security   492100

« earlier    

VPN Report | Honest reviews of the top VPNs
I tested the most recommended VPN providers using my credit card to find the best ones — and which ones you should avoid.
vpn  security  reference 
9 hours ago by zool
I don't need your permission!
Some examples of how to avoid excessive Android permissions by correctly using Intents
android  security  privacy 
11 hours ago by dserodio
CDN, Website Security, DDoS Protection, Load Balancing | Incapsula
Incapsula is a security CDN that makes any website safer, faster and more reliable.
performance  security  ddos  cdn  infrastructure 
12 hours ago by vesan
Formal Methods and the KRACK Vulnerability - Galois, Inc.
"Formal proofs of software and protocols are analogous to the smoothing approach. They provide well defined areas that are completely free of a certain class of problem. In the case of WPA2, the formal proofs didn’t reveal any problems, but other formal approaches have been much more successful. [miTLS]. [...] A key to making this all work is the description of the work done. While the formal proofs carry rigorous definitions, they can be very difficult to understand. Like software and protocol specifications, theorem statements must combine rigor and readability."
(also includes links to their ChaCha20 specification, written in "literate Cryptol")
verification  security  post  cryptol  coq 
12 hours ago by mechazoidal

« earlier    

related tags

00000  2013  802.11i  acm  administration  ads  and  android  app  apple  application  article  aspnetcore  authentication  aws  aws_security  backup  best-practices  bestpractices  block  blockchain  blog  browser  browsere  canada  cdn  certificate  certificates  chat  china  chrome  chromium  cli  cloaking  cloudflare  collaboration  communication  company  computer-science  computer  concurrency  config  coq  crypto  cryptography  cryptol  csp  ddos  deployment  design  development  devops  docker  egypt  email  encryption  example  exploit  features  finance  firefox  forumthread  framework  future  gmail  golang  google  hackers  hacking  hn  howto  hsts  http  https  ifttt  information  infosec  infrastructure  inspiration  interesting  internet  iosdev  iot  islam  jwt  kenmunro  key-management  keygen  krack  lasc  law  letsencrypt  libvirt  linux  lopd  mac  macos  math  mena  microsoft  mode  moxie  network  networking  networks  news  ntlm  oct17  opensource  oss  otf  paper  passwords  pentest  performance  plugin  post  privacy  programming  proxy  qemu  rails  read  reference  research  rowhammer  ruby  salary  sensors  shenzhen  ships  simplicity  software  ssh  ssl  sslstrip  stackexchange  stackoverflow  standards  steganography  surveillance  team  tech  tips  tls  token  tool  tools  tutorial  unix  update  urlsession  usa  verification  visualization  vnc  vpn  web-browsers  web  webapi  webdesign  webdev  wi-fi  wifi  windows  wlan  wordpress  work  world  wpa2  wpa2crack  youth 

Copy this bookmark: