wiby  
Settings



Eben Moglen

http://moglen.law.columbia.edu/

2001 PostScript PDF The Encryption Wars , Cabinet Magazine, Issue 1, December 2000 PostScript PDF Swap or Steal: The Fate of Napster (Debate with Steven Metalitz), Justice Talking

The Gopher Manifesto

http://27.org/gopher-manifesto/

servers with greater encryption and security features must be developed. "Wireless communications developers would be well-advised to look at this venerable Internet protocol

Alterslash, the unofficial Slashdot digest

https://alterslash.org/

and using a strong encryption algorithm like AES256. Re:Rethinking our approach By dskoll • 2026-May-7 18:44 • Score: 5, Insightful • Thread A traditional login system throttles b
Alterslash picks the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.

Blog - Bradley Kühn ( bkuhn )

https://ebb.org/bkuhn/blog/

diversity emacs encryption enforcement exceptions faif fdl for-profit fosdem foss fsf gcc git gnome gnu google GPL gpl gpl-compatibility gpl-enforcement gplv3 guadec ibm identica

Can you trust your computer?

http://www.gpascal.com/trust.htm

includes a digital encryption and signature device, and the keys are kept secret from you. (Microsoft's version of this is called "palladium.") Proprietary programs will use this

Free as in Freedom - Free as in Freedom

https://faif.us/cast/

blog post on doing VoIP encryption with Free Software . (01:14:04) Bradley mentioned his talk entitled The Affero GPLv3: Why It Exists & Who It's For? at the Southern California L
Free as in Freedom is a bi-weekly oggcast about legal, policy and other issues in Free, Libre and Open Source Software

https://www.rfc-editor.org/rfc/rfc7230.txt

https://www.rfc-editor.org/rfc/rfc7230.txt

the use of strong encryption, end-to-end, prior to sending the first HTTP request. https-URI = "https:" "//" authority path-abempty [ "?" query ] [ "#" fragment ] Note that the "h

Order Of Magi

http://www.orderofmagi.com/

Nice, France. Wrote Encryption Software Including MEUCS. Designed and Coded mpg2 Video Format and upgraded jpg picture compression. (Yes She IS Arlen Specter's Illegitimate Daught
Those That Protect All, Those That Var The Illuminati, Those That Control All Beings; The Magi

Luke Smith Fanclub & Archive

https://lukesmith.neocities.org/

and privacy-focused encryption; involves partitioning, encrypting, and configuring logical volume management; installation covers configuring portage, setting up a secure and effi
LukeSmith.xyz fanclub and archive – removed articles, lost videos, and community opinions. Explore content no longer on lukesmith.xyz.

PuTTY FAQ

https://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html

your guarantee that the encryption you put on your data at the client end is the same encryption taken off the data at the server end; it's your guarantee that it hasn't been remo

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

DES), block cipher encryption modes (ECB, CBC, CFB, encrypt+MAC modes, LRW), public-key encryption (RSA, DH, Elgamal, DSA), using PKCs, Public-Key Cryptography Standards (PKCS), e

NLnet; Current projects

https://nlnet.nl/project/current.html

for automatic OpenPGP encryption Hyper 8 Video System Self-hostable, maintenance-free video publishing tool Universal Sensor Libraries Shared libraries for different types of sens


Find more...