Explore other dev related sites in this ring. If you would like to join this ring click here.
devring.club Previous Random Next

linksfor.dev(s)

Posts for 'encryption'

  1. Tools I Love to Not Think About
  2. What it means to be a cryptographer
  3. SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
  4. survey.pdf
  5. Write Crypto Code! Don't publish it!
  6. pavlobu/deskreen
  7. Technological stagnation: Why I came around
  8. s-51: Ask Me Anything (AMA), with Joan Daemen
  9. The architecture of my life | mjwsteenbergen-blog
  10. AKS Zero To Hero - Series for everyone - Azure Greg
  11. Release Notes | Bitwarden Help & Support
  12. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  13. My Backup Strategy
  14. So, You Want to CTF? (A Beginner’s Guide to CTFing)
  15. Stepping up for a truly open source Elasticsearch | Amazon Web Services
  16. Building your first Telegram Bot with ASP.NET Core
  17. Please Stop Encrypting with RSA Directly
  18. The State of State Machines
  19. The worrying trend of game technology centralization
  20. Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
  21. We can do better than Signal
  22. CondensationDB/Condensation
  23. Mesmerizing Chameleon Signatures
  24. Is Writing as Important as Coding?
  25. Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
  26. A history of end-to-end encryption and the death of PGP
  27. Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
  28. KEMTLS: Post-quantum TLS without signatures
  29. Fully Homomorphic Encryption Part One: A Gentle Intro
  30. danso - happy-space: a whitespace-sensitive calculator
  31. Holistic web protection: industry recognition for a prolific 2020
  32. Foam
  33. Send and receive WhatsApp messages through email
  34. Learn X by doing Y - A project-based learning search engine
  35. Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
  36. jukefoxer/Signal-Android
  37. An introduction to the Data Protection system in ASP.NET Core
  38. Notification of Data Security Incident - December 23, 2020
  39. My personal wishlist for a decentralized social network
  40. Machine Learning with ML.NET - Linear Regression
  41. Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
  42. Wasmer - The Universal WebAssembly Runtime
  43. Signal, thank you for not collecting my data. But I won’t use you.
  44. Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
  45. safepassme
  46. What I learned doing 125 public talks - Part I
  47. .NET Rocks! vNext
  48. DALL·E: Creating Images from Text
  49. Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
  50. HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
  51. SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
  52. The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
  53. Cryptology ePrint Archive: Report 2020/1456
  54. s-18: FSE 2020 Rump session
  55. Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
  56. Linux Hardening Guide | Madaidan's Insecurities
  57. Why are video games graphics (still) a challenge? Productionizing rendering algorithms
  58. zkSNARKS and Cryptographic Accumulators
  59. NeurIPS 2020 Best Machine Learning Paper Awards
  60. Web Authentication Methods Compared
  61. Combating abuse in Matrix - without backdoors. | Matrix.org
  62. Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
  63. Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
  64. Development time is money, therefore I RAID
  65. Against Victimhood
  66. The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
  67. No, Cellebrite cannot 'break Signal encryption.'
  68. Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
  69. Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
  70. Why I've Been Merging Microservices Back Into The Monolith At InVision
  71. My Engineering Axioms
  72. 2020’s Top 15 Machine Learning & AI Research Papers
  73. You're Missing Out If You Don't Write Weekly Digests
  74. Cryptologie | Vetted Encryption
  75. Apple M1 foreshadows RISC-V
  76. Bizarre Design Choices In Zoom’S End-To-End Encryption
  77. Branding Your Own Startup | Blog of Pascal
  78. Commits are snapshots, not diffs - The GitHub Blog
  79. Giving more tools to software engineers: the reorganization of the factory
  80. How to conduct a competitive analysis - Philipp Muens
  81. Adding Encrypted Group Calls to Signal
  82. Learn about online security, privacy, and encryption
  83. The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
  84. Privacy and Compliance Reading List
  85. Computers Are Bad
  86. Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
  87. Google Alternatives 2020: Best Privacy Friendly Alternatives
  88. How to Build a Global Network that Complies with Local Law
  89. Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
  90. There's Always More History • Hillel Wayne
  91. Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
  92. Improving DNS Privacy with Oblivious DoH in 1.1.1.1
  93. From Zero to AppStore
  94. Privacy needs to be built into the Internet
  95. benwilber/boltstream
  96. Welcome to Privacy & Compliance Week
  97. InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
  98. On Trusting Macintosh Hardware
  99. An introduction to three-phase power and PDUs
  100. Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
  101. How to Make Your Code Reviewer Fall in Love with You
  102. Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
  103. An iOS zero-click radio proximity exploit odyssey
  104. Gamedev from scratch 0: Groundwork
  105. Release OpenZFS 2.0.0 · openzfs/zfs
  106. We Need Organic Software
  107. ph1lter
  108. Are My Encryption Keys In The Cloud Really Secure?
  109. How to Think for Yourself
  110. An ex-Googler's guide to dev tools
  111. Crypto Dictionary
  112. Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
  113. How do people find bugs?
  114. What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
  115. Getting lucky with posting on Hacker News
  116. Productive Uncertainty - Reaction Wheel
  117. zkSummit 6 | Hopin
  118. Normal Forms - Simple Talk
  119. The book is finished, well sort of...
  120. Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
  121. The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
  122. zfs.rent
  123. Six months of Tiny Projects
  124. ‘You Have Zero Privacy’ Says an Internal RCMP Presentation. Inside the Force’s Web Spying Program | The Tyee
  125. Claims encryption for B2C tokens | Developer Support
  126. Can’t open apps on macOS: an OCSP disaster waiting to happen
  127. Using Matrix to replace proprietary and centralized chat apps
  128. Going Bark: A Furry’s Guide to End-to-End Encryption
  129. Does Apple really log every app you run? A technical look
  130. SAD DNS Explained
  131. How a Game Developer Leaked 46 Million Accounts
  132. Etebase - Your end-to-end encrypted backend
  133. Get Animal Jam for your mobile device, PC, or Mac
  134. caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
  135. Notes On Owning Your Own Business
  136. How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
  137. Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
  138. Zoom lied to users about end-to-end encryption for years, FTC says
  139. What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
  140. Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
  141. Over 1M Lazada RedMart accounts sold online after data breach
  142. Productivity vs. Privacy
  143. Multithreading Handbook for Simulation Developers
  144. The missing explanation of zk-SNARKs: Part 2
  145. https://www.statewatch.org/media/1434/eu-council-draft-declaration-against-encryption-12143-20.pdf
  146. Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
  147. Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
  148. Standing on Our Own Two Feet
  149. Querying Across Databases In SQL Azure
  150. Scripts for Managing Azure Container Registry
  151. A Brief Introduction to Deniability
  152. Leaving OCaml
  153. Two workers are quadratically better than one • Hillel Wayne
  154. C# in Simple Terms - Exceptions and Exception Handling
  155. ML Optimization - Advanced Optimizers from scratch with Python
  156. The Basis of Testing – Stories from a Software Tester
  157. Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
  158. The missing explanation of ZK-SNARKs: Part 1
  159. Scott Santens - An Engineering Argument for Basic Income
  160. Personal data from 2.8 million Eatigo accounts stolen, put up for sale online
  161. RedMart Data Security Incident
  162. Lazada suffers data breach; personal information from 1.1 million RedMart accounts for sale online
  163. Episode 63 - Being Productive With Jay Miller
  164. How software eats money
  165. ML Optimization pt.1 - Gradient Descent with Python
  166. Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
  167. gnu.org
  168. Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
  169. 1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
  170. Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
  171. Azure CLI Oct 2020 release
  172. Ransomware Group Makes Splashy $20K Donation to Charities
  173. The accelerating adoption of Julia
  174. Personal banking needs an API | Chris Hardie's Tech and Software Blog
  175. Let's talk about fake reviews - part 1
  176. 14 Popular Machine Learning Evaluation Metrics
  177. A Legislative Path to an Interoperable Internet
  178. Questioning Probability
  179. charmbracelet/glow
  180. Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
  181. Exposing covert surveillance backdoors in children’s smartwatches
  182. XChaCha20-Poly1305: A Primer with Examples in .NET
  183. Five Eyes and Japan call for Facebook backdoor to monitor crime
  184. Event Feeds: Simple and reliable messaging infrastructure
  185. Smart male chastity lock cock-up
  186. Stop the EARN IT Bill Before It Breaks Encryption
  187. Security Of Streaming Encryption In Google's Tink Library
  188. It Didn’t Take Too Long…
  189. Fortunately, I don't squash my commits
  190. Cute Cryptography Stories
  191. Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
  192. Wiki - RustStarterKit2020
  193. Urgent: EARN IT Act Introduced in House of Representatives
  194. Episode 61 - Azure and Live Conferences With Andy Morrell
  195. Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
  196. Coinbase offers exit package to those uncomfortable with new direction
  197. Doing discourse better: Stuff I wish I knew
  198. is it worth it? — Martin Kleppmann’s blog
  199. Advisory: security issues in AWS KMS and AWS Encryption SDKs
  200. This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
  201. Zig's New Relationship with LLVM
  202. How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
  203. Using Azure RBAC with Azure Key Vault
  204. Uncomfortable Questions About App Signing
  205. Python behind the scenes #2: how the CPython compiler works
  206. 71.177.243.54
  207. Google Interview Questions Deconstructed: The Knight’s Dialer
  208. Simple Anomaly Detection Using Plain SQL
  209. Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
  210. VPNs from first principles
  211. No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
  212. Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
  213. dwmkerr/hacker-laws
  214. Revenue Model, not Culture, is the Dominant Term
  215. CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
  216. When double.Epsilon can equal 0
  217. Let's Encrypt's New Root and Intermediate Certificates
  218. A Thanksgiving Carol
  219. Nvidia’s Integration Dreams
  220. Phosphine gas in the cloud decks of Venus
  221. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  222. Some Great Books For Programmers That StackOverflow Cannot Replace
  223. Security by Obscurity is Underrated
  224. What Clojure spec is and what you can do with it (an illustrated guide)
  225. Raccoon Attack
  226. BashPitfalls - Greg's Wiki
  227. Oracle Developer Live—Java
  228. TLS certificate lifespan cut short: A win for security, or cause for chaos?
  229. Things I Learned to Become a Senior Software Engineer
  230. Verizon achieves milestone in future-proofing data from hackers
  231. Why you want to encrypt password hashes
  232. Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
  233. Attention is your scarcest resource
  234. Key exchange standards - Manning
  235. Key exchange standards - Manning
  236. connorferster/handcalcs
  237. The Why and How of Privacy and Security — This Too Shall Grow
  238. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  239. A Saudi Prince's Attempt to Silence Critics on Twitter
  240. I've decided to pursue a Bootstrap MBA
  241. Why I’m Writing A Book On Cryptography
  242. Minimal React: getting started with the frontend library
  243. Soatok’s Guide to Side-Channel Attacks
  244. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  245. So you want to roll your own crypto?
  246. Zoom is now critical infrastructure. That’s a concern
  247. Pure and Applied Chess
  248. It Took 2 Years To Make My First Dollar Selling A Product
  249. The Five Pillars Of Wealth Building - Darius Foroux
  250. Providers | PrivacyTools
  251. Is cloud security too easy to screw up? | A Cloud Guru
  252. A New Botnet Is Covertly Targeting Millions of Servers
  253. Cross-platform cryptography in .NET Core and .NET 5
  254. degoogle
  255. drduh/macOS-Security-and-Privacy-Guide
  256. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  257. What's new in the Windows Store client
  258. fast.ai releases new deep learning course, four libraries, and 600-page book
  259. Transfer a Software Project - Lessons Learned - dcaulfield
  260. jesseduffield/horcrux
  261. Obfuscating your email on the web
  262. A Guide to Autodidactism | Jack Kinsella
  263. Symmetric and Asymmetric Encryption in .NET Core
  264. You Need a Password Manager. Here Are the Best Ones
  265. Graphical Linear Algebra
  266. Let's Learn x86-64 Assembly! Part 0
  267. Nintendo DS Architecture | A Practical Analysis
  268. Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
  269. JWTs: Which Signing Algorithm Should I Use?
  270. Data Breach Statement - Utah Gun Exchange
  271. 2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
  272. Why I Left a Career as a Startup CTO to Become a Writer
  273. IBM Reveals Next-Generation IBM POWER10 Processor
  274. The Illustrated TLS Connection
  275. Frustrated? It's not you, it's Rust - fasterthanli.me
  276. Mozilla's failures and a path to profitability
  277. Intel® Trust Domain Extensions
  278. Handles are the better pointers
  279. Securing Web Application Secrets Through Azure Key Vault - Simple Talk
  280. Serverless apps on AWS using F# and fable
  281. Mozilla Alumni Network
  282. The CompSci Pub
  283. I don’t trust Signal
  284. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  285. Mobile Phone Streams
  286. bulletproofs::notes::range_proof - Rust
  287. How to encrypt and decrypt shared folders on my Synology NAS
  288. Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
  289. Building dashboards for operational visibility | Amazon Builders' Library
  290. A Brief History of The Deficit Myth with Dr. Stephanie Kelton
  291. Proof of X
  292. hephaest0s/usbkill
  293. 1Password for Linux development preview
  294. 27-inch iMac gets a major update
  295. Tales of the Autistic Developer - Senior Developer
  296. Physical Attractiveness Bias in the Legal System — The Law Project
  297. How it works - Briar
  298. Azure Cloud Shell Tips And Tricks | Build5Nines
  299. Cosmetics firm Avon leaks 19 million customer records (Includes interview)
  300. David Wong
  301. swyx Writing | Slack is Fumbling Developers
  302. Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
  303. .NET R&D Digest (July, 2020)
  304. Chessprogramming wiki
  305. Polymorphic Encryption Algorithms — Generating Code Dynamically
  306. Some SQL Tricks of an Application DBA
  307. You Want Options
  308. Tip 272 - Azure Security Best Practices
  309. Joe Bergeron | Java Obfuscation: A Pattern Language
  310. p410n3 blog
  311. Dropping Out of College to Join Facebook: 3 Years Later
  312. Storage 101: Data Security and Privacy - Simple Talk
  313. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  314. Exploring Fully Homomorphic Encryption
  315. Essays on programming I think about a lot
  316. You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
  317. Designing a New Old Home: Part 1
  318. The encrypted homelab
  319. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  320. MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
  321. What’s New in Thunderbird 78
  322. 100 Best Kubernetes Books of All Time
  323. Poor feedback from readers
  324. Hacking Reolink cameras for fun and profit
  325. Welcome to Element!
  326. Data Structures & Algorithms I Actually Used Working at Tech Companies
  327. Digicert revokes a raft of web security certificates
  328. A few thoughts about Signal’s Secure Value Recovery
  329. Trending
  330. crypto_stories.md
  331. Disabling Google 2FA Doesn't Need 2FA
  332. New German law would force ISPs to allow secret service to install trojans on user devices
  333. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  334. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  335. Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
  336. A Team
  337. Clean Architecture, 2 years later - Elton Minetto
  338. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  339. A Concurrency Cost Hierarchy
  340. VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
  341. Why I’m Writing A Book On Cryptography
  342. nabeelqu
  343. Why Can't I Reproduce Their Results?
  344. The true cost of knowledge | RoyalSloth
  345. Beware the Google Password Manager - fasterthanli.me
  346. Apple Lightning
  347. Oppose the EARN IT Act
  348. New Mac ransomware spreading through piracy - Malwarebytes Labs
  349. How CDNs Generate Certificates
  350. foambubble/foam
  351. How to get the best out of your Yubikey with GPG
  352. New US Bill would require makers of encrypted devices to leave a backdoor
  353. US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News
  354. Why AES-GCM Sucks
  355. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  356. Navigating Power & Status
  357. Journalist’s phone hacked by new ‘invisible’ technique: All he had to do was visit one website. Any website.
  358. Which Database should I use in my Azure Serverless App?
  359. Avoiding exposing identifier details to your users
  360. jonathan-laurent/AlphaZero.jl
  361. Do you CI? | Benji's Blog -
  362. How is NSA breaking so much crypto?
  363. Discovering Dennis Ritchie’s Lost Dissertation - CHM
  364. The smartest password policy enforcer for Active Directory
  365. Making your data residency choices easier with Azure
  366. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  367. End-to-End Encryption Update - Zoom Blog
  368. Zoom to Introduce New Censorship Features After Doing China's Bidding
  369. GitHub Terms of Service - GitHub Help
  370. Reasoning by Lego: The wrong way to think about cryptography.
  371. GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
  372. Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
  373. #FuckDiscord | Cadence's Blog
  374. May 2020 news · Gwern.net
  375. Exploration Strategies in Deep Reinforcement Learning
  376. How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
  377. DRY vs DAMP in Unit Tests
  378. How to set compensation using commonsense principles
  379. Playing Around With The Fuchsia Operating System
  380. Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
  381. 12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
  382. Google got rich from your data. DuckDuckGo is fighting back
  383. Discret 11, the French TV encryption of the 80's
  384. Hacking Windows with F# 5.0 Scripts
  385. Byzantine and non-Byzantine distributed systems
  386. Logging with Decorators in TypeScript
  387. How are you improving your technology skills today? Start by reading articles
  388. The Dictator's Army and charismatic founders
  389. Is a trillion-dollar worth of programming lying on the ground
  390. Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
  391. Introducing P2P Matrix | Matrix.org
  392. Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
  393. CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
  394. ScottHolden/BFSourceGen
  395. A Guide to Threat Modelling for Developers
  396. Against an Increasingly User-Hostile Web
  397. A Guide to Threat Modelling for Developers
  398. Obsidian
  399. Messaging with Azure Service Bus - Part 9 - Premium Features
  400. A Guide to Threat Modelling for Developers
  401. Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
  402. Org Mode - Organize Your Life In Plain Text!
  403. Implementing simple cooperative threads in C - Stephen Brennan
  404. Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
  405. TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10
  406. NIST Special Publication 800-63-3
  407. An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
  408. A Guide to Threat Modelling for Developers
  409. Introduction to quantum computing with Q# – Part 3, Single qubit gates
  410. Turning Signal App into a Coarse Tracking Device
  411. A Guide to Threat Modelling for Developers
  412. OpenBSD 6.7
  413. Want to build a side business? Just buy a great Domain Name | Deep South Ventures
  414. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  415. A Guide to Threat Modelling for Developers
  416. Cryptology ePrint Archive: Report 2020/572
  417. How Not to Store Passwords
  418. Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
  419. Replacing JWTs with Branca and PASETO in .NET Core
  420. Meshing with LinkerD2 using gRPC-enabled .NET Core services
  421. Lockdown Course: Introduction to Cryptography - James Grime
  422. Asgard Systems uses ML.NET to reduce food waste | .NET
  423. Make LLVM fast again
  424. Zoom buys Keybase to help it build end-to-end encryption
  425. Alternatives to PGP
  426. Cryptology ePrint Archive: Report 2018/607
  427. A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
  428. Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
  429. Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
  430. April Extensions for Firefox Preview
  431. Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
  432. Modern SAT solvers: fast, neat and underused (part 1 of N)
  433. Startup financial models - 12 templates compared for SaaS
  434. OpenPGP Message Format
  435. How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
  436. SailfishOS - Sailfish OS
  437. IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
  438. Why not "Why not WireGuard?"
  439. Messaging with Azure Service Bus - Part 5 - Message Sending Options
  440. keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
  441. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  442. Barbie typewriter
  443. Preventing Software Rot
  444. Search Results - Springer
  445. Build a C# App with CockroachDB and the .NET Npgsql Driver
  446. This is what end-to-end encryption should look like! - Jitsi
  447. FocalFossa/ReleaseNotes - Ubuntu Wiki
  448. How Netflix brings safer and faster streaming experience to the living room on crowded networks…
  449. ZEIT is now Vercel - Vercel
  450. Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
  451. “Stubs” in the .NET Runtime
  452. Scuttlebot peer-to-peer log store
  453. Saving Money on Internation Payments as a Remote Freelancer
  454. This is what end-to-end encryption should look like! - Jitsi
  455. Technical reasons to choose FreeBSD over GNU/Linux
  456. The limitations of Android N Encryption
  457. Hacking my Sixth Form College network in 1991
  458. Temporal circuit of macroscale dynamic brain activity supports human consciousness
  459. Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
  460. Messaging App Signal Threatens to Dump US Market if Anti-Encryption Bill Passes
  461. Learn dbatools in a Month of Lunches
  462. Running your own secure communication service with Matrix and Jitsi | Matrix.org
  463. Hack yourself first – how to go on the offence before online attackers do
  464. OnCheckin - Continuous Deployment for ASP.Net websites.
  465. Welcome · Real-World Cryptography MEAP V05
  466. How we recovered over $300K of Bitcoin
  467. Reassuring Words and Good Intentions Don't Mean Good Security
  468. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  469. A Message to Our Users - Zoom Blog
  470. The EARN IT Act Violates the Constitution
  471. Perspectives & gaps between theory, practice & industry research in cryptography
  472. .NET R&D Digest (March, 2020)
  473. Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
  474. US Government Wages War on Encryption
  475. Await | Writing an OS in Rust
  476. patents in crypto
  477. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  478. The Hardest Program I've Ever Written – journal.stuffwithstuff.com
  479. New grad vs senior dev
  480. Released: Microsoft.Data.SqlClient 2.0 Preview 2
  481. Speeding up Linux disk encryption
  482. Unsure Calculator
  483. [15] RFR 8172680: Support SHA-3 based Hmac algorithms
  484. A Quick Garbled Circuits Primer
  485. 0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
  486. Software Engineer - Jobs at Apple
  487. How Tailscale works
  488. Scott Helme
  489. MacBook Air
  490. Ryan_Connolly_Resume.docx
  491. EARN IT bill is aiming at destroying encryption. We must take action now.
  492. Async ValueTask Pooling in .NET 5 | .NET Blog
  493. US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News
  494. ploeh blog
  495. The polygons of Another World: Atari Jaguar
  496. MakerDAO gets stress tested as ETH price plummets
  497. The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
  498. EARN IT Must Not Happen
  499. What is Meshtastic?
  500. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  501. How I Survived Being A $220k/year Intern
  502. draft-ietf-mls-protocol-09
  503. Keybase
  504. EARN IT is a direct attack on end-to-end encryption
  505. Intel x86 Root of Trust: loss of trust
  506. Enhancing Pwned Passwords Privacy with Padding
  507. The growth of command line options, 1979-Present
  508. Re: SMB over QUIC: Files Without the VPN
  509. Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
  510. WireGuard Gives Linux a Faster, More Secure VPN
  511. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  512. zkMesh
  513. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  514. CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
  515. DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
  516. An Intuitive Guide to Linear Algebra – BetterExplained
  517. It’s 2020. Is your code ready for leap day?
  518. pwn.college BETA
  519. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  520. How can I create a password protected .zip file in Windows 10?
  521. The Zen of Go | Dave Cheney
  522. A Simple Range Proof From Polynomial Commitments - HackMD
  523. microsoft/electionguard
  524. TimeSnapper, automatic screenshot software, auto screen capture
  525. hassio-addons/addon-ssh
  526. Welcome to the UK .NET Tour 2020
  527. Source Code | OpenVPN
  528. A Brief Intro to Clean Architecture, Clean DDD, and CQRS
  529. Fundamental Concepts for Elastic Jobs in Azure SQL Database
  530. Messaging Layer Security: Towards a New Era of Secure Group Messaging
  531. Cryptologie
  532. Update on our new and upcoming security keys
  533. Latacora - Stop Using Encrypted Email
  534. dwmkerr/hacker-laws
  535. Real-World Cryptography
  536. The NuGet Blog
  537. How HTTPS works Part 1 — Building Blocks
  538. google/tink
  539. damienbod/AspNetCoreCertificates
  540. Serious Cryptography | No Starch Press
  541. draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
  542. Dino 0.1 Release - Dino. Communicating happiness.
  543. Ryujinx/Ryujinx
  544. Searching For New Adventures In Software Development
  545. Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
  546. Building personal search infrastructure for your knowledge and code | beepb00p
  547. Authentication, What The Fuck?
  548. How to write a simple operating system in assembly language
  549. Welcome to the UK .NET Tour 2020
  550. v5.8 Release Notes
  551. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  552. .NET Core, .NET 5; the exodus of .NET Framework?
  553. Autocrypt 1.1.0 documentation
  554. On Privacy versus Freedom | Matrix.org
  555. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  556. Google gives up on US carriers, will roll out its own RCS chat system
  557. .NET R&D Digest (November – December, 2019)
  558. Signal >> Blog >> Technology Preview for secure value recovery
  559. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  560. Zero allocation code in C# and Unity - Seba's Lab
  561. How to generate random numbers using water bubbles
  562. tmds/Tmds.Ssh
  563. oqtane/oqtane.framework
  564. Data breach disclosure 101: How to succeed after you've failed
  565. Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
  566. Why IVPN - What makes IVPN the best privacy protection service
  567. GateHub Investigation - Final Statement
  568. Stop surveillance and preserve your privacy with IVPN
  569. Isogeny crypto
  570. Homepage | ZKProof Standards
  571. dotnet/SqlClient
  572. Real World Crypto 2020 Program
  573. Thoughts on DNS-over-HTTPS
  574. x86/x64 SIMD Instruction List (SSE to AVX512)
  575. bye: FTP Support Is Going Away
  576. Verzekeraar Allianz informeert klanten over datalek - Security.NL
  577. Commas in big numbers everywhere: An OpenType adventure
  578. Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
  579. OceanLibrary/Ocean
  580. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  581. A detailed look at Ubuntu’s new experimental ZFS installer
  582. Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
  583. “Stubs” in the .NET Runtime
  584. Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
  585. Peddle the Pedal to the Metal
  586. praeclarum/sqlite-net
  587. beemdevelopment/Aegis
  588. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  589. PrivacySafe: The Anti-Cloud Appliance
  590. awslabs/s2n
  591. Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
  592. Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
  593. OWASP/CheatSheetSeries
  594. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  595. Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
  596. Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
  597. Security Incident - Please Change Your Password
  598. EV SSL Certificates Phased Out of New Browser Updates | Venafi
  599. Learn UI Design: The Complete Online Video Course
  600. KNOB Attack
  601. Gone forEVer!
  602. Extended Validation Certificates are (Really, Really) Dead
  603. Spying on HTTPS
  604. Online syntax highlighting for the masses!
  605. Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
  606. Canva Security Incident - May 24 FAQs
  607. Architecture for humans - Ayende @ Rahien
  608. Pwnie Awards
  609. More on Backdooring (or Not) WhatsApp - Schneier on Security
  610. ECMAScript 2015 Language Specification – ECMA-262 6th Edition
  611. Kazakhstan’s HTTPS Interception
  612. When a rewrite isn’t: rebuilding Slack on the desktop
  613. Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
  614. Digital Driver’s Licenses Could Become a Real Option in Some States
  615. CRYPTO-LAB
  616. Real-World Cryptography
  617. Proving security at scale with automated reasoning - All Things Distributed
  618. VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
  619. The Ultra Secure Crypto Storage & Communication Device
  620. Security advisory 2019-06-13 | Yubico
  621. I wanna go fast: HTTPS' massive speed advantage
  622. Fixing Random, part 34
  623. An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
  624. dotnet/coreclr
  625. Apple CryptoKit | Apple Developer Documentation
  626. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  627. Accessing UNIX sockets remotely from .NET - Red Hat Developer
  628. RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
  629. Ethical Alternatives & Resources - ethical.net
  630. dotnet/coreclr
  631. Top SSL Certificates Buyer's Guide
  632. Using Ed25519 signing keys for encryption
  633. Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
  634. Performance Improvements in .NET Core 3.0 | .NET Blog
  635. ZombieLoad Attack
  636. Domain Randomization for Sim2Real Transfer
  637. eyeDisk. Hacking the unhackable. Again | Pen Test Partners
  638. ZkVM: a new design for fast, confidential smart contracts
  639. Thank you Waitrose, now fix your insecure site
  640. Community and Communication going forward
  641. Do we need effects to get abstraction?
  642. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  643. A doorbell company owned by Amazon wants to start producing “crime news” and it’ll definitely end well
  644. mpm guide - niall t.l.
  645. The .NET Abstraction Pile
  646. A Recipe for Training Neural Networks
  647. Twisted Oak
  648. AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
  649. Peddle the Pedal to the Metal
  650. JDK 12 Security Enhancements
  651. Understanding the Limitations of HTTPS
  652. How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch
  653. Cryptologie
  654. We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
  655. Direct3D 11.3 Functional Specification
  656. Website enumeration insanity: how our personal data is leaked
  657. Verified cryptographic provider a triple threat
  658. The story of the Rendition Vérité 1000
  659. Scott Helme
  660. Dotnet-Boxed/Templates
  661. BoringTun, a userspace WireGuard implementation in Rust
  662. New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
  663. The WhibOx Contest Edition 2 - CYBERCRYPT
  664. Understanding STIR/SHAKEN
  665. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  666. We need to talk about Session Tickets
  667. Introduction
  668. Cybersecurity for the Public Interest - Schneier on Security
  669. Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
  670. Data Leakage from Encrypted Databases - Schneier on Security
  671. kelseyhightower/kubernetes-the-hard-way
  672. Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
  673. Crypto Canon - Andreessen Horowitz
  674. Blockchain Governance: Programming Our Future
  675. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  676. Keybase launches encrypted git
  677. AI Progress Measurement
  678. Microsecond Resolution Time Services for Windows
  679. vivri/Adjective
  680. On the Security of Password Managers - Schneier on Security
  681. Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
  682. Reconstructing SIGSALY - Schneier on Security
  683. Public-Interest Tech at the RSA Conference - Schneier on Security
  684. Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
  685. Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
  686. Hacking the GCHQ Backdoor - Schneier on Security
  687. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  688. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  689. El Chapo's Encryption Defeated by Turning His IT Consultant - Schneier on Security
  690. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  691. Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
  692. Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
  693. New Australian Backdoor Law - Schneier on Security
  694. Security Risks of Chatbots - Schneier on Security
  695. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  696. Security of Solid-State-Drive Encryption - Schneier on Security
  697. ID Systems Throughout the 50 States - Schneier on Security
  698. Cell Phone Security and Heads of State - Schneier on Security
  699. draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
  700. Ext4 Disk Layout - Ext4
  701. Modern Alternatives to PGP
  702. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  703. Real World Crypto 2019
  704. The year in post-quantum crypto
  705. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  706. The Case Against Quantum Computing - IEEE Spectrum
  707. Mathematics of Public Key Cryptography
  708. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  709. D. J. Bernstein / Talks
  710. Security in Times of Surveillance
  711. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  712. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  713. Pitching security vs. privacy is asking the wrong question
  714. libpqcrypto: Intro
  715. Security in Times of Surveillance
  716. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  717. The ROBOT Attack
  718. Unity Labs Publications | Unity
  719. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  720. Cloud Data Backup for Small Businesses | CrashPlan
  721. nucypher/nufhe
  722. RUB-NDS/TLS-Padding-Oracles
  723. [paper review] A faster, more efficient cryptocurrency
  724. mimoo/eureka
  725. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  726. Database Encryption
  727. Kerckhoffs’ principles – Why should I make my cipher public?
  728. Proxy re-encryption and FHE with NuCypher
  729. Attack of the week: searchable encryption and the ever-expanding leakage function
  730. Introducing Adiantum: Encryption for the Next Billion Users
  731. Quantum computing as a field is obvious bullshit
  732. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  733. Going old school: how I replaced Facebook with email
  734. » Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
  735. » Agrippa (A Book of the Dead) The Digital Antiquarian
  736. » Doing Windows, Part 6: Look and Feel The Digital Antiquarian
  737. » The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian
  738. » The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
  739. .NET Design Review: GitHub Quick Reviews
  740. Tuning a Runtime for Both Productivity and Performance
  741. We didn’t see this coming
  742. dotnet/coreclr
  743. MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
  744. no dogma podcast - powered by FeedBurner
  745. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
  746. Software Tokens Won't Save You
  747. Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1