| 1. | | Jacob Appelbaum: What Has This Man Done? (zeit.de) |
| 6 points by brl on Aug 15, 2016 | past | 1 comment |
|
| 2. | | Kerckhoffs’ Legacy: The history of open source and network security. (subgraph.com) |
| 1 point by brl on Aug 17, 2011 | past |
|
| 3. | | Video demonstrates server compromise with new ASP.NET platform vulnerability. (youtube.com) |
| 4 points by brl on Sept 18, 2010 | past |
|
| 4. | | Quotes from Julian Assange of Wikileaks (anitawirawan.com) |
| 20 points by brl on June 26, 2010 | past | 5 comments |
|
| 5. | | POET: A practical attack against encrypted client-side web application state (netifera.com) |
| 6 points by brl on June 8, 2010 | past |
|
| 6. | | MD5 hash extension attack breaks API authentication in Flickr (and others) (netifera.com) |
| 58 points by brl on Sept 28, 2009 | past | 22 comments |
|
| 7. | | Cryptanalysis of Caesar Cipher (anagram.com) |
| 2 points by brl on July 3, 2009 | past |
|
| 8. | | $134.5 billion in US treasury bonds seized from Japanese smugglers (asianews.it) |
| 4 points by brl on June 10, 2009 | past |
|
| 9. | | What open source could learn from proprietary platforms (cnet.com) |
| 1 point by brl on May 27, 2009 | past |
|
| 10. | | Why the free software community cares about The Pirate Bay (northxsouth.com) |
| 18 points by brl on May 17, 2009 | past | 37 comments |
|
| 11. | | The Java Virtual Machine as Shellcode (Screencast of what my startup is working on) (netifera.com) |
| 5 points by brl on May 14, 2009 | past | 1 comment |
|
| 12. | | 75% of new open-source software written in C or Java (theregister.co.uk) |
| 3 points by brl on Jan 22, 2009 | past |
|
| 13. | | Interview with an Adware Author (philosecurity.org) |
| 51 points by brl on Jan 12, 2009 | past | 4 comments |
|
| 14. | | Rather crazy online logic test (drunkmenworkhere.org) |
| 38 points by brl on Jan 6, 2009 | past | 23 comments |
|
| 15. | | Flash simulation of the Enigma cipher machine with visualization of the permutations (enigmaco.de) |
| 36 points by brl on Jan 1, 2009 | past | 5 comments |
|
| 16. | | Creating a rogue CA certificate with MD5 hash collisions (phreedom.org) |
| 107 points by brl on Dec 30, 2008 | past | 55 comments |
|
| 17. | | How to be a genius (newscientist.com) |
| 77 points by brl on Nov 3, 2007 | past | 37 comments |
|
| 18. | | The Genius is in the Details (aaronsw.com) |
| 43 points by brl on Sept 24, 2007 | past | 15 comments |
|