wiby  
Settings



Basilikum

https://basilikum.monster/

with cute peeps cryptography Tor onions HTML the internet even more things, particularly media, I like a special kind of idiot still trying to figure it all out Contact Write to m

Capability Comparison

https://secushare.org/comparison

while rolling their cryptography, but those mistakes got fixed. Crypto.cat went through similar pains, but for some reasons its even more embarassing mistakes are no longer talked

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

using PKCs, Public-Key Cryptography Standards (PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functi

NLnet; Current projects

https://nlnet.nl/project/current.html

Elliptic Curve Cryptography for microcontrollers Irdest - OpenWRT Image and Bluetooth LE Add Bluetooth LE connections to Irdest Irdest IP Traffic Proxy Route existing IP-network t

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec. Ad-Blocker An Overview of Ad-Blocking Technology - Basically explains how an Ad-B
All your base are belong to us!

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

device. How to attack cryptography [From hardest to easiest:] Find a flaw in the mathematics (extremely unlikely). Find a flaw in the algorithm. Find a flaw in the crypto software
Best practices and information about computer and smartphone security and privacy

A provably strong password you can remember

http://www.cambridgeclarion.org/pw.html

is analogous to what in cryptography is now called “Kerckhoff's Principle”. In a 1883 journal article Kerckhoff wrote six desired qualities of a military cipher system, including

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Ribeiro Corrêa Cryptography, PGP and Pine , by Matteo Dell'Omodarme Tuxedo Tails , by Eric Kasten Micro Publishing: Part 3 , by Mark Nielsen Virtual fax to pdf files with EF

Directory | An IndieWeb Webring

https://xn--sr8hvo.ws/directory

include amateur radio, cryptography, peer-to-peer networking, and sustainable development. christiano.dev Christiano Anderson Data Engineer, Python, PostgreSQL rasulkireev.com Ras
An IndieWeb Webring

alt.cyberpunk FAQ – /cyb/+/sec/ wiki

https://cyb-sec.neocities.org/pages/alt-cyberpunk-faq/

is through cryptography and cryptosystems. They believe widespread use of extremely hard-to-break coding schemes will create “regions of privacy” that “The Syste

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

including API attacks Cryptography – including why quantum crypto security proofs based on entanglement are convincing Security of clinical information systems – inclu


Find more...