Active
Recent
Comments
Search
Login
Login
cendyne.dev: 11 stories from 5 submitters
5
Spoofing certificates with MD5 collisions
security
cendyne.dev
via
nortti
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
An introduction to Decentralized Identity
distributed
cendyne.dev
via
cadey
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
14
Process Engineering at a Furry Convention
practices
programming
cendyne.dev
via
Kye
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
18
A path to niche skill-sets and community
culture
cendyne.dev
via
soatok
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
How to use HKDF to derive new keys
cryptography
security
cendyne.dev
via
soatok
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
34
A few thoughts about Uber's breach
security
cendyne.dev
via
cadey
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
24 comments
24
8
Ed25519 Deep Dive Addendum
cryptography
cendyne.dev
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
19
How Google played with bad cryptography
cryptography
security
cendyne.dev
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
16
A Deep dive into Ed25519 Signatures
cryptography
cendyne.dev
via
soatok
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
26
Do not recommend: User Provided Primary Keys
programming
security
cendyne.dev
authored by
cendyne
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
40
A Base64 Surprise
cryptography
programming
cendyne.dev
authored by
cendyne
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11