Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Towards Federated Key Transparency (soatok.blog)
47 points by bo0tzz on June 7, 2024 | past | 19 comments
Understanding HKDF (soatok.blog)
2 points by fanf2 on May 29, 2024 | past
It's Time for Furries to Stop Using Telegram (soatok.blog)
5 points by Kye on May 14, 2024 | past
The Tech Industry Doesn't Understand Consent – Opt-Out Is Not Consent (soatok.blog)
126 points by todsacerdoti on Feb 28, 2024 | past | 67 comments
KEM Trails – Understanding Key Encapsulation Mechanisms (soatok.blog)
7 points by todsacerdoti on Feb 26, 2024 | past
Would Be More Professionally Useful If Not for the Furry Art (soatok.blog)
2 points by some_furry on Nov 21, 2023 | past
This Would Be More Professionally Useful If Not For the Furry Art (soatok.blog)
10 points by Kye on Nov 17, 2023 | past
Database Cryptography for the Rest of Us (soatok.blog)
3 points by zigzag312 on Nov 8, 2023 | past
A plan for multicast support in noise-based protocols (soatok.blog)
3 points by api on Oct 10, 2023 | past | 1 comment
A Plan for Multicast Support in Noise-Based Protocols (soatok.blog)
2 points by todsacerdoti on Oct 10, 2023 | past
Return to Office Is Bullshit and Everyone Knows It (soatok.blog)
926 points by Kye on Oct 2, 2023 | past | 885 comments
An Introduction to Database Cryptography (soatok.blog)
1 point by soatok on July 7, 2023 | past
Asymmetric Cryptographic Commitments (soatok.blog)
13 points by sysadm1n on May 17, 2023 | past | 5 comments
Database cryptography fur the rest of us (soatok.blog)
2 points by sneakerblack on March 20, 2023 | past
Database Cryptography Fur the Rest of Us: An intro to database cryptography (soatok.blog)
2 points by yarapavan on March 13, 2023 | past
Database Cryptography Fur the Rest of Us (soatok.blog)
5 points by makaimc on March 6, 2023 | past
Database Cryptography Fur the Rest of Us (soatok.blog)
4 points by yboulkaid on March 1, 2023 | past
Database Cryptography Fur the Rest of Us (soatok.blog)
15 points by todsacerdoti on March 1, 2023 | past
How You Respond to Security Researchers Says Everything About You (soatok.blog)
43 points by todsacerdoti on Jan 21, 2023 | past | 17 comments
What We Do in the /etc/shadow – Cryptography with Passwords (soatok.blog)
98 points by psanford on Jan 5, 2023 | past | 29 comments
What We Do in the /etc./Shadow – Cryptography with Passwords (soatok.blog)
2 points by signa11 on Dec 30, 2022 | past
What We Do in the /etc./Shadow – Cryptography with Passwords (soatok.blog)
5 points by todsacerdoti on Dec 29, 2022 | past
Extending the AES-GCM Nonce Without Nightmare Fuel (soatok.blog)
6 points by todsacerdoti on Dec 21, 2022 | past | 2 comments
Security Research on Twitter: Before and After Musk’s Takeover (soatok.blog)
9 points by gronky_ on Dec 17, 2022 | past | 1 comment
Security Research on Twitter: Before and After Musk's Takeover (soatok.blog)
4 points by some_furry on Dec 16, 2022 | past
Towards End-to-End Encryption for Direct Messages in the Fediverse (soatok.blog)
10 points by MostlyInnocent on Nov 23, 2022 | past | 1 comment
Towards End-to-End Encryption for Direct Messages in the Fediverse (soatok.blog)
6 points by phoe-krk on Nov 22, 2022 | past
Towards End-to-End Encryption for Direct Messages in the Fediverse (soatok.blog)
8 points by todsacerdoti on Nov 22, 2022 | past | 2 comments
Should you delete your Patreon account after they laid off their security team? (soatok.blog)
86 points by some_furry on Sept 9, 2022 | past | 85 comments
Cryptographic Agility and Superior Alternatives (soatok.blog)
2 points by thadt on Aug 25, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: