Active
Recent
Comments
Search
Login
Login
soatok.blog: 40 stories from 8 submitters
113
Going Bark: A Furry’s Guide to End-to-End Encryption
cryptography
javascript
privacy
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
78 comments
78
31
A Brief Introduction to Deniability
email
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
34
Bizarre Design Choices in Zoom’s End-to-End Encryption
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
9
Dead Ends in Cryptanalysis: Length Extension Attacks
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
48
EduTech Spyware is Still Spyware: Proctorio Edition
security
soatok.blog
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
5
Soatok’s Guide to Side-Channel Attacks
cryptography
php
programming
security
soatok.blog
via
sarciszewski
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates
cryptography
soatok.blog
via
mz
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
33
GNU: A Heuristic for Bad Cryptography
cryptography
rant
soatok.blog
via
inactive-user
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
13
How To Learn Cryptography as a Programmer
cryptography
soatok.blog
via
fcbsd
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
Why AES-GCM Sucks
cryptography
soatok.blog
via
sarciszewski
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
23 comments
23
5
Putting the “Fun” in “Hash Function”
cryptography
soatok.blog
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
<< Page 1