Newest Stories by kyle
Home
Recent
Comments
Search
Login
4
TLS Triple Handshakes
security
imperialviolet.org
via
kyle
4 years ago
|
cached
|
no comments
0
22
in which keyboard science goes further
hardware
technomancy.us
via
kyle
4 years ago
|
cached
|
3 comments
3
13
TLS Symmetric Crypto
security
imperialviolet.org
via
kyle
4 years ago
|
cached
|
1 comment
1
7
Responsibly Bringing a new Cryptography Product to Market
security
spideroak.com
via
kyle
4 years ago
|
cached
|
no comments
0
0
Using BGP to Reroute Traffic during a DDoS
networking
security
blog.thousandeyes.com
via
kyle
4 years ago
|
cached
|
1 comment
1
27
Go Style Guide
go
code.google.com
via
kyle
4 years ago
|
cached
|
19 comments
19
19
Technical Details Behind a 400Gbps NTP Amplification DDoS Attack
networking
security
blog.cloudflare.com
via
kyle
4 years ago
|
cached
|
1 comment
1
5
Reading bare NAND flash chips with a microcontroller
hardware
spritesmods.com
via
kyle
4 years ago
|
cached
|
1 comment
1
2
Writing High-Performance Software
scaling
blog.bittorrent.com
via
kyle
4 years ago
|
cached
|
no comments
0
32
Lobsters interview with joshua stein
☶
interview
person
authored by
kyle
4 years ago
|
4 comments
4
3
Honey Encryption
security
bristolcrypto.blogspot.com
via
kyle
4 years ago
|
cached
|
no comments
0
7
An ATMega1284p based homebrew computer
hardware
ostracodfiles.com
via
kyle
4 years ago
|
cached
|
no comments
0
5
Bitcoins the hard way: Using the raw Bitcoin protocol
cryptocurrencies
righto.com
via
kyle
4 years ago
|
cached
|
no comments
0
11
Listen, Chrome…
browsers
privacy
usblog.kaspersky.com
via
kyle
4 years ago
|
cached
|
5 comments
5
9
Manually Creating an ELF Executable
assembly
linux
robinhoksbergen.com
via
kyle
4 years ago
|
cached
|
no comments
0
3
Watch Computers Watch Famous Movies
visualization
fastcodesign.com
via
kyle
4 years ago
|
cached
|
1 comment
1
5
Random Number Generation, Revisited
security
bristolcrypto.blogspot.com
via
kyle
4 years ago
|
cached
|
no comments
0
7
Self-referential functions and the design of options
go
commandcenter.blogspot.com
via
kyle
4 years ago
|
cached
|
no comments
0
8
avr11: simulating minicomputers on microcontrollers
hardware
dave.cheney.net
via
kyle
4 years ago
|
cached
|
1 comment
1
23
Spoiled Onions
☶
privacy
cs.kau.se
via
kyle
4 years ago
|
cached
|
2 comments
2
2
Highlights of the Real World Cryptography 2014 workshop
☶
security
blog.xot.nl
via
kyle
4 years ago
|
cached
|
no comments
0
1
Trust Assertions for Certificate Keys
security
web
tack.io
via
kyle
4 years ago
|
cached
|
2 comments
2
29
Lobsters interview with Ted Unangst
☶
interview
person
via
kyle
4 years ago
|
5 comments
5
13
Chinese Whispers in Rust
go
rust
thornydev.blogspot.com
via
kyle
4 years ago
|
cached
|
no comments
0
2
Homomorphic AES Evaluation Using NTRU
pdf
security
eprint.iacr.org
via
kyle
4 years ago
|
cached
|
2 comments
2
<< Page 6
|
Page 8 >>