key   8341

« earlier    

Kerberos vs. PKI | Bryan Soliman Blog
Kerberos architecture required an ongoing administration of a central Key Distribution Center (KDC), and as such; prevents Kerberos from scaling beyond the Intranet,
security  kerberos  public  key  infra 
2 days ago by adamklein
This low-cost device may be the world’s best hope against account takeovers | Ars Technica
Privacy-preserving “cryptographic assertions” are impossible to guess or phish.
2fa  security  key  u2f 
2 days ago by mifepba
Iranian phishers bypass 2fa protections offered by Yahoo Mail and Gmail | Ars Technica
Group breaches SMS-protected accounts. It's still testing attacks against 2fa apps.
2fa  security  key  hacking  email  password  u2f 
2 days ago by mifepba
4 Reasons a Certified Locksmith Is Worth It
There are lots of problems with locks that may cause you to need to replace or repair them on your home or business. Learn about four reasons why a certified locksmith is worth it:
locksmith  lock  key 
9 days ago by Adventure_Web
CrypTech.is – Making the Internet a little bit safer
The Snowden and subsequent revelations have called into question the integrity of some of the implementations of basic cryptographic functions and of the cryptographic devices used to secure applications and communications on the Internet. via Pocket
IFTTT  Pocket  cryptography  hardware  key  keys  open  private  security 
12 days ago by ChristopherA
Hackerkey v5
Updated version of hackerkey
geekcode  hackerkey  signature  mail  key  code 
16 days ago by pyrho
Hackerkey v4
The Hacker Key Guide was inspired by Robert Hayden's excellent Geek Code which has been a long time hacker favorite. However, the Geek Code has not been updated in a long time, and although the commercialization of the Internet has washed away much of the old hacker environment (MUDs, BBSes, DOS...), we must attempt to keep hacker traditions alive, by reimplementation if needed.
geek  geekcode  hacke  key  code  signature 
16 days ago by pyrho

« earlier