Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
soatok
.
7
Dead Ends in Cryptanalysis #2: Timing Side-Channels
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
0
Proctorio Is Using Racist Algorithms to Detect Faces
ai
education
security
vice.com
via
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
29
Understanding Extended-Nonce Constructions
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
43
No Gates, No Keepers
culture
rant
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
53 comments
53
5
Adventures with RSA Blind Signing
cryptography
cathieyun.medium.com
via
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
82
Cryptography Interface Design is a Security Concern
api
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
105
Crackpot Cryptography and Security Theater
cryptography
science
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
27 comments
27
3
Hybrid encryption and the KEM/DEM paradigm
cryptography
security
neilmadden.blog
via
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
97
Please Stop Encrypting with RSA Directly
cryptography
security
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
20 comments
20
14
Block Cipher Structures Ranked
cryptography
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
2
SQISign
cryptography
math
security
ellipticnews.wordpress.com
via
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
20
Cryptographic Wear-Out for Symmetric Encryption
cryptography
math
soatok.blog
authored by
soatok
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
6
TypeScript Implementation of X3DH using Libsodium
cryptography
javascript
privacy
security
github.com
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
113
Going Bark: A Furry’s Guide to End-to-End Encryption
cryptography
javascript
privacy
security
soatok.blog
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
78 comments
78
31
A Brief Introduction to Deniability
email
security
soatok.blog
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
9
DKIM: Show Your Privates
cryptography
email
security
rya.nc
via
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
34
Bizarre Design Choices in Zoom’s End-to-End Encryption
cryptography
soatok.blog
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
9
Dead Ends in Cryptanalysis: Length Extension Attacks
cryptography
security
soatok.blog
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
constant-time-js:Constant-Time Algorithm Implementations in TypeScript
cryptography
javascript
programming
security
github.com
authored by
soatok
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
<< Page 1