cryptography   23708

« earlier    

Myths about /dev/urandom [2uo]
A long and detailed piece about why you shouldn't block waiting for "more entropy" for your random number generator.
cryptography  security  programming  via:HackerNews 
yesterday by mcherm
Exclusive: U.S. government seeks Facebook help to wiretap Messenger - sources | Reuters
The U.S. government is trying to force Facebook Inc to break the encryption in its popular Messenger app so law enforcement may listen to a suspect’s voice conversations in a criminal probe, three people briefed on the case said, resurrecting the issue of whether companies can be compelled to alter their products to enable surveillance - not terribly surprising. If they manage to achieve this could the method be applied to Signal? Also would there be a precedent to break Apple's resolve?
us  legal  cryptography  totwitter 
yesterday by renaissancechambara
We've seen this with , with , and now . If everyone that is an acknowledged expe…
climatechange  antivax  cryptography  from twitter_favs
4 days ago by parsingphase
Open Source Password Management Solutions | Bitwarden
Solve your password management problems
The easiest and safest way for individuals, teams, and business organizations to store, share, and sync sensitive data.
1_App  2_OpenSource  3_Both  4_ITManagement  4_HelperTools  7_PasswordMgm  cryptography 
4 days ago by michimaurer
Bitcoin keys and elliptic curve secp256k1
The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview.
math  cryptography 
4 days ago by geetarista
When Encryption Goes Wrong: The Babington Plot
One of the first recorded Man-in-the-Middle attacks literally cost someone their head
cryptography  history 
5 days ago by jchris

« earlier    

related tags

1_app  2_opensource  2fa  3_both  4_helpertools  4_itmanagement  7_passwordmgm  aesthetics  algorithm  algorithms  alice  antivax  arc  art  article  audio  aug18  bitcoin  blockchain  blog  bls  bluetooth  bob  book  bookrecommendations  books  burn  challenge  children  ciberseguridad  climatechange  collaboration  communication  computerscience  computing  coq  course  criptografía  crypto  curves  cyber-security  cybersecurity  decentralization  decentralized  definition  design  digitalsignature  e-mail  ecc  economics  ed25519  edsca  education  eliptic  email  encryption  etymology  fpe  framework  garyzhexizhang  github  go  golang  gordon  gpg  graphs  hacking  hash  hashbased  hipaa  history  important  indices  information  intro  isogeny  javascript  keybase  lavalamp  learn  learning  ledger  legal  library  links  mail  market  mastodon  math  mathematics  mit  music  mycelia  noise  numbers-station  one-time-pad  open-source  opensource  openssl  passwords  patent  pci  pdf  performance  pgp  pii  privacy  programming  programmingchallenges  proof  protocol  python  quantum  randomness  randomnumber  reference  rust  scandal  security  signal  signatures  signing  silicongraphics  software  ssh  ssl  steganography  swarm  textbooks  tls  tools  tor  totwitter  toys  tutorial  us  verification  wiki  writing  yubikey  zeroknowledge 

Copy this bookmark: