Hacker News new | past | comments | ask | show | jobs | submit | from login
My Blog Lasted Longer Than the Confederacy (2024) (soatok.blog)
7 points by hlieberman 10 days ago | past | 1 comment
An appeal to companies doing AI (soatok.blog)
80 points by todsacerdoti 10 days ago | past | 58 comments
The Authenticity Drought (soatok.blog)
7 points by halosghost 41 days ago | past
The Practical Limitations of End-to-End Encryption (soatok.blog)
44 points by todsacerdoti 50 days ago | past | 45 comments
Post-Quantum Cryptography Is About the Keys You Don't Play (soatok.blog)
7 points by dmarto 58 days ago | past
Collatzeral damage: bitwise and proof foolish (soatok.blog)
14 points by fanf2 60 days ago | past | 2 comments
The insecurity of telecom stacks in the wake of Salt Typhoon (soatok.blog)
312 points by zdw 64 days ago | past | 207 comments
Reviewing the cryptography used by Signal (soatok.blog)
172 points by todsacerdoti 85 days ago | past | 151 comments
Hell is overconfident developers writing encryption code (soatok.blog)
201 points by zdw 3 months ago | past | 238 comments
Too Many People Don't Value the Time of Security Researchers (soatok.blog)
22 points by zdw 3 months ago | past | 5 comments
Don't use Session – Round 2 (soatok.blog)
36 points by todsacerdoti 3 months ago | past | 9 comments
Don't Use Session (Signal Fork) (soatok.blog)
68 points by xena 4 months ago | past | 12 comments
Roasting Christmas Spam from Muhu AI (2024) (soatok.blog)
5 points by some_furry 4 months ago | past
Roasted Christmas Spam from Muhu AI (soatok.blog)
9 points by vegadw 4 months ago | past
The Better Daemons of Our Profession (soatok.blog)
3 points by zdw 4 months ago | past
Imagining Private Spaces for Bluesky (Using Cryptography) (soatok.blog)
4 points by some_furry 5 months ago | past
Imagining Private Airspaces for Bluesky (soatok.blog)
1 point by cy7 5 months ago | past
Beyond Bcrypt (soatok.blog)
6 points by todsacerdoti 5 months ago | past
Key transparency and the right to be forgotten (soatok.blog)
68 points by zdw 5 months ago | past | 48 comments
What to Use Instead of PGP (soatok.blog)
6 points by marbu 5 months ago | past | 1 comment
What to Use Instead of PGP (soatok.blog)
3 points by thunderbong 5 months ago | past
What to Use Instead of PGP (soatok.blog)
16 points by luxpir 5 months ago | past | 21 comments
What to Use Instead of PGP (soatok.blog)
10 points by todsacerdoti 6 months ago | past | 4 comments
Cryptographic Innuendos: Signatures That Only The Intended Audience Can Verify (soatok.blog)
2 points by ramchip 7 months ago | past
The Continued Trajectory of Idiocy in the Tech Industry (soatok.blog)
94 points by gmemstr 7 months ago | past | 125 comments
Invisible Salamanders Are Not What You Think (soatok.blog)
2 points by PaulHoule 8 months ago | past
Invisible Salamanders Are Not What You Think (soatok.blog)
3 points by fanf2 8 months ago | past
Doesn't Matter (soatok.blog)
3 points by zdw 8 months ago | past
Why Furries Make Excellent Hackers (soatok.blog)
7 points by thread_id 8 months ago | past | 1 comment
Alacrity to Federated Cryptography (soatok.blog)
25 points by zdw 8 months ago | past | 10 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: