Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Practical Collision Attack Against Long Key IDs in PGP (soatok.blog)
12 points by zdw 1 day ago | past | discuss
Everything You Need to Know About Email Encryption in 2026 (soatok.blog)
34 points by birdculture 1 day ago | past | 9 comments
Everything You Need to Know About Email Encryption in 2026 (soatok.blog)
10 points by thm 2 days ago | past | discuss
Everything You Need to Know About Email Encryption in 2026 (soatok.blog)
7 points by tempodox 3 days ago | past | discuss
Everything You Need to Know About Email Encryption in 2026 (soatok.blog)
52 points by some_furry 3 days ago | past | 9 comments
GNU: A Heuristic for Bad Cryptography (soatok.blog)
10 points by stackghost 11 days ago | past | 4 comments
Key Transparency for the Fediverse (soatok.blog)
5 points by walterbell 17 days ago | past
The Revolution Will Not Make the Hacker News Front Page (soatok.blog)
25 points by blackhole 21 days ago | past | 4 comments
Key Transparency for the Fediverse (soatok.blog)
20 points by todsacerdoti 24 days ago | past | 2 comments
Moving Beyond the NPM Elliptic Package (soatok.blog)
8 points by woodruffw 49 days ago | past | 1 comment
Moving Beyond the NPM Elliptic Package (soatok.blog)
2 points by zdw 49 days ago | past
The Dreamseeker's Vision of Tomorrow (soatok.blog)
5 points by SlackingOff123 84 days ago | past
Barking Up the Ratchet Tree – MLS Is Neither Royal nor Nude (soatok.blog)
23 points by cityroler 4 months ago | past | 2 comments
Improving Geographical Resilience for Distributed Open Source Teams with Freon (soatok.blog)
31 points by zdw 5 months ago | past
Age verification doesn't need to be a privacy footgun (soatok.blog)
56 points by zdw 5 months ago | past | 91 comments
Against the censorship of adult content by payment processors (soatok.blog)
255 points by SlackingOff123 5 months ago | past | 250 comments
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps (soatok.blog)
24 points by zdw 6 months ago | past | 11 comments
Checklists Are the Thief of Joy (soatok.blog)
5 points by zdw 6 months ago | past | 3 comments
What to Use Instead of PGP (2024) (soatok.blog)
3 points by xeonmc 6 months ago | past
The Tech Industry Doesn't Understand Consent (soatok.blog)
13 points by ColinWright 6 months ago | past | 6 comments
My Blog Lasted Longer Than the Confederacy (2024) (soatok.blog)
7 points by hlieberman 8 months ago | past | 1 comment
An appeal to companies doing AI (soatok.blog)
80 points by todsacerdoti 8 months ago | past | 58 comments
The Authenticity Drought (soatok.blog)
7 points by halosghost 9 months ago | past
The Practical Limitations of End-to-End Encryption (soatok.blog)
44 points by todsacerdoti 9 months ago | past | 45 comments
Post-Quantum Cryptography Is About the Keys You Don't Play (soatok.blog)
7 points by dmarto 9 months ago | past
Collatzeral damage: bitwise and proof foolish (soatok.blog)
14 points by fanf2 9 months ago | past | 2 comments
The insecurity of telecom stacks in the wake of Salt Typhoon (soatok.blog)
312 points by zdw 10 months ago | past | 207 comments
Reviewing the cryptography used by Signal (soatok.blog)
172 points by todsacerdoti 10 months ago | past | 151 comments
Hell is overconfident developers writing encryption code (soatok.blog)
201 points by zdw 11 months ago | past | 238 comments
Too Many People Don't Value the Time of Security Researchers (soatok.blog)
22 points by zdw 11 months ago | past | 5 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: