Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
awn
.
11
How we secure Monzo’s banking platform
practices
security
monzo.com
via
awn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Securely delegating trust with digital signatures and secret storage systems
cryptography
security
monzo.com
authored by
awn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
linux/random - use computational hash for entropy extraction
cryptography
linux
git.kernel.org
via
awn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
3
The Moral Character of Cryptographic Work (2015)
☶
cryptography
law
philosophy
privacy
security
web.cs.ucdavis.edu
via
awn
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
22
rosen: censorship-resistant proxy tunnel
show
go
security
spacetime.dev
authored by
awn
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
12
Coding Adventure: Atmosphere
video
graphics
youtube.com
via
awn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
mutable strings in go (2019)
go
spacetime.dev
authored by
awn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
4
Sampling profiler for Python programs
programming
python
github.com
via
awn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
33
plausibly deniable encryption
cryptography
spacetime.dev
authored by
awn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
26 comments
26
12
An Introduction to Number Theory
math
nrich.maths.org
via
awn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
The Eternal Value of Privacy (2006)
privacy
schneier.com
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
34
“Hello, world” from scratch on a 6502
video
hardware
youtube.com
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
32
Slack Security Incident
practices
keybase.io
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
36 comments
36
13
encrypting secrets in memory
cryptography
spacetime.dev
authored by
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
44
PCIe on the Raspberry Pi 4 B+
hardware
mloduchowski.com
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
7
Cloudflare launches authenticated network-time service
practices
cloudflare.com
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
7
MinimaLT: Minimal-latency Networking Through BetterSecurity
pdf
networking
cr.yp.to
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Adding support for in-memory encryption of secrets
cryptography
go
release
security
github.com
authored by
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
3
to slice or not to slice
go
spacetime.dev
authored by
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
1
[patchset] vfs: make immutable files actually immutable
linux
lwn.net
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Google allows .dev domain registrations
web
blog.google
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Ledger's Advanced Side Channel Analysis Repository
api
hardware
privacy
security
github.com
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
AMD Discloses Initial Zen 2 Details
hardware
fuse.wikichip.org
via
awn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
38
zinc: Introduce minimal cryptography library
cryptography
linux
git.kernel.org
via
awn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
13
Kaleidoscope: Implementing a Language with LLVM
compilers
llvm.org
via
awn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
Page 2 >>