wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

to the Internet . Data Encryption Key (DEK) Much like an actual key used for locking and re-opening doors, DEKs are used for the encryption and decoding of message text, sometimes

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

of an RSA file security encryption program tattooed on his arm (:wired496:) RFC 1882: The 12-Days of Technology Before Christmas Country domains registered: Ethiopia (ET), Cote d'
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Alterslash, the unofficial Slashdot digest

https://alterslash.org/

and using a strong encryption algorithm like AES256. Re:Rethinking our approach By dskoll • 2026-May-7 18:44 • Score: 5, Insightful • Thread A traditional login system throttles b
Alterslash picks the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.

Halestrom's Peregrinations

http://halestrom.net/darksleep/

imapcopy with actual encryption Tunnelling Imapcopy traffic over TLS and everything that went wrong for me. Tuesday 19 July 2022 Many indoor air quality sensor products are a scam

NLnet; Current projects

https://nlnet.nl/project/current.html

for automatic OpenPGP encryption Hyper 8 Video System Self-hostable, maintenance-free video publishing tool Universal Sensor Libraries Shared libraries for different types of sens

Research Papers and Surveys

https://www.scottaaronson.com/papers/

useful homomorphic encryption on instances of the Forrelation problem. As a corollary, there exists an oracle relative to which P=NP but BQP≠QCMA. Conversely, there exists an o

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

for using end-to-end encryption French court rules that Steam’s ban on reselling used games is contrary to European law MEPs approve sweeping changes to copyright law The Legaliti
All your base are belong to us!

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

- - Communication and encryption - - Electronic banking - - CCTV cameras - - Robotic cleaners - - Visual Positioning System (augmented reality) - - Proctoring software: the spies'

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

etc. - a myriad of encryption programs, bulk ciphers, variants on PGP, etc. Some of these I've listed...others I've had to throw my hands over and just ignore. (Keeping track of z

GNU.Support website about GNU Operating Systems

https://gnu.support/

Free Cultural Works Encryption and Privacy Schneier on Security Window Managers StumpWM File Managers ROX Filer Midnight Commander Latest pages Building a Sovereign Local LLM on L
GNU.Support is a website dedicated to promoting the GNU Operating System and free software, emphasizing user freedoms, practical applications, and programming education while adher

CipherSaber Home Page

https://ciphersaber.gurus.org/

attack has reopened the encryption debate and once again it is necessary to explain why public access to strong encryption is in our national interest. Many have pointed out the o
Fight the crypto ban by learning how to write your own strong encryption program.

Wayne Pollock's Home Page

http://wpollock.com/

available to provide encryption and digital signatures for your email and files, known as Gnu Privacy Guard (or GnuPG or simply GPG ).  This is compatible with the older Pret
Wayne Pollock homepage


Find more...