Active
Recent
Comments
Search
Login
Login
soatok.blog: 59 stories from 21 submitters
37
On The Insecurity of Telecom Stacks in the Wake of Salt Typhoon
c
security
soatok.blog
via
ibotty
18 hours ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
124
Reviewing the Cryptography Used by Signal
cryptography
soatok.blog
via
freddyb
22 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
66
Hell Is Overconfident Developers Writing Encryption Code
cryptography
practices
security
soatok.blog
via
giffengrabber
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
77 comments
77
115
Don't Use Session (Signal Fork)
3
security
soatok.blog
via
EvanHahn
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
71 comments
71
18
The Better Daemons Of Our Profession
culture
soatok.blog
via
mwcampbell
2 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
56
Beyond Bcrypt
cryptography
security
soatok.blog
via
gmem
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
12
Key Transparency and the Right to be Forgotten
cryptography
soatok.blog
via
fanf
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
98
What To Use Instead of PGP
cryptography
security
soatok.blog
via
deejayy
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
115 comments
115
30
The Continued Trajectory of Idiocy in the Tech Industry
culture
rant
soatok.blog
via
gmem
5 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
38
Invisible Salamanders Are Not What You Think
cryptography
soatok.blog
via
fanf
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
27
Introducing Alacrity to Federated Cryptography
cryptography
soatok.blog
via
Picnoir
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
41
Security Issues in Matrix’s Olm Library
cryptography
security
soatok.blog
via
lonjil
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
52
Against XMPP+OMEMO
cryptography
soatok.blog
via
unlobito
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
40 comments
40
18
Towards Federated Key Transparency
cryptography
soatok.blog
via
crazyloglad
9 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
22
KEM Trails – Understanding Key Encapsulation Mechanisms
cryptography
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
16
A Plan for Multicast Support in Noise-based Protocols
cryptography
networking
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
11
Asymmetric Cryptographic Commitments
cryptography
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
52
Database Cryptography Fur the Rest of Us
cryptography
databases
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
95
How You Respond to Security Researchers Says Everything About You
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
34
What We Do in the /etc/shadow – Cryptography with Passwords
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
23
Extending the AES-GCM Nonce Without Nightmare Fuel
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
61
Towards End-to-End Encryption for Direct Messages in the Fediverse
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
39 comments
39
39
Cryptographic Agility and Superior Alternatives
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
38
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
51
Using RSA Securely in 2022
cryptography
security
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
Page 2 >>