blog | Enindu Alahapperuma
Kratix for Database Management: A Step-by-Step Guide to Amazon RDS Deployment
How Language Models Understand Nullability
The ESP32 "backdoor" that wasn't | Dark Mentor LLC
Everything You Think You Know About DeltaChat Is Wrong – Makefile.feld
GitHub - vxfemboy/purrcrypt: A fur-ociously secure encryption tool that encodes your secrets as adorable cat and dog sounds, using real elliptic curve cryptography with a playful disguise.
Synchronising files across machines – The Dan MacKinlay stable of variably-well-consider’d enterprises
Why Local-First Software Is the Future and its Limitations | RxDB - JavaScript Database
Differentiable Logic Cellular Automata: From Game of Life to pattern generation with learned recurrent circuits
Age and cognitive skills: Use it or lose it
Terraform Power-Ups: The Best Tools to Supercharge Your IaC Workflow - Chris Woody Woodruff
Apple takes UK to court over 'backdoor' order
ARC-AGI Without Pretraining
Use Firefox in 2025
Prosthetics that don't betray
LLMs, Game Theory, and Market Dynamics
Introduction to Dapr for .NET Developers
GitHub - LadybirdBrowser/ladybird: Truly independent web browser
Coffee and Open Source Conversation - Key Jefferys
The Raster Tragedy in Skia
Benchoff Design Portfolio
App over file
There Isn’t Much Point to HTTP/2 Past The Load Balancer
Lock It Down: Security Ideas for Terraform Deployments - Chris Woody Woodruff
How I Saved $1,900 by Ditching Kajabi and Building My Own Learning Platform on Replit
How the UK is Weakening Safety Worldwide
A Minimal Hash-Based Symmetric Encryption Protocol
Terraform Power Moves: Unlocking Advanced Features for Smarter Infrastructure - Chris Woody Woodruff
Scream Cipher
The Infinite Game Meets Azure Security with Bojan Magušić
Magma: A Foundation Model for Multimodal AI Agents
Is Hallucination a Vehicle for Creativity?
Nuclear fusion: WEST beats the world record for plasma duration!
XOR
Direnv - and reinventing the wheel with envloader
The State of Terraform: Keeping Your Cloud Empire in Check - Chris Woody Woodruff
m-onz
Deterministic signatures are not your friends
The 20 year old PSP can now connect to WPA2 Wifi Networks - Wololo.net
Introducing Privacy Pass authentication for Kagi Search
League of Legends data scraping the hard and tedious way for fun
Par Part 2: Linear Logic
Backblaze Drive Stats for 2024
GitHub - Grubre/smol-gpu: An rv32i inspired ISA, SIMT GPU implementation in system-verilog.
C# .NET 9: Deep Dive into the Technical Beast 🚀
In 1920s Quantum Physics, True Particles Do Not Exist
Linear Relationships in the Transformer’s Positional Encoding
On Not Being Immutable
Static analysis of the DeepSeek Android App
Understanding Reasoning LLMs
The future belongs to idea guys who can just do things
Understanding Reasoning LLMs
Infosec 101 for Activists
Optimizing with Novel Calendrical Algorithms
Are reasoning benchmarks today actually reliable? Introducing the JustLogic benchmark
There is still plenty of low-hanging fruit in science
Best Simple System for Now
ryanbuening.com | Bits of Wisdom
Avoid ISP routers - RouterSecurity.org
What is SwiGLU?
Falsehoods programmers believe about null pointers
The First Ten Years
The GenAI Product Manager
Lessons on Creative Work | Daniel Saewitz
Antiqua et nova. Note on the Relationship Between Artificial Intelligence and Human Intelligence (28 January 2025)
A few words about indie app business – Charlie Monroe
How To Avoid Malware Rabbitholes
Eric Chiang | Confidential Compute and GPUs
17-445 Machine Learning in Production
The Illustrated DeepSeek-R1
How we built Ellipsis (or: Lessons from 27 months building LLM coding agents) - Ellipsis.dev | Automated code reviews
The State of WebAssembly – 2024 and 2025
GitHub - seemoo-lab/openhaystack: Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
The Protesters' Guide to Smartphone Security
But But, You Were Supposed to Be a GPT Wrapper?!
Digital Signature Algorithms - Ronkathon: Cryptography Educational Foundations
Implementing AES Encryption With C#
Rust's Superpower: Speed Meets Smarts - Chris Woody Woodruff
TechThreads · Secrets Management w/ Firebase App Hosting and NextJS
next.js: an honest review
The Closed Web
Paul Romer
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
Looking Beyond HackerNews
Reverse Engineering Call Of Duty Anti-Cheat
Testing a handful of sensors for your next DIY project
I am (not) a Failure: Lessons Learned From Six (and a half) Failed Startup Attempts
Block AI scrapers with Anubis
Investigating an "evil" RJ45 dongle
Private Keys in the Fortigate Leak
UofTCTF 2025: An AES Timing Side-Channel
On-Chain Randomness Gotchas | drand
The documentation problem in development
structured decoding, a guide for the impatient
Beating cuBLAS in Single-Precision General Matrix Multiplication
End-to-end encrypted email is bad for you
Tracking and Personalizing Connections – Chris Woody Woodruff
Don't use cosine similarity carelessly - Piotr Migdał
The 2025 AI Engineering Reading List
How I Use LLMs for Coding and Writing
HOW TO TRACK WEBSITE ANALYTICS USING ONLY NGINX AND PURE BASH
Password Cracking 101: From DES to ZIP
How outdated information hides in LLM token generation probabilities and creates logical inconsistencies
Deniable Knowledge
Creating a simple free website in 2025
How We Cracked a 512-Bit DKIM Key for Less Than $8 in the Cloud
Zero to One Hundred Thousand Tests
Üllar Maasik - Learning Laravel by building a postal code finder
Pick 3 or Get None
What Makes a Good Automated Test?
Efficiently factoring RSA modulus from public private keys
Beyond the Random Class: Cryptographic Randomness in .NET 6+
Why is Open Source important? And is it free?
What LLMs mean for EBITDA margins | Notes
Do it in jeans first
How Websockets are Scaled
How we speed up filtered vector search with ACORN | Weaviate
There's no good reason for signing webhooks
Programming a GPU on bare metal
Generative AI is not going to build your engineering team for you - Stack Overflow
mjg59 | The GPU, not the TPM, is the root of hardware DRM
Blockchain-as-a-Backend
The Backstory of Backpropagation – Yuxi on the Wired
What changed in Rails this year?
Things we learned about LLMs in 2024
Jonot's Blog
Intro
Getting gpt-4o-mini to perform like gpt-4o
Passkey technology is elegant, but it’s most definitely not usable security
GitHub - lexiforest/curl-impersonate: An active fork of curl-impersonate with more versions and build targets.
Improving RAG Pipelines with Hybrid Search
Apple Photos phones home on iOS 18 and macOS 15
MonKafka: Building a Kafka Broker from Scratch with Zero Dependencies (So Far)
Notes on China
matthewsinclair.com · Intelligence. Innovation. Leadership. Influence.
Write your Own Virtual Machine
GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
String Matching. Beginning
Memetic Culture
Tech Trends 2025 - scapellato.dev
Talking To Your Mailserver Is Not as Hard as You Think!
Dec 22: Why we use our own hardware at Fastmail
Building Custom RSS Feeds for LWN.net
Finally, a Replacement for BERT: Introducing ModernBERT
How types make hard problems easy
Failing Randomly: Linux Seccomp and Kernel Hacking
No, You can’t bet on everything (and that’s okay)
Breaking into Vision
Parallel vector graphics rasterization on CPU.
GitHub - markmoxon/elite-source-code-commodore-64: Fully documented and annotated source code for Elite on the Commodore 64
Bluesky and Decentralization -- Dustycloud Brainstorms
Terraform Rules of Thumb
VC will be the best way finance learning
Sharing new research, models, and datasets from Meta FAIR
Coercing a Magic MIFARE credential into being an iPhone-compatible NFC tag | Evan Pratten
All Your Codebase
Google Announces Quantum Chip - Willow
Zero to CMake | Fred's Blog
Intel on the Brink of Death | Culture Rot, Product Focus Flawed, Foundry Must Survive
Becoming (more) Afraid To Post Online
nrdlg | From Nix to Eos
Librebooting the ThinkPad T480
Strategy is Not War; It’s Gardening
Lies I was Told About Collaborative Editing, Part 1: Algorithms for offline editing / Moment devlog
Writing down (and searching through) every UUID · eieio.games
meta-llama/Llama-3.3-70B-Instruct · Hugging Face
How I Built the World's Largest Database of LEGO Minifigure Ratings
Lessons Learned from Working at Startups
Teaching Elderly People to Use Android - Lessons Learned
The fascinating security model of dark web marketplaces
1934361 - ICP-Brasil: Mis-issued certificate
Procedural Knowledge in Pretraining Drives LLM Reasoning
GitHub - privastead/privastead
Weaponizing SSO for profit - Raz Blog
A Vanity VNC server (or Joke over RFB) - ache
100 Bushels of Corn, Revisited – R Works
Setting up listmonk, an open-source newsletter & mailing list manager - Yasoob Khalid
Solving LeetCode™ problems with Racket
How decentralized is Bluesky really? -- Dustycloud Brainstorms
Mathematical Thinking Isn’t What You Think It Is | Quanta Magazine
How to Build a Chess Engine and Fail
Security means securing people where they are
Reverse Engineering iOS 18 Inactivity Reboot
fleetwood.dev
What To Use Instead of PGP - Dhole Moments
The fallacies of distributed systems
‘Reflections on Trusting Trust’, but completely by accident this time
Why I Quit Google to Work for Myself
Escape the Surveillance Web with Gemini
What I learned from 130 hours in a Waymo
Traceroute Isn't Real
Former Bayesian captain offers insight
Our First Generalist Policy
House of Nettles • A Non-Technical Intro to Webmentions
Authenticating People With Certificate Chains
Matrix 2.0 Is Here!
delroth's homepage - One weird trick to get the whole planet to send abuse complaints to your best friend(s)
Scheduling Model in LLVM - Part II
llama-recipes/recipes/quickstart/NotebookLlama at main · meta-llama/llama-recipes
Managing Secrets in NixOS Home Manager with SOPS
Challenges deploying PostgreSQL (9.2) for high availability · Dave Pacheco's Blog
OpenZFS deduplication is good now and you shouldn't use it
Vulnerabilities of Realtek SD card reader driver, part 1
A decade of WiFi
Betting on Bali: My Journey Into the Offshoring Business
Is Your Security Posture Holding Your Healthcare Startup Back? - Hadi Javeed's blog
I got dysentery so you don’t have to
Jujutsu (jj), a git compatible VCS
Clone your building key fob
Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
BearerToken: The new Authentication handler in ASP.NET Core 8
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
Improving ASP.NET Core Security By Putting Your Cookies On A Diet
Exploring what is inside the ASP.NET Core cookies
Improving ASP.NET Core Security By Putting Your Cookies On A Diet
Exploring what is inside the ASP.NET Core cookies
Demystifying OpenID Connect's State and Nonce Parameters in ASP.NET Core
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault
BearerToken: The new Authentication handler in ASP.NET Core 8
Trust Rules Everything Around Me
HTML Whitespace is Broken - Devel without a Cause
The Stallman report
Turn your old laptop into low-end gaming machine
UDP, A Disclaimer, And QUIC
Large language models reduce public knowledge sharing on online Q&A platforms
Every bug/quirk of the Windows resource compiler (rc.exe), probably
Taste and Tradeoffs
Seven for a secret never to be told
OpenBSD 7.6
Can You Get Root With Only a Cigarette Lighter?
~200GB Free Cloud for Your files [ENG 🇬🇧] – Tomasz Dunia Blog
Purity is Great for Collaboration
Beware UserDefaults: a tale of hard to find bugs, and lost data
Node vs Bun: no backend performance difference
Getting my daily news from a dot matrix printer
Why I Prefer Errors to Exceptions
Reverse Engineering and Dismantling Kekz Headphones
Why laptop support, why now: FreeBSD’s strategic move toward broader adoption | FreeBSD Foundation
Evaluating the Effectiveness of LLM-Evaluators (aka LLM-as-Judge)
How Mobile Networks Work
A friendly introduction to assembly for high-level programmers — Conditionals
Hypercomputation without bothering the cactus people: Software development for the DMT headspace
“Bad Romance”: How Kaspersky Lab Failed to Conquer the Western Cybersecurity Market
Cryptographic Innuendos - Dhole Moments
Digital signatures and how to avoid them
Using YouTube to steal your files
Warning: macOS Sequoia 15 may bypass DNS encryption
macOS Sequoia is available today
Solene'% : I moved my emails to Proton Mail
Notes on OpenAI’s new o1 chain-of-thought models
Arrays of Wisdom of the Ancients
Performance Improvements in .NET 9 - .NET Blog
The Integration of Hardware, Software and Services
Making a game for my friend's retro console — Nick Girardo
Radicle
Kafka protocol practical guide - Ivan Yurchenko
Keeping your Dotfiles in Sync and your Secrets in Gopass
Exploiting CI / CD Pipelines for fun and profit – Razz Security Blog
Managing dotfiles with chezmoi | Daniel Stoddart
Keyhole | MAS
I Never Expected To Run For Office—Here's What I Learned
By request from the jobs thread: why my job is to watch dreams die.
Effective Spaced Repetition
Programming ZKPs: From Zero to Hero
My Software Bookshelf
To Nerves from Elixir
Air Con: $1697 for an on/off switch
We've Been Lied To About Work
Exploring inner workings of a random free android VPN
How I’d Set Up My Tech If I Were Tate: Ensuring the Police Have Zero Evidence
Danny O'Brien's Oblomovka » Blog Archive
Why should anyone boot you up?
Why Solid?
Emulating the early Macintosh floppy drive
Is Telegram really an encrypted messaging app?
"What is marketing all about?" - Thoughts on marketing from a developer and rookie marketer
Continuous reinvention: A brief history of block storage at AWS
An unordered list of hidden gems inside NixOS — kokada
Running an LLM on a simple Raspberry Pi
.:: Phrack Magazine ::.
Cache Grab: How Much Are You Leaving on the Table? – CSS Wizardry
Reckoning: Part 2 — Object Lesson - Infrequently Noted
VHS to Digital
An underrated software engineering interview question – Jake Zimmerman
That's the Sound of Devs Working on the Chain Gang
How I won $2,750 using JavaScript, AI, and a can of WD-40
Why I am stuck using Dropbox?
Vector Stores Are Dumb - Tim Kellogg
Hacking a VoIP Phone
Details about METR’s brief initial evaluation of GPT-4o
CrowdStrike: Risk assessment is better off at the sharp end
Dual-Boot NetBSD And Archlinux
Tony Hawk's Pro Strcpy
1fps.video - Hassle-free Screen Sharing
Leaving Stripe: Parting Thoughts
LLM-centric Software Paradigms
A primer on how End-to-End Encryption IS NOT PREVENTING policing, arrest, or conviction of the rioters in the UK race riots (HT @shashj @DmitryOpines @AntiRacismDay @arusbridger)
Linux backup workflow for hackers with restic, rclone, Backblaze B2
Create your own DIY Password Manager with Vim and Syncthing
You Can't Spell WebRTC without RCE - Part 1
Against XMPP+OMEMO - Dhole Moments
Netninja.com
Advice to Young Engineers - Robotic Sea Bass
2024-07-31 just disconnect the internet
On software as an "in-discipline"
Why are open source nonprofits so weird?
Windows resiliency: Best practices and the path forward
Why can't I stop eating?
The New Internet
Quantifying Prospective Jobs
NuGetAudit 2.0: Elevating Security and Trust in Package Management - The NuGet Blog
Panic! at the Tech Job Market
Software is more like a garden
ComplexType vs JSON Columns: Choosing the Right Data Storage Approach
Samsung Galaxy NX: a decade's review
Writing GUI apps doesn't have to be painful
Not so Secret: Analysis of KakaoTalk's Secret Chat E2EE Feature
Pretty pictures, bootable floppy disks, and the first Canon Cat demo?
Building a WoW server in Elixir
The Experience of Deploying Next.js Apps on Cloudflare
system logs aggregation with postgres
The Tragedies of Reality Are Coming for You
Exploring TLS certificates and their limits
Using aerc-mail with Outlook
Announcing SSMS 20.2 ... and getting feedback for SSMS 21
Evict Your Darlings: Banish dotfiles from your home directory
gRPC Over HTTP/3
Extrinsic Hallucinations in LLMs
How LLMs Learn: What We Know, What We Don't (Yet) Know, and What Comes Next
Machine Learning and the triumph of GOFAI
Ente - Private cloud for your photos, videos and more
17 vulnerabilities in Sharp Multi-Function Printers
I Have No Constructor, and I Must Initialize
Batteries: how cheap can they get?
Proton launches its own version of Google Docs
Binary Classification Using LightGBM -- Visual Studio Magazine
Amateur Mathematicians Find Fifth ‘Busy Beaver’ Turing Machine | Quanta Magazine
Ladybird
Creating hashes in .NET
Exorcising us of the Primer
Ladybird
Automating my gate door
Do a firmware update for your AirPods – now – Jonas’ Blog
Mako - Mako is Now Open Source
Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
A Eulogy for DevOps
Rabbit hole full of hardcoded credentials by Mārtiņš Irbe
Skip and Kotlin Multiplatform
My .gitconfig file dissected | Kiran Rao
On Claude 3.5 Sonnet
Y292B bug
Training a 70B model from scratch: open-source tools, evaluation datasets, and learnings
Cognitive Architectures for Business Decision Making in Supply Chain Management
Why I attack
Profiling with Ctrl-C
How I Organize My Work As a Solo Founder
Why strand.spreen.co is Now Offline
How to Build a Fullstack Webapp with F#
How my weekend project turned into a 3 years journey
Inside the tiny chip that powers Montreal subway tickets
quackland.kr
Exploring How Cache Memory Really Works
Ladybird browser spreads its wings [LWN.net]
Curating my Corner of the Internet with a freehand web editor
EU Council has withdrawn the vote on Chat Control
Why and how to run your own FreeBSD package cache.
Chat Control: The EU's CSEM scanner proposal
What is HSTS and why is it in my ASP.NET Core app?
Hack the Hacker - How to Setup an SSH Honeypot
Chat Control Must Be Stopped – Now!
Chat control: incompatible with fundamental rights
GitHub - nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
What You Get After Running an SSH Honeypot for 30 Days
Update on the Recall preview feature for Copilot+ PCs
Land value tax in online games and virtual worlds: A how-to guide
My experience crafting an interpreter with Rust
cr.yp.to: 2024.06.12: Bibliography keys
How To Encrypt ASP.NET Core Route Parameters
Solene'% : OpenBSD extreme privacy setup
Blog - Private Cloud Compute: A new frontier for AI privacy in the cloud - Apple Security Research
From Chaos to Clarity: My Journey with Obsidian
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog
So You Want To Build A Browser Engine
12 years of the com.lihaoyi Scala Platform
0.13.0 Release Notes ⚡ The Zig Programming Language
When I Realized I Was Not That Guy
What is PID 0? · blog.dave.tf
Towards Federated Key Transparency - Dhole Moments
A Picture is Worth 170 Tokens: How Does GPT-4o Encode Images? - OranLooney.com
Bouncy Castle Cryptography Library for .NET - Code Maze
From Scratch - Generative Adversarial Networks
Blazor in .NET 9 Takes Shape (Preview 4 Highlights)
Encryption At Rest: Whose Threat Model Is It Anyway?
Attacking NIST SP 800-108
A beginner's guide to mapping arrays in EF Core 8 - .NET Blog
Even more Opentelemetry!
Rationalizing Latency Competition in High-Frequency Trading – Headlands Technologies LLC Blog
Encryption At Rest: Whose Threat Model Is It Anyway?
Setting up a local reverse proxy on Proxmox with Traefik and Cloudflare
Majority for chat control possible – Users who refuse scanning to be prevented from sharing photos and links
Lizzy Banks. This story must be heard.
Make Chrome go brrrrrr....
htmx: Simplicity in an Age of Complicated Solutions
Moving Beyond Type Systems | Vhyrro's Digital Garden
Recall: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible.
What We've Learned From A Year of Building with LLMs
Things you wish you didn't need to know about S3
Building a serverless secured dead drop
Length Extension Attacks | Tiago Neto
Startup Risk
Opinion: Ottawa wants the power to create secret backdoors in our networks to allow for surveillance
re: Secure Drop protocol
Web App Security—Broken Authentication vs Session Management
Demystifying Golang Slices
Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs
Understanding Coupling in Software Development
Windows Recall sounds like a privacy nightmare – here's why I'm worried
Going Dark: The war on encryption is on the rise. Through a shady collaboration between the US and the EU.
The Decorator Pattern in Modern C# [2024]
Mathematics and literature, really?
Designing a Scalable OCPP server - Siddharth Sabron
Build android apk from command line without gradle
The WAF Swiss-Knife – Pomba Labs
Thinking out loud about 2nd-gen Email – Gabriel Sieben
Stuff I know about ZIP | orchid.pink
New in .NET 8: ASP.NET Core Identity and How to Implement It
100 Exercises To Learn Rust
BashFu - Open X11 window with netcat, echo, pipes and file system
Localizing a .NET console or desktop application
Wolverine’s HTTP Model Does More For You
🚲 alden.page
16 years of CVE-2008-0166 - Debian OpenSSL Bug
PeaZip free archiver utility, open extract RAR TAR ZIP files
Dancing on the Shoulders of Giants
using golang's crypto/aes and crypto/cipher packages
Disaster recovery with ZFS and zrepl
Proton Mail Discloses User Data Leading to Arrest in Spain
CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
Deniable Encryption
Conservative codomain conjecture
Using age with org-journal
Hallucination-Free RAG: Making LLMs Safe for Healthcare
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
My Home Server Journey - From Raspberry Pi to Ryzen
No, I don’t want to fill out your contact form
Deniable Encryption
Cost efficient alternative to databricks lock-in | Georg Heiler
Woodworking as an escape from the absurdity of software
Multi-Class Classification Using LightGBM -- Visual Studio Magazine
Ansible is a Lisp
Online Cryptography Course by Dan Boneh
The Disappearance of Lived Time
How to Train Diffusion for Text from Scratch
Direct Preference Optimization Explained In-depth
Verifying Slack Requests in Phoenix
Lateral Thinking: examples of creative solutions
1000x the telemetry at 0.01x the cost
the Stabilizer Problem
The Simplest Thing In The World: Modifing Keymaps in Wayland
Harry Chapin and RATM: the problem with bleeding interests
Anneal autopsy
C isn’t a Hangover; Rust isn’t a Hangover Cure
open letter to the NixOS foundation
What is the Metropolis algorithm?
Id30 – magnushoff.com
Good Ideas in Computer Science
Why you shouldn't run a BSD on a PC
Why Everything is Becoming a Game
10x Engineers vs -10x Burdens
GoFetch: Will people ever learn?
How do electronic passports work? | Burak Can's Blog
Basic Things Mar 22, 2024
Diffusion Models for Video Generation
I launched a new startup and shut it down in two weeks - Andrew Miracle
Big Integer in Zig
#ChatControl: EU ministers want to exempt themselves
Is Attention All You Need?
PuTTY vulnerability vuln-p521-bias
The Making of Side 7 | GUNDAM EVOLUTION Private Server Project
What is OpenID Connect Authentication? A Practical Guide - Developer Friendly Blog
Building a GPS Receiver, Part 1: Hearing Whispers
Responses to Rabble on ActivityPub
The golden rule of PR reviews
Kaspersky analysis of the backdoor in XZ
Common pitfalls of digital health startups & advice on how to avoid them
Our Response to Hashicorp's Cease and Desist Letter | OpenTofu
Nightmare on Lemmy Street (A Fediverse GDPR Horror Story) - Michael Altfield's Tech Blog
Deploy SOPS Secrets with Nix - Jan-Philip Loos | maxdaten.io
Extracting curve coordinates from a bitmap
Habitually - I’ve Been Tracking Everything in My Life for A Year
How I discovered a 9.8 critical security vulnerability in ZeroMQ with mostly pure luck and my two cents about xz backdoor
What it’s like to run HTMX in Production
Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux
smeso - MIPS stacktrace: an unexpected journey
How to securely reverse-proxy ASP.NET Core web apps
'If this one guy got hit by a bus, the world's software would fall apart.'
Generative transformer from first principles in Julia - Lior Sinai
OpenBSD 7.5
xz backdoor - Dmitry Kudryavtsev
LLM Task-Specific Evals that Do & Don't Work
Performance insights: Engineering for high performance
XZ Backdoor: Not the End of Open Source
Automatic differentiation with dual numbers
What we know about the xz Utils backdoor that almost infected the world
GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
LLaMA Now Goes Faster on CPUs
Refurb weekend: Data General/One (and the worst LCD in the world)
Mental Health in Software Engineering
xz/liblzma: Bash-stage Obfuscation Explained
Tell the LLM the business context
Filippo Valsorda (@filippo.abyssdomain.expert)
Urgent Alert: Stealthy Backdoor Discovered in XZ Compression Utilities - Cyber Kendra
security - backdoor in upstream xz/liblzma leading to ssh server compromise
Solving the “Are You a Millionaire?” Problem with ZK certificates
Notes on EndeavourOS
Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing
Malicious email .ics attachments
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms - Computer Security Group
Protect your ASP.NET site using WebAuthn Passkeys
GitHub - janmojzis/tinyssh: TinySSH is small server (less than 100000 words of code)
Sealed: Custom Wax Seal NFC Tags
My 12 Favorite Problems
Roll your own ZFS NAS
Knee Deep in tree-sitter Queries
A better jittering approach for discretization acknowledgment in density estimation
The Linux Desktop Is Finally Great (both Ubuntu and Firefox)
IP Geolocation Is Twenty-Five Years Old
Senior Security Analyst, Threat Intelligence in Remote, United States | GitHub, Inc.
How I Built a Bootstrapped Consulting Company: From Zero To 60k€ Revenue
All the fallacies in the world
JIT WireGuard
Functional foundations ⚙️
Securing WebSocket Channels in Local Development: A Guide with Soketi and Laravel Valet - AhmadYousefDev
Conversational Spaced Repetition | David Bieber
Building For Builders - deven.codes
Cloning a laptop over NVME TCP
Plugin Architecture in C# for Improved Software Design
C and C++ Prioritize Performance over Correctness
ZK Taipei #5: ZK Day · Luma
S06E12 - nanoFramework: Unleashing the Power of C# in Embedded Systems and IoT with José Simões
Make your own E-Mail server - FreeBSD, OpenSMTPD, Rspamd and Dovecot included - Part 1
A Primer On Randomness
Zama's homomorphic encryption tech lands it $73M on a valuation of nearly $400M | TechCrunch
The Pile
Parallel Zero-knowledge Virtual Machine
The Nature of Technology Book Review
Azure Cosmos DB — Getting Started and Creating a NoSQL Database
An Overview Of Quantum Computing's Possible Impact On Cryptography
The Case Against Geometric Algebra
Ente - Private cloud for your photos, videos and more
List of 2024 Leap Day Bugs
Mocking authorization tokens with WireMock.NET
CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info
GitHub - microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
The Linux CNA – Red Flags Since 2022
How law firms and corporations are dealing with USPTO’s non-DOCX penalty
Why I use Firefox
Bcrypt Hash Generator & Verifier
Nintendo is suing the creators of Switch emulator Yuzu
Gemini server for 0ut3r.space
Writing is hard, so I got help
The Effect Existence, Its Magnitude, and the Goals
GitHub - zksecurity/zkBank: zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!
How Does BlueSky Work?
Persisting the ASP.NET Core Data Protection Key Ring in Azure Key Vault – Tore Nestenius
ARCHITECTURE.md
Jan-Piet Mens
Language Checklist
System.IO.Hashing 8.0.0
ESP32 based voice assistant with wake word – Tristam
OK-Robot: What Really Matters in Integrating Open-Knowledge Models for Robotics
After 14 years in the industry, I still find programming difficult
The Billion Row Challenge (1BRC) - Step-by-step from 71s to 1.7s
ZK Mini Summit · Luma
What is Scrum and is Scrum good for startups? — todo.space blog
Large Language Models Are Drunk at the Wheel
Interesting Uses of Ansible’s ternary filter
Atuin - Magical Shell History
Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
Open Source: Current State and Future Hopes
Using Azure Key Vault for signing and encrypting JSON Web Tokens
Introducing Safecat
How Google is killing independent sites like ours - HouseFresh
ActivityPub Server in a Single PHP File
Diseconomies of scale in fraud, spam, support, and moderation
Using a CSP nonce in Blazor Web
Share a private key without using passwords
Plus and Times Set Free
AMD and ZPrize using FPGAs to Accelerate Zero Knowledge
Muse retrospective · Adam Wiggins
Tech Support Stories Part 2
How I did the layout for my self-published book
Climbing out of the rabbit hole
E2EE on the web: is the web really that bad?
varoa.net | Galo Navarro
Episode 486 - Azure Savings Plans
A love letter to the Internet
Synthetic Data for Finetuning: Distillation and Self-Improvement
Secure Yo Self
European Court of Human Rights bans weakening of secure end-to-endencryption - the end of EU‘s chat control CSAR mass surveillance plans?
Engineering Practices for LLM Application Development
Hello world, and the future for PyO3
I worry our Copilot is leaving some passengers behind
Sign and Verify Messages with HMAC Using the Web Crypto API
Lunar reflections during SLIM landing – Daniel Estévez
Episode 485 - Copilot for Azure
Ransomware Hit $1 Billion in 2023
Does it matter where you live?
'Prompt Engineering' Jokes Abound when GitHub Asks Devs for Tips -- Visual Studio Magazine
How to Get the Number of Files in a Folder With C# - Code Maze
.NET Rocks! gRPC Update with Irina Scurtu
How to Use Dapper in Your .NET Projects
From Zero to .NET MAUI: Seeking One Codebase to Run Everywhere -- Visual Studio Magazine
Reverse engineering Skylanders' Toys-to-life mechanics
The Noise Protocol Framework
(Mis)estimation – why estimation does not work
Go 1.22 Release Notes - The Go Programming Language
Introducing Citrea: Bitcoin’s First ZK Rollup
Finding New Mountains to Climb
When sorting your data costs more than cracking AES-128
Tools and Best Practices for Secret Management in .NET - Code Maze
Hacking a Smart Home Device
Remaking the app store — Benedict Evans
Issue 46: Is Being Well Read Actually a Thing? Pt III: The Well-Read Archetypes
A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
Infrastructure: From Zero to Enterprise
Reverse-engineering the Synacor Challenge
Embracing Functional Programming in C#
Your Security Program Is Shit
The end of my childhood
The ultimate guide to Full Disk Encryption with TPM and Secure Boot (with hibernation support!)
The end of my Elastic/optimyze journey ...
Snowpipe Streaming Deep Dive
Self-hosted media center
Why Certificate Lifecycle Automation Matters
Playing with Nom and parser combinators
Supporting modern https on Windows XP
Error categories and category errors
41 Years in UX: A Career Retrospective
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
Crypto is not cryptocurrency
Crypto is not cryptocurrency
Unleashing the Cloud: A Historical Odyssey of Cloud Storage
Want to learn more about zkBitcoin? I've made some videos
Rclone syncs your files to cloud storage
What I Learned from Indie Consulting - jxnl.co
Ruby on Rails load testing habits
zkBitcoin: Zero-Knowledge Applications for Bitcoin
GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
2023 letter | Dan Wang
Corax, Lucene, Benchmarks and lies!
The ZK update conflict issue in multi-user applications
Zero-knowledge proofs in stateful applications
Public Key Encryption with the JavaScript Web Crypto API
Being Intentional in 2024
zero-knowledge proof apps on Bitcoin
Improving ASP.NET Core Security By Putting Your Cookies On A Diet – Tore Nestenius
Learn to code. Or don’t.
There is still cool stuff on the internet
Ceph: A Journey to 1 TiB/s - Ceph
GitHub - sigma0-xyz/zkbitcoin: zkBitcoin: zero-knowledge proofs on Bitcoin!
Nethermind client: 3 Experimental Approaches to State Database Change
Fine-tuning an LLM on your texts: part 2 - exploring your text data - Edward Donner
RSA is deceptively simple (and fun)
OpenAI drops ban on military tools to partner with the Pentagon | Semafor
Postgres password encryption without leaking credentials
Maybe don't use Blake3 on Short Inputs
NixOS on Hetzner Dedicated - mhu.dev
Exploring .NET frozen segments
Episode 484 - Production LiveSite Review
High-speed 10Gbps full-mesh network based on USB4 for just $47.98
Authenticating a .NET GitHub App using a JSON Web Token (JWT) - Steve Gordon - Code with Steve
The Best C# Books For Beginner Developers: Top 6 Picks
asmBB Forum "What is AsmBB?"
The Slow Frontier of Genetic Choice
What's out there for ECDSA threshold signatures
</> htmx ~ Is htmx Just Another JavaScript Framework?
The ZK update conflict issue in multi-user applications
JSON Web Tokens are actually great, just not for sessions
Smartphone
Outlook is Microsoft’s new data collection service | Proton
Binius: a Hardware-Optimized SNARK
SSH-Snake: Automatic traversal of networks using SSH private keys
Language Modeling Reading List (to Start Your Paper Club)
Gmail And Yahoo Inbox Updates & What They Mean For Senders | Mailgun
Released: Security updates for Microsoft.Data.SqlClient and System.Data.SqlClient
runtime/src/libraries/System.Net.WebSockets/src/System/Net/WebSockets/WebSocket.cs at 1d5f483fa4344328fb85fd67fc482b70b31e6c4d · dotnet/runtime
Tokenization, or How I Learned to Stop Worrying and Love the Vault
What Is Linux Mobile
Nino
1BRC in .NET · gunnarmorling/1brc · Discussion #44
Questionable Advice: “My boss says we don’t need any engineering managers. Is he right?”
Artificial Knowledge Creation
You shouldn’t run NSA-grade Wi-Fi at home. Here’s how to do it
How Standard Ebooks serves millions of requests per month with a 2GB VPS; or, a paean to the classic web
Add sample of integrating client apps (WinForms & WPF) into an Aspire app by DamianEdwards · Pull Request #78 · dotnet/aspire-samples
RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)
.NET 8 — New Randomness Methods
Hacking a CTF: Do not use ECB mode for encryption
How to Speak the Language of the Internet: A Introduction to the Most Common Network Protocols
Major performance (I/O?) issue in /mnt/* and in ~ (home) · Issue #873 · microsoft/WSL
Mozilla CEO wants business to pick up the pace
Trustlessness and the left
Aleo completes security audits of snarkOS & snarkVM
How to Format a String as Base64 in CSharp – Beginner’s Guide
Compiling Success: My Aspirations for a Transformative Year Ahead - Chris Woodruff's Blog
GitHub - ublue-os/bazzite: Bazzite is an OCI image that serves as an alternative operating system for the Steam Deck, and a ready-to-game SteamOS-like for desktop computers, living room home theater PCs, and numerous other handheld PCs.
How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT
commit signing in 2023 is kinda wack
The Art of HPC
Linux Boomers
What if I paid for all my free software?
EP 38 : How to use Guard Clauses in C#
"Attention", "Transformers", in Neural Network "Large Language Models"
Security at Startup
xmas.c, 1988
Update in Thrussh: the SSH Terrapin attack
Don’t Believe Your Eyes - A WhatsApp Clickjacking Vulnerability
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Beeper - Moving Forward
Episode 482 - Network Watcher
Announcing the Aleo Foundation
New capabilities help simplify and streamline the experience with Microsoft Dev Box
Empirically sup code review best practices
Colliding Secure Hashes | Blog
GitHub - francoismichel/ssh3: SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/pdf/2312.08396.pdf
Steering at the Frontier: Extending the Power of Prompting - Microsoft Research
Bricked Xmas
ZFS Profiling on Arch Linux | Bin Wang
Announcing the first Arecibo release
How to Get an Access Token from HttpContext in ASP.NET Core
htmx is a erlang
Kubernetes v1.29: Mandala
Adopting Rust: the missing playbook for managers and CTOs - Mainmatter
Architecting Observability in a Cloud-Native World With eBPF
Demystifying OpenID Connect’s State and Nonce Parameters in ASP.NET Core – Tore Nestenius
Good Docs Take Great Effort
GNU ASCII armor: send encrypted data in plain text
Beeper Mini Is Back
RFC 9330: Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture
6 lessons from building 6 projects, while nomading for 6 months - Dmitry Kudryavtsev
zkLogin | Sui Documentation
GitHub - openbao/openbao at development
Why Team Leaders Give Up
Unveiling secrets of the ESP32: creating an open-source MAC Layer
💸 Sending a file in 2017 | Zack Scholl
iMessage, explained
Beeper Mini - iMessage on Android
bips/bip-0341.mediawiki at master · bitcoin/bips
I Hacked Magic the Gathering: Arena for a 100% Winrate
Recursive zkSNARK Proof as a Private Input - What Is Visible To The Verifier?
I Started With Nix, NixOS, Home Manager and Flakes
Monocypher 4: The Clean Break
Remote collaboration fuses fewer breakthrough ideas? Probably not.
Vicyyn - Simple Obsidian System for 99% of Your Needs
EP rejects mass scanning of private messages - European Digital Rights (EDRi)
Y Combinator's Future in the Software Slowdown
I got top 20 on my first product hunt launch by doing a homework assignment
How to Fund FOSS, Save It from the CRA, and Improve Cybersecurity
Restic Backups on Backblaze B2 with NixOS
Exploring Generative AI
My Personal Data Backup Pipeline – Justin Paulin
construct0, the first steps of an organisation with great aspirations.
Matrix vs. XMPP | Luke's Webpage
My techno-optimism
Demystifying Web Push Notifications
Analyzing the Monoprice Blackbird HDCP 2.2 to 1.4 Down Converter
Communication Ministry studying report of IndiHome data leak - ANTARA News
Discover the Magic of .NET 8 and Beyond!
Docker Security Principles Overview - Simple Talk
Cookies, Tokens, or JWTs? The ASP.NET Core Identity Dilemma
Finding My Voice: Brain Injury and ChatGPT | t3chn0tix - Tech News
“Shift left”—wtf does it mean?
Sqids (formerly Hashids) · Generate Short IDs from Numbers
The Bond villain compliance strategy
All that Infocom interpreter code
Exploring what is inside the ASP.NET Core cookies – Tore Nestenius
How STARKs work if you don't care about FRI
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
Things Programmers Can Do in One Week | Blog | build-your-own.org
What Is Refactoring And Understanding Why You Need It
Password Breach of Game Developer Zynga Compromises 170 Million Accounts - CPO Magazine
Back up your Bitwarden vault in a future-proof and secure way
Exploring macOS private frameworks
Practical Tips for Finetuning LLMs Using LoRA (Low-Rank Adaptation)
Things Programmers Can Do in One Week | Blog | build-your-own.org
ConcurrentStack in C# - Code Maze
Cryptographers Solve Decades-Old Privacy Problem
Sunbird Security Isn’t Nothing
Sunbird / ‘Nothing Chats’ is Not Secure.
All of the writing I did in a week as a software engineer
Every software is messy and has skeletons
Signal Messenger: Using Signal Will Soon Cost $50 Million a Year
Mainframe and midrange modernization - Azure Logic Apps
Built a bunch of apps, here's what I learned
Privacy is Priceless, but Signal is Expensive
Fiat-Shamir security of FRI and related SNARKs — Part 1
The OSI Model Revisited
Making a nice API of Amtrak's ugly API
Data-as-a-Product: the keystone of the data-mesh
Is the Reversal Curse Real?
CryptoKitchen23 ZK Day: Private Entrance to the Kitchen & The Ultimate Use Cases · Luma
Child sexual abuse online: effective measures, no mass surveillance | News | European Parliament
Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
Read the docs like a book - Aaron Francis
Frameworks Cover Up Skill Issues, And That's a Good Thing | jakelazaroff.com
Building an occupancy sensor with an ESP32 and a serverless DB
OpenAI Platform
HSG: Funded PhD student in Applied Cryptography & Privacy-preserving authentication (m/f/d) (m/w/d)
Data Oriented Blogging
An important step towards secure and interoperable messaging
Blockchains and the Future of AI
Release CoreWCF v1.5.1 · CoreWCF/CoreWCF
Comparing Portugal and Oregon's drug decriminalization policies — Jeffrey Martens
Hare aims to become a 100-year programming language
A clarification on the multithreading constraints of the EncryptMessage function - The Old New Thing
Ombudsman: European Commission’s concealment of secret ‘expert list’ on CSAM regulation constitutes ‘maladministration’ - Irish Council for Civil Liberties
Article 45 Will Roll Back Web Security by 12 Years
Seeing like a Bank
Live Coding a containerized web app for event management
2023-11-04 nuclear safety
Social Networking
GitHub - davidchisnall/banning-e2ee-is-stupid: Do you think banning end-to-end encryption is plausible? Think again.
Why I Ran Away from Philosophy Because of Sam Bankman-Fried
Your Loved Ones Are Prisoners, and You Made the Chain
Getting our focus back
Issues enabling BitLocker hardware encryption (Windows Encrypted Hard Drive) on AMD 7840
Episode 477 - Azure cloud within a cloud
Mechanistic interpretability of LLM analogy-making
Last Chance to fix eIDAS
Using WebAuthn for non-repudiation
Giopler | Easy C++ Profile Debug Trace
Why I Am a Pluralist
How To Rob a Bank
General Knowledge Poker — Drawn In Perspective
Self-Signed locally trusted certificates with cert-manager
An Open Letter to Cryptographers: Please Work Together
Have I Been Pwned: API v3
.NET 8 Top 10 New Features - NDepend Blog
Why is there a hash of a weak password in the Windows cryptographic libraries? - The Old New Thing
Lifespan extension: separating fact from fiction
Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider
Azure: the cloud platform that is changing the world
From CSS madness to CSS Hooks
An Analysis of Signal's PQXDH
A billion deaths at two degrees? Why climate activists should make a special effort to get the science right - Mark Lynas
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
Episode 476 - Azure HDInsight on AKS
Hampton Blog
AppSec loves Agile
How to Implement the Facade Pattern in C# for Simplified Code and Increased Efficiency
GitHub - localsend/localsend: An open source cross-platform alternative to AirDrop
Nobody knows what a good password looks like
Some concerns with OpenPubKey
SQL Server Security Primer - Simple Talk
Encrypt. Now. — blog.tripu.info
Creating a Variable Color Font From Scratch
'OpenBSD 7.4 released -- Oct 16, 2023'
Memory alignment of doubles in C#
Security: The Impact of Time
The Present Should Be Signed
SSH Hardening with ssh-audit
Intercepting Allocations with the Global Allocator
GitHub - jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Massive input and/or spaced repetition
LSP could have been better
Radical Energy Abundance
How I built a MVP in 14 hours
Drivechains: A Detailed Analysis
An Intuitive Explanation Of Hashing
The Linux Foundation Member Summit | Linux Foundation Events
Episode 294: Succinct Proofs and Linear Algebra with Guillermo and Alex - ZK Podcast
Polylang – Polylang by Polybase Labs
Strikeout (ꓘ) Blog - Security Researcher
How to Perform Case-Insensitive Substring Search in C#
Visual Studio 2022 17.8 Preview 3 is here! - Visual Studio Blog
Building an Anomaly Detection System with Recurrent Neural Networks
A Plan for Multicast Support in Noise-based Protocols - Dhole Moments
Observing OSIRIS-REx during the capsule reentry – Daniel Estévez
How Render Scaled Knative to Support 100k+ Free-Tier Apps | Render
Bitwise and Shift Operators in C#: A Deep Dive
Understand Linear regression through many facets
Announcing the $12k NIST Elliptic Curves Seeds Bounty
Store ssh keys inside the TPM: ssh-tpm-agent
Why HTTP/3 is eating the world | APNIC Blog
Converting a Hexadecimal String to a Byte Array in C# - Code Maze
Pythagoras: Everyone knows his famous theorem, but not who discovered it 1000 years before him - Journal of Targeting, Measurement and Analysis for Marketing
Security Tradeoffs: Privacy
How to Design a Practical Type System to Maximize Reliability, Maintainability, and Productivity in Software Development Projects / Part 1: What, Why, and How?
The inability to count correctly
I don't want to know IPs: encryption in TORRENTDYNE
A journey into zero-knowledge proofs
Episode 474 - Azure Chaos Studio
GitHub - reclaimprotocol/circom-chacha20
Reclaim Successfully Passed the ZK Circuit Security Audit
Buy wisely
Trusting Microsoft and .NET MAUI Toolkit NuGet Packages
Public report of Reclaim protocol's ChaCha20 circuit
Return to Office Is Bullshit And Everyone Knows It - Dhole Moments
Free Open source disk encryption with strong security for the Paranoid
Mozilla and the burning need for clients for power users
Making a Chromecast receiver · random hacks
Guide to Timescript
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
What the Birthday Paradox Teaches Us About Protecting Patron Privacy
zk中秋節 Taipei Meetup (Aleo x zksecurity) · Luma
Security in the cloud: Whose responsibility is it?
Finding Bathroom Faucets with Embeddings
On the future of cloud services and BYOC — Jack Vanlightly
Performance Improvements in .NET 8
Binding Sigmas in Circuits for Fast Curve Operations
Create Cryptographic Numbers With RandomNumberGenerator - Code Maze
Block reels on Instagram - Break The Scroll
Welcome to Birthday Week 2023
t3chn0tix - Your Source for the Latest Tech News
Distilling step-by-step: Outperforming larger language models with less training data and smaller model sizes
Nintendo 3DS Architecture | A Practical Analysis
Signal Messenger: Speak Freely
S6E02 - From Junior to Jedi: Navigating the Web Development Galaxy with Irina Dominte
What link previews leak | aaron blog
Matrix 2.0: The Future of Matrix
Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users
64-Bit Bank Balances ‘Ought to be Enough for Anybody’? | TigerBeetle
Inside New Query Engine of MongoDB
Zexe vs. VeriZexe vs. Taiga | Blog - Anoma
Quantum Resistance and the Signal Protocol
Exploring Generative AI
ESXi on SolidRun V3000
SimulaVR
Exploring The Halo 1 System Link Protocol
Nuclear Propulsion | Charles Pellegrino
How to get your startup ISO27001 certified in 2023, explained for cloud-native companies
Book notes & reflections: An Elegant Puzzle
The Blind Men and the Coin - Part I | Boaz Sobrado's Website
Mario Zechner (@badlogic@mastodon.gamedev.place)
ZK Security meetup with the Succinct Labs folks! · Luma
Kopia
Dymocks - Customer Notices
Onboarding Made Simple with zkLogin
Role Of Algorithms
Performance Improvements in .NET 8 - .NET Blog
Getting to Know Dapr with Mark Fussell and Yaron Schneider
Techniques for Checking Floating-Point Equality in C# - Code Maze
GitHub - TryQuiet/quiet: A private, p2p alternative to Slack and Discord built on Tor & IPFS
How AES Is Implemented
Notes on Self-hosted Transactional Email
The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog
GitHub - nginx/unit: NGINX Unit – universal web app server – a lightweight and versatile open source server project that works as a reverse proxy, serves static assets, and runs applications in multiple languages.
Learn the Basics of HTTP Web API - Coding Sonata
why not matrix?
How to Use Basic Authentication With HttpClient? - Code Maze
Top 10 Web Application Security Risks In Microsoft Azure And Ways To Mitigate Them | Build5Nines
Designing a 3D Printed Toy for My Son
A (Post-Pandemic) World Without Email
Episode 472 - Azure Vector Search Unveiled
Mullvad on Tailscale: Privately browse the web
Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium
Enable passkeys in .NET with Bitwarden Passwordless.dev | Bitwarden Blog
The future headwinds
Dunghill Anti-Pattern - Why utility classes and modules smell?
How to Write a Secure JWT Library If You Absolutely Must
Simulation extractable versions of Groth’s zk-SNARK revisited - International Journal of Information Security
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
The Ultimate Guide to Network Programming in C# 12 & .NET 8 - Chris Woodruff's Blog
Android 14 blocks all modification of system certificates, even as root
Deploying a Dapr Sidecar to Azure Container Instances
What 0 to 6 Months of Photography Has Taught Me
Support for custom headers for handshake · Issue #16 · whatwg/websockets
Introducing our summer '23 research seminars
Episode 289: Penumbra Catch Up with Finch, Erwan and Jen - ZK Podcast
Explaining The Postgres Meme
Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
Auditing ZK circuits for a living (with David Wong - ZKSecurity.xyz)
GitHub - starkware-libs/stone-prover
Announcing my new blog · Higashi.blog
Wii Architecture | A Practical Analysis
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
The History of Data with Ted Neward
End-to-end encryption with Proton Mail
Episode 290: Exploring, Teaching and Auditing ZK with David Wong - ZK Podcast
Listen to us on zeroknowledge.fm
Measuring Unicode String Lengths with C#
Choosing Apache Kafka For A New Project – A Questionnaire
Automata Part 1: Understanding Position Automata
BearerToken: The new Authentication handler in .NET 8 – Tore Nestenius
Zero-Knowledge Proof Research | Berkeley RDI
Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
Vacation Study Ideas
How to debug linux kernel API (syscalls issues)?
The Tale of a Corrupt Backup
Introducing ChatGPT Enterprise
Demodulation of the 5G NR downlink – Daniel Estévez
Cool & Unique Cryptography Features for Modern Sui DApps
You Should Be Working On Hardware
Blockchain Applications Stanford Summit
You like Circom but you find it confusing? Introducing Circomscribe
Detecting and blocking OpenAI crawlers | aaron blog
Detecting boomerang values in zero-knowledge circuits using tag analysis
Fiat-Shamir Security of FRI and Related SNARKs
How SNARKs fall short for FHE
Getting our focus back
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
Delendum-SBC Research Meetup
Penumbra Security Audits Q3 2023
Ergaster - Syncing Notes with Obsidian
An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful) · Graham Helton
Max Goodhart (@chromakode@mastodon.social)
Raspberry Pi x OpenWRT Travel Router – Tristam
Unlocking Discord Nitro Features for Free
Brenton Cleeland - Website Best Practices
Storing passkeys in password managers is okay, actually
Backing Up Personal Files with rclone
Exploring Generative AI
Exploring Generative AI
About GitHub Copilot for Individuals - GitHub Docs
Breaking The Mutant Language's "Encryption"
How Surround Sound for Headphones Works
Understanding Lasso and Jolt, from theory to code
North Korean Hackers Suspected in New Wave of Malicious npm Packages
Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point
How the Nintendo Wii Security Was Defeated
Short session expiration does not help security
EXCLUSIVE: Naomi Wu and the Silence That Speaks Volumes
Unity 4D #2: Extending Unity to 4D - Alan Zucconi
My bug finding chronicles (and how to earn money through vulnerability research)
Bare Metal Space Invaders
The BEST Moq Alternatives: NSubstitute vs FakeItEasy
Self-Discipline Examples That Don't Suck
Software Engineering at Google
Use protected browser storage in Blazor | BinaryIntellect Knowledge Base
HalvarFlake (@HalvarFlake@mastodon.social)
Azure Storage Account: Best Practices for Efficient and Secure Storage
Chris James - Practical ways to shift QA left
Reflections on Ten Years Past the Snowden Revelations
Defending Event Stages: Cybersecurity Threats in Sports | Security Insider
State-Issued Identifiers aren’t generally good passwords
Tailscale vs. Narrowlink | Narrowlink
Youtube-dl Site Goes Offline as Hosting Provider Enforces Court-Ordered Ban * TorrentFreak
GitHub - id-Software/quake2-rerelease-dll
Do Machine Learning Models Memorize or Generalize?
On Moq & SponsorLink: Some thoughts
Introducing per hostname TLS settings — security fit to your needs
Android 14 introduces first-of-its-kind cellular connectivity security features
Efficient Elliptic Curve Arithmetic in OpenSSL — Store Halfword Byte-Reverse Indexed
Go 1.21 Release Notes - The Go Programming Language
Humble Tech Book Bundle: Math for Programmers 2023 by Manning
Removing Randomness with LLDB
Everyday Scientist » Replace Peer Review with “Peer Replication”
Verifiable encryption on the Blockchain
0.11.0 Release Notes ⚡ The Zig Programming Language
My experience at the k-space hackerspace hackathon
Google’s Plan To DRM The Web Goes Against Everything Google Once Stood For
Patterns for Building LLM-based Systems & Products
The Worst API Ever Made
Shamir Secret Sharing
File distribution over DNS: (ab)using DNS as a CDN (eighty-twenty news)
I Paid Off $194k in Student Loans in Six Years. It Wasn’t Easy. - BJL
The Reluctant Sysadmin's Guide to Securing a Linux Server
Why do consultants invent words?
Containers in Azure Container Apps: Simplifying app orchestration with Sidecar and Init Containers
Understanding Python Numeric Data Types | Pro Code Guide
Digital Bum: Finding a Home/lessness on the Internet
The U.K. Government Is Very Close To Eroding Encryption Worldwide
Episode 468 - WordPress on Azure App Service
Worldcoin isn’t as bad as it sounds: It’s worse
Introducing GitHub Copilot X
Where are all the women?
The Power of Being New: A Proven Recipe for High Impact | Hazel Weakly
What We Know About LLMs (Primer)
Pre 2013 Data Breach - Forum Thread
How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
Women in Cryptography
RSA
Sharing encrypted data over short-form mediums
Announcing .NET 8 Preview 6 - .NET Blog
Attention Is Off By One
Zenbleed
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
Have I Been Pwned: API v3
Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
Plane - The open source project management tool
What does a CTO actually do?
Performance Improvements in .NET Core - .NET Blog
Announcing the .NET Framework 4.7.2 - .NET Blog
Announcing the .NET Framework 4.8 - .NET Blog
Announcing the .NET Framework 4.7 General Availability - .NET Blog
Announcing the .NET Framework 4.7 - .NET Blog
What Happened to Dolphin on Steam?
1 Introduction · Real-World Cryptography
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations | Eyal Ronen
Best crypto blog posts of 2017
Why Frustum Culling Matters, and Why It's Not Important
Tutorial 1: Hello World | Mina Documentation
Libsodium Audit Results
Live from OpenBSD in Amsterdam
ZK Security X Delendum (farewell SBC) · Luma
Episode 285: Intents with Chris Goes from Anoma - ZK Podcast
Sharing code between Deno and Node where Bun and ts-node failed
Distributed Trust with Service-to-Service Authentication
Why the “Null” Lifetime Does Not Exist
Store age identities inside the TPM: age-plugin-tpm
Setting up PostgreSQL with Ansible
I don't know how I feel about email
Bypassing Internet Censorship Using SSH
An Alternative Approach to Deep Tech VC
Jeremy Mikkola - What makes developers productive?
Fun with DNS TXT Records
PhpMyAdmin and Azure Database for MySQL server
Living Life as a B- Student
ZK Security meetup @ Lightspeed · Luma
Episode 467 - OneStream's plans for becoming more cloud native on Azure
17 misconceptions about SNARKs (and why they hold us back)
Cycles of curves: what are they and do we need them?
Base64 Class (System.Buffers.Text)
Regex Isn't Hard - Tim Kellogg
Put a Pin on That
.NET Framework July 2023 Security and Quality Rollup Updates - .NET Blog
Announcing .NET 8 Preview 6 - .NET Blog
Hacking LangChain For Fun and Profit - I
Euclidean Algorithm
EPAS
Azure Container Registry and Azure Container Apps: The Perfect Combination for Containerized Application Deployment
Episode 466 - Open AI
How to enable Bitlocker HW encryption with modern SSDs on system drive (e.g. Samsung 980 Pro)
A slack clone in 5 lines of bash
GitHub - zksecurity/noname: Noname: a programming language to write zkapps
The zero-knowledge attack of the year might just have happened, or how Nova got broken
bips/bip-0042.mediawiki at master · bitcoin/bips
Exploring how Magic Link works
VerusCoin, Everything that Ethereum Isn’t
Running on a high-speed rail
Backend development is more than writing endpoints for frontend
Alpha
Elevating C# Code Quality with Qodana: A Journey Towards Perfection | The .NET Tools Blog
Programming Languages Going Above and Beyond
Episode 465 - Functions on Azure Container Apps
How to do templates properly
Getting Started with API Management: A Beginner's Guide for Developers
Davide's Code and Architecture Notes - L4 vs L7 Load Balancer
Open at Microsoft: Dapr
Everything that uses configurations should report the values they are using (or: achieving persistence with a hidden SSH backdoor)
Blocking, covariate adjustment and optimal experiment design - Emir's blog
Semantic Kernel: Microsoft Answers Your Questions, Updates Docs for AI Integration SDK -- Visual Studio Magazine
My journey into Microsoft – Unstructed.tech
How to Hash Passwords with BCrypt in C#
Using encryption to verify a license key
Red-Teaming Explained: How does it reduce toxicity in LLMs?
Based-30b
You don't take enough risks to be lucky
How (not) to compare 2D scatter plots
How to deploy your deep learning side project on a budget
Reset passwords in ASP.NET Core using delegated permissions and Microsoft Graph
The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits
Working With Guid in C# - Code Maze
Securing Software Supply Chains with Zero Knowledge Proofs - Galois, Inc.
Why I Became an Instructor at Zero to Mastery - Claudio Bernasconi
Interesting links of the week 2023-24 (#76)
The ACME Protocol in Practice and Reality - Matt Holt
Announcing .NET 8 Preview 5 - .NET Blog
Introducing the defensive statistics | Andrey Akinshin
An America-less Internet
Latest Updates for Azure App Service Presented at Microsoft Build 2023
Reset user account passwords using Microsoft Graph and application permissions in ASP.NET Core
Casey Reeves (@xogium@tech.lgbt)
/home/halosghost/blog
Episode 124 - Breaking Up with Tech Debt: A Love Story with M. Scott Ford
Impagliazzo's Five Worlds
Memory Management in DBMS
Episode 464 - Azure Deployment Environments
Microsoft .NET Code Analysis: The Rijndael and Rijndaelmanaged Types Are Superseded
Understanding the Tech Right
Episode 463 - OneStream's journey to Azure
ZK app developers should be able to see down to the constraints
zkSecurity
Do in secret. Assert in public. Don't under-constrain your prover's witness computation in ZK programs
Generating income from open source
ZK programmability adds a whole new layer to worry about
Display Checkbox and Radio Button table column in ASP.NET Core | BinaryIntellect Knowledge Base
Open at Microsoft - Dapr
The Prickly Case of JavaScript Proxies
Privacy Enhancing Technologies: An Introduction for Technologists
Private delegated computation is here, and there will be bugs!
DASP - TOP 10
Unmasking SQL Server Dynamic Data Masking, Part 1, Intro - Simple Talk
On being paid to learn
Coin flips and most significant bits.
Using Nix with Dockerfiles
Building a baseline JIT for Lua automatically
Finding your weak spots
How to Use SFTP For Secure File Upload in .NET - Code Maze
Episode 462 - AKS LTS
Why we're bad at CSS
Free VPN Service SuperVPN Exposes 360 Million User Records
What's New for Azure App Service at Build 2023
backups (public)
How to get (micro) acquired?
Compress-a-Palooza: Unpacking 5 Billion Varints in only 4 Billion CPU Cycles
PGP signatures on PyPI: worse than useless
SELM: Symmetric Encryption with Language Models
Two Immortals
This Week In Security: .zip Domains, Zip Scanning
Malleable software in the age of LLMs
Understanding Passkeys
How to Unleash the Power of Multithreading in JavaScript with Web Workers
Assembling Community OS
Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust | Azure Blog | Microsoft Azure
The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication
Experimenting with multi-factor encryption
How to Understand Abstract Art
transparent polynomial commitment scheme with constant opening proof size and verifier time
Level up your GPT game with prompt engineering - .NET Blog
Fast hashing, it's not that simple
Testing a new encrypted messaging app's extraordinary claims
Is .NET Still a Legitimate Technology in 2023?
How to be a Unicorn Person
API Security Checklist: How to Protect Your APIs
Managing infrastructure on Hetzner Cloud using Pulumi | Timo Zander
Story: Redis and its creator antirez
Savoring Complexity. Embracing the Infinite
PV consumption optimization – the power of software defined devices
Using The Decorator Design Pattern in .NET
Collision, Randomization and Welzl's Algorithm
Why should we read Azure Security?
Episode 274: SNARKs: A Trilogy with Ariel Gabizon - ZK Podcast
What is Type-Level Programming? - sulami's blog
How to design your first Solution Architecture Diagram?
Real-time charts with Blazor, SignalR and ApexCharts
Crypto: My Part In Its Downfall
The right to encrypt
Radical Incrementalism
More Design Patterns For Machine Learning Systems
Using Multiple SSH Keys at the same time - GitHub, BitBucket, etc. | no dogma blog
How To Run .NET 6, Kestrel, and Web API, on an AWS EC2 Windows Instance | no dogma blog
How To Run .NET 6, Kestrel, and Web API, on an AWS EC2 Linux Instance | no dogma blog
Create a multilingual a to z list in C#
Episode 458 - Integration Patterns
Do We Still Need Journals?
Why is OAuth still hard in 2023? | Nango Blog
Dometrain - Homepage
Introduction to ASP.NET Core Minimal APIs | The .NET Tools Blog
Bea Stollnitz - How GPT models work
Funds of every wallet created with the Trust Wallet browser extension could have been stolen without any user interaction
Sending Signal messages
The Most Annoying Math Problem
SLP: a new DDoS amplification vector in the wild
Episode 457 - Data API Builder
Local license key verification - Theory
Manning
Internexit?
The Importance of TLS with SQL Server
Playing devil's advocate on claims made in VPN adverts
Why I joined Cloudflare as Chief Security Officer
Current Issues With The Qt Project - From The Outside Looking In
Get your app to Mars!
Message-Driven Architecture: Promoting Efficient and Scalable Communication
mjg59 | PSA: upgrade your LUKS key derivation function
Nintendo Switch game modding is illegal. – Gabriel Sieben
Hot Takes on the Modern Data Stack
Make It Memory Safe: Adapting curl to use Rustls
Data Driven Detection Engineering
What do Solution Architects do?
(The Futility of) Keeping Secrets from Yourself
How I fix flaky tests - Code with Jason
5 Ways for Enterprise Teams to Secure Their DevOps Pipelines in 2023
Why I quit being a tech "influencer" | Blog | Jack Domleo - Frontend & UX Developer
Prompt Engineering vs. Blind Prompting
Curiously Confused
TLS 1.3—What is It and Why Use It?
Understanding Parameter-Efficient Finetuning of Large Language Models: From Prefix Tuning to LLaMA-Adapters
Recipes For Product Failure: Obsess Over Competitors
Sponge API for Field Elements
‘Youtube-dl Hosting Ban Paves the Way to Privatized Censorship’ * TorrentFreak
Experimenting with LLMs to Research, Reflect, and Plan
Climate Tech Checklist
iconicexpress-mag.com (Powered by Qualys SSL Labs)
Rethinking Type I/II error rates
11 API Security Best Practices to Secure Your Business
OpenBSD 7.3
My Love/Hate Relationship with Cloud Custodian
GPT Voyage: Part 2
Linux and Baikal Electronics: Why Postgres Should not Follow that Path
Overconfidence, and Executives as Personality Defect — Ludicity
Do Less, Better (with leverage!)
What We Learnt Building the Largest GPT-Telegram Bot
If It's So Good, Why Isn't Everyone Doing It?
Towards a Nova-based ZK VM
Sponsored ISO standards for PDF technology
Outperforming Warren Buffet
Make Your CLI Demos a Breeze with Zero Stress and Zero Mistakes
irhum.github.io - Tensor Parallelism with jax.pjit
I Quit Programming (or did I?)
I Didn't Read 17 Books So You Don't Have To 😩
Crushing the Myth of Late-Stage Capitalism | Tom Dehnel
Unlimited Powers
Ben Howdle - Software Engineering Consultant and Advisor
Paillier's cryptosystem - Addtive homomorphic encryption
Paillier's cryptosystem - Addtive homomorphic encryption
Paillier's additively homomorphic cryptosystem
Paillier's cryptosystem - Addtive homomorphic encryption
So, You Want To Build A DBaaS
GitHub Quick Reviews
Permutation-based Cryptography 2023 – Lyon, France
Permutation-based Cryptography 2023 – Lyon, France
How to Review and Refactor Code with GPT-4 (and ChatGPT) — SitePoint
Nix Turns 20. What the Hell Is It?
Cuttings / Moving Away from Todoist - to Taskwarrior, SSH & Dropbox - Part 2
Nobody’s on the ball on AGI alignment
Breaking a PRNG: Is it Called Xor Shift or Xor Shit?
New for Devs in SQL Server 2022: Ledger for Blockchain-Backed Security -- Visual Studio Magazine
ChatGPT's Plugin System Poses an Existential Risk to the Open Web
Synology NAS Backups with Minimal Bus Factor
Education - Mutable Instruments Documentation
Zig And Rust Mar 26, 2023
Sparks of Artificial General Intelligence (AGI) in GPT-4
Building a DOS ChatGPT client in 2023
The Artificial in AI - Pravesh Koirala
Just update rules between neurons
Symbolic vs Connectionist Machine Learning
(PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok
Let’s Talk About TikTok - Black Hills Information Security
No more custom domains in Microsoft Outlook?
mjg59 | We need better support for SSH host certificates
We updated our RSA SSH host key | The GitHub Blog
None of Your Business - Why, I Wonder?
Implementing and Exploiting Cryptography
zkSummit - Zero Knowledge Summit
fhur
The Randomness Summit 2023 · Luma
Notes on FFTs: for users
Loading RSA Keys in .NET
Distributed Application Runtime (Dapr) v1.10 Released
Aria: A Fast and Practical Deterministic OLTP Database
Taipei HackerNews #4 - Zero Knowledge Proof: From 0 to 1
HaveIBeenPwned, DevSecOps, and Other Security Things with Troy Hunt
Head of Marketing
Geometry in Text-to-Image Diffusion Models
Microsoft.Bcl.Cryptography 8.0.0-preview.2.23128.3
Boosting password security! Pwned Passwords, zxcvbn, and more!
9 years of open-source database development
How I burnt out in FAANG, but it is not what you think
Is OpenBSD for you? - Marián Mižik
Sunsetting Aztec Connect
Three years all-remote at GitLab: Know the unknown unknowns (growth, life, and work)
Sapphire Rapids: Golden Cove Hits Servers
cURL, the omnipresent data tool, is getting a 25th birthday party this month
QR Code Generator in Laravel 10 Tutorial
Losing Signal
Daily links from Cory Doctorow
My Backup Strategy
The Kids are Not Okay
Tech Notes: Polymorphic shellcode
Announcing new security and observability features in Azure Database for PostgreSQL
Were We All Gaslit About Content Being King?
Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
Warnings-as-errors friction
Veraport: Inside Korea’s dysfunctional application management
I made JSON.parse() 2x faster
Caveat Implementor! Key Recovery Attacks on MEGA
TimeSpan in C# - Code Maze
Cryptography without Security - Cronokirby
Quantum computing shorts
zk-SNARK Concepts Explained Like You’re 15
Block Breakers
ChatGPT Explained: A Normie's Guide To How It Works
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
Use GNU Emacs The Plain Text Computing Environment
Digital Market Act workshop in Brussels
Overview | Mina Documentation
zkVMs are cool, but have you heard of zkCPUs?
How To Deploy EF Database Migrations
Database Cryptography Fur the Rest of Us - Dhole Moments
On mindsets, mind shifts and wins
Dealing with the unknown
Thief in the car
LattePanda V1 - my experience with a Raspberry Pi alternative
Zero-knowledge proof composition and recursion. Part 7: Deferred values
Zero-knowledge proof composition and recursion. Part 8: Hashing in public input
Zero-knowledge proof composition and recursion. Part 9: BCTV14 paper walkthrough
On Relearning to Code as an Adult
Zero-knowledge proof composition and recursion. Part 6: cycles of curves
Convert a File to a Byte Array in C# - Code Maze
Cryptography 101 - PHINUG Online Dev Sessions 2023.03
A new series of videos on zero-knowledge proof composition and recursion (part 1)
Real-World Cryptography, a bit more than a year later
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
Developer Relations
Cryptography Attacks and Defenses, Reloaded
NixOS as a server, part 1: Impermanence | Guekka's blog
Episode 454 - Sustainability and Azure
what is the randomart image for?
Getting faster to decisions in A/B tests – part 2: misinterpretations and practical challenges of classical hypothesis testing
Asking ChatGPT to Design Its Next Generation, ChatGPT 2
『 0x61 』- /var/log
Sangria: a Folding Scheme for PLONK - Geometry Research
Haiku Package Management
Why did all of the public reproduction of GPT-3 fail? In which tasks should we use GPT-3.5/ChatGPT?
How Safe is the Cloud? What Businesses Need to Know
Lessons Learned from Re-rolling 60+ Production Credentials
Gamebert: a Game Boy emulator built by Robert | Robert Heaton
<div style="max-width: 480px;">What Is ChatGPT Doing … and Why Does It Work?</div>
Google’s Fully Homomorphic Encryption Compiler — A Primer
Using Cell Phone Sensors for 3D Transformations – Ramatak Inc.
Novel Proofs of the Infinitude of Primes
Are ASP.NET and .NET the Same? Understanding the Key Differences and Similarities
Keeping up with The Thiel Fellows
<3 Deno Feb 12, 2023
The unsafe language doom principle
CVD, EU-DSGVO and revDSG - A personal responsible disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
My most important email filter that helps me control my chaos
The Joy Of Duplexes
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
[Apply by 02/15] Future Computing Research Workshop
Episode 453 - In the Real World
Challenges 7-12: Implementing and breaking AES ECB
Contributing to open source projects and about learning zero-knowledge proofs
The KZG/Kate Polynomial Commitment Scheme
Ian Norris - Blog - Understanding the limits of large language models
.NET Security Headers: A Senior Developer’s Guide✨
Reversing UK mobile rail tickets
Episode 115 - How We Got Into Security with Ashley Burke, Karla Reffold, and Divya Mudgal
Python’s “Disappointing” Superpowers
Ten Years, Ten Highlights: Reflections on My Decade at Sumo Logic
Anker admits to lying about Eufy security camera encryption; describes future plans
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
Various Ways of Sending Mail via SMTP
My first recession
Episode 261: Proofs, Arguments, and ZKPs with Justin Thaler - ZK Podcast
Fuzzy API composition: querying NBA stats with GPT-3 + Statmuse + Langchain
Can GPT-3 Solve CTF Problems?
Deciphering my Dead Mother’s Cipher
Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
Making sense of TypeScript using set theory
Encrypting Data in the Browser Using WebAuthn
Introducing Zero to Nix — Determinate Systems
How to debug
Bitwarden design flaw: Server side iterations
Degrees of Open Source
1.4 Million Autotrader Users EXPOSED, IntelBroker Posts Details on Dark Web
How to Implement Google Authentication in Next with NextAuth
Implementing Zero Trust: A Guide to Securing Your Data
How You Respond to Security Researchers Says Everything About You - Dhole Moments
An incomplete guide to stealth addresses
Securely store secrets in Git using SOPS and Azure Key Vault
zkalc: a cryptographic calculator | EF Cryptography Research
Breaking EA Desktop's pathetic Encryption
How 1Password is designed to keep your data safe, even in the event of a breach | 1Password
Zero Knowledge Proofs MOOC
Some thoughts on the ETH's Threema Analysis
The Best GPUs for Deep Learning in 2023 — An In-depth Analysis
zkIgnite, Cohort 1 Program Overview
What's the deal with zkapps?
The PLONK zero-knowledge proof system
How to Secure Your .NET Application Against Common Threats
Terraform Industries Whitepaper 2.0
.NET 7 Brings Networking Improvements
Implementing secure Microsoft Graph application clients in ASP.NET Core
Encrypting and Decrypting a String in C# - Code Maze
Profiling .NET on Linux with BenchmarkDotNet
Episode 451 - Landing Zones
Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research - CPO Magazine
Machine Learning in .NET with F# and ML.NET 2.0
What is Zero Trust and is it the Future of Cybersecurity?
ZK System Benchmarking
Writing a TLA⁺ tree-sitter grammar
Large Transformer Model Inference Optimization
Cryptography Implementations in .NET - Code Maze
MINA zkApp staking pool - HackMD
How I went from 0 to Hacking in SF as a high-schooler
Is it worth encrypting? | Matthew Linkous
Using client side encrypted fields in RavenDB
GitHub - mjbommar/gpt-takes-the-bar-exam: GPT Takes the Bar Exam
On PBKDF2 iterations
Renato Athaydes
Azure DevOps Server - Switch from HTTP to HTTPS–Part 3
Debugging Architects
Migrating Old Asp.net Authentication to Asp.net core Identity with OpenId Connect - Doumer's Blog
Production Twitter on One Machine? 100Gbps NICs and NVMe are fast
Ancient Apocalypse reviewed
Machine Learning in .NET with F# and ML.NET 2.0
Forming the habit of analog journaling - Why the digital format did not work for me
David Wong
Join Mina's zkIgnite, Cohort 1
Fast Accumulation on Streams (2018) - bkase
Vitalik Buterin's website
Hardware-friendliness of HyperPlonk - HackMD
Raspberry Pi security alarm — the basics
HTTPS explained with carrier pigeons
RE: False Rumors on API Leaks or Exposure of our Database
Your Pa$$word doesn't matter
Lastpass Breach - Everything you need to know
The Matrix Holiday Update 2022 | Matrix.org
The Service and the Beast: Building a Windows Service that Does Not Fail to Restart
20 Best Cryptography Algorithms Books of All Time
2022 APFS Advent Challenge Day 17 - Blazingly Fast Checksums with SIMD
IncrementalHash Class (System.Security.Cryptography)
AI assistants help developers produce code that's insecure
Reverse Engineering Tiktok's VM Obfuscation (Part 1)
Nix on the Steam Deck — Determinate Systems
LastPass users: Your info and password vault data are now in hackers’ hands
Notice of Recent Security Incident - The LastPass Blog
Soatok Dreamseeker (@soatok@furry.engineer)
Password requirements: myths and madness
Not Getting Hacked
Personal backups and file archival
Implementing the MySQL server protocol for fun and profit
Accessing the Firebase Auth user in SvelteKit server-side - Jeroen Pelgrims
Yubikeys & PKI: What Are They For? | Charlton's Blog
Episode 450 - Twitter Live Spaces Discussion
Why doesn't the BitLocker wizard let me save the BitLocker key on an encrypted drive?
How to Secure Passwords with BCrypt.NET - Code Maze
Why Current Wormhole Research is So Important
Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
How Cloudflare advocates for a better Internet
Why you can’t build a web browser and why you should anyway.
Is San Francisco “back”? I audited its parties to find out
Technical Writer
The limited utility of the phrase “GNU/Linux”
Playing with ActivityPub
Real-World Cryptography
ChatGPT and the viability of replacing humans with circus tricks • Adam Shaylor
Dev environments in the cloud are a half-baked solution
ChatGPT - Current state for .NET - and in general
Apple iCloud, and why encrypted backup is the only issue
Apple advances user security with powerful new data protections
Installing Guix on a 10th gen Thinkpad X1 — dthompson
Making an RC Roomba
SBF is Crypto Personified
What was Microsoft's first Integrated Development Environment (IDE)? #Shorts
Episode 448 - Azure and OSS
Pratyush Mishra
Notice of Recent Security Incident - The LastPass Blog
Choosing your chat application
Be less scared of overconfidence
Real-World Cryptography: Wong, David + Free Shipping
Mutual Contact Discovery
[Apply by 12/08] Introducing our fellowship program
Autonomy, packet size, friction, fanout, and velocity
Episode 111 - RavenDB with Oren Eini
zkapp-cli
How I over-engineered a Fast Fourier Transform for Arduino.
You Must Be 64-Bit to Ride This Ferry
Towards End-to-End Encryption for Direct Messages in the Fediverse - Dhole Moments
OpenIddict
Converting Data Across Time Zones: An In-Depth Primer - Simple Talk
ongoing by Tim Bray · AWS and Blockchain
The Magic of Zero Knowledge with Brandon Kase from O(1) Labs
Cloud-Native Application Security - DZone Refcardz
Quest for my perfect watch.
Dear Crypto & Fiat Bros - An open letter to the confused and dismissive. | dergigi.com
zero to connection string
4 Strategies for Dealing with Bad Code
The C Pointer Game
Weekly Update 322
Weekly Update 322
Intro to LiteDB for .NET Developers. Sample WebApp Included
GitHub - teslamotors/liblithium: A lightweight and portable cryptography library.
Example: Oracle | Mina Documentation
Mina Launches zkApps Era
Authorization and Authentication in Minimal APIs
Why take and make notes
Security Engineering: Intern Opportunities for University Students in Redmond, Washington, United States | Security Engineering at Microsoft
S1 Ep2: Data Breaches, DNA & the Future of Privacy
My take on self-hosting
Intro to Zero-knowledge & Building zkApps w/Mina Protocol
Live system DD backup, with encryption and compression!
Reverse engineering an EV charger
The Curse of Intelligence
Episode 446 - Security & L7 DDoS protection @ Edge, DNS Security, and Private DNS
GitHub - Jaysmito101/cgl: CGL (C Game Library) is a multipurpose library mainly for recreational coding / demo scenes / prototyping / small games / experimentation.
Weil Pairing and the MOV attack on Elliptic Curve Cryptography
The intuition behind the sum-check protocol in 5 minutes
Too Much Crypto
NSA urges orgs to use memory-safe programming languages
Amazon.com: Real-World Cryptography (Audible Audio Edition): David Wong, Derek Dysart, Manning Publications: Books
Brave New Trusted Boot World
End to End Encryption with RSA in Kotlin and C sharp - Doumer's Blog
How to contribute to Kimchi
Die Hard Advent Calendar - Hans Gruber Falling off off Nakatomi Plaza
Mina zkApp Developers Meetup - San Francisco
Zero to App Store in 7 weeks
Generate Random Numbers with .NET 6
Neural Network Pruning Explained
Wii U Architecture | A Practical Analysis
0.10.0 Release Notes ⚡ The Zig Programming Language
Improving Git protocol security on GitHub | The GitHub Blog
Encrypt and Decrypt Text Values in .NET
5 ways to boost your collaborative app development
Real-World Cryptography: Wong, David + Free Shipping
Build your own OAuth 2.0 Server and OpenId Connect Provider in ASP.NET Core 6.0
Encryption
Example: Anonymous Message Board Tutorial | Mina Documentation
We Must Professionalize Programming to Preserve Society and Computing Freedom
Running a law firm on Linux - a year or so in
Jett Hays
How I built and sold a successful startup with fractional hires
OpenBSD 7.2
Separation of Concerns in Node.js
10 essentials to mitigating API security risks | Red Hat Developer
In Australia, it's hard to get a 'burner phone', but this is just one thing criminals are using your data for
What's the deal with zkapps?
LiteDB - A .NET embedded NoSQL database
Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm!
Episode 442 - Azure IP Services
Delivering consistency and transparency for cloud hardware security
✂️ The ideal blockchain
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
Mina zkApps 🛠 Zero-Knowledge Programming with TypeScript - Jack Servia
What to know about Zero Knowledge
Jira Pricing - Monthly and Annual Subscription Cost per User
The UNIX Pipe Card Game
Lucid Multi-Key Deputies Require Commitment
Let's watch videos with David - HackMD
Microsoft Office 365 email encryption could expose message content
How observability-driven development creates elite performers
The magic words are squeamish ossifrage
Public Preview: Disabling Weaker TLS Cipher Suites for Web Apps on Multi-tenant Premium App Service Plans
The Rails SaaS Conference
yara signatures converted from trufflehog regexes for identifying secrets in text files
OAuth client authentication - more than just client secrets
Seven years in the life of Hypergiants' off-nets
How does the key exchange in HTTPS work?
Threshold ECDSA in Excessive Detail
Machine Identity Management Summit 2022
GitHub - woodrush/lambda-8cc: x86 C compiler written in untyped lambda calculus
Comparing Semgrep and CodeQL · Doyensec's Blog
Machine Identity Management Summit 2022
E-commerce platform Bhinneka.com reported to be latest target of data theft
Shamir's Secret Sharing Visualised — Blog — Evervault
Yubikey Madness
Privacy is a business imperative
.NET R&D Digest (September, 2022)
Amazon Best Sellers: Best Computer Cryptography
Scoreboard Hacking Part 2 - Getting the AES Key
The Lens Of Asymmetry
age and Authenticated Encryption
Episode 107 - Unstructured Data With Kirk Marple
Evaluating New Tools
Russia-based Facebook operation targeted Europe with anti-Ukraine messaging
Getting started with OpenTelemetry Metrics in .NET. Part 1: Key concepts
The many problems with implementing Single Sign-On
'Berkeley' Testnet Alpha Participation Guide
Outdated vs. Complete
RegEx match open tags except XHTML self-contained tags
the sad state of debug performance in c++
Aging programmer
Help people in Iran reconnect to Signal – a request to our community
ImperialViolet - Passkeys
06 SnarkyJS
BEAST: An Explanation of the CBC Attack on TLS
How does PLONK work? Part 1: What's PLONK?
What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)
0xPARC
What is security?
CK's Cold Dive
Introducing LiteFS
How hashing and cryptography made the internet possible | Red Hat Developer
An Introduction to Ansible Inventory
IN/"juels; ari" in US Patent Collection
Release CoreWCF v1.2.0 · CoreWCF/CoreWCF
Push notification two-factor auth considered harmful
A few thoughts about Uber's breach
How I manage my passwords
Google removed our website from search because it uses youtube-dl
FileSystemWatcher in C# - Code Maze
noname developer updates: structs are working!
35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
Implementing a Zero Trust strategy after compromise recovery - Microsoft Security Blog
Visual Cryptography For Physical Keyrings
It pays to be Circomspect
Ethereum activates The Merge as it shifts to proof of stake
A beginner’s guide to regular expressions with grep | Red Hat Developer
Episode 438 - Azure NAT Gateway
Enstil Postmortem
Attacking the Android kernel using the Qualcomm TrustZone
Basic Cryptography Without Fluff - Cronokirby
Announcing .NET 7 Release Candidate 1
The subtleties of proper B+Tree implementation
githublog/rolling-your-own-crypto-aes.md at main · francisrstokes/githublog
6 Simple and Useful PostgreSQL Features that I wish I knew when I started
Narrative driven development
GitHub - tlepoint/fhe.rs: Fully Homomorphic Encryption library in Rust
Offshore Information Services Ltd.
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
Ed25519 Deep Dive Addendum
The Sender Policy Framework (SPF)
learning about zero-knowledge apps and circuits using the noname educational DSL
Security of ZK Systems
An overview of Node.js: architecture, APIs, event loop, concurrency
Predict steel quality with Azure AutoML in manufacturing
Two And A Half Coins episode 5: More on Bitcoin: 51% attacks and Merkle trees!
On Security Against Time Traveling Adversaries
Someone’s Been Messing With My Subnormals!
Replicant: Reproducing a Fault Injection Attack on the Trezor One
fxhash - Lessons Learned from Implementing "Wave Function Collapse"
One Year With the Framework Laptop and NixOS
What Is A Blockchain
Cloudflare named a Leader by Gartner
Episode 437 - Azure CXP CRE Low Code Automation
Formal Verification of ZK Constraint Systems
Top 10 skills every programmer should know
Implement a GRPC API with OpenIddict and the OAuth client credentials flow
GitHub - mimoo/noname: Noname: a programming language to write zkapps
Impagliazzo's Five Worlds, or The Computational (Im)Possibilities of The World That We Live In
Announcing the Open Sourcing of Paranoid's Library
Security of ZK Systems
Kagi status update: First three months
Performance Improvements in .NET 7
What Every Programmer Should Know About Optical Fiber
Review: The This by Adam Roberts
My Data Science Projects - Don’t impute all missing data: Missing Data Patterns
We Are All Nerds: The Literary Works of Neal Stephenson
Technical Evaluation of a Startup
What You Should Learn Before Building a zkApp
champonthis | dev/rand/lack-of-attention
2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
Performance isolation in a multi-tenant database environment
Cryptography R&D Security Engineer
Raytracing and Raycasting with Signed Distance Functions
Cryptographic Agility and Superior Alternatives - Dhole Moments
Define “better”
Deep dives & how the Internet works
How SQLite Scales Read Concurrency
Should You Buy an EV?
A Heavy Lift: Bringing Kestrel + YARP to Azure App Services
Ask Cryptography
“10% error rate is okay“ - Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
ASP.NET validation revisited
A Dive in to Hyper-V Architecture & Vulnerabilities
How much customer service is too much? - Joydeep's Corner
GitHub - bootdotdev/curriculum: A roadmap for Boot.dev's CS curriculum for backend developers
GitHub - Trivo25/mina-zk-rollup: A modular zk-Rollup for zero knowledge smart contracts, zkApps, on the Mina blockchain.
What is Lattice-based Cryptography?
The Paper that Keeps Showing Up
Add BWK's email. · onetrueawk/awk@9ebe940
Understanding JSON Web Encryption (JWE)
Why don't we do email verification in reverse?
How I Learned to Stop Worrying and Love Macros
Azure's 'Dev Box' Cloud Workstation Service in Public Preview -- Visual Studio Magazine
A Heavy Lift: Bringing Kestrel + YARP to Azure App Services
6 Raspberry Pis, 6 SSDs on a Mini ITX Motherboard
How Did I Become Database Engineer at 23
Workshop at SBC'22 | Tse Lab at Stanford University
GA Release of Visual Studio for Mac 17.3 Intros User Secrets for Sensitive Info -- Visual Studio Magazine
There aren't that many uses for blockchains
Brute Force Development · Matt Layman
Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
SAFE (Sponge API for Field Elements) – A Toolbox for ZK Hash Applications - HackMD
zkEVMs: Not a Panacea
GitHub - filecoin-project/neptune: Rust Poseidon implementation.
The quick and practical "MSI" hash table
ASP.NET Core updates in .NET 7 Preview 7
Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
How does PLONK work? Part 1: What's PLONK?
Module Three – ZK Whiteboard Sessions
GitHub - openairplay/airplay2-receiver: AirPlay 2 Receiver - Python implementation
On Giving Technical Guidance to Others
NSA, NIST, and post-quantum cryptography
MPC In The Head Special
Implement additional asymmetric signature and encryption overloads by vcsjones · Pull Request #73502 · dotnet/runtime
NSA, NIST, and post-quantum cryptography
Home Network Part 1 - DIY Home Router with NixOS
Prevent Forwarded header spoofing with HTTP message signature
Experiment with post-quantum cryptography today
An intro to Open Telemetry in .NET - James World
BrainSTARK, Part 0: Introduction
ZK Whiteboard Sessions
The Castryck-Decru Attack on SIDH
Post-quantum encryption contender is taken out by single-core PC and 1 hour
Microsoft Previews Azure Premium SSD V2 Disk Storage
Use One Big Server - Speculative Branches
What happened to the inventors?
Document Scanner with OpenCV Using Video Footage
What I'm frustrated by in crypto
Shor, I’ll do it
Recommended settings for Wi-Fi routers and access points
An efficient key recovery attack on SIDH (preliminary version)
Remote attestation is coming back. How much freedom will it take? – Gabriel Sieben
The many flavors of hashing
x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
Total Fleet Visibility with Kolide
GitHub - o1-labs/proof-systems: The proof systems used by Mina
When the window is not fully open, your TCP stack is doing more than you think
CFF22 trip report
The dangers of Microsoft Pluton – Gabriel Sieben
I quit my business to start an open-source dev tool
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
How I Hacked my Car
British recycle old arguments for bypassing E2E encryption
What are zkVMs? And what's the difference with a zkEVM?
The Azure Well-Architected Framework Provides Guidance for Building, Deploying, and Maintaining a Robust Cloud App
Authentication is Difficult
GitHub - MystenLabs/narwhal: Narwhal & Tusk are a high throughput mempool & consensus, used in the Sui smart contract platform
GitHub - chip-red-pill/MicrocodeDecryptor
Using Apache Kafka to process 1 trillion messages
Logistic regression in Hobbiton - the dumbest intro to machine learning on the internet
The First Secret Problem
Facebook has started to encrypt links to counter privacy-improving URL Stripping - gHacks Tech News
prose.sh
Commercial music media, a tier list · brhfl.com
I've started using Mozilla Firefox and now I can never go back to Google Chrome
Mina zkApp Developers Meetup - Paris
Get Compliant with Kolide
GitHub - nalinbhardwaj/zordle
We Need Non-Interactive Post-Quantum KEMs
Checklist For Evaluating Cloud Backup Services
Compiler and Composability in ZKP
FizzBuzz is FizzBuzz years old (and still a powerful tool)
ASP.NET Core updates in .NET 7 Preview 6
System.Security.Cryptography.Cose 7.0.0-preview.6.22324.4
Dmitry.GR: Projects
AWS Summit - Virtual EMEA Recap
Custom Blazor Elements No Longer Experimental in .NET 7 Preview 6 -- Visual Studio Magazine
Statements Vs. Expressions
ASP.NET Core updates in .NET 7 Preview 6
ASP.NET Core updates in .NET 7 Preview 6
ASP.NET Core updates in .NET 7 Preview 6
mjg59 | Responsible stewardship of the UEFI secure boot ecosystem
Alan Howard-Backed Cryptography Investor Geometry Emerges From Stealth
CS101 Introduction to Computing Principles
Issues in Replacing OpenSSL – Security Poodle
GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers
NIST’s pleasant post-quantum surprise
Introducing: the ZK Whiteboard Sessions! - ZK Podcast
Sam Jaques
Episode 430 - Multi-tenant Architectures
Web3, why? – Gautam Dhameja
How to get a job in a new industry without experience | Jason Tu
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Dual EC or the NSA's Backdoor: Explanations
Use OS-provided RSA OAEP implementation for Android by vcsjones · Pull Request #71670 · dotnet/runtime
The PeerTube instance tube.hamnet.io on HAMNET
On the use of a life
This website is hacky AF
Composability of Data
The best books for cryptography apprentices
Bookchor data breach of over 5 lakh users: What we know so far
Web3: What they are not telling you! – Gautam Dhameja
Advanced Dashes
Why I left Android Development after 10 years and became a Backend Developer
Using Graphs to Search for Code · Nick Gregory
CloudFormation is Dead, Long Live Terraform
Testimonials | The F# Software Foundation
Episode 429 - Azure Native Independent Software Vendor (ISV) Solutions
Italy declares Google Analytics illegal
GitHub - timvisee/ffsend: Easily and securely share files from the command line. A fully featured Firefox Send client.
Thomas H. Ptacek
Huobi Global Lists Mina Protocol
Undefined behavior in C is a reading error. – keeping simple
MEGA: Malleable Encryption Goes Awry
Introducing Tailscale SSH
What I'm excited for this build cycle
SnarkyJS Week 2022 - Crowdcast
Old-school blogging, retro computers, and decentralisation • AndreGarzia.com
Facebook Says Apple is Too Powerful. They're Right.
Join Us For the First Ever SnarkyJS Week
Matrix notes - anarcat
The Animated Elliptic Curve
My other database is a compiler
Some ways to use ZK-SNARKs for privacy
find an anon friendly job today
Eurocrypt 2022 program
The hunt for the cluster-killer Erlang bug
First impressions of Web5
Class-groups – USF Crypto
Hertzbleed Attack
core/known-issues.md at main · dotnet/core
Real World Cryptography Study Group
OneService Journey to .NET 6
New UUID Formats
Foreword — ZK Jargon Decoder
Specifying Spring '83
The Web PKI 2.0
Hands-on: X25519 Key Exchange
Lessons learned from becoming CTO of a small startup - Vadim Kravcenko
Remove old macOS compatibility code for RSA decryption by vcsjones · Pull Request #70397 · dotnet/runtime
In defense of crypto(currency)
HTTP/3 becomes a standard, at last
On BFT Consensus Evolution: From Monolithic to DAG
GitHub - ory/kratos: Next-gen identity server (think Auth0, Okta, Firebase) with Ory-hardened authentication, MFA, FIDO2, profile management, identity schemas, social sign in, registration, account recovery, passwordless. Golang, headless, API-only - without templating or theming headaches. Available as a cloud service.
What Makes a Good Research Proposal?
What's OpenIddict?
A new portal for Project Galileo participants
Several Improvements on BKZ Algorithm
GitHub - lucadibello/in-house-greenhouse: 🐛 A new generation of smart indoor greenhouses!
Episode 426 - Defender for the Cloud
Groth-Sahai Proofs Are Not That Scary | EF Cryptography Research
About the security of passkeys
HTTP/3 From A To Z: Core Concepts — Smashing Magazine
RFC 9113: HTTP/2
This is not normal
How Effective Abstractions Are Opinionated | 8th Light
Cloudflare observations of Confluence zero day (CVE-2022-26134)
Orhun's Blog
Tink, with Sophie Schmieg - Security. Cryptography. Whatever.
Zero-Day Exploitation of Atlassian Confluence | Volexity
A concise summary of amazing and great ideas · johnpfeiffer
Microsoft Retools 'Untapped Superpower' Low-Code Push with Power Pages -- Visual Studio Magazine
Countering the Crypto Lobbyists
A Gentle(-ish) Introduction to Worst-Case Optimal Joins
Why Seafile is unique among file sync solutions
Episode 425 - BUILD 2022 Updates
Security in MySQL: Part Two - Simple Talk
Welcoming Rocket.Chat to Matrix! | Matrix.org
Losing your cookies
Using WebTransport
Windows OS, Services & Apps: Network Connection Target Hosts • Helge Klein
Over 8 GB Database Exposing Millions of Hotel Guests Dumped (for Free) on Telegram
Announcing .NET 7 Preview 3
Cloudflare’s approach to handling BMC vulnerabilities
PSA: Serious Security Vulnerability in Tor Browser - Darknetlive
Ghost in the Shellcode
A Kernel Hacker Meets Fuchsia OS
The power of tech debt
Patch: Zoom chat messages can infect devices with malware
Create AWS resources with Kubernetes and Operators | Red Hat Developer
Preliminary Learning ON Kimchi: PLONK
Cryptology ePrint Archive: Report 2022/621
Site Reliability Engineering – Monitoring Distributed Systems
RustDesk | Open source remote desktop software
Why wireguard is NOT safe, and you should NOT use it.
Automating Well-Architected Principles
Features of the Windows Process Activation Service (WAS)
50 shades of .NET on AWS
Approaches to implementing multi-tenancy in SaaS applications | Red Hat Developer
Weekly Update 296
Monitoring our monitoring: how we validate our Prometheus alert rules
Laurence Tratt: Static Integer Types
Quick comparison of pricing of Simple Storage Services
Proof of Stake and our next experiments in web3
KDE Connect
25 Gbit/s HTTP and HTTPS download speeds
Some Cryptography Books I Like
Introducing Lurk: A programming language for recursive zk-SNARKs
Laptopia
Support for custom headers for handshake · Issue #16 · whatwg/websockets
Practical bruteforce of AES-1024 military grade encryption
The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.
Announcing Pub/Sub: Programmable MQTT-based Messaging
C# Method to Check if a Number is Prime
European Commission prefers breaking privacy to protecting kids
A Beginner's Guide to Application Security
Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating
Cryptology ePrint Archive: Report 2022/566
GitHub - cronokirby/boo-hoo: An implementation of ZKBoo
Cryptology ePrint Archive: Report 2016/163
Building a Stack Overflow browser as a VS extension
Fitting Everything Together
zsh-autoquoter makes shell quoting slightly less annoying
Bridging Web 2 and Web 3: an identity perspective - Blog by Damian Schenkelman
Patenting Your Perpetual Motion Machine
Multiplying polynomials with Fast Fourier Transform
The Two Generals Problem
Topographical Maps in Unity: Edge Detection - Alan Zucconi
Themes from Real World Crypto 2022
When Negotiating a Price, Never Bid with a Round Number
Why I joined Cloudflare in Latin America
Darlings of the self-hosted, open-source world
Learn to code. Or don't.
GitHub - onceupon/Bash-Oneliner: A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
Implementing a ZK-focused authenticated-encryption scheme
What's two-adicity?
Senior Product Security Engineer
Alexandre Nédélec - Why will I choose Pulumi over Terraform for my next project?
Announcing Bolt & Forte partnership
Explaining Yao's Garbled Circuits - Cronokirby
Why the fediverse is stuck.
Seeking good work-life balance and avoiding burnout
A File Format to Aid in Security Vulnerability Disclosure
Lies we tell ourselves to keep using Golang
Real World Cryptography Conference 2022
Episode 422 - Open Service Mesh
Secret Management with HashiCorp Vault
Secret Management with HashiCorp Vault
Personal Knowledge Management is Bullshit
Building many private virtual networks through Cloudflare Zero Trust
Monolith in Cloud
Announcing the Hare programming language
Why LSP?
Canetti et al's Paradoxical Encryption Scheme
Implementing JWT Authentication in Golang REST API - Detailed Guide
How SHA-256 Works Step-By-Step
A list of all my projects - Patrick Zhong
Production postmortem: The encrypted database that was too big to replicate
I can’t let go of “The Dunning-Kruger Effect is Autocorrelation”
OpenBSD 7.1
Physical Threshold Encryption
Linearization in Plonk and Kimchi. Why?
The 10 Commandments .NET Developers Must apply for Secure Applications
Walking Through ECDSA Distributed Key Generation (DKG) - HackMD
Things I would like to see in a computer algebra system
CVE-2022-21449: Psychic Signatures in Java
Fintech and Practical Utopianism
Production postmortem: Misleading security and other production snafus
Taxonomy Of In-The-Wild Exploitation
Exponentially Better Rotations
Using dotnet format Command to Format the C#/.NET Code - Code Maze
A clearer lens on Zero Trust security strategy: Part 1 - Microsoft Security Blog
ClickHouse Keeper | Cupper
GitHub - freenet/locutus: Declare your digital independence
The games Nintendo didn't want you to play: Tengen
Cryptographic Assumptions in Hidden-Order Groups
The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down
Episode 96 - The Programmer's Brain with Felienne Hermans
Ethereum Has Issues
An overview of my threat model
Let’s Encrypt Receives the Levchin Prize for Real-World Cryptography
Announcing .NET 7 Preview 3
Watch People Doing the Thing
Requests for comment/Stop accepting cryptocurrency donations - Meta
Automate Public Certificate Lifecycle Management via ACME Client API | Google Cloud Blog
Impressions from a first-time Mac user
Dapr v1.7 is now available
Git Credential Manager: authentication for everyone | The GitHub Blog
zkStudyClub: Zero-Knowledge Proofs Security, in Practice [JP Aumasson, Taurus]
Random Class in C# - Code Maze
Private Classification · The Decentralized Robot
O(1) Labs
OpenSSH: Release Notes
Episode 419 - Azure Front Door
Coinbase Lists Mina Protocol
The (r)Evolution of FHE
Optimizing for Luck
How to run a Digital Platform at Scale
placeholder
Motivating and Retaining People
Random number generator enhancements for Linux 5.17 and 5.18
zkHappyHour with Mina Protocol
What I learned as a hired consultant for autodidact physicists | Aeon Ideas
In response to Moxie's doubts on web3, and about ultra light clients
Troubleshooting HTTP/3 in http.sys
Introduction
Essential Cryptography for JavaScript Developers | With Blue Ink
Sofía Celi - cryptographer
Episode 95 - Avalonia UI with Dan Walmsley
PKC Test-of-Time Award
Webinar next week: Clean Architecture with RavenDB
Future-proofing SaltStack
A Deep dive into Ed25519 Signatures
Introducing Caddy-SSH
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
EPAS
BAT: a Fast and Small Key Encapsulation Mechanism
It Looks Like You’re Trying To Take Over The World · Gwern.net
[Crypto] Cracking Diffie–Hellman key exchange using CADO-NFS + Logjam SSL/TLS attack
Year in Review: 2020 laid the groundwork for zero knowledge proofs
2022 Predictions: Zero-Knowledge Proofs Become Web3’s Killer Feature
The (Edited) Latecomer's Guide to Crypto
Postico – a modern PostgreSQL client for the Mac
Ridiculously easy to use Tunnels
Decentralized Identity: The Basics of Decentralized Identity
Implementing a toy version of TLS 1.3
The Problem With Note-Taking - More To That
If you’re not using SSH certificates you’re doing SSH wrong
The Projects That Matter The Most To Me Are Small
NSA algorithm for PX-1000 broken
mimoo - Overview
GitHub - natemcmaster/dotnet-serve: Simple command-line HTTPS server for the .NET Core CLI
Announcing Sui
Using RavenDB from Serverless applications
James Stanley - Librem 5: first impressions
Using RSA Securely in 2022 - Dhole Moments
Windows Needs a Change in Priorities
Decrypting your own HTTPS traffic with Wireshark – Trickster Dev
Passkeys: How multi-device FIDO credentials can replace passwords
The first Asahi Linux Alpha Release is here! - Asahi Linux
Staking and Trading for MINA Starts Now For USA, CA and AUS! - Kraken Blog
Zotero Blog » Blog Archive
Mina: Using Zero-Knowledge To Make Web3 Useful for Everyone
$92M Capital Raise Led by FTX Ventures and Three Arrows Capital Puts the Mina Ecosystem in Position to Become Leading Hub for Zero Knowledge Smart Contracts
Be a part of the world's lightest blockchain.
O(1) Labs
Roll your own crypto, then smoke it.
The Aptos Vision
ImperialViolet - Picking parameters
FTC Takes Action Against CafePress for Data Breach Cover Up
ssh package - golang.org/x/crypto/ssh - pkg.go.dev
WAF for everyone: protecting the web from high severity vulnerabilities
The code is the specification? Introducing cargo spec
How not to build a secure plugins architecture | Crafting Privacy
Rocky Jaiswal | Fun with function composition
Recording: Database Security in a Hostile World
How to Write a Golang App Remotely on a Raspberry Pi Using Atom
...A Farm Upstate Where He Can Run and Run
In praise of opinionated frameworks
Why should you use a random testing library in C#? · Anthony Lloyd
A Comprehensive Primer · Michael Straka
GitHub - facebookresearch/narwhal: Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus.
Cooking with credentials - pepper - Eric Mann's Blog
I can probably hack your password in MINUTES!
Reintroducing Snapps as zkApps
Search results – Add-ons for Firefox (en-US)
EARN-IT threatens encryption and therefore user freedom — Free Software Foundation — Working together for free software
Things I hate about Rust, redux
An Illustrated Guide to Elliptic Curve Cryptography Validation
How Cloudflare verifies the code WhatsApp Web serves to users
crt.sh | 6316640888
Request for comments: Removing graph queries from RavenDB
Deep Learning Is Hitting a Wall
Optimizing code by understanding usage
Put an io_uring on it: Exploiting the Linux Kernel - Blog
Announcing experimental DDR in 1.1.1.1
Open Banking for OAuth Developers
Use a message envelope
We Cannot Live Without Cryptography!
Webinar: Database Security in a Hostile World
Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia
The technological case against Bitcoin and blockchain
Telenot Complex: Insecure AES Key Generation
Struggles With Stability And Meaning During Pandemic Life Changes - Marketer Philosopher
Introducing Native Matrix VoIP with Element Call!
Part 2: Improving crypto code in Rust using LLVM’s optnone
Never Change Your Password - TidBITS
Part 1: The life of an optimization barrier
The Controversy Surrounding Hybrid Cryptography - Dhole Moments
Recording: RavenDB–a really boring database
iCloud Private Relay: information for Cloudflare customers
Blockchain Cryptography | Gary Woodfine
Security for package maintainers
Plagiarism as a patent amplifier
GNU Taler Documentation — GNU Taler 0.8.2 documentation
Using the .NET JIT to reduce abstraction overhead
Performance optimizations in production
Transport Layer Security (5/6)
Fuzzing for wolfSSL
Security | Fleet handbook
Introducing the OpenIddict client
Zig Build System Internals
The post-quantum future: challenges and opportunities
Disable SHA1 signature creation and verification by default (78fb78d3) · Commits · Red Hat / centos-stream / rpms / openssl
RavenDB: Domain Modeling and Data Persistency
HPKE: Standardizing public-key encryption (finally!)
GitHub Previews Faster Codespaces Creation with Prebuilds -- Visual Studio Magazine
Building Confidence in Cryptographic Protocols
Badly implementing encryption: Part X-Additional data
zkSync 2.0: Public Testnet is Live!
Why the OAuth mTLS spec is more interesting than you might think
Badly implementing encryption: Part IX–SIV
Making protocols post-quantum
OpenSSH: Release Notes
Cossack Labs - Security of React Native libraries: the bad, the worse and the ugly
Migrating from Redis-64 to Memurai
GitHub - brouberol/marcel: Le docker français
aes-gcm-nonce-reuse.rb
Badly implementing encryption: Part VIII–timings attacks and side channels
Deep Dive Into a Post-Quantum Key Encapsulation Algorithm
How bad it is using the same IV twice with AES/GCM?
Mac Setup for Web Development [2022]
Sign up for weekly tips
The Post-Quantum State: a taxonomy of challenges
Badly implementing encryption: Part VII–implementing authenticated encryption
AWS Lambda Cookbook — Elevate your handler’s code — Part 2 — Observability
7 Improvements You Might Have Missed in .NET 6
HTB - DevOops
Why learn Racket? A student's perspective - Micah Cantor
Programming things that have gotten easier
Reasons why Babies Cry in the First Three Months, How to Tell Them Apart, and What to Do
Is Datalog a good language for authorization?
Off-The-Record Messaging part 1: the problem with PGP | Robert Heaton
Practical bruteforce of military grade AES-1024 Remote Rhein Ruhr Stage
.NET 7 WebAssembly Plans: Mixed-Mode AOT, Multi-Threading, Web Crypto -- Visual Studio Magazine
Badly implementing encryption: Part VI–malleable encryption
Episode 412 - Azure Database for Postgres
How to capture book notes and turn those into smart notes
Improving the US financial system
Badly implementing encryption: Part V–nonce reuse
on training
Cryptology ePrint Archive: Report 2021/1641
1Password for SSH & Git (Beta) | 1Password Developer Documentation
redbean – single-file distributable web server
Badly implementing encryption: Part IV–keyed hash function
Pure-Impure Segregation Principle | Oleksii Holub
The right thing for the wrong reasons: FLOSS doesn't imply security
Learn Privacy-Enhancing Techniques with Cryptographic Games
Badly implementing encryption: Part III–breaking your encryption apart
Security of BLS batch verification - Cryptography - Ethereum Research
How Perl Saved the Human Genome Project
Badly implementing encryption: Part II–breaking the code
Android 13 virtualization lets Pixel 6 run Windows 11, Linux distributions - CNX Software
00
DNS Security, Part VII: Blockchain-based Name Systems and Transparency
GitHub - blowdart/dotnetSigningWithKeyVaultCertificates: Demonstrating how to sign .net assemblies and nuget packages in azdo
Staking
Zero Knowledge Proofs Can Save the Metaverse From Becoming a Dystopian Surveillance State - The Defiant
Kimchi: The latest update to Mina’s proof system
Badly implementing encryption: Part I
Key Senators Have Voted For The Anti-Encryption EARN IT Act
Episode 411 - Event Driven Architectures on Azure
BeyondCorp is dead, long live BeyondCorp
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
How we optimized Python API server code 100x
Dolphin Progress Report: November and December 2021, January 2022
BastionZero Blog | In which I agree with the federal gov't and bash VPNs for fun and profit
r/hearthstone - How I hacked Hearthstone
A Developer's Guide to Dogfooding
Chat Control
John Battelle's Search Blog On Building A Better Web: The Marlinspike Threads
The Federal Reserve Bank of Boston and Massachusetts Institute of Technology release technological research on a central bank digital currency
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
CS 251 Cryptocurrencies and Blockchain Technologies: Syllabus
Episode 410 - Fusion Dev
Estimating the Bit Security of Pairing-Friendly Curves
Jay's Blog
Why and how I got my own ASN!
Visual Studio 2022 - with Kendra Havens
RWC 2022 program
Remote Pair Programming - Demir Delic
The GNU Name System
.NET R&D Digest (January, 2022)
PagerDuty’s Security Training for Engineers, The Dramatic Conclusion
X.520: What’s in a name?
Basic cryptography - the Vigenere cipher - Eric Mann's Blog
Knowledge Base - your company’s undervalued asset
I finally understand Declarative Programming 🍀
Fold inbox crypto into one assembly by bartonjs · Pull Request #64307 · dotnet/runtime
It’s been 20 years since “15” was factored on quantum hardware | IBM Research Blog
Tor Browser: a legacy of advancing private browsing innovation | Tor Project
Wire • Secure Messenger | F-Droid - Free and Open Source Android App Repository
LTO Tape data storage for Linux nerds
BastionZero Blog | I read the federal government’s Zero-Trust Memo so you don’t have to
PQShield raises $20M for its quantum-ready, future-proof cryptographic security solutions – TechCrunch
Testnet #4: Shielded Staking Is Here
Run Ordinary Rails Apps Globally
The State of Zero Knowledge
Landscape of API Traffic
2022 Tech Predictions · Ted Neward's Blog
Biscuit 2.0 release
The Curse of NixOS
[Fixed Ending] Episode 90 - Clean Architecture and Subcutaneous Testing with Matthew Jeorrett
On Leaving Facebook
GitHub - khuedoan/homelab: My self-hosting infrastructure, fully automated from empty disk to operating services.
Episode 214: Emin Gün Sirer on Avalanche and its Formation - ZK Podcast
GitHub - 425show/verifiable-credential-demo
Code Maze Weekly #110 - Code Maze
Roblox Return to Service 10/28-10/31 2021 - Roblox Blog
Don’t assume the result of read()
David Wong
David Wong
Securing Sensitive Data in an Event Driven Architecture
Why is the Nuclear Power Industry Stagnant?
Bulletproof SSL and TLS | Feisty Duck
CC #9: A Wild ECDSA Appears!
Bitwarden Open Source Password Manager
FBI document shows what data can be obtained from encrypted messaging apps
How to use Org Mode and Hugo for a better scientific blogging – STRM
No Place to Hide
You're running untrusted code!
You should probably be building a web app
Arm A64 Instruction Set Architecture
Let's Encrypt SSL certificate overview
Some Techniques to Enhance Your Terraform Proficiency
Switching from macOS to Pop!_OS
GitHub - o1-labs/snapp-resource-kit: This repository is a resource kit contains links to all code, tools, documentation, and learning materials necessary to successfully become a snapp developer and contributor. Add your projects or findings here!
Clear communication
An extremely casual code review of MetaMask’s crypto
Aditya Birla Fashion and Retail Ltd. (ABFRL) Hacked -- All Data Leaked Online
SSH Bastion host best practices: How to Build and Deploy a Security-Hardened SSH Bastion Host
Life at 800MHz
Music industry is suing youtube-dl hosters
Episode 408 - Azure Load Testing
Publishing and consuming ECMAScript modules via packages – the big picture
When NOT to write an Abstraction Layer
CryptoHack – Home
Tips for More Efficient .NET Logs
Introduction to Model Predictive Control · Arnav's Weblog
Opinion: Is Web3 a Scam? - Stack Diary
Introducing Plonky2 — Polygon | Blog
XMPP: the secure communication protocol that respects privacy
Episode 407 - Container Apps
Make the Internet Yours Again With an Instant Mesh Network
dmca/2022-01-04-readium.md at master · github/dmca
Donald Knuth - The Patron Saint of Yak Shaves
Hashing is not encryption - Eric Mann's Blog
In response to Moxie's doubts on web3
My first impressions of web3
XML Encryption Syntax and Processing
Weekly Update 277
Real-World Cryptography by David Wong Book Review
6 Julia Frameworks to Create Desktop GUI’s 🖥 and Web Apps 🕸
The Relativity of Wrong by Isaac Asimov
Coming Clean
The Cryptography of Orphan Annie and Captain Midnight
Neural Network From Scratch
If it looks like a duck, swims like a duck, and QWACs like a duck, then it's probably an EV Certificate
PagerDuty’s Security Training for Engineers! Part Deux
Compiling a Go program into a native binary for Nintendo Switch™ - Ebiten
A Succinct Story of Zero Knowledge
Breaking change: Partial and zero-byte reads in DeflateStream, GZipStream, and CryptoStream - .NET
How I built a WFH Shed
Fixing stutters in Papers Please on Linux – Blog
The Case Against Crypto
The Modern Guide to OAuth
Stupid Patterns
GitHub - fikrikarim/companies-with-successful-pivot: List of startups/companies that had successful pivots
Looking Forward: Some Predictions for 2022
.NET's Cryptographic One-Shots
Unusual Attempted Login Activity: How LastPass Protects You - The LastPass Blog
Fix stack overflow with X509Certificate FriendlyName by vcsjones · Pull Request #63179 · dotnet/runtime
crt.sh | 1491512298
A Year In Review · Jethro Kuan
GitHub - trailofbits/zkdocs
Fight for privacy — an interview with Troy Hunt
How to Generate Random Numbers From a Range in C# - Code Maze
Cloud Security Breaches and Vulnerabilities: 2021 in Review
Dear Self; We Need To Talk About Social Media
MS Teams: 1 feature, 4 vulnerabilities | Positive Security
Introduction
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
What Problem Blockchains Actually Solve
How did the Enigma Machine work?
LISP with GC in 436 bytes
GitHub - mendel5/alternative-front-ends: Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
Closing the loop: a deep dive on a Facebook reseller of bikes stolen in Colorado
CCPA Scam November 2021 from Princeton University
Episode 406 - Azure Bastion
GitHub - rkeene/hunter2: The "hunter2" password manager is a simple script-oriented password manager.
Don’t start with microservices – monoliths are your friend – Arnold Galovics
Rails 7.0: Fulfilling a vision
How to build large-scale end-to-end encrypted group video calls
Secure Containerized Browser
Research Notes on Humanoid Robots
"Alpha-Rays" behind the scenes - HackMD
Cryptology ePrint Archive: Report 2021/1621
Scrt.link vs. One-Time Secret
How to Write a Technical Book
Meet Kryptology: Coinbase’s Open Source Cryptography Library
Tech Solvency: The Story So Far: CVE-2021-44228 (Log4Shell log4j vulnerability).
Alexandre Nédélec - Pulumi with an Azure Blob Storage backend
"Open source" is not broken
Testing constant-timeness using Valgrind: case of the NSS library
.NET 6 Networking Improvements
Calculating my open source blast radius
crawshaw - 2021-12-11
Solene'% : What are the VPN available on OpenBSD
Redefining Scalability
Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast
Post-Quantum Signatures in TLS will be challenging | Bulletproof TLS Newsletter
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
A Call to Build Models Like We Build Open-Source Software
Avoiding Internet Centralization
TLS Crawler Report: Top 1 Million Analysis 2021 | Venafi
Security. Cryptography. Whatever.: WireGuard, feat. Jason Donenfeld on Apple Podcasts
Twitter Suspension
Connection Failures with Microsoft.Data.SqlClient 4 and later
Episode 404 - When Windows is nowhere to be found
Gravatar "Breach" Exposes Data of 100+ Million Users
Is “KAX17” performing de-anonymization Attacks against Tor Users?
Why your cloud infrastructure should be immutable
Blockchains don't solve problems that are interesting to me
uBlock, I exfiltrate: exploiting ad blockers with CSS
Security | 2021 | The Web Almanac by HTTP Archive
Understanding HKDF - Dhole Moments
Welcome to CIO Week and the future of corporate networks
Understanding Zero-knowledge proofs through simple examples
Don't Make My Mistakes: Common Infrastructure Errors I've Made
Understanding Zero-knowledge proofs through simple examples
On the Use of Pedersen Commitments for Confidential Payments
This shouldn't have happened: A vulnerability postmortem
Securing Sensitive Data in an Event Driven Architecture
Memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures
Why I have settled on XChaCha20+Blake3 as the AE suite of choice for my projects
Don't Let the Internet Dupe You, Event Sourcing is Hard
Released: General Availability of Microsoft.Data.SqlClient 4.0
Proof of stake is a scam and the people promoting it are scammers
Build software better, together
How did this paypal spoof email pass SPF, DKIM and DMARC
Bank transfers as a payment method
Bitslicing for Constant Time Cryptography
Why does Web 3.0 Exist? - Web3 Oversimplified
How to configure verified GitHub commits?
Notebook on nbviewer
The best Task+Note system
Understanding identity tokens
An intensive introduction to cryptography: index
An Engineer's Hype-Free Observations on Web3 (and its Possibilities)
The Great Internet Mystery - Cicada 3301 by Dave Plummer
RSA vs ECDSA for DNSSEC | APNIC Blog
ZK-Hack Puzzle #4 Writeup - HackMD
Speculative Autobiographies
Mentoring junior programmers: What I tell them is job number one - Vallified
The Joy of Cryptography
Implement certificate authentication in ASP.NET Core for an Azure B2C API connector
GitHub - zademn/EverythingCrypto: (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
hacspec [![hacspec chat][chat-image]][chat-link]
Episode 403 - GitHub and Azure
80386DX ISA SINGLE BOARD MICROCOMPUTER
Episode 87 - Learning C# by Developing Games with Unity with Harrison Ferrone
Model-based Testing
How to install any distrib on a Gandi VPS
RavenDB 5.3 New Features: Experimental PostgreSQL wire protocol
XMPP, A Comeback Story: A 20 Year Old Messaging Protocol For Robust, Private and Decentralized Communications
Regex Learn - Step by step, from zero to advanced.
Cracking the Adventure Time Cipher
ZK HACK #5 - Aztec Workshop - Nov 23 | Hopin
ZK HACK #4 - Anoma Workshop - Nov 16 | Hopin
Practical attacks against attribute-based encryption
Blacksmith – Computer Security Group
Azure Active Directory's gateway is on .NET 6.0!
Writing new system software
Using a framework can make you stupid!
Yes, Programming is Hard
restic · Backups done right!
Email From FBI Looks Odd
It's Now Possible To Sign Arbitrary Data With Your SSH Keys
Implement PEM exports for RSA PKCS#1 and ECPrivateKey by vcsjones · Pull Request #61487 · dotnet/runtime
No one knows what's coming next
Five Great (free!) Ways to Get Started With Cloudflare
Threshold Digital Signatures
Announcing the GA release of Red Hat Enterprise Linux 8.5 - Red Hat Customer Portal
ZK HACK #7 - Mina Workshop - Dec 07 | Hopin
The Surreal Horror of PAM
Reflecting on 11 years of side projects
Announcing YARP 1.0 Release
Libra Shrugged — Chapter 15: Central bank digital currencies
Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries
.NET 6 Is Here -- Visual Studio Magazine
Matter Labs Announces $50M in New Funding for zkSync
Sizing Up Post-Quantum Signatures
Zillow, Prophet, Time Series, & Prices
HOWTO: Get tenure
Signal is losing
How To Learn Stuff Quickly
GitHub - axelarnetwork/tofn: A threshold cryptography library in Rust
Random Oracles in Cryptography
Episode 401 - Ignite 2021 Wrap-Up
Breaking changes in .NET 6 - .NET
Threema: Three Strikes, You’re Out
Timeline of the human condition
How (Not) to Design a Hash Function
PAKEs, oPRFs, algebra, feat. George Tankersley - Security. Cryptography. Whatever.
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
The Future of Work and the Workplace
Do-nothing scripting: the key to gradual automation
Beyond Bootable Backups: Adapting recovery strategies for an evolving platform | Carbon Copy Cloner
Simple Product Management Tricks - Jacob Kaplan-Moss
The Strange Path of Accepting How Your Brain Works · Caffeinspiration
You Are What You Consume - Priyam Mohanty
Pairings in CIRCL
SectorLISP Now Fits in One Sector
Please change your mind about your announced release plans
Pipelines - Runs for runtime
Handshake Encryption: Endgame (an ECH update)
mazzo.li — Backing up WhatsApp data through the multi-device web client
Anatomy of a STARK, Part 0: Introduction
Episode 400 - A view from Azure's Core
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
HTTPS Everywhere plug-in no longer needed | Bulletproof TLS Newsletter
You want Tor Browser ... not a VPN
Element One - Matrix, WhatsApp, Signal and Telegram in one place
Privacy is a Human Right | Tor Blog
GitHub - pubkey/client-side-databases: An implementation of the exact same app in Firestore, AWS Datastore, PouchDB, RxDB and WatermelonDB
bitbottle
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Why aviation’s compass is shifting towards True navigation
Choosing a cache
The AEGIS family of authenticated encryption algorithms
Opening a PDF in Xamarin Forms (P2: Xamarin.Android with Radaee)
Bevel Work | Rounding Sharp Corners
Looking into convergent encryption
.NET Memory Expert - become memory-aware ninja in .NET. Dotnetos training
F# eXchange 2021 | Skills Matter
8 Reasons Smart Engineers Use Frameworks - Even for Infrastructure
Implement RSA-PSS signature for CmsSigner by vcsjones · Pull Request #60316 · dotnet/runtime
SRP is Now Deprecated - TobTu
Episode 85 - Clean Code in C# With Jason Alls
SEO for Non-Scumbags: How to Earn Site Visitors without Selling Your Soul
A Tour Through the OWASP Top 10
PlayStation 3 Architecture | A Practical Analysis
Why Nano
A Critique [The Call of the Open Sidewalk]
How to Find the Right Collaborative Coding Tool for Remote Pair Programming - DZone Agile
Code quality: a concern for businesses, bottom lines, and empathetic programmers
A Graduate Course in Applied Cryptography
Episode 17: Breaking Wi-Fi With Frame Attacks!
Introducing M1 Pro and M1 Max: the most powerful chips Apple has ever built
On the Word “Nonce” in Cryptography and the UK
Critical security flaw exposed Joburg residents’ private info
JSON Web Token (JWT) Implementation Using Node.js
NixOS on Framework laptop
Vimarsh Shah - The best way to self host
It's time for the Permanent Web
Episode 398 - Hear ye! Hear ye!
Introducing Nuntius - Cronokirby
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
On the Optimization of PLONK – ZK Podcast
Geo Key Manager: Setting up a service for scale
Everything That Every .NET Developer Needs to Know About Disposable Types: Properly Disposing Objects
How to use certificates in ASP.NET Core
Signatures From Identification Schemes - Cronokirby
Avoid Authy, Use Aegis
OpenBSD 7.0
Privacy-Preserving Compromised Credential Checking
What if Performance Advertising is Just an Analytics Scam? - SparkToro
Cloudflare and the IETF
Canonicalization Attacks Against MACs and Signatures
Working around expired Root Certificates
1Password Refugee’s Guide to KeePass
A Tale Of Two Optimisations
mazzo.li — blag — Remote, encrypted ZFS storage server with NixOS
A PKI-less secure communication channel: Using TLS
Introducing SSL/TLS Recommender
The efficiency of Microsoft.
ongoing by Tim Bray · Worst Case
You're Doing IoT RNG
Designing technologies with Values? Possibility - Necessity - and European story.
Announcing Cloudflare Research Hub
HD wallets and the Legendrery PRF in MPC - HackMD
Sending emails to myself
What is SSH Tunneling, SSH Reverse Tunneling and SSH Port Forwarding?
Cloudflare Research: Two Years In
Web3 Architecture and How It Compares to Traditional Web Apps - The New Stack
Privacy is sexy 🍑🍆 - Enforce privacy & security on Windows and macOS
What happened on the Internet during the Facebook outage
Episode 84 - ASP .NET Core 5 Design Patterns With Carl-Hugo Marcotte
Episode 397 - Capacity Reservation
Scheduling Backups To OneDrive For Paperless-ng Using RClone
Lightning Round
A PKI-less secure communication channel: Implementing the record stream
Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!
A PKI-less secure communication channel: Coding the handshake
Staging TLS Certificate: Make every deployment a safe deployment
Overview | ChessCoach
The most counterintuitive facts in all of mathematics, computer science, and physics
A PKI-less secure communication channel: The record layer
Implicit Overflow Considered Harmful (and how to fix it)
Ordinal Classification Using PyTorch -- Visual Studio Magazine
A PKI-less secure communication channel: The record layer
New study reveals iPhones aren't as private as you think
Apple's CSAM Detection, feat. Matthew Green - Security. Cryptography. Whatever.
Superhero passwords may be your kryptonite wherever you go online | The Mozilla Blog
Effective Go - The Go Programming Language
The secret to Cloudflare’s pace of Innovation
Vulnerabilities show fragility of STARTTLS | Bulletproof TLS Newsletter
Copycats and Endurance - The Bootstrapped Founder
A PKI-less secure communication channel: design
Cybersecurity threats - Simple Talk
Automatic cipher suite ordering in crypto/tls
Snapps on Mina with Emre and Izaak – ZK Podcast
CSAW Quals 2021 Bits
Introduction — pyNomo Documentation 0.3.2.0 documentation
The Bi-Symmetric Encryption Fraud
A World Without Sci-Hub
GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Five ways I handled my OutOfMemoryErrors
Postmortem: Partial RavenDB Cloud outage
Q6 How do you manage your time? How do you allocate your time between work and other things?
OpenSSH: Release Notes
No, We Won’t Have a Video Call for That!
Code Maze Weekly #94 - Code Maze
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
Authenticated Boot and Disk Encryption on Linux
Patreon
The First Rule of Machine Learning: Start without Machine Learning
ECDSA and Custom XML Signatures in .NET
How to sign XML using RSA in .NET
Guide to Autoencoders with TensorFlow & Keras | Rubik's Code
Rejections, Resilience, and Rejoicing: Getting a Tenure-Track Position
Let's Encrypt's Root Certificate is expiring!
Linux on the Desktop: Part Two
Cloudflare Pages is Lightning Fast
Weekly Update 261
Splitting up trust
The long-term consequences of maintainers’ actions – Ariadne's Space
HTTP/3 support in .NET 6
How We Made Playable Quotes for the Game Boy
Episode 394 - Quantum Update
If you copied any of these popular StackOverflow encryption code snippets, then you coded it wrong
“Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
ACSC Annual Cyber Threat Report 2020-21
WebSocket per-message compression in ASP.NET Core 6
Why Monero
Advanced Git Workflow Tips | The .NET Tools Blog
Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients | Matrix.org
FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild - The Citizen Lab
Cloud Providers Publish Ransomware Mitigation Strategies
Welcome to Speed Week and a Waitless Internet
Write code that's easy to delete, and easy to debug too.
Why Flask will teach you more about software engineering than Django
Constant-time code verification with Memory Sanitizer
A resource for the OpenBSD community
Sylvain Kerkour
CFAIL Session 4 Talk #1: Incorrectly Generated RSA Keys, by Daniel Shumow
Part 4: Notifiable Data Breach (NDB) Scheme
Certified Application Security Specialist (CASS)
Groundbreaking Technique Yields Important New Details on Silicon, Subatomic Particles and Possible ‘Fifth Force’
AWS SIGv4 and SIGv4A — shufflesharding.com
Q6 How do you manage your time? How do you allocate your time between work and other things?
Weekly Update 260
OWASP Top 10
Rewilding: 60 years ago, scientists let a farm go wild – the results are in
WhatsApp “end-to-end encrypted” messages aren’t that private after all
About
Maintain it With Zig
GitHub - doctorray117/minecraft-ondemand: Templates to deploy a serverless Minecraft Server on demand in AWS
How to be a Certificate Authority, feat. Ryan Sleevi - Security. Cryptography. Whatever.
Welcome · Real-World Cryptography MEAP V14
ProtonMail deletes 'we don't log your IP' boast from website after French climate activist reportedly arrested
Release age v1.0.0 🏁 · FiloSottile/age
Why not ZFS
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
Saving a restic backup the hard way
A meditation on three dead side projects
ProtonMail logged IP address of French activist after order by Swiss authorities – TechCrunch
Important clarifications regarding arrest of climate activist
NO STARTTLS
certreq.cs
Proxy vs Reverse Proxy - using a real life example!
Delays Aren't Good Enough—Apple Must Abandon Its Surveillance Plans
Minimal Viable Developer: acing your first month in software
WhatsApp Fined with a Record $267 million for Breaching EU Privacy Laws
Zero Trust Security Architecture Overview | Developer.com
www.opendesktop.org
Windows Server 2022 now generally available—delivers innovation in security, hybrid, and containers - Microsoft Windows Server Blog
Refactor symmetric one-shots for improved performance by vcsjones · Pull Request #58270 · dotnet/runtime
Mozilla VPN Completes Independent Security Audit by Cure53 | The Mozilla Blog
How I re-over-engineered my home network for privacy and security
NIST Internal or Interagency Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
zkMesh: Aug 2021 recap
Improving Git protocol security on GitHub
Recover Password Sync for a Domain Joined Mac
Microsoft Warns Customers about a Critical Vulnerability in Azure Cosmos DB
Writing Programs with NCURSES
The Design and Evolution of OCB - Journal of Cryptology
You’re Not Too Late
on terminal control
NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
Episode 391 - AI/ML for Process Automation
The Lenovo IdeaPad Flex 5
Aggregatable Distributed Key Generation
Released: Microsoft.Data.SqlClient 4.0 Preview 1
The All-Seeing "i": Apple Just Declared War on Your Privacy
Azure SDK: Goodbye QnA Maker, Hello AI 'Question Answering' -- Visual Studio Magazine
Cryptography Engineer
59a34eabe31910abfb06f308 - Apple NeuralHash Collision
Programmers Don’t Understand Hash Functions
The Search for a FLOSS Mobile OS (Aug 2021) — Emacsen's Blog
API Tokens: A Tedious Survey
Principal Technical Product Manager, Amazon Corretto - Virtual Location (Level 7)
The Linux Kernel Module Programming Guide
r/hacking - How to bypass Sprint/T-Mobile 2fa in under 5 minutes...
Golem keyboard project
Cryptography FM: Episode 17: Breaking Wi-Fi With Frame Attacks!
Loading Elliptic Curve (EC) Keys in .NET
Developers Are the Most Valuable Resource When Creating Software but Their Time Is Undervalued and…
EFF Joins Global Coalition Asking Apple CEO Tim Cook to Stop Phone-Scanning
Platform Security Part Deux, feat. Justin Schuh - Security. Cryptography. Whatever.
GitHub - JetBrains/projector-installer: Install, configure and run JetBrains IDEs with Projector Server on Linux or in WSL
Here's another free CA as an alternative to Let's Encrypt!
Performance Improvements in .NET 6
Adventures in fuzzing libolm | Matrix.org
How does PLONK work? Part 11: Our final protocol! (Without the copy constraints)
Thinking of the children
How does PLONK work? Part 10: The Kate polynomial commitment scheme
How ephemeral keys validate possession of a static key
Safer Illinois, Isn’t
How does PLONK work? Part 9: What's a polynomial commitment scheme (PCS)?
Auditing Cryptography: #Zcon2Lite
How does PLONK work? Part 8: A polynomial dance
How does PLONK work? Part 7: A sketch protocol with our polynomial
How does PLONK work? Part 5: From arithmetic circuits to constraint systems
How does PLONK work? Part 6: From constraint systems to polynomials
Performance Improvements in .NET 6
6 New Ways to Validate Device Posture
How does PLONK work? Part 1: What's PLONK?
Cryptology ePrint Archive: Report 2021/923
Reddit Interview Problems: The Game of Life
Thinking of the children
Why is Learning Functional Programming So Damned Hard?
10×10%
Introducing Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field - Cryptography - Ethereum Research
Stewardship of Ourselves
Exploring the password policy rabbit hole — Sun Knudsen
The world in which IPv6 was a good design
Security. Cryptography. Whatever.: The Great "Roll Your Own Crypto" Debate, feat. Filippo Valsorda on Apple Podcasts
GitHub picks Friday 13th to kill off password-based Git authentication
What do we do about JWT? feat. Jonathan Rudenberg - Security. Cryptography. Whatever.
The Deceptive PR Behind Apple’s “Expanded Protections for Children”
.NET 6 Preview 7: New Features Done, but Templates with Top-Level Statements Stir Debate -- Visual Studio Magazine
How to never type passwords when using Git
More devices, fewer CAPTCHAs, happier users
If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World
Why Doesn't Software Show Up in Productivity?
Australia is becoming a surveillance state
Announcing .NET 6 Preview 7
Implementing ‘le chiffre indéchiffrable’ in Scheme
Apple’s Mistake
One Bad Apple - The Hacker Factor Blog
Hey Signal! Great Encryption Needs Great Authentication
The logic behind three random words
How does FaceTime Work?
Apple to scan U.S. iPhones for images of child sexual abuse
Apple explains how iPhones will scan photos for child-sexual-abuse images
draft-peabody-dispatch-new-uuid-format-01
Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
HTTP/2: The Sequel is Always Worse
Episode 18: Optimizing Cryptography for Microcontrollers!
Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
The Drunken Bishop Algorithm – Barely Functional Theories
Bob had a bad night: IoT mischief in a capsule hotel takes neighborly revenge to the next level | ZDNet
When You Get Right Down to It, Most Security Is Based on The Honor System
designs/blazor-wasm-crypto.md at main · dotnet/designs
GitHub - veorq/cryptocoding: Guidelines for low-level cryptography software
What is an inner product argument?
An Attempt at Demystifying Graph Deep Learning
GitHub - facebookresearch/Cupcake: A Rust library for lattice-based additive homomorphic encryption.
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
Beyond OAuth? GNAP for Next Generation Authentication - The New Stack
Shtetl-Optimized » Blog Archive
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
Full-Time Open Source - CoRecursive Podcast
TODO apps are meant for robots
PyTorch Tutorial for Beginners - Building Neural Networks
Wormhole - Simple, private file sharing
Looking between the lines: how media is control.
GitHub - cy384/ssheven: A modern SSH client for Mac OS 7/8/9
Tech spec experts seek allies to tear down ISO standards paywall
Verkle trees
NSO group, Pegasus, Zero-Days, i(OS|Message) security - Security. Cryptography. Whatever.
Comparing dotnet:main...vcsjones:16df4edc7215a9521eda2c7a8aa3fa5f1bcecfef · dotnet/runtime
The Future of Work at Cloudflare
How I store my files and why you should not rely on fancy tools for backup
Zip - How not to design a file format.
Cloudflare's Athenian Project Expands Internationally
From Stolen Laptop to Inside the Company Network — Dolos Group
Prime Number Factors that Solve N = p * q, Snyder, Bobby Joe - Amazon.com
IPv4 pricing - Hetzner Docs
Netcat - All you need to know
A new chapter for Google’s Vulnerability Reward Program
Securing your development environment
K-9 Mail is back
Welcome to Cloudflare Impact Week
Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset
Syncing all the things
Google pushed a one-character typo to production, bricking Chrome OS devices
Everyone cites that 'bugs are 100x more expensive to fix in production' research, but the study might not even exist
How to Build Multi-Platform Apps with Uno Platform and Blockchain
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x41.cf
Germany’s national healthcare system adopts Matrix! | Matrix.org
How does TLS work?
The Game Developers Guide to NFTs
Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling
Hungarian journalists and critics of Orbán were targeted with Pegasus, a powerful Israeli cyberweapon
Cryptanalysis of Meow Hash
How To Learn Stuff Quickly
A framework for Front End System Design interviews - draft
Shtetl-Optimized » Blog Archive » QC ethics and hype: the call is coming from inside the house
How the blockchain will break up Big Tech
HashWires: Range Proofs from Hash Functions | ZKProof Standards
Why we need to do more to reduce certificate lifetimes
TLS - The Cloudflare Blog
Is TLS Fast Yet?
ongoing by Tim Bray · Algorithm Agility?
Security Analysis of Telegram (Symmetric Part)
Pa(dding rtitioning) oracles, and another hot take on PAKEs
Building a Trustless and Private Internet for Everyone
Cryptography @ Google
dotnet/apireviews
Building a Vision of Life Without Work
Adventures in mTLS Debugging
The EFAIL Hoax [The Call of the Open Sidewalk]
Behind the scenes, AWS Lambda
r/crypto - My breakdown on Partition Oracle Attacks
Announcing Arti, a pure-Rust Tor implementation | Tor Blog
Probably Are Gonna Need It: Application Security Edition - Jacob Kaplan-Moss
Episode 384 - Safe Deployment Practices
Decrypt Secrets Into ASP.NET Core MVC Action Arguments Using Action Filters
Ways of reading without the influence of community
The Myth of the Expert Reviewer
An incomplete list of practices to improve security of your (micro)services · m's blog
How SHA-256 Works Step-By-Step - Qvault
Sam Lewis
More Secret Codes: A History of Cryptography (Part 2)
Dumping and extracting the SpaceX Starlink User Terminal firmware
A new macroeconomics? – J. W. Mason
Episode 15: Bringing Secure Multiparty Computation to the Real World!
Kaspersky Password Manager: All your passwords are belong to us
Stuff I wish I knew before I went Independent
ossu/computer-science
Poisson's Equation is the Most Powerful Tool not yet in your Toolbox
Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
Write a time-series database engine from scratch
RSA Conference goes full blockchain, for a moment
BitTorrent Turns 20: The File-Sharing Revolution Revisited * TorrentFreak
Episode 16: Contact Discovery in Mobile Messengers!
Constant-Time Big Numbers: An Introduction
Blazor Flash Cards - State Management with Fluxor
Mise-en-Place for Knowledge Workers: 6 Practices for Working Clean - Forte Labs
Cryptology ePrint Archive: Report 2021/626
Explaining blockchains to developers
The Missing Email Service For Domains
How to Build a Giant Carmaker
angularsen/UnitsNet
Account Takeover Protection and WAF mitigations to help stop Global Brute Force Campaigns
Coding, Cloud & Technology | An In Depth Look into Random Number Generation in .NET
OpenPGP Identity Structure [The Call of the Open Sidewalk]
Yes, the network is hostile, even yours (or: how to lose your data in three steps)
An Elixir Adoption Success Story
New Release: Fiddler Everywhere 2.0 Is Here!
NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications
irsl/gcp-dhcp-takeover-code-exec
Update on Windows 11 minimum system requirements
Temporal: getting started with JavaScript’s new date time API
cirosantilli/x86-bare-metal-examples
Voice AI is scary good now. Video game actors hate it.
Production Threshold Signing Service
Windows 11, Amazon, and Uncomfortable Questions
Is Quantum Supremacy A Threat To The Cryptocurrency Ecosystem?
TPM recommendations (Windows 10) - Microsoft 365 Security
Taking the (quantum) leap with go
Messaging app Signal not in compliance with new rules, say officials
Django for Startup Founders: A better software architecture for SaaS startups and consumer apps
Designing a duress PIN: plausible deniability (part II)
The Era Of Customized Blockchains Is Rising Because Smart Contracts Aren’t Really ‘Smart’
Episode 18: Optimizing Cryptography for Microcontrollers!
Using SSH and localhost.run to test GitHub webhooks locally
Zero Knowledge from the Discrete Logarithm Problem
Roamkasten - a practical how to guide to optimize Zettelkasten in Roam Research
Remote Desktop Connection Manager - Windows Sysinternals
A from-scratch tour of Bitcoin in Python
Hacker's guide to deep-learning side-channel attacks: the theory
Internet-in-a-Box
How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
dsprenkels/sss
Croc Full Plaintext Recovery - CVE-2021-31603
A response to "Did we market Knative wrong?"
Episode 382 - Reducing Carbon Emissions with Spot VMs
streetcomplete/StreetComplete
Announcing .NET 6 Preview 5 | .NET Blog
Cryptographic shuffle | Brain on Fire
Selfish vs. Selfless: Self-Promotion in Communities - The Bootstrapped Founder
I wish I could write this well
Cryptography updates in OCaml and MirageOS
Cryptology ePrint Archive: Report 2021/819
Welcome · Real-World Cryptography MEAP V14
[Cryptography] Apple's iCloud+ "VPN"
Richard Feynman's Integral Trick
[Last Week in .NET #46] – Exceptionally Useful
google/fully-homomorphic-encryption
Cryptology ePrint Archive: Report 2021/507
Automonous Biology
Supporting Let’s Encrypt, the nonprofit making HTTPS free for all | 1Password
Client-side encryption and strengthened collaboration in Google Workspace | Google Cloud Blog
How to Handle Secrets on the Command Line
Taildrop was kind of easy, actually
Answering Community Questions and What’s Ahead for Mina
Wormhole: Instant Encrypted File-Sharing Powered by WebTorrent * TorrentFreak
From KEMs to protocols
Sequoia: Super Powering End-to-End Email Encryption in Mozilla Thunderbird
Kerckhoffs’s Law for Security Engineers
Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
The ARM processor (Thumb-2), part 7: Bitwise operations | The Old New Thing
Althttpd: The Althttpd Webserver
Exploring android development on iPad
Certificates Confuse Everything
It’s time to ditch Chrome
The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams
Cryptology ePrint Archive: Report 2021/428
about:joel
accounts.makerbot.com (Powered by Qualys SSL Labs)
Declassified Cold War code-breaking manual has lessons for solving 'impossible' puzzles
FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof
Secret Codes: A History of Cryptography (Part 1)
Password Managers.
Kate polynomial commitments
Amazon.com: SanDisk 256GB Extreme PRO USB 3.2 Solid State Flash Drive - SDCZ880-256G-GAM46: Computers & Accessories
Episode 14: Schnorr, Factoring and Lattices!
The best cryptographic protocol ever!
Linux Security Hardening and Other Tweaks
.NET Rocks! vNext
Leaky Abstractions
Vinod Vaikuntanathan - Real World Cryptographers Podcast
Episode 380 - App Service Environments
Zip Assist for HydroTap's | Cloud Connection for Remote System Access | Zip Water
Using Wikipedia as an Impromptu RottenTomatoes API
Lightweight Cryptography Standardization: Finalists Announced
Mikkel Paulson
Conversation about .NET interop | .NET Blog
ongoing by Tim Bray · Testing in the Twenties
The Most Expensive Number in Engineering
The Roslyn analyzers I use in my projects - Gérald Barré
Verify vaccination data using Zero Knowledge Proofs with ASP.NET Core and MATTR
Amazon devices will soon automatically share your Internet with neighbors
Contributing to Gemini ecosystem
Elliptic Curve Cryptography Explained
QUIC Version 1 is live on Cloudflare
Code Maze Weekly #78 - Code Maze
Episode 77 - Application Security with Tanya Janka
QUIC is now RFC 9000
A UDP-Based Multiplexed and Secure Transport
Is MDPI a predatory publisher?
The state of tooling for verifying constant-timeness of cryptographic implementations
Messaging and Chat Control
New Storage Providers for Azure Durable Functions
The best API design principles inspired by nature - andre.schweighofer
Blockchain voting is overrated among uninformed people but underrated among informed people
Chris's Wiki :: blog/programming/RustInOurFuture
DARPA Selects Researchers to Accelerate Use of Fully Homomorphic Encryption
magic-wormhole/magic-wormhole
Cryptography from the Ground Up
255: What is encryption anyways?
Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)
How to Get Rich
Heartbleed Revisited
Secure Search Over Encrypted Data
Indian job portal IIMJobs hacked; 46GB worth of database leaked online
Factoring in logarithmic time: a mathemagic trick
How the UK's Online Safety Bill threatens Matrix | Matrix.org
Authenticated Encryption in .NET with AES-GCM
SecureString obsoletions and shrouded buffer proposal by GrabYourPitchforks · Pull Request #147 · dotnet/designs
I am sick and tired of hearing tech companies complain about a developer shortage
Tink | Google Developers
Avoiding the Frigid Hellscape of Online Marketing
The tools and tech I use to run a one-woman hardware company - Thea Flowers
Welcoming Linux to the 1Password Family | 1Password
zkSessions: The ZK Languages Roundup - May 19 | Hopin
Are you a victim of terrible API documentation? - Note Canvas
Constructing a sponge function from MD5 - Gokberk Yaltirakli
Zcon2Lite
I Have a Lot to Say About Signal’s Cellebrite Hack
Password Storage - OWASP Cheat Sheet Series
The stack monoid revisited
Running a .NET 5 web app on Railway
A day at work
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
BLS12-381 For The Rest Of Us - HackMD
Reverse Engineering an Unknown Microcontroller - Dmitry.GR
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
Building an Event Driven .NET Application: The Fundamentals – Wrapt
Peter Thiel's Religion - David Perell
<p>The Node.js CA Footgun</p>
Security flaws in all Wi-Fi devices
Cryptography Dispatches: OpenSSH 8.2 Just Works with U2F/FIDO2 Security Keys
Beware of Applications Misusing Root Stores – Mozilla Security Blog
The 0-RTT Feature of TLS 1.3 Can Be Used As an Encrypted Steganographic Channel to Operate a Backdoor into an Enterprise Network – Pomcor
Hell site
Minecraft Modding: Laser Gun - Alan Zucconi
Dear EU: Please Don't Ruin the Root - Articles
Realizing the Mina vision in Rust
Security keys are now supported for SSH Git operations | The GitHub Blog
Personal Data of 3 Million+ People Exposed In DriveSure Hack
Controlling my Sinclair AC using .NET and C# (from Raspberry Pi)
Why does Cryptography use Polynomial Modular Arithmetic in Finite Fields?
Introducing the Pinecone overlay network | Matrix.org
Understanding Extended-Nonce Constructions
Amazon Fake Reviews Scam Exposed in Data Breach
--this is a no-knowledge proof--
SharpLab
Episode 376 - Azure Media Services
Introduction to JSON Web Tokens (JWT)
timvisee/send
Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
Clarifying the "blockchain"
ZK languages with Alex Ozdemir
Is abstraction killing civilization? | datagubbe.se
.NET API browser
OpenBSD 6.9
Cryptology ePrint Archive: Report 2021/323
What do we mean by a “backdoor” in End-To-End Encrypted Messengers or Secure Messengers? #endToEndEncryption #e2ee
Mixed Boolean Arithmetic Obfuscation
Update: Security Notification - March 2021
Episode 375 - The Case of the Dangling Domain
Zero-knowledge Virtual Machines, the Polaris License, and Vendor Lock-in
Content Marketing for Bootstrappers | James Chambers
Dabbling in Cryptography
We were promised Strong AI, but instead we got metadata analysis
HashiCorp Boundary: Remote Access Management Service Adds OIDC Support
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
Rust Language Cheat Sheet
Setting up a Cardano Producer node using Kubernetes/microk8s
Customer Notice FAQs
IDE > Language > Protocol
In epic hack, Signal developer turns the tables on forensics firm Cellebrite
Make better predictions, stop estimating - andre.schweighofer
What is a Merkle Tree?
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
Rust and cryptographic code | Bulletproof TLS Newsletter
Apple introduces AirTag
Minimum Viable State: Building a Nomad Internet Country
Adventures with RSA Blind Signing
Episode 373 - GitHub Actions
A Full Circle Journey: Introducing Cloudflare Canada
Infrastructure Vulnerability Scanner Checkov Adds Context Aware Assessments
dotnet/runtime
What's in the box? - fasterthanli.me
Thoughts on writing a wayland window manager with wlroots
Why should you care about privacy - even if you had nothing to hide
Vanquished Vaccines and Vetocracies – We Are Not Saved
Eat a Peach for Engineers
Problems | Project Lovelace
Standard Notes | A Simple And Private Notes App
FTP is 50 years old
Node.js support in Cloudflare Workers
What on Earth is this Encryption Scheme?
The FreeBSD Project | FreeBSD 13.0-RELEASE Release Notes
Security Control: Implement security best practices
Lock and Code
Serving up zero-knowledge proofs
Machine Learning With ML.NET - Evaluation Metrics
The Cursed Computer Iceberg Meme
In defense of Signal
mratsim/constantine
My Vim Notes Setup
Meet the patent troll that won a $308 million jury trial against Apple
Show dotnet: Animating 40 LEDs with charlieplexing | .NET Blog
My programming principles • Borislav Grigorov
16 Where cryptography fails and final words · Real-World Cryptography MEAP V12
The Architecture Behind A One-Person Tech Startup
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
WTF are these security chips?
A pretty good guide to pretty good privacy
The Cursed Certificate
Goodbye OpenSSL, and Hello To Google Tink
Cryptology ePrint Archive: Report 2021/442
MPC-Over-Signal
Update on git.php.net incident - Externals
The Unparalleled Genius of John von Neumann
Signal Adds Payments—With a Privacy-Focused Cryptocurrency
Dumping user data from cheap tablets in minutes
How I Got Into Computers AppDev Edition
Breaking GitHub Private Pages for $35k
(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
Legalizing Gay Marriage in Crusader Kings III with Ghidra
Episode 371 - Cloud Native Machine Learning
Cryptology ePrint Archive: Report 2021/123
Obvious and possible software innovations nobody does
PostgreSQL Security Hardening
The Exception Model
Cryptology ePrint Archive: Report 2021/418
Zero click vulnerability in Apple’s macOS Mail
A categorized list of all Java and JVM features since JDK 8 to 16
Cryptography and assembly code
AES was worth $250 billion dollars
MakAir Series: Engineering Focus on Ventilator Software
C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
Apple's cooperation with authoritarian governments
Some opinionated thoughts on SQL databases
Cloudflare’s WAF is recognized as customers’ choice for 2021
Recovering a full PEM Private Key when half of it is redacted
Peace of mind backup - boa.nu
Creation vs. Consumption
208.43.231.11 Git
A new Cloudflare Web Application Firewall
Getting started with Self Sovereign Identity SSI
SSL/TLS connection issue troubleshooting test tools
.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
OpenPGP Message Format
PGP is a Form of Minimalism [The Call of the Open Sidewalk]
About | Mina Illuminate
Single-primitive authenticated encryption for fun
Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers
It doesn't work | Frank DENIS random thoughts.
janroesner/sixty5o2
APT Encounters of the Third Kind
Building a phone book: Part I
News & Events - Release of draft Applied Cryptography knowledge area for public consultation
C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
/news/vulnerabilities.html
facebookresearch/Cupcake
The Evolution of Distributed Systems on Kubernetes
The Solution of the Zodiac Killer’s 340-Character Cipher—Wolfram Blog
Is There a Case for Programmers to Unionize? - Qvault
RFC 8996 - Deprecating TLS 1.0 and TLS 1.1
On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
CoinList
Browser Isolation for teams of all sizes
Easy generation of fake/dummy data in C# with Faker.Net
suite - Privacy-Enhancing Cryptography | CSRC | CSRC
Crystal 1.0 - What to expect
mratsim/constantine
Welcome to Cloudflare Security Week 2021!
My self-study plan for electrical engineering
r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
Hybrid encryption and the KEM/DEM paradigm
Episode 72 - Emulating a Video Game System in .NET with Ryujinx
The missing explanation of ZK-SNARKs: Part 1
Can we talk about client-side certificates?
Zero Knowledge Proof (with Avi Wigderson) - Numberphile
We bootstrapped to $11 million in ARR
A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
Can an economy keep on growing? - Inverted Passion
What It Means to Learn to Code
Surreptitious Forwarding [The Call of the Open Sidewalk]
The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
A Simple Personal Data Backup Setup
How are zlib, gzip and zip related? What do they have in common and how are they different?
Add and manage TLS/SSL certificates - Azure App Service
YouTube
r/crypto - What kind of careers can I pursue with a PhD?
Key Exchange Standards
Episode 368 - Azure Load Balancer
Becoming physically immune to brute-force attacks
ARMs Race: Ampere Altra takes on the AWS Graviton2
GNU coreutils – MaiZure's Projects
About the March 8 & 9, 2021 Verkada camera hack
Block Cipher Structures: Ranked
Getting started with Dapr for .NET Developers
I want a Computer that I Own
4 Times I Felt Discriminated Against for Being a Female Developer
Notion is not a knowledge base
A flamegraph of Real-World Cryptography
It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!
The Teams Dashboard: Finding a Product Voice
A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
Did Schnorr destroy RSA? Show me the factors.
Online tool to generate and check bcrypt hashed passwords.
"This destroyes the RSA cryptosystem"
Cryptology ePrint Archive: Report 2021/015
Hotpatch for Windows Server Azure Edition (preview)
February 2021 - Killing Turbotax
How I Might Have Hacked Any Microsoft Account - The Zero Hack
Semantic Versioning Will Not Save You
Configuring HTTPS using a custom TLS certificate with Netlify and Cloudflare
How Nacon Cracked and Pirated The Sinking City - Frogwares
Real-World Cryptography: Wong, David: 9781617296710: Amazon.com: Books
nullpo-head/WSL-Hello-sudo
Cryptology ePrint Archive: Report 2020/1491
Goodbye Client Affinity, Hello Data Protection with Azure
Weird architectures weren't supported to begin with
5 tools I use to protect my privacy online
Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
How I cut GTA Online loading times by 70%
The security of the "Pass" password manager
2021 Tech Predictions · Ted Neward's Blog
The Economics of Biodiversity
Cryptology ePrint Archive: Report 2020/1610
How often should I rotate my ssh keys?
Microsoft Releases Azure Firewall Premium in Public Preview
Librsvg, Rust, and non-mainstream architectures
[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
Understanding how Leela Chess Zero works
Cryptology ePrint Archive: Report 2020/1608
Cryptography Interface Design is a Security Concern
Zero Bug Tolerance
Cryptographic Wear-Out for Symmetric Encryption
C#'s Functional Journey
The Azure Security Architect Map
Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
Add static PBKDF2 one-shot methods · dotnet/runtime@0c47471
Cryptology ePrint Archive: Report 2020/1581
Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
How to destroy the Earth
Double-Odd Elliptic Curves - Double-Odd Elliptic Curves
GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
Cryptology ePrint Archive: Report 2020/1533
Using HPKE to Encrypt Request Payloads
Urbit :: the good, the bad, and the insane
Cryptology ePrint Archive: Report 2020/1536
Cryptology ePrint Archive: Report 2020/1535
Declassified spacecrafts and orbital weapons of the USSR – Russia
Distributed Application Runtime (Dapr) v1.0 Announced
Go 1.16 Release Notes - The Go Programming Language
Making Easy Auth tokens survive releases on Linux Azure App Service
Cryptology ePrint Archive: Report 2020/1541
upgundecha/howtheysre
ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
A Visual Guide: To Sustainable Software Engineering
Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
Cryptology ePrint Archive: Report 2020/1545
Multi-asset shielded pool project (MASP)
A Billion Mockingbirds: The Role of Journalists in Destroyed Civilization
no dogma podcast - powered by FeedBurner
Securing the post-quantum world
Our Solo v2 launch is official!
Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
Quantum cryptography network spans 4600 km in China – Physics World
Good-bye ESNI, hello ECH!
PemEncoding Class (System.Security.Cryptography)
Crackpot Cryptography and Security Theater
Why should I give you my ID card
2020 U.S. Election: Cybersecurity Analysis
Turning an old Amazon Kindle into a eink development platform
What's an SPF Record? - Ultimate Guide to Email
A look at GSM
Reverie: An optimized zero-knowledge proof system
Report: Romanian Real Estate Portal Suffers Crippling Data Breach
Lessons Learned From My Last Startup: A Post Mortem
Is abstraction killing civilization? | datagubbe.se
Protect your accounts from data breaches with Password Checkup
Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
ARCHITECTURE.md
How to automatically set up a development machine with Ansible
Working with SSL Certificate in Azure App Service
Ideas That Created the Future
A Simple and Succinct Zero Knowledge Proof
Help users in Iran reconnect to Signal
Building Product Intelligence Platform with Cloudflare Workers
Security: The Need-to-know principle
Threshold Cryptography with Omer Shlomovits from ZenGo
7 behaviours to avoid in a software architecture role - Daniel Watts
Tearing Down a Humidifier - Lei's Blog
Cryptology ePrint Archive: Report 2020/1506
Getting better at Linux with 10 mini-projects
Why Generation X will save the web - Hi, I'm Heather Burns.
Cryptology ePrint Archive: Report 2006/069
SSL/TLS connection issue troubleshooting guide
The Best TLS and PKI Training Course in the World
My experience passing CKA and CKAD
Episode 10: Exploiting Authenticated Encryption Key Commitment!
LackRack - Eth0Wiki
All Stories Are Wrong, but Some Are Useful
Neural Networks Explained from Scratch using Python
Index of /map
The Subtle Hazards of Real-World Cryptography
I didn't install Signal for privacy
The Psychology of Stock Bubbles
How to properly store a password in the Database | Petre Popescu
Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
The EU must protect the right to privacy and not attack end-to-end encryption
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
No, Java is not a Secure Programming Language
berty/berty
mRNA Vaccines: Questions & Misconceptions
Aggregate (Root) Design: Separate Behavior & Data for Persistence
Tools I Love to Not Think About
What it means to be a cryptographer
The **Simplest** Web Developer Path for 2021
SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
survey.pdf
ThreadPool Blocking Mitigation by benaadams · Pull Request #47366 · dotnet/runtime
Write Crypto Code! Don't publish it!
pavlobu/deskreen
Technological stagnation: Why I came around
s-51: Ask Me Anything (AMA), with Joan Daemen
Firecracker: start a VM in less than a second
The architecture of my life | mjwsteenbergen-blog
AKS Zero To Hero - Series for everyone - Azure Greg
Release Notes | Bitwarden Help & Support
Stepping up for a truly open source Elasticsearch | Amazon Web Services
My Backup Strategy
So, You Want to CTF? (A Beginner’s Guide to CTFing)
The widening gyre
Stepping up for a truly open source Elasticsearch | Amazon Web Services
Cryptography 101 with Oso's Dr. Sam Scott | Hanselminutes with Scott Hanselman
Building your first Telegram Bot with ASP.NET Core
Please Stop Encrypting with RSA Directly
Update: youtube-dl reinstantiated thanks to EFF
The State of State Machines
The worrying trend of game technology centralization
Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
We can do better than Signal
CondensationDB/Condensation
Mesmerizing Chameleon Signatures
Is Writing as Important as Coding?
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
A history of end-to-end encryption and the death of PGP
Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
KEMTLS: Post-quantum TLS without signatures
Fully Homomorphic Encryption Part One: A Gentle Intro
source.winehq.org Git - wine.git/blob - ANNOUNCE
danso - happy-space: a whitespace-sensitive calculator
Holistic web protection: industry recognition for a prolific 2020
Foam
Send and receive WhatsApp messages through email
VeriCrypt: An Introduction to Tools for Verified Cryptography
Learn X by doing Y - A project-based learning search engine
Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
Episode 360 - Microsoft Solutions with Corey
jukefoxer/Signal-Android
An introduction to the Data Protection system in ASP.NET Core
Kernel Root Exploit via a ptrace() and execve() Race Condition
Notification of Data Security Incident - December 23, 2020
My personal wishlist for a decentralized social network
.NET 5 Networking Improvements | .NET Blog
Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen
Machine Learning with ML.NET - Linear Regression
Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
Death to the document
Wasmer - The Universal WebAssembly Runtime
Signal, thank you for not collecting my data. But I won’t use you.
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
David Wong - What is Applied Cryptography? #121 - Develomentor
David Wong – What is Applied Cryptography? #121
safepassme
What I learned doing 125 public talks - Part I
Cryptology ePrint Archive: Report 2020/1390
Steam's login method is kinda interesting
.NET Rocks! vNext
WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
JavaScript Complete Course - Array Push, Pop, Shift and Unshift Methods - Part 36
JavaScript Complete Course - Array Concat, Reverse & IndexOf - Part 37
JavaScript Complete Course - Array Iterations - Part 34
JavaScript Complete Course - Array Slice & Splice - Part 38
JavaScript Complete Course - Number Methods - Part 31
JavaScript Complete Course - Array Map - Part 40
JavaScript Complete Course - Object Arrays - Part 33
Episode 8: Breaking Elliptic-Curve Signatures With LadderLeak!
DALL·E: Creating Images from Text
JavaScript Complete Course - Objects - Part 29
JavaScript Complete Course - Creating Classes - Part 27
Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
Episode 9: Off-the-Record Messaging and PKI Implementations!
"Live" Coding A NES Emulator in C++!
Cryptology ePrint Archive: Report 2020/1456
s-18: FSE 2020 Rump session
[Cryptography] Bitcoin is a disaster.
How mRNA Vaccines Work - Simply Explained
Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
Linux Hardening Guide | Madaidan's Insecurities
Introducing Thrift VPN
START with a Monolith, NOT Microservices
Colin Stebbins Gordon
Why are video games graphics (still) a challenge? Productionizing rendering algorithms
Year in Review: 2020
zkSNARKS and Cryptographic Accumulators
AI Unlocks all trophies in ZigZag using Python and OpenCV.
NeurIPS 2020 Best Machine Learning Paper Awards
Web Authentication Methods Compared
Combating abuse in Matrix - without backdoors. | Matrix.org
Tal Rabin - Real World Cryptographers Podcast
I am Filippo Valsorda, Go cryptography lead and tool author, Ask Me Anything
Making an OS - Update, Resources, Future of the Series
Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
Development time is money, therefore I RAID
Against Victimhood
The Mystery of Deceased Hiker 'Mostly Harmless' Is At Long Last Solved
The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
No, Cellebrite cannot 'break Signal encryption.'
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
Splitting up a Monolith to (micro)Services
Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
Introduction to quantum computing with Q# – Part 12, Bell’s inequality
Why I've Been Merging Microservices Back Into The Monolith At InVision
My Engineering Axioms
2-adic Logarithms and Fast Exponentiation
What's Serverless in #Shorts and why should you care?
Steve Blank Startup Stock Options – Why A Good Deal Has Gone Bad
2020’s Top 15 Machine Learning & AI Research Papers
You're Missing Out If You Don't Write Weekly Digests
Cryptologie | Vetted Encryption
Counterfactual communication and intimidation
Apple M1 foreshadows RISC-V
Episode 5: Isogeny-Based Cryptography For Dummies!
Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security
Bizarre Design Choices In Zoom’S End-To-End Encryption
Bouncy Castle crypto authentication bypass vulnerability revealed
Branding Your Own Startup | Blog of Pascal
Cryptography Dispatches: Re-Deriving the edwards25519 Decoding Formulas
Commits are snapshots, not diffs - The GitHub Blog
Giving more tools to software engineers: the reorganization of the factory
jwasham/coding-interview-university
How to conduct a competitive analysis - Philipp Muens
Adding Encrypted Group Calls to Signal
Learn about online security, privacy, and encryption
Files and directories to exclude from antivirus scanning for Orion Platform products (AV exceptions and exclusions)
The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
Cryptohack: A Fun Platform For Learning Modern Cryptography
Last Week in .NET #22 – Microsoft Parrots Google
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
Privacy and Compliance Reading List
Computers Are Bad
Real World String Validation in JavaScript - Scrimba 24 Days of #JavaScriptmas Challenge
Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
Google Alternatives 2020: Best Privacy Friendly Alternatives
How to Build a Global Network that Complies with Local Law
Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
#104 – David Wong: Many Layers of Complexity
There's Always More History • Hillel Wayne
Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
Cryptography Improvements in .NET 5 - Support for PEM
OPAQUE: The Best Passwords Never Leave your Device
Improving DNS Privacy with Oblivious DoH in 1.1.1.1
Episode 357 - Verifiable Identity with Blockchain
From Zero to AppStore
#104 – David Wong: Many Layers of Complexity
Privacy needs to be built into the Internet
benwilber/boltstream
Understand The .NET 5 Runtime Environment
Welcome to Privacy & Compliance Week
InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
On Trusting Macintosh Hardware
Workshop On Elliptic Curve Cryptography Ecc 2020 (Videos)
An introduction to three-phase power and PDUs
Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
Analyzing firmware from embedded devices
Cryptologie | International Olympiad In Cryptography
How to Make Your Code Reviewer Fall in Love with You
Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
The Cryptopals Crypto Challenges
Radicle - Peer-to-peer code collaboration
An iOS zero-click radio proximity exploit odyssey
Gamedev from scratch 0: Groundwork
Release OpenZFS 2.0.0 · openzfs/zfs
Pyecsca: Python Elliptic Curve Cryptography Side-Channel Analysis Toolkit
We Need Organic Software
ph1lter
Are My Encryption Keys In The Cloud Really Secure?
Episode 356 - Sustainability solutions in Azure
How to Think for Yourself
An ex-Googler's guide to dev tools
Crypto Dictionary
Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
How do people find bugs?
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
Getting lucky with posting on Hacker News
Productive Uncertainty - Reaction Wheel
zkSummit 6 | Hopin
Normal Forms - Simple Talk
The book is finished, well sort of...
Facebook Is Going After Its Critics in the Name of Privacy
A Taste of OCaml's Predictable Performance - Dev.Poga
Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
[JDK-8254713] Disable TLS 1.0 and 1.1
Episode 355 - Splunk, Blockchain and Azure
zfs.rent
Six months of Tiny Projects
Anchoring Trust: A Hardware Secure Boot Story
Api diff between net5.0 and netcoreapp3.1 & netstandard2.1 by Anipik · Pull Request #5610 · dotnet/core
GitHub Reinstates Youtube-DL and Puts $1M in Takedown Defense Fund * TorrentFreak
Episode 2: Breaking Lightweight Symmetric Cryptography!
Ok Google: please publish your DKIM secret keys
Claims encryption for B2C tokens | Developer Support
Can’t open apps on macOS: an OCSP disaster waiting to happen
Using Matrix to replace proprietary and centralized chat apps
Going Bark: A Furry’s Guide to End-to-End Encryption
Does Apple really log every app you run? A technical look
SAD DNS Explained
Your Computer Isn't Yours
github/dmca
How a Game Developer Leaked 46 Million Accounts
Generate a Service Bus SAS Token and Manage Token renewal using Azure Runbooks | Developer Support
Etebase - Your end-to-end encrypted backend
Get Animal Jam for your mobile device, PC, or Mac
caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
Notes On Owning Your Own Business
How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
Zoom lied to users about end-to-end encryption for years, FTC says
What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
net5-contrib.diff
Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
Over 1M Lazada RedMart accounts sold online after data breach
Productivity vs. Privacy
Cryptologie | The Joy Of Cryptography
Implement a Web APP and an ASP.NET Core Secure API using Azure AD which delegates to second API
Multithreading Handbook for Simulation Developers
The missing explanation of zk-SNARKs: Part 2
Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
Standing on Our Own Two Feet
Episode 353 - WVD Updates
Spending political capital
Querying Across Databases In SQL Azure
erebe/personal-server
Scripts for Managing Azure Container Registry
A Brief Introduction to Deniability
GitHub warns devs face ban if they fork DMCA'd YouTube download tool... while hinting how to beat the RIAA
Leaving OCaml
Two workers are quadratically better than one • Hillel Wayne
Cryptography Dispatches: Reconstruct Instead Of Validating
C# in Simple Terms - Exceptions and Exception Handling
Blazor and Azure B2C: The Big Picture
The Basis of Testing – Stories from a Software Tester
Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
The missing explanation of ZK-SNARKs: Part 1
Isogeny-Based Cryptography: Past, Present, And Future
Scott Santens - An Engineering Argument for Basic Income
Adi Shamir 2002 Acm A.m. Turing Award Lecture, "cryptography: State Of The Science"
RedMart Data Security Incident
Episode 63 - Being Productive With Jay Miller
.NET libraries and the art of backward compatibility – Part 3
How software eats money
RIAA's YouTube-DL Takedown Ticks Off Developers and GitHub's CEO * TorrentFreak
ML Optimization pt.1 - Gradient Descent with Python
Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
gnu.org
github/dmca
The physiological effects of slow breathing in the healthy human
Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
United States v. Google
Azure CLI Oct 2020 release
The accelerating adoption of Julia
X509Certificate2.CreateFromPem(ReadOnlySpan<Char>, ReadOnlySpan<Char>) Method (System.Security.Cryptography.X509Certificates)
dotnet/runtime
Personal banking needs an API | Chris Hardie's Tech and Software Blog
Let's talk about fake reviews - part 1
Home
14 Popular Machine Learning Evaluation Metrics
OpenBSD 6.8
A Legislative Path to an Interoperable Internet
Questioning Probability
charmbracelet/glow
Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
Breaking changes, version 3.1 to 5.0 - .NET Core
Cryptography Dispatches: Nacl Is Not A High-Level Api
JDK 15 Security Enhancements
Exposing covert surveillance backdoors in children’s smartwatches
XChaCha20-Poly1305: A Primer with Examples in .NET
Decentralized Finance will reshape (or eat?) Centralized Finance
The .NET Stacks #20: Route to Code, IdentityServer, community links
Event Feeds: Simple and reliable messaging infrastructure
Cryptography Dispatches: Reconstruct Instead of Validating
Smart male chastity lock cock-up
Stop the EARN IT Bill Before It Breaks Encryption
Security Of Streaming Encryption In Google's Tink Library
It Didn’t Take Too Long…
Consensus is Harder Than It Looks
Fortunately, I don't squash my commits
Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
Robots, Oracles And Protocols; Breaking Cryptography Through Information Leakage
Wiki - RustStarterKit2020
LLVM provides no side-channel resistance
ASP.NET Core breaking changes
The Kyber/Dilithium NTT
Episode 61 - Azure and Live Conferences With Andy Morrell
Implement Azure AD Client credentials flow using Client Certificates for service APIs
Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
Coinbase offers exit package to those uncomfortable with new direction
Provisioning resources on AWS using AWS CDK and Azure DevOps Pipelines
A categorized list of all Java and JVM features since JDK 8 to 15
Doing discourse better: Stuff I wish I knew
is it worth it? — Martin Kleppmann’s blog
Advisory: security issues in AWS KMS and AWS Encryption SDKs
This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
Zig's New Relationship with LLVM
How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
Using Azure RBAC with Azure Key Vault
Uncomfortable Questions About App Signing
Python behind the scenes #2: how the CPython compiler works
71.177.243.54
Google Interview Questions Deconstructed: The Knight’s Dialer
Simple Anomaly Detection Using Plain SQL
Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
VPNs from first principles
No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
Top 10 .NET 5.0 new APIs - NDepend
Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
PEM Loading in .NET Core and .NET 5
On the use of a life
dwmkerr/hacker-laws
Revenue Model, not Culture, is the Dominant Term
CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
When double.Epsilon can equal 0
Let's Encrypt's New Root and Intermediate Certificates
Episode 346 - Autonomous Systems
A Thanksgiving Carol
Nova
Nvidia’s Integration Dreams
ASP.NET Core Configuration – Azure Key Vault - Code Maze
Phosphine gas in the cloud decks of Venus
GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
Announcing .NET 5.0 RC 1 | .NET Blog
Your Phone Is Your Castle – Purism
Support ECDiffieHellman on X509Certificate2 by vcsjones · Pull Request #42180 · dotnet/runtime
Some Great Books For Programmers That StackOverflow Cannot Replace
coin_artist – 34700 $coin Puzzle Write-Up ($20,000)
Security by Obscurity is Underrated
What Clojure spec is and what you can do with it (an illustrated guide)
Raccoon Attack
State of Cybersecurity Industry Exposure at Dark Web
BashPitfalls - Greg's Wiki
Oracle Developer Live—Java
TLS certificate lifespan cut short: A win for security, or cause for chaos?
Things I Learned to Become a Senior Software Engineer
Verizon achieves milestone in future-proofing data from hackers
Preventing Insecure Network Connections | Apple Developer Documentation
Why you want to encrypt password hashes
Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
Attention is your scarcest resource
Key exchange standards - Manning
Key exchange standards - Manning
A history of elliptic curves in tweets
connorferster/handcalcs
The Why and How of Privacy and Security — This Too Shall Grow
Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
I've decided to pursue a Bootstrap MBA
Why I’m Writing A Book On Cryptography
Minimal React: getting started with the frontend library
Soatok’s Guide to Side-Channel Attacks
Cryptologie | Links
Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
So you want to roll your own crypto?
florinpop17/app-ideas
Zoom is now critical infrastructure. That’s a concern
Pure and Applied Chess
It Took 2 Years To Make My First Dollar Selling A Product
Call For Presentations – PasswordsCon
The Five Pillars Of Wealth Building - Darius Foroux
Heyyyyyyyyyyyy.com | email with *nuance*
Providers | PrivacyTools
Is cloud security too easy to screw up? | A Cloud Guru
A New Botnet Is Covertly Targeting Millions of Servers
Cross-platform cryptography in .NET Core and .NET 5
NuGet and long file name support · Issue #3324 · NuGet/Home
degoogle
drduh/macOS-Security-and-Privacy-Guide
Cryptography Dispatches
Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
July 11, 2020 - LiveAuctioneers Account Security
What's new in the Windows Store client
fast.ai releases new deep learning course, four libraries, and 600-page book
Transfer a Software Project - Lessons Learned - dcaulfield
NGINX Config | DigitalOcean
How to contact Google SRE: Dropping a shell in cloud SQL
jesseduffield/horcrux
Obfuscating your email on the web
A Guide to Autodidactism | Jack Kinsella
Symmetric and Asymmetric Encryption in .NET Core
You Need a Password Manager. Here Are the Best Ones
Graphical Linear Algebra
Web Scraping without getting blocked
Let's Learn x86-64 Assembly! Part 0
Nintendo DS Architecture | A Practical Analysis
Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
JWTs: Which Signing Algorithm Should I Use?
Data Breach Statement - Utah Gun Exchange
2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
Introduction to quantum computing with Q# – Part 6, No-cloning theorem
Why I Left a Career as a Startup CTO to Become a Writer
IBM Reveals Next-Generation IBM POWER10 Processor
Hiding messages in x86 binaries using semantic duals
Stateful Hash-Based Signatures | CSRC | CSRC
The Illustrated TLS Connection
Frustrated? It's not you, it's Rust - fasterthanli.me
Mozilla's failures and a path to profitability
Intel® Trust Domain Extensions
Write your Own Virtual Machine
If the NSA has been hacking everything, how has nobody seen them coming?
Handles are the better pointers
Securing Web Application Secrets Through Azure Key Vault - Simple Talk
Serverless apps on AWS using F# and fable
Mozilla Alumni Network
The CompSci Pub
I don’t trust Signal
crt.sh | 2427368505
Devcontainers AKA performance in a secure sandbox
terrajobst/HarvestPlatformSupport
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Mobile Phone Streams
bulletproofs::notes::range_proof - Rust
How to encrypt and decrypt shared folders on my Synology NAS
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Building dashboards for operational visibility | Amazon Builders' Library
A Brief History of The Deficit Myth with Dr. Stephanie Kelton
Proof of X
acidanthera/OpenCorePkg
WASM: Add MD5 and SHA* hash functions by akoeplinger · Pull Request #40486 · dotnet/runtime
hephaest0s/usbkill
1Password for Linux development preview
27-inch iMac gets a major update
Tales of the Autistic Developer - Senior Developer
The .NET Core Journey at Criteo
How it works - Briar
Azure Cloud Shell Tips And Tricks | Build5Nines
Cosmetics firm Avon leaks 19 million customer records (Includes interview)
David Wong Portfolio
David Wong
swyx Writing | Slack is Fumbling Developers
Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
.NET R&D Digest (July, 2020)
Chessprogramming wiki
Polymorphic Encryption Algorithms — Generating Code Dynamically
Some SQL Tricks of an Application DBA
You Want Options
Tip 272 - Azure Security Best Practices
Small Mailserver Best Current Practices
Joe Bergeron | Java Obfuscation: A Pattern Language
p410n3 blog
Dropping Out of College to Join Facebook: 3 Years Later
Add CBOR property-based tests by eiriktsarpalis · Pull Request #39828 · dotnet/runtime
Storage 101: Data Security and Privacy - Simple Talk
Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
Exploring Fully Homomorphic Encryption
Essays on programming I think about a lot
You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
Designing a New Old Home: Part 1
Creating Elliptical Curve Keys using OpenSSL
Cryptography Dispatches: DSA Is Past Its Prime
The encrypted homelab
Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
What’s New in Thunderbird 78
100 Best Kubernetes Books of All Time
dotnet/designs
Poor feedback from readers
pimbrouwers/Falco
How SHA-2 Works Step-By-Step (SHA-256)
Hacking Reolink cameras for fun and profit
Oracle JRE and JDK Cryptographic Roadmap
Welcome to Element!
Data Structures & Algorithms I Actually Used Working at Tech Companies
Digicert revokes a raft of web security certificates
All .Net Exceptions List
Python Malware On The Rise
A few thoughts about Signal’s Secure Value Recovery
Trending
Disabling Google 2FA Doesn't Need 2FA
New German law would force ISPs to allow secret service to install trojans on user devices
[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
A Team
Clean Architecture, 2 years later - Elton Minetto
1650910 - DigiCert: Inconsistent EV audits
Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
A Concurrency Cost Hierarchy
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Why I’m Writing A Book On Cryptography
nabeelqu
Why Can't I Reproduce Their Results?
Bitcoin From Scratch - Part 1
The true cost of knowledge | RoyalSloth
Beware the Google Password Manager - fasterthanli.me
Apple Lightning
Oppose the EARN IT Act
New Mac ransomware spreading through piracy - Malwarebytes Labs
How CDNs Generate Certificates
Load Balancing an ASP.NET Core Web App using Nginx and Docker
foambubble/foam
How to get the best out of your Yubikey with GPG
New US Bill would require makers of encrypted devices to leave a backdoor
Why AES-GCM Sucks
There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
Breaking changes, version 3.1 to 5.0 - .NET Core
Navigating Power & Status
TechEmpower/FrameworkBenchmarks
Path Building vs Path Verifying: The Chain of Pain
Which Database should I use in my Azure Serverless App?
Avoiding exposing identifier details to your users
jonathan-laurent/AlphaZero.jl
Do you CI? | Benji's Blog -
How is NSA breaking so much crypto?
Teach Yourself Computer Science
Discovering Dennis Ritchie’s Lost Dissertation - CHM
The smartest password policy enforcer for Active Directory
Making your data residency choices easier with Azure
Let's Encrypt: Senior Software Engineer
11 User Authentication · Real-World Cryptography MEAP V07
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
End-to-End Encryption Update - Zoom Blog
Proxyjump, the SSH option you probably never heard of
GitHub Terms of Service - GitHub Help
Reasoning by Lego: The wrong way to think about cryptography.
jbp.io :: Third-party audit of rustls
A collection of free books from Springer
GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
May 2020 news · Gwern.net
Getting Started with Nix
ECDSA: Handle with Care
dotnet/pinvoke
Exploration Strategies in Deep Reinforcement Learning
How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
25 Years of PHP History
DRY vs DAMP in Unit Tests
How to set compensation using commonsense principles
Playing Around With The Fuchsia Operating System
CacheOut
Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
Google got rich from your data. DuckDuckGo is fighting back
Discret 11, the French TV encryption of the 80's
Ladies and Gentlemen… Cloudflare TV!
Hacking Windows with F# 5.0 Scripts
Byzantine and non-Byzantine distributed systems
Logging with Decorators in TypeScript
Peeking under the hood of Command & Conquer
How are you improving your technology skills today? Start by reading articles
The Dictator's Army and charismatic founders
Is a trillion-dollar worth of programming lying on the ground
Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
Introducing P2P Matrix | Matrix.org
Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
(Very) Basic Intro To Elliptic Curve Cryptography
CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
crt.sh | 1
ScottHolden/BFSourceGen
The radix 2^51 trick
A Guide to Threat Modelling for Developers
Against an Increasingly User-Hostile Web
A Guide to Threat Modelling for Developers
Obsidian
Node v12.17.0 (LTS) | Node.js
Messaging with Azure Service Bus - Part 9 - Premium Features
A Guide to Threat Modelling for Developers
Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
Org Mode - Organize Your Life In Plain Text!
Implementing simple cooperative threads in C - Stephen Brennan
Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10
NIST Special Publication 800-63-3
User authentication with passwords, What’s SRP?
HTTP Server - LanguageTool Wiki
An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
A Guide to Threat Modelling for Developers
Introduction to quantum computing with Q# – Part 3, Single qubit gates
Turning Signal App into a Coarse Tracking Device
SSH Agent Explained
A Guide to Threat Modelling for Developers
OpenBSD 6.7
Want to build a side business? Just buy a great Domain Name | Deep South Ventures
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
A Guide to Threat Modelling for Developers
ACME End User Client and Code Signing Certificates
Cryptology ePrint Archive: Report 2020/572
How Not to Store Passwords
Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
Erlang Programming Language
The Janet Programming Language
Replacing JWTs with Branca and PASETO in .NET Core
Meshing with LinkerD2 using gRPC-enabled .NET Core services
Credential Loading and the AWS SDK for .NET (Deep Dive) - Steve Gordon
Lockdown Course: Introduction to Cryptography - James Grime
Asgard Systems uses ML.NET to reduce food waste | .NET
Make LLVM fast again
Zoom buys Keybase to help it build end-to-end encryption
Alternatives to PGP
Cryptology ePrint Archive: Report 2018/607
Keybase joins Zoom
Create a .NET Core Deamon app that calls MSGraph with a certificate
A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
April Extensions for Firefox Preview
Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
Modern SAT solvers: fast, neat and underused (part 1 of N)
Startup financial models - 12 templates compared for SaaS
Before proceeding • IACR
OpenPGP Message Format
A Warm Welcome to ASN.1 and DER
How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
SailfishOS - Sailfish OS
IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
Why not "Why not WireGuard?"
Messaging with Azure Service Bus - Part 5 - Message Sending Options
keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
Remove certificate pinning for Australia Goverment Covidsafe Android Application
Barbie typewriter
Preventing Software Rot
Search Results - Springer
Build a C# App with CockroachDB and the .NET Npgsql Driver
This is what end-to-end encryption should look like! - Jitsi
FocalFossa/ReleaseNotes - Ubuntu Wiki
How Netflix brings safer and faster streaming experience to the living room on crowded networks…
ZEIT is now Vercel - Vercel
Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
500 Free Computer Science Courses from the World’s Top CS Universities
Scuttlebot peer-to-peer log store
Is BGP safe yet? · Cloudflare
Using Certificates from Azure Key Vault in ASP.NET Core
Erase your darlings: immutable infrastructure for mutable systems
Saving Money on Internation Payments as a Remote Freelancer
This is what end-to-end encryption should look like! - Jitsi
Technical reasons to choose FreeBSD over GNU/Linux
The limitations of Android N Encryption
Hacking my Sixth Form College network in 1991
Temporal circuit of macroscale dynamic brain activity supports human consciousness
Learn dbatools in a Month of Lunches
The Power of Prolog
Running your own secure communication service with Matrix and Jitsi | Matrix.org
Transport Layer Security (TLS) best practices with the .NET Framework
OnCheckin - Continuous Deployment for ASP.Net websites.
Welcome · Real-World Cryptography MEAP V05
How we recovered over $300K of Bitcoin
Reassuring Words and Good Intentions Don't Mean Good Security
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
A Message to Our Users - Zoom Blog
The EARN IT Act Violates the Constitution
How to SSH Properly
Perspectives & gaps between theory, practice & industry research in cryptography
.NET R&D Digest (March, 2020)
Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by default - Microsoft Edge Blog
Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
US Government Wages War on Encryption
Await | Writing an OS in Rust
patents in crypto
Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
New grad vs senior dev
Taking Back What Is Already Yours: Router Wars Episode I
Released: Microsoft.Data.SqlClient 2.0 Preview 2
Speeding up Linux disk encryption
A categorized list of all Java and JVM features since JDK 8 to 14
Setting Up Git Identities
Unsure Calculator
[15] RFR 8172680: Support SHA-3 based Hmac algorithms
.NET Platforms Feature Comparison | Premier Developer
A Quick Garbled Circuits Primer
0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
Software Engineer - Jobs at Apple
How Tailscale works
Scott Helme
OpsAI – OpsAI can help you optimize your infrastructure landscape, improve your security and compliance throughout the IT environment, and eliminates wasteful spending.
MacBook Air
Ryan_Connolly_Resume.docx
EARN IT bill is aiming at destroying encryption. We must take action now.
Async ValueTask Pooling in .NET 5 | .NET Blog
ploeh blog
The polygons of Another World: Atari Jaguar
MakerDAO gets stress tested as ETH price plummets
HTTP Desync Attacks: Request Smuggling Reborn
The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
DevOps'ish
EARN IT Must Not Happen
What is Meshtastic?
What's a key exchange?
Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
How I Survived Being A $220k/year Intern
draft-ietf-mls-protocol-09
Keybase
MYBP (Maybe You’ve Been Pwned)
EARN IT is a direct attack on end-to-end encryption
Intel x86 Root of Trust: loss of trust
The growth of command line options, 1979-Present
How to set up a tab profile in Windows Terminal to automatically SSH into a Linux box
Re: SMB over QUIC: Files Without the VPN
Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
WireGuard Gives Linux a Faster, More Secure VPN
Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
zkMesh
Stack Exchange Data Explorer
[Cado-nfs-discuss] Factorization of RSA-250
The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
#444 – An Interview with Ben Eater
An Intuitive Guide to Linear Algebra – BetterExplained
Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months
It’s 2020. Is your code ready for leap day?
crt.sh | cert-populations
pwn.college BETA
If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
How can I create a password protected .zip file in Windows 10?
The Zen of Go | Dave Cheney
A Simple Range Proof From Polynomial Commitments - HackMD
Am I generating email link tokens correctly?
microsoft/electionguard
TimeSnapper, automatic screenshot software, auto screen capture
hassio-addons/addon-ssh
Welcome to the UK .NET Tour 2020
Source Code | OpenVPN
Hash functions and security | Manning
home | CFAIL
A Brief Intro to Clean Architecture, Clean DDD, and CQRS
Fundamental Concepts for Elastic Jobs in Azure SQL Database
Provisioning X.509 Devices for Azure IoT Hub using .NET Core
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Cryptologie
Update on our new and upcoming security keys
X25519 in Web Cryptography · Issue #271 · mozilla/standards-positions
February 2020 SDK Release
Hash functions and security | Manning
Latacora - Stop Using Encrypted Email
Peter Lawrence Montgomery, 1947-2020
IdentityServer4: Building a Simple Token Server and Protecting Your ASP.NET Core APIs with JWT
CertificateManager 1.0.3
dwmkerr/hacker-laws
Real-World Cryptography
The NuGet Blog
How HTTPS works Part 1 — Building Blocks
google/tink
London Crypto Day 2020
Create Certificates for IdentityServer4 signing using .NET Core
Creating Certificates for X.509 security in Azure IoT Hub using .NET Core
ASP.NET Core 2.1 Supported Packages
damienbod/AspNetCoreCertificates
Serious Cryptography | No Starch Press
draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
Dino 0.1 Release - Dino. Communicating happiness.
Ryujinx/Ryujinx
Searching For New Adventures In Software Development
Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
Building personal search infrastructure for your knowledge and code | beepb00p
Authentication, What The Fuck?
Permutation-based Cryptography 2020 – Zagreb, Croatia
damienbod/AspNetCoreCertificates
Showtime | BenchmarkDotNet
How to write a simple operating system in assembly language
NorthSec 2020
Welcome to the UK .NET Tour 2020
Workshops | Insomni'Hack
Whose Curve Is It Anyway
Critical Windows 10 vulnerability used to Rickroll the NSA and Github
18.783 Home
Real World Crypto 2020
v5.8 Release Notes
Supersingular Isogeny Key Exchange for Not-Quite Beginners
SHA-1 is a Shambles
FROST — Flexible Round-Optimized Schnorr Threshold Signatures | Cryptography, Security, and Privacy (CrySP) | University of Waterloo
The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
.NET Core, .NET 5; the exodus of .NET Framework?
Tracing .NET Core applications - Red Hat Developer
The Hidden Number Problem – kel.bz
$1000 TCR hashing competition
Autocrypt 1.1.0 documentation
On Privacy versus Freedom | Matrix.org
Vim cryptmethod is not authenticated · Issue #638 · vim/vim
Google gives up on US carriers, will roll out its own RCS chat system
.NET R&D Digest (November – December, 2019)
On Linux's Random Number Generation
Signal >> Blog >> Technology Preview for secure value recovery
Building a new Win 3.1 app in 2019 Part 1: Slack client
Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
Zero allocation code in C# and Unity - Seba's Lab
How to generate random numbers using water bubbles
tmds/Tmds.Ssh
oqtane/oqtane.framework
Base64 to hex: Encode and decode bytes online
VPN Service for Serious Privacy & Security | IVPN
Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
Why IVPN - What makes IVPN the best privacy protection service
GateHub Investigation - Final Statement
Stop surveillance and preserve your privacy with IVPN
Isogeny crypto
Homepage | ZKProof Standards
dotnet/SqlClient
Maintaining cryptographic library for 12 languages
Thoughts on DNS-over-HTTPS
Facebook Libra is Architecturally Unsound
x86/x64 SIMD Instruction List (SSE to AVX512)
bye: FTP Support Is Going Away
TLS Post-Quantum Experiment
Have I Been Pwned: API v3
Creating Random Numbers With .NET Core
Verzekeraar Allianz informeert klanten over datalek - Security.NL
cr.yp.to: 2019.10.24: Why EdDSA held up better than ECDSA against Minerva
Commas in big numbers everywhere: An OpenType adventure
Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
Meet Algo, the VPN that works
Writing a book is hard
OceanLibrary/Ocean
Ed25519 Keys | Brian Warner
Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
A detailed look at Ubuntu’s new experimental ZFS installer
The Insecure Elephant in the Room - CA Security Council
Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
Algorand's cryptographic sortition
Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
novotnyllc/NuGetKeyVaultSignTool
.NET Core 3.0 -- Post Launch Blog Posts
Peddle the Pedal to the Metal
What's my birthday?
praeclarum/sqlite-net
CryptographicException on .NET Core 3, Windows only "The specified RSA parameters are not valid; both Exponent and Modulus are required fields." · Issue #30914 · dotnet/runtime
beemdevelopment/Aegis
draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
PrivacySafe: The Anti-Cloud Appliance
September 10, 2019—KB4515384 (OS Build 18362.356)
awslabs/s2n
Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
OWASP/CheatSheetSeries
Kestrel server does not get grade A in SSL tests because it has no cipher suit preference · Issue #30767 · dotnet/runtime
OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
cr.yp.to: 2017.07.23: Fast-key-erasure random-number generators
jedisct1/dsvpn
Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
Padloc - A Modern Password Manager For Individuals And Teams
Please do not use the .NET 2.0 HMACSHA512 and HMACSHA384 Classes
Security Incident - Please Change Your Password
EV SSL Certificates Phased Out of New Browser Updates | Venafi
Learn UI Design: The Complete Online Video Course
draft-truskovsky-lamps-pq-hybrid-x509-01 - Multiple Public-Key Algorithm X.509 Certificates
KNOB Attack
Potentially unsafe uses of unsafe · Issue #145 · mozilla/neqo
Gone forEVer!
Spying on HTTPS
Online syntax highlighting for the masses!
!(Spotting the promising cryptography-related start ups)
Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
Canva Security Incident - May 24 FAQs
Random Thoughts
Architecture for humans - Ayende @ Rahien
Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
JDK 13 Security Enhancements
Pwnie Awards
More on Backdooring (or Not) WhatsApp - Schneier on Security
ECMAScript 2015 Language Specification – ECMA-262 6th Edition
JWT Signing using RSASSA-PSS in .NET Core
Security Engineering - A Guide to Building Dependable Distributed Systems
Kazakhstan’s HTTPS Interception
When a rewrite isn’t: rebuilding Slack on the desktop
Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
Sometimes valid RSA signatures in .NET
Manning Publications
Block Breakers
Package torgo
Digital Driver’s Licenses Could Become a Real Option in Some States
Host unreachable in https due to weak Http2 cipher · Issue #8952 · dotnet/aspnetcore
CRYPTO-LAB
Deprecation errors compiling native projects on macOS Catalina · Issue #30109 · dotnet/runtime
Mozilla SSL Configuration Generator
Real-World Cryptography
Using Chained Certificates for Certificate Authentication in ASP.NET Core 3.1
Support additional OIDs for SignedCms digest algorithms by vcsjones · Pull Request #38845 · dotnet/corefx
Proving security at scale with automated reasoning - All Things Distributed
Archive
VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
Add methods to convert between hexadecimal strings and bytes · Issue #17837 · dotnet/runtime
The Ultra Secure Crypto Storage & Communication Device
A book in preparation
Security advisory 2019-06-13 | Yubico
Certificate Authentication in ASP.NET Core 3.1
RAMBleed
Fixing Random, part 34
An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
dotnet/coreclr
Apple's 'Find My' Feature Uses Some Very Clever Cryptography
Requirements for trusted certificates in iOS 13 and macOS 10.15
Apple CryptoKit | Apple Developer Documentation
Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
Will it cluster? k3s on your Raspberry Pi
Accessing UNIX sockets remotely from .NET - Red Hat Developer
Revocation Tracker
How Hackers Get your Password? | Dr. Erdal Ozkaya Personal Blog
RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
Cryptography Dispatches • Buttondown
Ethical Alternatives & Resources - ethical.net
GitHub Enterprise - The best way to build and ship software
dotnet/coreclr
Top SSL Certificates Buyer's Guide
Using Ed25519 signing keys for encryption
SMS for 2FA: What Are Your Security Options? - Authy
brunoproduit/roca
Enable C# mode command line diff by terrajobst · Pull Request #1196 · dotnet/standard
Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
Performance Improvements in .NET Core 3.0 | .NET Blog
ZombieLoad Attack
Domain Randomization for Sim2Real Transfer
[Cryptography] Bitcoin - closing the coin
Why 2f+1
eyeDisk. Hacking the unhackable. Again | Pen Test Partners
ZkVM: a new design for fast, confidential smart contracts
nothings/single_file_libs
Community and Communication going forward
dotnet/extensions
The Tail of the Serpent by Le Slo
Do we need effects to get abstraction?
Azure Monitor HTTP Data Collector API - Azure Monitor
Edge79+ vs. Edge18 vs. Chrome
RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
mpm guide - niall t.l.
n0fate/chainbreaker
The LLVM Compiler Infrastructure Project
A Recipe for Training Neural Networks
Twisted Oak
AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
Peddle the Pedal to the Metal
JDK 12 Security Enhancements
proposal: crypto/tls: Expose maps for cipher suite IDs/names · Issue #30325 · golang/go
Understanding the Limitations of HTTPS
Cryptologie
We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
Lies, darn lies and sampling bias
Direct3D 11.3 Functional Specification
Verified cryptographic provider a triple threat
.NET API browser
A Go implementation of Poly1305 that makes sense
The story of the Rendition Vérité 1000
Scott Helme
Dotnet-Boxed/Templates
BoringTun, a userspace WireGuard implementation in Rust
New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
Possible bug with RSACng hash verification · Issue #29061 · dotnet/runtime
gRPC Bi-directional streaming with Razor Pages and a Hosted Service gRPC client
The WhibOx Contest Edition 2 - CYBERCRYPT
On the S-Box of Streebog and Kuznyechik
Understanding STIR/SHAKEN
Include System.Security.Cryptography.RandomNumberGenerator.GetInt32 · Issue #1101 · dotnet/standard
Go 1.12 Release Notes - The Go Programming Language
Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
Running Local Azure Functions in Visual Studio with HTTPS
Alexa Top 1 Million Analysis - February 2019
We need to talk about Session Tickets
Introduction
Security Experiments with gRPC and ASP.NET Core 3.1
Cybersecurity for the Public Interest - Schneier on Security
Added Range Manipulation APIs to Collection<T> and ObservableCollection<T> by ahoefling · Pull Request #35772 · dotnet/corefx
Past, Present, Future: From Co-ops to Cryptonetworks - Andreessen Horowitz
Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
Data Leakage from Encrypted Databases - Schneier on Security
kelseyhightower/kubernetes-the-hard-way
Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
Neowin
a16z Podcast: Voting, Security, and Governance in Blockchains - Andreessen Horowitz
Crypto Canon - Andreessen Horowitz
Blockchain Governance: Programming Our Future
Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
Keybase launches encrypted git
Bitcoin's Academic Pedigree - ACM Queue
How Information Got Re-Invented - Issue 51: Limits - Nautilus
AI Progress Measurement
Microsecond Resolution Time Services for Windows
vivri/Adjective
On the Security of Password Managers - Schneier on Security
Details on Recent DNS Hijacking - Schneier on Security
Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
Reconstructing SIGSALY - Schneier on Security
Blockchain and Trust - Schneier on Security
Public-Interest Tech at the RSA Conference - Schneier on Security
Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
Hacking the GCHQ Backdoor - Schneier on Security
Friday Squid Blogging: Squid Lollipops - Schneier on Security
Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
Friday Squid Blogging: New Giant Squid Video - Schneier on Security
Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
New Australian Backdoor Law - Schneier on Security
Security Risks of Chatbots - Schneier on Security
The DoJ's Secret Legal Arguments to Break Cryptography - Schneier on Security
Three-Rotor Enigma Machine Up for Auction Today - Schneier on Security
Friday Squid Blogging: Squid Sculptures - Schneier on Security
Hiding Secret Messages in Fingerprints - Schneier on Security
Security of Solid-State-Drive Encryption - Schneier on Security
ID Systems Throughout the 50 States - Schneier on Security
Cell Phone Security and Heads of State - Schneier on Security
draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
Ext4 Disk Layout - Ext4
Modern Alternatives to PGP
Go 1.12 Release Notes - The Go Programming Language
Archive
proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
CBC 2019
Real World Crypto 2019
The year in post-quantum crypto
Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
SPY --- Surveillance, Privacy, and You
The Case Against Quantum Computing - IEEE Spectrum
Quantum algorithms for analysis of public-key crypto | American Inst. of Mathematics
Mathematics of Public Key Cryptography
CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
Programme
PQCRYPTO ICT-645622
D. J. Bernstein / Talks
djbsort: Intro
Security in Times of Surveillance
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
Eurocrypt 2018 rump session
Classic McEliece: Talks
PQCrypto 2018 Conference : Florida Atlantic University - Charles E. Schmidt College of Science
Pitching security vs. privacy is asking the wrong question
libpqcrypto: Intro
Security in Times of Surveillance
Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
Post-Quantum Cryptography
CBC Workshop 2018 : Florida Atlantic University - Charles E. Schmidt College of Science
SPHINCS+
The ROBOT Attack
NTRU Prime: NIST submission
Unity Labs Publications | Unity
dalek-cryptography/ed25519-dalek
The CCC: Men Who Hate Women
Mersenne Prime Discovery - 2^82589933-1 is Prime!
Cloud Data Backup for Small Businesses | CrashPlan
nucypher/nufhe
RUB-NDS/TLS-Padding-Oracles
Cryptologie | Links
[paper review] A faster, more efficient cryptocurrency
mimoo/eureka
crypto/tls: enable TLS 1.3 and update tests · golang/go@30cc978
Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
Database Encryption
Kerckhoffs’ principles – Why should I make my cipher public?
Proxy re-encryption and FHE with NuCypher
Cryptologie | Links
Attack of the week: searchable encryption and the ever-expanding leakage function
Archive
Introducing Adiantum: Encryption for the Next Billion Users
Quantum computing as a field is obvious bullshit
Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
Stanford Blockchain Conference 2019 - Day 1
arXiv.org e-Print archive
DEF CON® 27 Hacking Conference - Call For Papers
Going old school: how I replaced Facebook with email
» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
» Agrippa (A Book of the Dead) The Digital Antiquarian
» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
Meow Hash
.NET Design Review: GitHub Quick Reviews
Tuning a Runtime for Both Productivity and Performance
We didn’t see this coming
Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
dotnet/coreclr
MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
Creating a GitHub app with create-probot-app: Creating my first GitHub app with Probot - Part 1
no dogma podcast - powered by FeedBurner
Manning Publications
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
Software Tokens Won't Save You
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1