c0mmando@links.hackliberty.orgM · 8 months agoSecurity without Identification: Card Computers to make Big Brother Obsoleteplus-squareweb.archive.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkSecurity without Identification: Card Computers to make Big Brother Obsoleteplus-squareweb.archive.orgc0mmando@links.hackliberty.orgM · 8 months agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 9 months agoThe Linux Foundation and its partners are working on cryptography for the post-quantum worldplus-squarewww.zdnet.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkThe Linux Foundation and its partners are working on cryptography for the post-quantum worldplus-squarewww.zdnet.comc0mmando@links.hackliberty.orgM · 9 months agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoMathematician warns US spies may be weakening next-gen encryptionplus-squareweb.archive.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMathematician warns US spies may be weakening next-gen encryptionplus-squareweb.archive.orgc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
∟⊔⊤∦∣≶@lemmy.nz · 1 year agoIs there any security in scrambling bits?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIs there any security in scrambling bits?plus-square∟⊔⊤∦∣≶@lemmy.nz · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoECH is Going Mainstream, and it Could Help Liberate Blocked Websitesplus-squarereclaimthenet.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkECH is Going Mainstream, and it Could Help Liberate Blocked Websitesplus-squarereclaimthenet.orgc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoQuantum Resistance and the Signal Protocolplus-squaresignal.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkQuantum Resistance and the Signal Protocolplus-squaresignal.orgc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
Spzi@lemm.eeEnglish · edit-21 year agoAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoSpzi@lemm.eeEnglish · edit-21 year agomessage-square0fedilink
shotgun_surgery@links.hackliberty.orgEnglish · 1 year agoIntroduction to Cryptography courseplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroduction to Cryptography courseplus-squareyoutu.beshotgun_surgery@links.hackliberty.orgEnglish · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoHow to run a shadow library: operations at Anna’s Archiveannas-blog.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to run a shadow library: operations at Anna’s Archiveannas-blog.orgc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoHelp users in Iran reconnect to Signalplus-squaresignal.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHelp users in Iran reconnect to Signalplus-squaresignal.orgc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoTornado Cash Code Repositoriesplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTornado Cash Code Repositoriesplus-squaregithub.comc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoDaniel Bernstein announced second lawsuit against the U.S. governmentplus-squareblog.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDaniel Bernstein announced second lawsuit against the U.S. governmentplus-squareblog.cr.yp.toc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoUnderstanding RSAplus-squaregit.hackliberty.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnderstanding RSAplus-squaregit.hackliberty.orgc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoSafeCurves: choosing safe curves for elliptic-curve cryptographyplus-squaresafecurves.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSafeCurves: choosing safe curves for elliptic-curve cryptographyplus-squaresafecurves.cr.yp.toc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoPost-Quantum VPN Tunnelsplus-squaremullvad.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPost-Quantum VPN Tunnelsplus-squaremullvad.netc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoGuidance for Choosing an Elliptic Curve Signature Algorithm in 2022plus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGuidance for Choosing an Elliptic Curve Signature Algorithm in 2022plus-squaresoatok.blogc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoHow to set up "always encrypted" Rocket.Chat on Kubernetes (Constellation)plus-squaredev.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to set up "always encrypted" Rocket.Chat on Kubernetes (Constellation)plus-squaredev.toc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoJoin the discussion about Internet Censorship Circumventionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJoin the discussion about Internet Censorship Circumventionplus-squaregithub.comc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoRun your own Numbers Stationplus-squarelinuxcoffee.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRun your own Numbers Stationplus-squarelinuxcoffee.comc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 2 years agoCryptanalysis proves Mega.nz crypto architecture "riddled with fundamental cryptography flaws"plus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptanalysis proves Mega.nz crypto architecture "riddled with fundamental cryptography flaws"plus-squarearstechnica.comc0mmando@links.hackliberty.orgM · 2 years agomessage-square0fedilink