Tech - Anil Dashhttps://www.anildash.com/tags/tech/
best of The lost infrastructure of social media. 08 Aug 2016 blogs search social media tech twitter New York-Style Tech 15 Jul 2016 nyc tech On the Hunt 24 Feb 2016 tech twitter s
A blog about making culture. Since 1999.
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
in the hardware and infrastructure that users of the Internet rely on. In the West, a small number of companies (such as Intel, Nvidia, Arm and Apple) design and produce the major
G-Kermit 2.01https://www.kermitproject.org/gkermit.html
in new releases of infrastructure items like system services and programming languages, the reality is that Unix-based software constantly needs to be "updated" to "comply" with o
15 reasons not to start using PGPhttps://secushare.org/PGP
to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Bank on Open-Source Infrastructure , by Ned Lilly Finding my computer at home from the outside , by Mark Nielsen Learning Perl, part 3 , by Ben Okopnik So You Like Color !!! (The
Post-OCSP certificate revocation in the Web PKI - Seirdyhttps://seirdy.one/posts/2024/09/25/post-ocsp-revocation/
in the Web public key infrastructure ( PKI ) have long validity: almost all remain valid for at least three months! An attacker compromising a certificate early enough in its life
OCSP, including OCSP Stapling, is leaving the Web PKI. Here's a complete look at revocation beyond OCSP: its past, present, and possible futures.
Find more...