Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
soatok
.
90
Bad Call by Lobsters Moderation
☶
meta
authored by
soatok
1 year ago
|
102 comments
102
22
KEM Trails – Understanding Key Encapsulation Mechanisms
cryptography
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
13
How to Hold KEMs
cryptography
security
durumcrustulum.com
via
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
61
The birth & death of search engine optimization
ai
web
xeiaso.net
via
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
16
A Plan for Multicast Support in Noise-based Protocols
cryptography
networking
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
18
A path to niche skill-sets and community
culture
cendyne.dev
via
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Asymmetric Cryptographic Commitments
cryptography
soatok.blog
authored by
soatok
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
52
Database Cryptography Fur the Rest of Us
cryptography
databases
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
23
What are you doing this week?
☶
ask
programming
authored by
soatok
2 years ago
|
38 comments
38
9
How to use HKDF to derive new keys
cryptography
security
cendyne.dev
via
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
95
How You Respond to Security Researchers Says Everything About You
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
34
What We Do in the /etc/shadow – Cryptography with Passwords
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
23
Extending the AES-GCM Nonce Without Nightmare Fuel
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
61
Towards End-to-End Encryption for Direct Messages in the Fediverse
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
39 comments
39
8
Ed25519 Deep Dive Addendum
cryptography
cendyne.dev
via
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
Cryptographic Agility and Superior Alternatives
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
19
How Google played with bad cryptography
cryptography
security
cendyne.dev
via
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
38
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
cryptography
soatok.blog
authored by
soatok
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
16
A Deep dive into Ed25519 Signatures
cryptography
cendyne.dev
via
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
51
Using RSA Securely in 2022
cryptography
security
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
38
The Controversy Surrounding Hybrid Cryptography
cryptography
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
22
Understanding HKDF
cryptography
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
140
Threema: Three Strikes, You’re Out
cryptography
mobile
privacy
security
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
21 comments
21
65
Programmers Don’t Understand Hash Functions
cryptography
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
41 comments
41
91
Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset
cryptography
security
soatok.blog
authored by
soatok
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
Page 2 >>