Hacker Newsnew | past | comments | ask | show | jobs | submit | some_furry's submissionslogin
31.Going Bark: A Furry's Guide to End-to-End Encryption (soatok.blog)
6 points by some_furry on Nov 14, 2020 | past | 1 comment
32.A Brief Introduction to Deniability (soatok.blog)
5 points by some_furry on Nov 4, 2020 | past
33.Bizarre Design Choices in Zoom's End-to-End Encryption (soatok.blog)
47 points by some_furry on Oct 28, 2020 | past
34.Dead Ends in Cryptanalysis: Length Extension Attacks (soatok.blog)
1 point by some_furry on Oct 7, 2020 | past
35.Dead Ends in Cryptanalysis: Length Extension Attacks (soatok.blog)
3 points by some_furry on Oct 7, 2020 | past
36.Show HN: Constant-Time Algorithm Implementations in TypeScript (github.com/soatok)
1 point by some_furry on Oct 5, 2020 | past
37.Show HN: Constant-Time-JS – Constant-Time Algorithms in TypeScript (github.com/soatok)
2 points by some_furry on Oct 1, 2020 | past | 1 comment
38.Show HN: Constant-Time-JS – Constant-Time Algorithms in TypeScript (github.com/soatok)
1 point by some_furry on Sept 29, 2020 | past
39.EduTech Spyware Is Still Spyware: Proctorio Edition (soatok.blog)
26 points by some_furry on Sept 12, 2020 | past | 9 comments
40.Designing New Cryptography for Non-Standard Threat Models (soatok.blog)
30 points by some_furry on Sept 9, 2020 | past | 2 comments
41.Invisible Salamanders in AES-GCM-SIV (keymaterial.net)
5 points by some_furry on Sept 8, 2020 | past
42.Guide to Cryptographic Side-Channel Attacks (soatok.blog)
2 points by some_furry on Aug 31, 2020 | past
43.Soatok's Guide to Side-Channel Attacks (soatok.blog)
2 points by some_furry on Aug 28, 2020 | past
44.Soatok's Guide to Side-Channel Attacks (soatok.blog)
1 point by some_furry on Aug 27, 2020 | past
45.Dorking Your Way to Search Results That Don't Suck (soatok.blog)
1 point by some_furry on Aug 10, 2020 | past
46.Show HN: Minisign-PHP – Cryptographically sign/verify files (for PHP developers) (github.com/soatok)
2 points by some_furry on Aug 8, 2020 | past
47.Kerlissions: Trivial Collisions in Iota's Hash Function (Kerl) (soatok.blog)
4 points by some_furry on July 15, 2020 | past
48.Add test vectors to demonstrate kerlissions in Kerl hash function (Iota) (github.com/iotaledger)
1 point by some_furry on July 15, 2020 | past
49.SIGRed: Exploiting a 17 Year-Old Bug in Windows DNS Servers (checkpoint.com)
9 points by some_furry on July 14, 2020 | past
50.GNU: A Heuristic for Bad Cryptography (soatok.blog)
22 points by some_furry on July 13, 2020 | past | 22 comments
51.GNU: A Heuristic for Bad Cryptography (soatok.blog)
17 points by some_furry on July 8, 2020 | past | 1 comment
52.Guide to Transition into a Tech Career Without Prior Experience for Nearly $0 (soatok.blog)
1 point by some_furry on June 30, 2020 | past
53.Minerva: The curse of ECDSA nonces (cryptography) [pdf] (iacr.org)
2 points by some_furry on June 21, 2020 | past
54.Putting the “Fun” in “Hash Function” (soatok.blog)
3 points by some_furry on June 20, 2020 | past
55.A Better Way for Programmers to Learn Cryptography (soatok.blog)
2 points by some_furry on June 16, 2020 | past
56.Why AES-GCM Sucks (Cryptography) (soatok.blog)
1 point by some_furry on June 15, 2020 | past
57.A Better Way for Programmers to Learn Cryptography (soatok.blog)
3 points by some_furry on June 15, 2020 | past
58.How to Learn Cryptography as a Programmer (soatok.blog)
1 point by some_furry on June 12, 2020 | past
59.How to Learn Cryptography as a Programmer (soatok.blog)
1 point by some_furry on June 10, 2020 | past
60.How to Learn Cryptography as a Programmer (soatok.blog)
9 points by some_furry on June 10, 2020 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: