wiby  
Settings



Tech - Anil Dash

https://www.anildash.com/tags/tech/

best of The lost infrastructure of social media. 08 Aug 2016 blogs search social media tech twitter New York-Style Tech 15 Jul 2016 nyc tech On the Hunt 24 Feb 2016 tech twitter s
A blog about making culture. Since 1999.

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

in the hardware and infrastructure that users of the Internet rely on. In the West, a small number of companies (such as Intel, Nvidia, Arm and Apple) design and produce the major

G-Kermit 2.01

https://www.kermitproject.org/gkermit.html

in new releases of infrastructure items like system services and programming languages, the reality is that Unix-based software constantly needs to be "updated" to "comply" with o

15 reasons not to start using PGP

https://secushare.org/PGP

to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Bank on Open-Source Infrastructure , by Ned Lilly Finding my computer at home from the outside , by Mark Nielsen Learning Perl, part 3 , by Ben Okopnik So You Like Color !!! (The

Post-OCSP certificate revocation in the Web PKI - Seirdy

https://seirdy.one/posts/2024/09/25/post-ocsp-revocation/

in the Web public key infrastructure ( PKI ) have long validity: almost all remain valid for at least three months! An attacker compromising a certificate early enough in its life
OCSP, including OCSP Stapling, is leaving the Web PKI. Here's a complete look at revocation beyond OCSP: its past, present, and possible futures.


Find more...