Hacker Newsnew | past | comments | ask | show | jobs | submit | spurlock's submissionslogin
1.International Day Against DRM (defectivebydesign.org)
5 points by spurlock on July 9, 2017 | past
2.FriendUP v1.0.0 Is Here: The Internet Is Now Your Computer (friendup.cloud)
1 point by spurlock on July 3, 2017 | past
3.Lattice Reduction: A Toolbox for the Cryptanalyst [pdf] (lip6.fr)
1 point by spurlock on July 2, 2017 | past
4.Five Steps to Secure Varnish with Hitch and Let's Encrypt (varnish-software.com)
1 point by spurlock on July 2, 2017 | past
5.Integer – Minimal Blogging Theme (themepatio.com)
2 points by spurlock on July 1, 2017 | past | 1 comment
6.Privacy Tips for Mobile and Desktop (spreadprivacy.com)
3 points by spurlock on July 1, 2017 | past
7.Advanced Privacy and Anonymity Using VMs, VPN’s, Tor (ivpn.net)
17 points by spurlock on July 1, 2017 | past
8.Greek Fire (wikipedia.org)
2 points by spurlock on July 1, 2017 | past
9.Multilateral Security [pdf] (cam.ac.uk)
1 point by spurlock on July 1, 2017 | past
10.Protesters Physically Block HQ of Russian Web Blocking Watchdog (torrentfreak.com)
2 points by spurlock on July 1, 2017 | past
11.New Technologies from Cryptography to AI Rapidly Transforming Financial Services (cointelegraph.com)
1 point by spurlock on July 1, 2017 | past
12.Truly universal: concerns raised on unlawful surveillance around the world (privacyinternational.org)
2 points by spurlock on July 1, 2017 | past
13.SafeCurves – Choosing safe curves for elliptic-curve cryptography (cr.yp.to)
2 points by spurlock on July 1, 2017 | past
14.An introduction to isogeny-based crypto [pdf] (pqcrypto.org)
1 point by spurlock on July 1, 2017 | past
15.Modern digital data laws that balance law enforcement needs with privacy (blogs.microsoft.com)
3 points by spurlock on July 1, 2017 | past | 1 comment
16.DataSploit – An OSINT Framework to perform various recon techniques (github.com/datasploit)
2 points by spurlock on July 1, 2017 | past
17.The Security of Self-Hosted Devops Tools (damow.net)
3 points by spurlock on July 1, 2017 | past
18.Five Eyes nations urged to respect strong encryption (itwire.com)
3 points by spurlock on July 1, 2017 | past
19.Show HN: Howl – A general purpose, fast and lightweight editor (howl.io)
2 points by spurlock on June 30, 2017 | past
20.Equivalence proofs with SAW – Exploring formal verification (timtaubert.de)
2 points by spurlock on June 30, 2017 | past
21.Top Canadian Court Permits Worldwide Internet Censorship (eff.org)
2 points by spurlock on June 30, 2017 | past | 4 comments
22.Five Eyes agree to engage with industry on terrorists’ use of encryption (theglobeandmail.com)
1 point by spurlock on June 30, 2017 | past
23.Encrypgen Uses Blockchain to Usher in New Era of Genetic Privacy (cointelegraph.com)
2 points by spurlock on June 30, 2017 | past | 1 comment
24.Online AES Key/IV generator (asecuritysite.com)
1 point by spurlock on June 30, 2017 | past | 2 comments
25.Raise Your Voice: Proclaim the Need for Net Neutrality (stackoverflow.blog)
1 point by spurlock on June 30, 2017 | past
26.Why It's Hard to Choose a VPN Provider (davepeck.org)
1 point by spurlock on June 30, 2017 | past
27.Guarding personally identifiable information (lwn.net)
2 points by spurlock on June 30, 2017 | past
28.Thoughts on the NotPetya Ransomware Attack (lawfareblog.com)
1 point by spurlock on June 30, 2017 | past
29.Designing an Authentication System: A Dialogue in Four Scenes (web.mit.edu)
2 points by spurlock on June 29, 2017 | past
30.Password-authenticated key agreement (wikipedia.org)
2 points by spurlock on June 29, 2017 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: