overflow@lemmy.ml to Programming@programming.dev · 7 months agoEight years of organizing tech meetups | notes.eatonphil.complus-squarenotes.eatonphil.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkEight years of organizing tech meetups | notes.eatonphil.complus-squarenotes.eatonphil.comoverflow@lemmy.ml to Programming@programming.dev · 7 months agomessage-square1fedilink
overflow@lemmy.ml to Linux@lemmy.ml · 8 months agoThe Berkeley Software Distributionplus-squarewww.abortretry.failexternal-linkmessage-square2fedilinkarrow-up181arrow-down13
arrow-up178arrow-down1external-linkThe Berkeley Software Distributionplus-squarewww.abortretry.failoverflow@lemmy.ml to Linux@lemmy.ml · 8 months agomessage-square2fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 8 months agoHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comoverflow@lemmy.ml to Privacy@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 8 months agoPrivacy implications of accelerometer dataplus-squaredl.acm.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPrivacy implications of accelerometer dataplus-squaredl.acm.orgoverflow@lemmy.ml to Privacy@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Linux@lemmy.ml · 8 months agoThe History of Debian, Part 1plus-squarewww.abortretry.failexternal-linkmessage-square7fedilinkarrow-up166arrow-down112
arrow-up154arrow-down1external-linkThe History of Debian, Part 1plus-squarewww.abortretry.failoverflow@lemmy.ml to Linux@lemmy.ml · 8 months agomessage-square7fedilink
overflow@lemmy.ml to cybersecurity@infosec.pubEnglish · 8 months agoCourt charges dev with hacking after cybersecurity issue disclosureplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up155arrow-down11
arrow-up154arrow-down1external-linkCourt charges dev with hacking after cybersecurity issue disclosureplus-squarewww.bleepingcomputer.comoverflow@lemmy.ml to cybersecurity@infosec.pubEnglish · 8 months agomessage-square3fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 8 months agoiPhone apps abuse iOS push notifications to collect user dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkiPhone apps abuse iOS push notifications to collect user dataplus-squarewww.bleepingcomputer.comoverflow@lemmy.ml to Privacy@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Linux@lemmy.ml · 1 year agoThe History of Red Hatplus-squarewww.abortretry.failexternal-linkmessage-square2fedilinkarrow-up168arrow-down11
arrow-up167arrow-down1external-linkThe History of Red Hatplus-squarewww.abortretry.failoverflow@lemmy.ml to Linux@lemmy.ml · 1 year agomessage-square2fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 1 year agoCrySP Speaker Series on Privacy | Cryptography, Security, and Privacy (CrySP) | University of Waterlooplus-squarecrysp.uwaterloo.caexternal-linkmessage-square0fedilinkarrow-up123arrow-down11
arrow-up122arrow-down1external-linkCrySP Speaker Series on Privacy | Cryptography, Security, and Privacy (CrySP) | University of Waterlooplus-squarecrysp.uwaterloo.caoverflow@lemmy.ml to Privacy@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoInformation Security—Before & After Public-Key Cryptographyinvidious.projectsegfau.ltexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInformation Security—Before & After Public-Key Cryptographyinvidious.projectsegfau.ltoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoTheory and Practice of Cryptographyvid.puffyan.usexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTheory and Practice of Cryptographyvid.puffyan.usoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoDeciphering Queen Of Scots, Mary Stuart’s Lost Lettersplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDeciphering Queen Of Scots, Mary Stuart’s Lost Lettersplus-squarehackaday.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agoImperialViolet - Cryptographic Agilityplus-squarewww.imperialviolet.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImperialViolet - Cryptographic Agilityplus-squarewww.imperialviolet.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 2 years agomessage-square0fedilink