7912
Finding Pwned Passwords With 1Password
To complete the process, the server sends back a list of leaked password hashes that start with those same five characters. 1Password then compares this list locally to see if it contains the full hash of your password. If there is a match then we know this password is known and should be changed.

app  ios  mac  software  security 
2 days ago
Selectric bug
The bug was fairly large and consisted of state-of-the-art integrated circuits and single-bit core memory. It was completely hidden inside a hollow support bracket at the bottom of the keyboard mechanism, and was invisible to the naked eye, but also to the detection equipment of the era. Only an X-ray scan could reveal the presence of the device, which is shown in the image below. It contains special components to hide its presence even from non-linear junction detectors (NLJD).
history  surveillance 
28 days ago
Quantifying the Effect of Tether
Tether printing moves the market appreciably; 48.8% of BTC’s price rise in the period studied occurred in the two-hour periods following the arrival of 91 different Tether grants to the Bitfinex wallet.
crypto  bitcoin  tether 
4 weeks ago
Security Considerations — Solidity 0.4.20 documentation
While it is usually quite easy to build software that works as expected, it is much harder to check that nobody can use it in a way that was not anticipated.
4 weeks ago
Evidence is mounting that much of the value in BTC may be artificial
over the last few days the evidence has reached a point to where it can no longer be ignored, and that evidence points to the fact that a huge amount of the value in BTC was created using fake money or Tethers to pump the price, and its real value could be $5K or less.
5 weeks ago
The Tether Conundrum: A Quick Backstory
Bitcoin’s maximalists claim it will save us from the tyranny of the printing press of central banks. But what if, in some gesture of supreme irony, Bitcoin’s undoing was actually the very same problem it set out to solve: namely the fiat currency “printing press”, except this time it was being used to prop up the Bitcoin bubble from its inevitable collapse?

5 weeks ago
Tips For Playing Fallout 4 [Updated!]
ng you see in your settlement can be moved around and broken down into scrap. Here’s a quick g
6 weeks ago
Mazda MX-5 - Wikipedia
Production of the third-generation MX-5, code NC, began May 17, 2005, for delivery in August, for the 2006 model year.
8 weeks ago
Gas Pump Skimmers - learn.sparkfun.com
mp controller market would gravitate towards the same number of pins using the same type of connector but use two different orientations. So I’m gue
electronics  hardware  security 
9 weeks ago
« earlier      
agile amazon analysis analytics android angular apache api app apple apps archive art article articles asmr assembly automation awesome aws bdd behat berlin bestpractices bitcoin blog book books business centos cheatsheet chrome cloud code coding color comic comics computer crypto cryptography css css3 culture data database ddd debian debugging deployment design dev development devops diy dns docker doctrine documentation ebooks ec2 editor education electronics email emulation encryption engineering facebook fitness fonts food framework free game games gaming git go golang google gpg graphics hack hacking hardware health hiking history hosting howto html html5 http humor ifttt images infosec inspiration internet ios iphone java javascript jenkins jquery js json kernel kindle law learning library life linux logging mac management mapping maps minecraft mobile monitoring music mysql network networking news nginx nsa oop openbsd opensource osx patterns performance pgp philosophy photo photography php plugin politics privacy productivity programming proxy psychology puppet python rails random raspberrypi reading refactoring reference rest ruby running scalability science search security selinux server service shell soa social software ssl storage symfony sysadmin tdd tech technology testing thinkpad tips todo tool tools tor travel tutorial twitter ubuntu ui uk unix urbex vagrant varnish via:popular video videogames vim visualization walking watches web webdesign webdev wikileaks windows wordpress work zfs

Copy this bookmark:



description:


tags: