logo Links
  • logo Links
  • Tag cloud
  • RSS Feed
  • Login
Delete
8617 shaares
Links per page
20 50 100
27 results tagged cryptography

How the CIA used Crypto AG encryption devices to spy on countries for decades - Washington Post

cia · cryptography
Tue, 10 Mar 2020 at 19:17
https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/

Apple's 'Find My' Feature Uses Some Clever Cryptography | WIRED

Apple says an elaborate rotating key scheme will soon let you track down your stolen laptop, but not let anyone track you. Not even Apple.
apple · cryptography · de-week · location
Wed, 5 Jun 2019 at 23:59
https://www.wired.com/story/apple-find-my-cryptography-bluetooth/

How does Apple (privately) find your offline devices?

At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”. Unlike Apple’s “Find my iPhone”, which uses cellular communication and the lost…
apple · cryptography · de-week · location
Wed, 5 Jun 2019 at 23:45
https://blog.cryptographyengineering.com/2019/06/05/how-does-apple-privately-find-your-offline-devices/

RepRage – How Banksy Authenticates His Work

How Banksy created a private key art authentication system with forged ten pound bank notes ripped in half.
art · cryptography · de-week
Mon, 1 Apr 2019 at 08:42
https://reprage.com/post/how-banksy-authenticates-his-work

Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering

The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually o…
cryptography
Sat, 20 Oct 2018 at 19:22
https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/

A crypto primer in the form of Ikea instructions

A crypto primer in the form of Ikea instructions
cryptography · de-week
Fri, 16 Feb 2018 at 22:22
https://boingboing.net/2018/02/16/asymmetrical-encryption.html

Using structured encryption to search protected photos in the cloud

Using structured encryption to search protected photos in the cloud
cryptography
Tue, 23 Jan 2018 at 03:58
https://boingboing.net/2018/01/22/real-world-crypto.html

~stef/blog/ - pitchfork

cryptography · openpgp
Sat, 30 Sep 2017 at 01:06
https://www.ctrlc.hu/~stef/blog/posts/pitchfork.html

Signal Has a Fix for Apps' Contact-Leaking Problem

cryptography · de-week · signal
Thu, 28 Sep 2017 at 16:26
https://www.wired.com/story/signal-contact-lists-private-secure-enclave/amp

Alice and Bob: The World’s Most Famous Cryptographic Couple

A History of Alice and Bob, by Quinn DuPont and Alana Cattapan (created 2017).
cryptography · de-week
Thu, 20 Jul 2017 at 07:12
http://cryptocouple.com/

The basics of crypto, in 4.5 pages, using only small words lawmakers can understand

The basics of crypto, in 4.5 pages, using only small words lawmakers can understand
cryptography · de-week
Thu, 23 Feb 2017 at 19:54
http://boingboing.net/2017/02/23/so-simple-your-boss-can-unders.html

RIP, SHA-1

cryptography · de-week
Thu, 23 Feb 2017 at 19:51
https://freedom-to-tinker.com/2017/02/23/rip-sha-1/

Forget Recounts. Next Election, Encrypt the Vote Instead

A new voting system promises to avoid unnecessary recounts---and prove when they're necessary, too.
cryptography · electronic-voting
Tue, 31 Jan 2017 at 23:39
https://www.wired.com/2017/01/next-election-dont-recount-vote-encrypt/

Wakker geschrokken na Britse overname Fox-IT - NRC

Beveiliging staatsgeheimen: De overname van Fox-IT in november 2015 kwam voor  de overheid onverwacht. De overheid wil nu bij een volgende overname de optie om het bedrijfsonderdeel dat staatsgeheimen versleutelt  te kopen.
cryptography · de-week · public-private-partnerships
Wed, 25 Jan 2017 at 08:46
https://www.nrc.nl/nieuws/2017/01/24/wakker-geschrokken-na-britse-overname-6381515-a1542736

Computer Science Professor Mocks The NSA's Buggy Code

cryptography
Mon, 22 Aug 2016 at 20:12
http://rss.slashdot.org/~r/Slashdot/slashdotYourRightsOnline/~3/KFRiDQloJM8/computer-science-professor-mocks-the-nsas-buggy-code

RSA Keys Can Be Harvested With Microphones

cryptography
Sun, 5 Jun 2016 at 20:17
http://rss.slashdot.org/~r/Slashdot/slashdotYourRightsOnline/~3/U1srXW1ihfY/rsa-keys-can-be-harvested-with-microphones

Does ‘Quantum encryption’ defend against a quantum computer?

cryptography
Fri, 27 May 2016 at 13:49
http://blog.xot.nl/2016/05/18/does-quantum-encryption-defend-against-a-quantum-computer/

Museum Soesterberg bemachtigt unieke handleiding Enigma-code | NU - Het laatste nieuws het eerst op NU.nl

cryptography
Wed, 4 May 2016 at 11:09
http://www.nu.nl/cultuur-overig/4256746/museum-soesterberg-bemachtigt-unieke-handleiding-enigma-code.html

Why Making Johnny’s Key Management Transparent is So Challenging

cryptography · key-management
Sun, 3 Apr 2016 at 20:29
https://freedom-to-tinker.com/blog/masomel/why-making-johnnys-key-management-transparent-is-so-challenging/

The FBI wants a backdoor only it can use – but wanting it doesn’t make it possible

apple · backdoors · climate-change · cryptography · cryptowars
Wed, 24 Feb 2016 at 16:51
http://gu.com/p/4h2at?CMP=Share_AndroidApp_Add_to_Shaarli

Sara "Scout" Sinclair Brody: Protecting Data Privacy With User-Friendly Software - Council on Foreign Relations

cryptography · usability
Tue, 23 Feb 2016 at 11:22
http://www.cfr.org/privacy/protecting-data-privacy-user-friendly-software/p37551

The Father of Online Anonymity Has a Plan to End the Crypto War | WIRED

anonimity · cryptography · cryptowars
Fri, 8 Jan 2016 at 23:13
http://www.wired.com/2016/01/david-chaum-father-of-online-anonymity-plan-to-end-the-crypto-wars/

Rogaway – Moral Character of Cryptographic Work

cryptography · ethics
Mon, 7 Dec 2015 at 09:16
http://web.cs.ucdavis.edu/~rogaway/papers/moral.html

The NSA sure breaks a lot of "unbreakable" crypto. This is probably how they do it. / Boing Boing

cryptography
Fri, 16 Oct 2015 at 10:45
http://boingboing.net/2015/10/15/the-nsa-sure-breaks-a-lot-of.html#more-428095

Kraken sha-1 kan veel goedkoper dan gedacht met gpu's

cryptography
Thu, 8 Oct 2015 at 22:11
http://tweakers.net/nieuws/105689/kraken-sha-1-kan-veel-goedkoper-dan-gedacht-met-gpus.html

Schneier on Security: October 15, 1998

cryptography
Tue, 12 May 2015 at 13:56
https://www.schneier.com/crypto-gram/archives/1998/1015.html#cipherdesign

Smart Grid consortium rolled its own crypto, which is always, always a bad idea - Boing Boing

cryptography · smart-cities
Sun, 10 May 2015 at 08:56
http://boingboing.net/2015/05/09/smart-grid-consortium-rolled-i.html
Links per page
20 50 100
Fold Fold all Expand Expand all Are you sure you want to delete this link? The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community