wiby  
Settings



How PGP works

http://users.ece.cmu.edu/~adrian/630-f04/PGP-intro.html

— even a billion computers doing a billion checks a second — it is not possible to decipher the result of strong cryptography before the end of the universe. One would

Stop Using Discord

https://usemumble.neocities.org/

with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc

The Design and Implementation of the Tor Browser [DRAFT]

https://2019.www.torproject.org/projects/torbrowser/design/

such as seizing the computers of all Tor users in an area (especially after narrowing the field by the above two pieces of information). History records and cache data are the pri

JdM

https://futureofthe.tech/

// Optimized for computers // Comfortable for users // Innovative for the world // Decentralized for our freedom ↓↓↓↓↓↓ About me Hi, I'm JdM. I'm passionate about development. As

Cryptography Amicus Brief 10/96

https://archive.epic.org/crypto/export_controls/amicus_brief.html

mathematicians and computerscientists concerning cryptography and to fulfill his interest in thedissemination of information about cryptography, Appellant Karn, asoftware engineer

About the Fur Central Annex

https://www.captainpackrat.com/annex.htm

running on my own computers at home. Currently the Midden network consists of 8 machines:  Capybara is the primary network server, Packrat and  Muskrat are workstations,

Bypassing the privacy chase

http://digdeeper.love/articles/bypassing.xhtml

tuned to. There are no computers in the jungle, after all. Civilization has allowed privacy violators to hide behind devices (such as CCTV cameras) and avoid triggering our biolog

Networking software for DOS and Windows 3.x

http://www.jacco2.dds.nl/samba/dos.html

the network (see which computers are connected to it) at least one computer running Samba, Windows for Workgroups, Windows 95 or Windows NT must be on the network and belong to th

A beginner's guide to CGI scripting

http://www.anaesthetist.com/mnm/cgi/

variety of programs on computers across the 'Net. HTTP is very similar to the format used for e-mail ( RFC 822 ) and MIME . The beauty of HTTP/1.0 is that it makes it easy for us

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

speeds, about NSA supercomputers. There's just no reason for people to worry about "weak IDEA keys" when so many more pressing matters exist. (Let the experts worry.) Little of th

Mike Patton's pointers to computer info

http://www.mit.edu/people/map/computers.html

Hardware interests DEC Computers Other Computers Other Hardware Software interests UNIX, ugh Languages Programs, etc. Computer communications Home Setup Home Automation Miscellane

SmartFilter - I've Got A Little List

http://sethf.com/anticensorware/smartfilter/gotalist.php

mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study


Find more...