Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
jtdowney
.
-1
How to protect HMACs inside AWS KMS
cryptography
aws.amazon.com
via
jtdowney
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
28
CVE-2022-21449: Psychic Signatures in Java
cryptography
security
neilmadden.blog
via
jtdowney
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
9
Announcing Cloudflare R2 Storage: Rapid and Reliable Object Storage, minus the egress fees
devops
scaling
blog.cloudflare.com
via
jtdowney
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Declarative Validation
api
python
blog.drewolson.org
via
jtdowney
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
12
Biscuit, the foundation for your authorization systems
api
security
clever-cloud.com
via
jtdowney
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
Cargo's crate index: upcoming squash into one commit
rust
vcs
internals.rust-lang.org
via
jtdowney
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
18
Learning From A Year of Security Breaches
security
medium.com
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
10
Rails 5.1 might be gaining webpack and yarn support out of the box
javascript
ruby
web
github.com
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
6
SWEET32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN
cryptography
security
sweet32.info
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Breaking https' AES-GCM (or a part of it)
cryptography
security
cryptologie.net
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
29
Why we use the Linux kernel's TCP stack
linux
networking
blog.cloudflare.com
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
2
Badlock Bug
security
windows
badlock.org
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
35
Introducing DGit
distributed
vcs
githubengineering.com
via
jtdowney
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
2
The plain simple reality of entropy [32c3]
video
security
youtube.com
via
jtdowney
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
29
Don't wait to fix your password storage
programming
security
jtdowney.com
authored by
jtdowney
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
19
Elixir Streams
elixir
blog.drewolson.org
via
jtdowney
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
I Forgot Your Password: Randomness Attacks Against PHP Applications
video
php
security
youtube.com
via
jtdowney
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
On the (provable) security of TLS: Part 1
security
blog.cryptographyengineering.com
via
jtdowney
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0