| | My Blog Lasted Longer Than the Confederacy (2024) (soatok.blog) |
|
7 points by hlieberman 10 days ago | past | 1 comment
|
| | An appeal to companies doing AI (soatok.blog) |
|
80 points by todsacerdoti 10 days ago | past | 58 comments
|
| | The Authenticity Drought (soatok.blog) |
|
7 points by halosghost 41 days ago | past
|
| | The Practical Limitations of End-to-End Encryption (soatok.blog) |
|
44 points by todsacerdoti 50 days ago | past | 45 comments
|
| | Post-Quantum Cryptography Is About the Keys You Don't Play (soatok.blog) |
|
7 points by dmarto 58 days ago | past
|
| | Collatzeral damage: bitwise and proof foolish (soatok.blog) |
|
14 points by fanf2 60 days ago | past | 2 comments
|
| | The insecurity of telecom stacks in the wake of Salt Typhoon (soatok.blog) |
|
312 points by zdw 64 days ago | past | 207 comments
|
| | Reviewing the cryptography used by Signal (soatok.blog) |
|
172 points by todsacerdoti 85 days ago | past | 151 comments
|
| | Hell is overconfident developers writing encryption code (soatok.blog) |
|
201 points by zdw 3 months ago | past | 238 comments
|
| | Too Many People Don't Value the Time of Security Researchers (soatok.blog) |
|
22 points by zdw 3 months ago | past | 5 comments
|
| | Don't use Session – Round 2 (soatok.blog) |
|
36 points by todsacerdoti 3 months ago | past | 9 comments
|
| | Don't Use Session (Signal Fork) (soatok.blog) |
|
68 points by xena 4 months ago | past | 12 comments
|
| | Roasting Christmas Spam from Muhu AI (2024) (soatok.blog) |
|
5 points by some_furry 4 months ago | past
|
| | Roasted Christmas Spam from Muhu AI (soatok.blog) |
|
9 points by vegadw 4 months ago | past
|
| | The Better Daemons of Our Profession (soatok.blog) |
|
3 points by zdw 4 months ago | past
|
| | Imagining Private Spaces for Bluesky (Using Cryptography) (soatok.blog) |
|
4 points by some_furry 5 months ago | past
|
| | Imagining Private Airspaces for Bluesky (soatok.blog) |
|
1 point by cy7 5 months ago | past
|
| | Beyond Bcrypt (soatok.blog) |
|
6 points by todsacerdoti 5 months ago | past
|
| | Key transparency and the right to be forgotten (soatok.blog) |
|
68 points by zdw 5 months ago | past | 48 comments
|
| | What to Use Instead of PGP (soatok.blog) |
|
6 points by marbu 5 months ago | past | 1 comment
|
| | What to Use Instead of PGP (soatok.blog) |
|
3 points by thunderbong 5 months ago | past
|
| | What to Use Instead of PGP (soatok.blog) |
|
16 points by luxpir 5 months ago | past | 21 comments
|
| | What to Use Instead of PGP (soatok.blog) |
|
10 points by todsacerdoti 6 months ago | past | 4 comments
|
| | Cryptographic Innuendos: Signatures That Only The Intended Audience Can Verify (soatok.blog) |
|
2 points by ramchip 7 months ago | past
|
| | The Continued Trajectory of Idiocy in the Tech Industry (soatok.blog) |
|
94 points by gmemstr 7 months ago | past | 125 comments
|
| | Invisible Salamanders Are Not What You Think (soatok.blog) |
|
2 points by PaulHoule 8 months ago | past
|
| | Invisible Salamanders Are Not What You Think (soatok.blog) |
|
3 points by fanf2 8 months ago | past
|
| | Doesn't Matter (soatok.blog) |
|
3 points by zdw 8 months ago | past
|
| | Why Furries Make Excellent Hackers (soatok.blog) |
|
7 points by thread_id 8 months ago | past | 1 comment
|
| | Alacrity to Federated Cryptography (soatok.blog) |
|
25 points by zdw 8 months ago | past | 10 comments
|
|
|
More |