| 1. | | International Day Against DRM (defectivebydesign.org) |
| 5 points by spurlock on July 9, 2017 | past |
|
| 2. | | FriendUP v1.0.0 Is Here: The Internet Is Now Your Computer (friendup.cloud) |
| 1 point by spurlock on July 3, 2017 | past |
|
| 3. | | Lattice Reduction: A Toolbox for the Cryptanalyst [pdf] (lip6.fr) |
| 1 point by spurlock on July 2, 2017 | past |
|
| 4. | | Five Steps to Secure Varnish with Hitch and Let's Encrypt (varnish-software.com) |
| 1 point by spurlock on July 2, 2017 | past |
|
| 5. | | Integer – Minimal Blogging Theme (themepatio.com) |
| 2 points by spurlock on July 1, 2017 | past | 1 comment |
|
| 6. | | Privacy Tips for Mobile and Desktop (spreadprivacy.com) |
| 3 points by spurlock on July 1, 2017 | past |
|
| 7. | | Advanced Privacy and Anonymity Using VMs, VPN’s, Tor (ivpn.net) |
| 17 points by spurlock on July 1, 2017 | past |
|
| 8. | | Greek Fire (wikipedia.org) |
| 2 points by spurlock on July 1, 2017 | past |
|
| 9. | | Multilateral Security [pdf] (cam.ac.uk) |
| 1 point by spurlock on July 1, 2017 | past |
|
| 10. | | Protesters Physically Block HQ of Russian Web Blocking Watchdog (torrentfreak.com) |
| 2 points by spurlock on July 1, 2017 | past |
|
| 11. | | New Technologies from Cryptography to AI Rapidly Transforming Financial Services (cointelegraph.com) |
| 1 point by spurlock on July 1, 2017 | past |
|
| 12. | | Truly universal: concerns raised on unlawful surveillance around the world (privacyinternational.org) |
| 2 points by spurlock on July 1, 2017 | past |
|
| 13. | | SafeCurves – Choosing safe curves for elliptic-curve cryptography (cr.yp.to) |
| 2 points by spurlock on July 1, 2017 | past |
|
| 14. | | An introduction to isogeny-based crypto [pdf] (pqcrypto.org) |
| 1 point by spurlock on July 1, 2017 | past |
|
| 15. | | Modern digital data laws that balance law enforcement needs with privacy (blogs.microsoft.com) |
| 3 points by spurlock on July 1, 2017 | past | 1 comment |
|
| 16. | | DataSploit – An OSINT Framework to perform various recon techniques (github.com/datasploit) |
| 2 points by spurlock on July 1, 2017 | past |
|
| 17. | | The Security of Self-Hosted Devops Tools (damow.net) |
| 3 points by spurlock on July 1, 2017 | past |
|
| 18. | | Five Eyes nations urged to respect strong encryption (itwire.com) |
| 3 points by spurlock on July 1, 2017 | past |
|
| 19. | | Show HN: Howl – A general purpose, fast and lightweight editor (howl.io) |
| 2 points by spurlock on June 30, 2017 | past |
|
| 20. | | Equivalence proofs with SAW – Exploring formal verification (timtaubert.de) |
| 2 points by spurlock on June 30, 2017 | past |
|
| 21. | | Top Canadian Court Permits Worldwide Internet Censorship (eff.org) |
| 2 points by spurlock on June 30, 2017 | past | 4 comments |
|
| 22. | | Five Eyes agree to engage with industry on terrorists’ use of encryption (theglobeandmail.com) |
| 1 point by spurlock on June 30, 2017 | past |
|
| 23. | | Encrypgen Uses Blockchain to Usher in New Era of Genetic Privacy (cointelegraph.com) |
| 2 points by spurlock on June 30, 2017 | past | 1 comment |
|
| 24. | | Online AES Key/IV generator (asecuritysite.com) |
| 1 point by spurlock on June 30, 2017 | past | 2 comments |
|
| 25. | | Raise Your Voice: Proclaim the Need for Net Neutrality (stackoverflow.blog) |
| 1 point by spurlock on June 30, 2017 | past |
|
| 26. | | Why It's Hard to Choose a VPN Provider (davepeck.org) |
| 1 point by spurlock on June 30, 2017 | past |
|
| 27. | | Guarding personally identifiable information (lwn.net) |
| 2 points by spurlock on June 30, 2017 | past |
|
| 28. | | Thoughts on the NotPetya Ransomware Attack (lawfareblog.com) |
| 1 point by spurlock on June 30, 2017 | past |
|
| 29. | | Designing an Authentication System: A Dialogue in Four Scenes (web.mit.edu) |
| 2 points by spurlock on June 29, 2017 | past |
|
| 30. | | Password-authenticated key agreement (wikipedia.org) |
| 2 points by spurlock on June 29, 2017 | past |
|
|
| More |