Explore other dev related sites in this ring. If you would like to join this ring
click here
.
devring.club
Previous
Random
Next
linksfor.dev(s)
Posts for 'encryption'
My Vim Notes Setup
Meet the patent troll that won a $308 million jury trial against Apple
My programming principles • Borislav Grigorov
The Architecture Behind A One-Person Tech Startup
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
WTF are these security chips?
A pretty good guide to pretty good privacy
Goodbye OpenSSL, and Hello To Google Tink
MPC-Over-Signal
The Unparalleled Genius of John von Neumann
Signal Adds Payments—With a Privacy-Focused Cryptocurrency
Dumping user data from cheap tablets in minutes
How I Got Into Computers AppDev Edition
Leaked phone number of Mark Zuckerberg reveals he is on Signal
(PDF) Where has all the oil gone? BP branding and the discursive elimination of climate change risk
Legalizing Gay Marriage in Crusader Kings III with Ghidra
PostgreSQL Security Hardening
The Exception Model
Zero click vulnerability in Apple’s macOS Mail
C# 9 (Two Decades of C#: A Reference) • Ben Bowen's Blog
Apple's cooperation with authoritarian governments
Some opinionated thoughts on SQL databases
Cloudflare’s WAF is recognized as customers’ choice for 2021
Peace of mind backup - boa.nu
Fleeing WhatsApp for Privacy? Don't Turn to Telegram
Creation vs. Consumption
208.43.231.11 Git
A new Cloudflare Web Application Firewall
Getting started with Self Sovereign Identity SSI
.NET Standard 1.3 is no longer supported in AWS SDK for .NET version 3.7 | Amazon Web Services
OpenPGP Message Format
PGP is a Form of Minimalism [The Call of the Open Sidewalk]
About | Mina Illuminate
Single-primitive authenticated encryption for fun
It doesn't work | Frank DENIS random thoughts.
janroesner/sixty5o2
APT Encounters of the Third Kind
Building a phone book: Part I
C# 7 (Two Decades of C#: A Reference) • Ben Bowen's Blog
facebookresearch/Cupcake
The Evolution of Distributed Systems on Kubernetes
Is There a Case for Programmers to Unionize? - Qvault
On the Road to StarkNet: A Permissionless STARK-Powered L2 ZK-Rollup
CoinList
Browser Isolation for teams of all sizes
suite - Privacy-Enhancing Cryptography | CSRC | CSRC
Crystal 1.0 - What to expect
Welcome to Cloudflare Security Week 2021!
My self-study plan for electrical engineering
r/crypto - What's stopping the guy who has 2 guesses left to access his $240m bitcoin from copying all the data on the drive and trying again?
Hybrid encryption and the KEM/DEM paradigm
Episode 72 - Emulating a Video Game System in .NET with Ryujinx
The missing explanation of ZK-SNARKs: Part 1
Can we talk about client-side certificates?
Zero Knowledge Proof (with Avi Wigderson) - Numberphile
A Survey of Existing and Proposed TLS Visibility Solutions – Pomcor
Can an economy keep on growing? - Inverted Passion
What It Means to Learn to Code
Surreptitious Forwarding [The Call of the Open Sidewalk]
The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into
A Simple Personal Data Backup Setup
How are zlib, gzip and zip related? What do they have in common and how are they different?
YouTube
Key Exchange Standards
Becoming physically immune to brute-force attacks
About the March 8 & 9, 2021 Verkada camera hack
Block Cipher Structures: Ranked
Getting started with Dapr for .NET Developers
I want a Computer that I Own
4 Times I Felt Discriminated Against for Being a Female Developer
Notion is not a knowledge base
A flamegraph of Real-World Cryptography
It's not easy being green: EV HTTPS cert seller Sectigo questions Chrome's logic in burying EV HTTPS cert info
The Teams Dashboard: Finding a Product Voice
A Two-Version Visibility Solution for TLS 1.2 and TLS 1.3 based on a Handshake-Agnostic Middlebox – Pomcor
Online tool to generate and check bcrypt hashed passwords.
Hotpatch for Windows Server Azure Edition (preview)
February 2021 - Killing Turbotax
How I Might Have Hacked Any Microsoft Account - The Zero Hack
How Nacon Cracked and Pirated The Sinking City - Frogwares
Cryptology ePrint Archive: Report 2020/1491
Goodbye Client Affinity, Hello Data Protection with Azure
5 tools I use to protect my privacy online
Could Age Replace OpenPGP? [The Call of the Open Sidewalk]
How I cut GTA Online loading times by 70%
Camera Response Function
The security of the "Pass" password manager
The Economics of Biodiversity
Cryptology ePrint Archive: Report 2020/1610
How often should I rotate my ssh keys?
Microsoft Releases Azure Firewall Premium in Public Preview
[JDK-8262273] Deprecate 3DES and RC4 in Kerberos
Understanding how Leela Chess Zero works
Cryptography Interface Design is a Security Concern
Zero Bug Tolerance
Cryptographic Wear-Out for Symmetric Encryption
C#'s Functional Journey
California can enforce net neutrality law, judge rules in loss for ISPs
The Azure Security Architect Map
Don't Code Tired | ICYMI C# 8 New Features: Simplify Array Access and Range Code
Cryptology ePrint Archive: Report 2020/1581
Episode #4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
How to destroy the Earth
GetAddrInfoExA function (ws2tcpip.h) - Win32 apps
Cryptology ePrint Archive: Report 2020/1533
Using HPKE to Encrypt Request Payloads
Urbit :: the good, the bad, and the insane
Cryptology ePrint Archive: Report 2020/1536
Distributed Application Runtime (Dapr) v1.0 Announced
Making Easy Auth tokens survive releases on Linux Azure App Service
upgundecha/howtheysre
ASP.NET Core Dependency Injection: What is the IServiceCollection? - Steve Gordon - Code with Steve
A Visual Guide: To Sustainable Software Engineering
Interview: Amanda Schneider Milne, Software Developer / Manager / Executive
Multi-asset shielded pool project (MASP)
Securing the post-quantum world
Our Solo v2 launch is official!
Public-Key Cryptography Standard (PKCS) #11 v 3.0 has been released: What is it, and what does it mean for RHEL?
Good-bye ESNI, hello ECH!
Crackpot Cryptography and Security Theater
Why should I give you my ID card
2020 U.S. Election: Cybersecurity Analysis
A look at GSM
Reverie: An optimized zero-knowledge proof system
Writing high performance F# code
Report: Romanian Real Estate Portal Suffers Crippling Data Breach
Lessons Learned From My Last Startup: A Post Mortem
Is abstraction killing civilization? | datagubbe.se
Password Monitor: Safeguarding passwords in Microsoft Edge - Microsoft Research
ARCHITECTURE.md
Working with SSL Certificate in Azure App Service
Ideas That Created the Future
A Simple and Succinct Zero Knowledge Proof
Help users in Iran reconnect to Signal
Security: The Need-to-know principle
Threshold Cryptography with Omer Shlomovits from ZenGo
7 behaviours to avoid in a software architecture role - Daniel Watts
Tearing Down a Humidifier - Lei's Blog
Why Generation X will save the web - Hi, I'm Heather Burns.
SSL/TLS connection issue troubleshooting guide
The Best TLS and PKI Training Course in the World
My experience passing CKA and CKAD
Episode 10: Exploiting Authenticated Encryption Key Commitment!
LackRack - Eth0Wiki
All Stories Are Wrong, but Some Are Useful
The Subtle Hazards of Real-World Cryptography
I didn't install Signal for privacy
The Psychology of Stock Bubbles
How to properly store a password in the Database | Petre Popescu
Web Real-Time Communications (WebRTC) transforms the communications landscape; becomes a World Wide Web Consortium (W3C) Recommendation and multiple Internet Engineering Task Force (IETF) standards
The EU must protect the right to privacy and not attack end-to-end encryption
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
No, Java is not a Secure Programming Language
berty/berty
Tools I Love to Not Think About
What it means to be a cryptographer
SQL Server 2019 Always Encrypted: The Searchable Encryption! | Data Exposed: MVP Edition
survey.pdf
Write Crypto Code! Don't publish it!
pavlobu/deskreen
Technological stagnation: Why I came around
s-51: Ask Me Anything (AMA), with Joan Daemen
The architecture of my life | mjwsteenbergen-blog
AKS Zero To Hero - Series for everyone - Azure Greg
Release Notes | Bitwarden Help & Support
Stepping up for a truly open source Elasticsearch | Amazon Web Services
My Backup Strategy
So, You Want to CTF? (A Beginner’s Guide to CTFing)
Stepping up for a truly open source Elasticsearch | Amazon Web Services
Building your first Telegram Bot with ASP.NET Core
Please Stop Encrypting with RSA Directly
The worrying trend of game technology centralization
Code Spotlight: the Reference Implementation of Ed25519 (Part 1)
We can do better than Signal
CondensationDB/Condensation
Mesmerizing Chameleon Signatures
Is Writing as Important as Coding?
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme
A history of end-to-end encryption and the death of PGP
Fully Homomorphic Encryption Part Two: Lattice-based Crypto and the LWE Problem
KEMTLS: Post-quantum TLS without signatures
Fully Homomorphic Encryption Part One: A Gentle Intro
danso - happy-space: a whitespace-sensitive calculator
Holistic web protection: industry recognition for a prolific 2020
Foam
Send and receive WhatsApp messages through email
Learn X by doing Y - A project-based learning search engine
Introducing Strongly Typed HTTP Request Headers for ASP.NET Core - Steve Talks Code
jukefoxer/Signal-Android
An introduction to the Data Protection system in ASP.NET Core
Notification of Data Security Incident - December 23, 2020
My personal wishlist for a decentralized social network
Machine Learning with ML.NET - Linear Regression
Element group video messenger | Group chat | Team communication productivity app | Matrix open network | Decentralized end-to-end encryption
Wasmer - The Universal WebAssembly Runtime
Signal, thank you for not collecting my data. But I won’t use you.
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
safepassme
What I learned doing 125 public talks - Part I
Steam's login method is kinda interesting
.NET Rocks! vNext
WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app
DALL·E: Creating Images from Text
Extending the TLS 1.3 Visibility Solution to Include PSK and 0-RTT – Pomcor
HTTP keep-alive is on by default in modular AWS SDK for JavaScript | Amazon Web Services
SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
The Best Software Every Reverse Engineer Should Have for Cracking Software | PiProgramming
Cryptology ePrint Archive: Report 2020/1456
s-18: FSE 2020 Rump session
Shtetl-Optimized » Blog Archive » My vaccine crackpottery: a confession
Linux Hardening Guide | Madaidan's Insecurities
Why are video games graphics (still) a challenge? Productionizing rendering algorithms
zkSNARKS and Cryptographic Accumulators
NeurIPS 2020 Best Machine Learning Paper Awards
Web Authentication Methods Compared
Combating abuse in Matrix - without backdoors. | Matrix.org
Episode 6: Proving The Existence Of Vulnerabilities With Zero-Knowledge Proofs!
Google Discloses Poorly-Patched, Now Unpatched, Windows 0-Day Bug
Development time is money, therefore I RAID
Against Victimhood
The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing.
No, Cellebrite cannot 'break Signal encryption.'
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
Introduction to quantum computing with Q# – Part 11, EPR Quantum Key Distribution
Why I've Been Merging Microservices Back Into The Monolith At InVision
My Engineering Axioms
2020’s Top 15 Machine Learning & AI Research Papers
You're Missing Out If You Don't Write Weekly Digests
Cryptologie | Vetted Encryption
Apple M1 foreshadows RISC-V
Bizarre Design Choices In Zoom’S End-To-End Encryption
Branding Your Own Startup | Blog of Pascal
Commits are snapshots, not diffs - The GitHub Blog
Giving more tools to software engineers: the reorganization of the factory
How to conduct a competitive analysis - Philipp Muens
Adding Encrypted Group Calls to Signal
Learn about online security, privacy, and encryption
The 3 CSS Methods for Adding Element Borders | Modern CSS Solutions
Privacy and Compliance Reading List
Computers Are Bad
Encrypting your WAF Payloads with Hybrid Public Key Encryption (HPKE)
Google Alternatives 2020: Best Privacy Friendly Alternatives
How to Build a Global Network that Complies with Local Law
Parsing ETL traces yourself, part 2: The EventLogReader | The Old New Thing
There's Always More History • Hillel Wayne
Cloudflare and Apple design a new privacy-friendly internet protocol – TechCrunch
Improving DNS Privacy with Oblivious DoH in 1.1.1.1
From Zero to AppStore
Privacy needs to be built into the Internet
benwilber/boltstream
Welcome to Privacy & Compliance Week
InstaHide Disappointingly Wins Bell Labs Prize, 2nd Place
On Trusting Macintosh Hardware
An introduction to three-phase power and PDUs
Why did renewables become so cheap so fast? And what can we do to use this global opportunity for green growth?
How to Make Your Code Reviewer Fall in Love with You
Code Smell – Primitive Obsession and Refactoring Recipes - NDepend
An iOS zero-click radio proximity exploit odyssey
Gamedev from scratch 0: Groundwork
Release OpenZFS 2.0.0 · openzfs/zfs
We Need Organic Software
ph1lter
Are My Encryption Keys In The Cloud Really Secure?
How to Think for Yourself
An ex-Googler's guide to dev tools
Crypto Dictionary
Preliminary notes on analyzing Disk and File I/O performance with ETW traces | The Old New Thing
How do people find bugs?
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
Getting lucky with posting on Hacker News
Productive Uncertainty - Reaction Wheel
zkSummit 6 | Hopin
Normal Forms - Simple Talk
The book is finished, well sort of...
Facebook Is Going After Its Critics in the Name of Privacy
Risks from symmetric encryption in Ubiquiti UniFi’s inform protocol · Jade.WTF
The Signal Private Group System And Anonymous Credentials Supporting Efficient Verifiable Encryption
zfs.rent
Six months of Tiny Projects
‘You Have Zero Privacy’ Says an Internal RCMP Presentation. Inside the Force’s Web Spying Program | The Tyee
Claims encryption for B2C tokens | Developer Support
Can’t open apps on macOS: an OCSP disaster waiting to happen
Using Matrix to replace proprietary and centralized chat apps
Going Bark: A Furry’s Guide to End-to-End Encryption
Does Apple really log every app you run? A technical look
SAD DNS Explained
How a Game Developer Leaked 46 Million Accounts
Etebase - Your end-to-end encrypted backend
Get Animal Jam for your mobile device, PC, or Mac
caddytls: Support multiple issuers by mholt · Pull Request #3862 · caddyserver/caddy
Notes On Owning Your Own Business
How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab
Apple unveils M1, its first system-on-a-chip for Mac computers - 9to5Mac
Zoom lied to users about end-to-end encryption for years, FTC says
What is a System-on-Chip (SoC), and Why Do We Care if They are Open Source? « bunnie's blog
Making Mass Effect not require administrator rights, or maybe how not to write a boolean check
Over 1M Lazada RedMart accounts sold online after data breach
Productivity vs. Privacy
Multithreading Handbook for Simulation Developers
The missing explanation of zk-SNARKs: Part 2
https://www.statewatch.org/media/1434/eu-council-draft-declaration-against-encryption-12143-20.pdf
Announcing Spectrum DDoS Analytics and DDoS Insights & Trends
Collections: Iron, How Did They Make It, Addendum: Crucible Steel and Cast Iron
Standing on Our Own Two Feet
Querying Across Databases In SQL Azure
Scripts for Managing Azure Container Registry
A Brief Introduction to Deniability
Leaving OCaml
Two workers are quadratically better than one • Hillel Wayne
C# in Simple Terms - Exceptions and Exception Handling
ML Optimization - Advanced Optimizers from scratch with Python
The Basis of Testing – Stories from a Software Tester
Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA
The missing explanation of ZK-SNARKs: Part 1
Scott Santens - An Engineering Argument for Basic Income
Personal data from 2.8 million Eatigo accounts stolen, put up for sale online
RedMart Data Security Incident
Lazada suffers data breach; personal information from 1.1 million RedMart accounts for sale online
Episode 63 - Being Productive With Jay Miller
How software eats money
ML Optimization pt.1 - Gradient Descent with Python
Are my Encryption Keys in the Cloud Really Secure? | Cryptosense
gnu.org
Using encrypted access tokens in Azure with Microsoft.Identity.Web and Azure App registrations
1Password for Linux beta is now open 🎊 🐧 🎊 | 1Password
Advisory: Security Issues In Aws Kms And Aws Encryption Sdks
Azure CLI Oct 2020 release
Ransomware Group Makes Splashy $20K Donation to Charities
The accelerating adoption of Julia
Personal banking needs an API | Chris Hardie's Tech and Software Blog
Let's talk about fake reviews - part 1
14 Popular Machine Learning Evaluation Metrics
A Legislative Path to an Interoperable Internet
Questioning Probability
charmbracelet/glow
Introduction to quantum computing with Q# – Part 9, BB84 Quantum Key Distribution
Exposing covert surveillance backdoors in children’s smartwatches
XChaCha20-Poly1305: A Primer with Examples in .NET
Five Eyes and Japan call for Facebook backdoor to monitor crime
Event Feeds: Simple and reliable messaging infrastructure
Smart male chastity lock cock-up
Stop the EARN IT Bill Before It Breaks Encryption
Security Of Streaming Encryption In Google's Tink Library
It Didn’t Take Too Long…
Fortunately, I don't squash my commits
Cute Cryptography Stories
Cryptologie | Zero-Knowledge Proofs From Information-Theoretic Proof Systems
Wiki - RustStarterKit2020
Urgent: EARN IT Act Introduced in House of Representatives
Episode 61 - Azure and Live Conferences With Andy Morrell
Confidential Containers Nodes Now Supported on Azure Kubernetes Service (AKS) – Public Preview
Coinbase offers exit package to those uncomfortable with new direction
Doing discourse better: Stuff I wish I knew
is it worth it? — Martin Kleppmann’s blog
Advisory: security issues in AWS KMS and AWS Encryption SDKs
This Hacked Coffee Maker Demands Ransom and Demonstrates a Terrifying Implication About the IoT
Zig's New Relationship with LLVM
How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
Using Azure RBAC with Azure Key Vault
Uncomfortable Questions About App Signing
Python behind the scenes #2: how the CPython compiler works
71.177.243.54
Google Interview Questions Deconstructed: The Knight’s Dialer
Simple Anomaly Detection Using Plain SQL
Exclusive: Hackers Hit Virgin Mobile in Saudi Arabia
VPNs from first principles
No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler
Marc Andreessen On Productivity, Scheduling, Reading Habits, Work, and More - Andreessen Horowitz
dwmkerr/hacker-laws
Revenue Model, not Culture, is the Dominant Term
CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller
When double.Epsilon can equal 0
Let's Encrypt's New Root and Intermediate Certificates
A Thanksgiving Carol
Nvidia’s Integration Dreams
Phosphine gas in the cloud decks of Venus
GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
Some Great Books For Programmers That StackOverflow Cannot Replace
Security by Obscurity is Underrated
What Clojure spec is and what you can do with it (an illustrated guide)
Raccoon Attack
BashPitfalls - Greg's Wiki
Oracle Developer Live—Java
TLS certificate lifespan cut short: A win for security, or cause for chaos?
Things I Learned to Become a Senior Software Engineer
Verizon achieves milestone in future-proofing data from hackers
Why you want to encrypt password hashes
Athletic Anti-Nutrition: What a Vegan Diet Did to Carl Lewis
Attention is your scarcest resource
Key exchange standards - Manning
Key exchange standards - Manning
connorferster/handcalcs
The Why and How of Privacy and Security — This Too Shall Grow
Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
A Saudi Prince's Attempt to Silence Critics on Twitter
I've decided to pursue a Bootstrap MBA
Why I’m Writing A Book On Cryptography
Minimal React: getting started with the frontend library
Soatok’s Guide to Side-Channel Attacks
Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
So you want to roll your own crypto?
Zoom is now critical infrastructure. That’s a concern
Pure and Applied Chess
It Took 2 Years To Make My First Dollar Selling A Product
The Five Pillars Of Wealth Building - Darius Foroux
Heyyyyyyyyyyyy.com | email with *nuance*
Providers | PrivacyTools
Is cloud security too easy to screw up? | A Cloud Guru
A New Botnet Is Covertly Targeting Millions of Servers
Cross-platform cryptography in .NET Core and .NET 5
degoogle
drduh/macOS-Security-and-Privacy-Guide
Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
July 11, 2020 - LiveAuctioneers Account Security
What's new in the Windows Store client
fast.ai releases new deep learning course, four libraries, and 600-page book
Transfer a Software Project - Lessons Learned - dcaulfield
jesseduffield/horcrux
Obfuscating your email on the web
A Guide to Autodidactism | Jack Kinsella
Symmetric and Asymmetric Encryption in .NET Core
You Need a Password Manager. Here Are the Best Ones
Graphical Linear Algebra
Let's Learn x86-64 Assembly! Part 0
Nintendo DS Architecture | A Practical Analysis
Supporting Encrypted Content-Encoding in HttpClient - Replacing Bouncy Castle With .NET Core
JWTs: Which Signing Algorithm Should I Use?
Data Breach Statement - Utah Gun Exchange
2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity - Help Net Security
Why I Left a Career as a Startup CTO to Become a Writer
IBM Reveals Next-Generation IBM POWER10 Processor
The Illustrated TLS Connection
Frustrated? It's not you, it's Rust - fasterthanli.me
Mozilla's failures and a path to profitability
Intel® Trust Domain Extensions
Handles are the better pointers
Securing Web Application Secrets Through Azure Key Vault - Simple Talk
Serverless apps on AWS using F# and fable
Mozilla Alumni Network
The CompSci Pub
I don’t trust Signal
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Mobile Phone Streams
bulletproofs::notes::range_proof - Rust
How to encrypt and decrypt shared folders on my Synology NAS
Bill Gates on Covid: Most US Tests Are ‘Completely Garbage’
Building dashboards for operational visibility | Amazon Builders' Library
A Brief History of The Deficit Myth with Dr. Stephanie Kelton
Proof of X
hephaest0s/usbkill
1Password for Linux development preview
27-inch iMac gets a major update
Tales of the Autistic Developer - Senior Developer
Physical Attractiveness Bias in the Legal System — The Law Project
How it works - Briar
Azure Cloud Shell Tips And Tricks | Build5Nines
Cosmetics firm Avon leaks 19 million customer records (Includes interview)
David Wong
swyx Writing | Slack is Fumbling Developers
Leveraging Cloudflare Workers to prevent attackers from bypassing your Cloudflare WAF
.NET R&D Digest (July, 2020)
Chessprogramming wiki
Polymorphic Encryption Algorithms — Generating Code Dynamically
Some SQL Tricks of an Application DBA
You Want Options
Tip 272 - Azure Security Best Practices
Joe Bergeron | Java Obfuscation: A Pattern Language
p410n3 blog
Dropping Out of College to Join Facebook: 3 Years Later
Storage 101: Data Security and Privacy - Simple Talk
Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
Exploring Fully Homomorphic Encryption
Essays on programming I think about a lot
You Can’t Kill the Bloomberg Terminal. But If You Were Going to Try, Here’s How.
Designing a New Old Home: Part 1
The encrypted homelab
Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
MAVERICK LIFE TECH: Four steps to take right now to protect your accounts from hackers
What’s New in Thunderbird 78
100 Best Kubernetes Books of All Time
Poor feedback from readers
Hacking Reolink cameras for fun and profit
Welcome to Element!
Data Structures & Algorithms I Actually Used Working at Tech Companies
Digicert revokes a raft of web security certificates
A few thoughts about Signal’s Secure Value Recovery
Trending
crypto_stories.md
Disabling Google 2FA Doesn't Need 2FA
New German law would force ISPs to allow secret service to install trojans on user devices
[tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Pulsar vs Kafka - Comparison and Myths Explored - Kai Waehner
A Team
Clean Architecture, 2 years later - Elton Minetto
Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
A Concurrency Cost Hierarchy
VC Firms Promised to Help Black Founders. My Experience Shows a Different Reality.
Why I’m Writing A Book On Cryptography
nabeelqu
Why Can't I Reproduce Their Results?
The true cost of knowledge | RoyalSloth
Beware the Google Password Manager - fasterthanli.me
Apple Lightning
Oppose the EARN IT Act
New Mac ransomware spreading through piracy - Malwarebytes Labs
How CDNs Generate Certificates
foambubble/foam
How to get the best out of your Yubikey with GPG
New US Bill would require makers of encrypted devices to leave a backdoor
US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News
Why AES-GCM Sucks
There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
Navigating Power & Status
Journalist’s phone hacked by new ‘invisible’ technique: All he had to do was visit one website. Any website.
Which Database should I use in my Azure Serverless App?
Avoiding exposing identifier details to your users
jonathan-laurent/AlphaZero.jl
Do you CI? | Benji's Blog -
How is NSA breaking so much crypto?
Discovering Dennis Ritchie’s Lost Dissertation - CHM
The smartest password policy enforcer for Active Directory
Making your data residency choices easier with Azure
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
End-to-End Encryption Update - Zoom Blog
Zoom to Introduce New Censorship Features After Doing China's Bidding
GitHub Terms of Service - GitHub Help
Reasoning by Lego: The wrong way to think about cryptography.
GitHub to replace "master" with alternative term to avoid slavery references | ZDNet
Why Low Pay In the Games Industry Leads to Bad Games – Aaron Nemoyten
#FuckDiscord | Cadence's Blog
May 2020 news · Gwern.net
Exploration Strategies in Deep Reinforcement Learning
How Wikipedia Lost 3 Billion Organic Search Visits To Google in 2019 | Hacker Noon
DRY vs DAMP in Unit Tests
How to set compensation using commonsense principles
Playing Around With The Fuchsia Operating System
Borg+Vorta is finally a usable backup solution for Linux desktop | Blog by Simon Frey
12 Lessons from Saying No to a Life of Mediocrity – The Blog of Joe Balcom
Google got rich from your data. DuckDuckGo is fighting back
Discret 11, the French TV encryption of the 80's
Hacking Windows with F# 5.0 Scripts
Byzantine and non-Byzantine distributed systems
Logging with Decorators in TypeScript
How are you improving your technology skills today? Start by reading articles
The Dictator's Army and charismatic founders
Is a trillion-dollar worth of programming lying on the ground
Haveibeenpwned.com pwned our helpdesk! GLPI 9.4.5 SQL Injection – fyr.io
Introducing P2P Matrix | Matrix.org
Reconstructing a lost NES game from 30-year-old source code disks – Video Game History Foundation
CVE-2019-9506 | Encryption Key Negotiation of Bluetooth Vulnerability
ScottHolden/BFSourceGen
A Guide to Threat Modelling for Developers
Against an Increasingly User-Hostile Web
A Guide to Threat Modelling for Developers
Obsidian
Messaging with Azure Service Bus - Part 9 - Premium Features
A Guide to Threat Modelling for Developers
Azure Cosmos DB wrap-up: May 2020 BUILD Announcements | Azure Cosmos DB Blog
Org Mode - Organize Your Life In Plain Text!
Implementing simple cooperative threads in C - Stephen Brennan
Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web | ZDNet
TUXEDO Book BA15 - Gen10 - 15,6 Zoll non-glare Full-HD IPS + AMD Ryzen 3500U + AMD Radeon Vega 8 Graphics + max. two SSDs (M.2) + max. 32GB RAM - TUXEDO Book BA15 - Gen10
NIST Special Publication 800-63-3
An Amazon Programmer's Perspective (http://pastebin.com/BjD84BQ3)
A Guide to Threat Modelling for Developers
Introduction to quantum computing with Q# – Part 3, Single qubit gates
Turning Signal App into a Coarse Tracking Device
A Guide to Threat Modelling for Developers
OpenBSD 6.7
Want to build a side business? Just buy a great Domain Name | Deep South Ventures
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
A Guide to Threat Modelling for Developers
Cryptology ePrint Archive: Report 2020/572
How Not to Store Passwords
Now there's nothing stopping the PATRIOT Act allowing the FBI to slurp web-browsing histories without a warrant
Replacing JWTs with Branca and PASETO in .NET Core
Meshing with LinkerD2 using gRPC-enabled .NET Core services
Lockdown Course: Introduction to Cryptography - James Grime
Asgard Systems uses ML.NET to reduce food waste | .NET
Make LLVM fast again
Zoom buys Keybase to help it build end-to-end encryption
Alternatives to PGP
Cryptology ePrint Archive: Report 2018/607
A Rust-based TLS library outperformed OpenSSL in almost every category | ZDNet
Zoom Acquires Keybase and Announces Goal of Developing the Most Broadly Used Enterprise End-to-End Encryption Offering - Zoom Blog
Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server
April Extensions for Firefox Preview
Apple updates 13-inch MacBook Pro with Magic Keyboard, double the storage, and faster performance
Modern SAT solvers: fast, neat and underused (part 1 of N)
Startup financial models - 12 templates compared for SaaS
OpenPGP Message Format
How Distributed Application Runtime (Dapr) has grown since its announcement - Open Source Blog
SailfishOS - Sailfish OS
IPFS 0.5.0 is here! Our largest upgrade to IPFS yet
Why not "Why not WireGuard?"
Messaging with Azure Service Bus - Part 5 - Message Sending Options
keys.pub - Cryptographic key management, sigchains, user identities, signing, encryption, password manager.
Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
Barbie typewriter
Preventing Software Rot
Search Results - Springer
Build a C# App with CockroachDB and the .NET Npgsql Driver
This is what end-to-end encryption should look like! - Jitsi
FocalFossa/ReleaseNotes - Ubuntu Wiki
How Netflix brings safer and faster streaming experience to the living room on crowded networks…
ZEIT is now Vercel - Vercel
Adding simple email address obfuscation for your blog like Cloudflare Scrape Shield
“Stubs” in the .NET Runtime
Scuttlebot peer-to-peer log store
Saving Money on Internation Payments as a Remote Freelancer
This is what end-to-end encryption should look like! - Jitsi
Technical reasons to choose FreeBSD over GNU/Linux
The limitations of Android N Encryption
Hacking my Sixth Form College network in 1991
Temporal circuit of macroscale dynamic brain activity supports human consciousness
Let's Stop the 5G Hysteria: Understanding Hoaxes and Disinformation Campaigns
Messaging App Signal Threatens to Dump US Market if Anti-Encryption Bill Passes
Learn dbatools in a Month of Lunches
Running your own secure communication service with Matrix and Jitsi | Matrix.org
Hack yourself first – how to go on the offence before online attackers do
OnCheckin - Continuous Deployment for ASP.Net websites.
Welcome · Real-World Cryptography MEAP V05
How we recovered over $300K of Bitcoin
Reassuring Words and Good Intentions Don't Mean Good Security
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
A Message to Our Users - Zoom Blog
The EARN IT Act Violates the Constitution
Perspectives & gaps between theory, practice & industry research in cryptography
.NET R&D Digest (March, 2020)
Report: 42M Iranian "Telegram" User IDs & Phone Numbers Leaked Online
US Government Wages War on Encryption
Await | Writing an OS in Rust
patents in crypto
Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
The Hardest Program I've Ever Written – journal.stuffwithstuff.com
New grad vs senior dev
Released: Microsoft.Data.SqlClient 2.0 Preview 2
Speeding up Linux disk encryption
Unsure Calculator
[15] RFR 8172680: Support SHA-3 based Hmac algorithms
A Quick Garbled Circuits Primer
0 to 100: Learning to Code with Kotlin - Marcus Eisele - Developer and Blogger
Software Engineer - Jobs at Apple
How Tailscale works
Scott Helme
MacBook Air
Ryan_Connolly_Resume.docx
EARN IT bill is aiming at destroying encryption. We must take action now.
Async ValueTask Pooling in .NET 5 | .NET Blog
US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News
ploeh blog
The polygons of Another World: Atari Jaguar
MakerDAO gets stress tested as ETH price plummets
The Difference Between API Gateways and Service Mesh - Cloud Native Computing Foundation
EARN IT Must Not Happen
What is Meshtastic?
Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
How I Survived Being A $220k/year Intern
draft-ietf-mls-protocol-09
Keybase
EARN IT is a direct attack on end-to-end encryption
Intel x86 Root of Trust: loss of trust
Enhancing Pwned Passwords Privacy with Padding
The growth of command line options, 1979-Present
Re: SMB over QUIC: Files Without the VPN
Relating Natural Language Aptitude to Individual Differences in Learning Programming Languages
WireGuard Gives Linux a Faster, More Secure VPN
Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
zkMesh
The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
CppCon 2014: Chandler Carruth "Efficiency with Algorithms, Performance with Data Structures"
DOJ Plans to Strike Against Encryption While the Techlash Iron Is Hot
An Intuitive Guide to Linear Algebra – BetterExplained
It’s 2020. Is your code ready for leap day?
pwn.college BETA
If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
How can I create a password protected .zip file in Windows 10?
The Zen of Go | Dave Cheney
A Simple Range Proof From Polynomial Commitments - HackMD
microsoft/electionguard
TimeSnapper, automatic screenshot software, auto screen capture
hassio-addons/addon-ssh
Welcome to the UK .NET Tour 2020
Source Code | OpenVPN
A Brief Intro to Clean Architecture, Clean DDD, and CQRS
Fundamental Concepts for Elastic Jobs in Azure SQL Database
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Cryptologie
Update on our new and upcoming security keys
Latacora - Stop Using Encrypted Email
dwmkerr/hacker-laws
Real-World Cryptography
The NuGet Blog
How HTTPS works Part 1 — Building Blocks
google/tink
damienbod/AspNetCoreCertificates
Serious Cryptography | No Starch Press
draft-ietf-mls-architecture-04 - The Messaging Layer Security (MLS) Architecture
Dino 0.1 Release - Dino. Communicating happiness.
Ryujinx/Ryujinx
Searching For New Adventures In Software Development
Sungrow Crabby With Researcher Over Security Vulnerability Disclosure
Building personal search infrastructure for your knowledge and code | beepb00p
Authentication, What The Fuck?
How to write a simple operating system in assembly language
Welcome to the UK .NET Tour 2020
v5.8 Release Notes
The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
.NET Core, .NET 5; the exodus of .NET Framework?
Autocrypt 1.1.0 documentation
On Privacy versus Freedom | Matrix.org
Vim cryptmethod is not authenticated · Issue #638 · vim/vim
Google gives up on US carriers, will roll out its own RCS chat system
.NET R&D Digest (November – December, 2019)
Signal >> Blog >> Technology Preview for secure value recovery
Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
Zero allocation code in C# and Unity - Seba's Lab
How to generate random numbers using water bubbles
tmds/Tmds.Ssh
oqtane/oqtane.framework
Data breach disclosure 101: How to succeed after you've failed
Amazon.com: Synology 5 bay NAS DiskStation DS1019+ (Diskless): Computers & Accessories
Why IVPN - What makes IVPN the best privacy protection service
GateHub Investigation - Final Statement
Stop surveillance and preserve your privacy with IVPN
Isogeny crypto
Homepage | ZKProof Standards
dotnet/SqlClient
Real World Crypto 2020 Program
Thoughts on DNS-over-HTTPS
x86/x64 SIMD Instruction List (SSE to AVX512)
bye: FTP Support Is Going Away
Verzekeraar Allianz informeert klanten over datalek - Security.NL
Commas in big numbers everywhere: An OpenType adventure
Competitive Pest Services Data Breach: What Happened and How We Plan to Fix It - Competitive Pest Control
OceanLibrary/Ocean
Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
A detailed look at Ubuntu’s new experimental ZFS installer
Intel 545s 2.5" 256GB SATA III 64-Layer 3D NAND TLC Internal Solid State Drive (SSD) SSDSC2KW256G8X1 - Newegg.com
“Stubs” in the .NET Runtime
Breaking change proposal: StringInfo and TextElementEnumerator to support extended grapheme clusters · Issue #30955 · dotnet/runtime
Peddle the Pedal to the Metal
praeclarum/sqlite-net
beemdevelopment/Aegis
draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
PrivacySafe: The Anti-Cloud Appliance
awslabs/s2n
Discovering Hard Disk Physical Geometry through Microbenchmarking « Blog
Why Are You Removing Website Identity, Google and Mozilla? - CA Security Council
OWASP/CheatSheetSeries
OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
Firefox and Chrome will remove GUI indicator for Extended Validation certificates (Bulletproof TLS Newsletter Issue #56)
Thread by @ErrataRob: "Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's n […]"
Security Incident - Please Change Your Password
EV SSL Certificates Phased Out of New Browser Updates | Venafi
Learn UI Design: The Complete Online Video Course
KNOB Attack
Gone forEVer!
Extended Validation Certificates are (Really, Really) Dead
Spying on HTTPS
Online syntax highlighting for the masses!
Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t
Canva Security Incident - May 24 FAQs
Architecture for humans - Ayende @ Rahien
Add passwords to list of stuff CafePress made hash of storing, says infoseccer. 11m+ who used Facebook 'n' pals to sign in were lucky
Pwnie Awards
More on Backdooring (or Not) WhatsApp - Schneier on Security
ECMAScript 2015 Language Specification – ECMA-262 6th Edition
Kazakhstan’s HTTPS Interception
When a rewrite isn’t: rebuilding Slack on the desktop
Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Office 365
Digital Driver’s Licenses Could Become a Real Option in Some States
CRYPTO-LAB
Real-World Cryptography
Proving security at scale with automated reasoning - All Things Distributed
VPS' IP Address will be blocked in Iran and China after using Outline VPN · Issue #193 · Jigsaw-Code/outline-server
The Ultra Secure Crypto Storage & Communication Device
Security advisory 2019-06-13 | Yubico
I wanna go fast: HTTPS' massive speed advantage
Fixing Random, part 34
An Experimental Floating-Point Scalar Evolution :: Duskborn — Duskborn Labs is where Neil ‘@sheredom‘ Henning writes up things of interest.
dotnet/coreclr
Apple CryptoKit | Apple Developer Documentation
Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
Accessing UNIX sockets remotely from .NET - Red Hat Developer
RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)
Ethical Alternatives & Resources - ethical.net
dotnet/coreclr
Top SSL Certificates Buyer's Guide
Using Ed25519 signing keys for encryption
Exploring .NET Core platform intrinsics: Part 4 - Alignment and pipelining
Performance Improvements in .NET Core 3.0 | .NET Blog
ZombieLoad Attack
Domain Randomization for Sim2Real Transfer
eyeDisk. Hacking the unhackable. Again | Pen Test Partners
ZkVM: a new design for fast, confidential smart contracts
Thank you Waitrose, now fix your insecure site
Community and Communication going forward
Do we need effects to get abstraction?
RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
A doorbell company owned by Amazon wants to start producing “crime news” and it’ll definitely end well
mpm guide - niall t.l.
The .NET Abstraction Pile
A Recipe for Training Neural Networks
Twisted Oak
AES-NI (.NET) - Outperforming C and OpenSSL - Nicolas Portmann - .NET / Java / Security
Peddle the Pedal to the Metal
JDK 12 Security Enhancements
Understanding the Limitations of HTTPS
How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch
Cryptologie
We have discovered and addressed a security breach. (Updated 2019-04-12) | Matrix.org
Direct3D 11.3 Functional Specification
Website enumeration insanity: how our personal data is leaked
Verified cryptographic provider a triple threat
The story of the Rendition Vérité 1000
Scott Helme
Dotnet-Boxed/Templates
BoringTun, a userspace WireGuard implementation in Rust
New AMD EPYC-Powered Amazon EC2 M5ad and R5ad Instances | Amazon Web Services
The WhibOx Contest Edition 2 - CYBERCRYPT
Understanding STIR/SHAKEN
Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
We need to talk about Session Tickets
Introduction
Cybersecurity for the Public Interest - Schneier on Security
Friday Squid Blogging: Chinese Squid-Processing Facility - Schneier on Security
Data Leakage from Encrypted Databases - Schneier on Security
kelseyhightower/kubernetes-the-hard-way
Kubernetes 1.12: Kubelet TLS Bootstrap and Azure Virtual Machine Scale Sets (VMSS) Move to General Availability
Crypto Canon - Andreessen Horowitz
Blockchain Governance: Programming Our Future
Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
Keybase launches encrypted git
AI Progress Measurement
Microsecond Resolution Time Services for Windows
vivri/Adjective
On the Security of Password Managers - Schneier on Security
Friday Squid Blogging: Sharp-Eared Enope Squid - Schneier on Security
Reconstructing SIGSALY - Schneier on Security
Public-Interest Tech at the RSA Conference - Schneier on Security
Security Analysis of the LIFX Smart Light Bulb - Schneier on Security
Friday Squid Blogging: Squids on the Tree of Life - Schneier on Security
Hacking the GCHQ Backdoor - Schneier on Security
Friday Squid Blogging: Squid Lollipops - Schneier on Security
Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
El Chapo's Encryption Defeated by Turning His IT Consultant - Schneier on Security
Friday Squid Blogging: New Giant Squid Video - Schneier on Security
Friday Squid Blogging: Illegal North Korean Squid Fishing - Schneier on Security
Friday Squid Blogging: More Problems with the Squid Emoji - Schneier on Security
New Australian Backdoor Law - Schneier on Security
Security Risks of Chatbots - Schneier on Security
Friday Squid Blogging: Squid Sculptures - Schneier on Security
Security of Solid-State-Drive Encryption - Schneier on Security
ID Systems Throughout the 50 States - Schneier on Security
Cell Phone Security and Heads of State - Schneier on Security
draft-irtf-cfrg-gcmsiv-09 - AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
Ext4 Disk Layout - Ext4
Modern Alternatives to PGP
proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
Real World Crypto 2019
The year in post-quantum crypto
Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
The Case Against Quantum Computing - IEEE Spectrum
Mathematics of Public Key Cryptography
CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
D. J. Bernstein / Talks
Security in Times of Surveillance
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
Pitching security vs. privacy is asking the wrong question
libpqcrypto: Intro
Security in Times of Surveillance
Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
The ROBOT Attack
Unity Labs Publications | Unity
Mersenne Prime Discovery - 2^82589933-1 is Prime!
Cloud Data Backup for Small Businesses | CrashPlan
nucypher/nufhe
RUB-NDS/TLS-Padding-Oracles
[paper review] A faster, more efficient cryptocurrency
mimoo/eureka
Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
Database Encryption
Kerckhoffs’ principles – Why should I make my cipher public?
Proxy re-encryption and FHE with NuCypher
Attack of the week: searchable encryption and the ever-expanding leakage function
Introducing Adiantum: Encryption for the Next Billion Users
Quantum computing as a field is obvious bullshit
Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
Going old school: how I replaced Facebook with email
» Whither the Software Artist? (or, How Trip Hawkins Learned to Stop Worrying and Love the Consoles) The Digital Antiquarian
» Agrippa (A Book of the Dead) The Digital Antiquarian
» Doing Windows, Part 6: Look and Feel The Digital Antiquarian
» The Game of Everything, Part 9: Civilization and Economics The Digital Antiquarian
» The View from the Trenches (or, Some Deadly Sins of CRPG Design) The Digital Antiquarian
.NET Design Review: GitHub Quick Reviews
Tuning a Runtime for Both Productivity and Performance
We didn’t see this coming
dotnet/coreclr
MVC is too complex to be usable? · Issue #7039 · dotnet/aspnetcore
no dogma podcast - powered by FeedBurner
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1
Software Tokens Won't Save You
Built in options for running async tasks: Running async tasks on app startup in ASP.NET Core - Part 1