wiby  
Settings



Brad Templeton's Home Page

https://www.templetons.com/brad/

with opportunistic encryption. How to solve sysadmin and upgrade problems in modern operating systems. A conceptual draft for Out-of-Band SGML /HTML/XMLs which are a way to provid

From Here to There, or: Walls Have Ears | unsigned.io

https://unsigned.io/articles/2022_04_02_From_Here_to_There.html

not just End-to-End Encryption. The creation of any sort of private, human-friendly or freedom-enhancing system requires the inclusion of end-to-end connectivity as a fundamental
Once the centerpiece in the hopes of a free and prosperous world, the Internet is currently undergoing significant mutations towards a consumption-oriented content delivery system,

A FreeBSD 11 Desktop How-to » Cooltrainer.org

https://cooltrainer.org/a-freebsd-desktop-howto/

at boot, i.e. I use encryption on my workstation but not on my FreeBSD router. Encrypting multiple physical devices with the same key will only require the passphrase once. You wi
A guide to a full-featured modern desktop FreeBSD installation

Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Inter

https://cryptome.org/wipo-imp99-3.htm

(i.e. circumvent encryption access control) or to strip out copy protection measures are devices that should clearly be illegal. General personal computers, at the other extreme,

I don't trust Signal

https://drewdevault.com/2018/08/08/Signal.html

the point of end-to-end encryption. But we have to trust that Moxie is running the server software he says he is. We have to trust that he isn’t writing down a list of peopl

FrogFind!

http://frogfind.de/about.php/?lg=en-us

JavaScript, CSS and encryption of modern websites. That said, they can browse simple websites quite well. So Sean decided to find out how much of the internet could be converted i

Threat modelling case study: bicycles

https://calpaterson.com/bicycle-threat-model.html

important data" or "use encryption" but these can all be just as vapid. "Strong passwords!" as a slogan fails to address the fact that the average internet user has hundreds of lo
How to avoid buying your bike again every 6-12 months and tips for how to apply the same reasoning to other things, like computers

Cryptography Amicus Brief 10/96

https://archive.epic.org/crypto/export_controls/amicus_brief.html

atechnical expertise in encryption that helps to illuminate thepractical aspects of the issues currently before the Court. EPIC isconcerned that the district court's ruling, if al

www.riscos.com - Main Index

http://riscos.com/

1.20 and uses 256 byte encryption methods to store order information on our server rather than downloading the information from PayPal when it's required. The system for downloadi

Home | Neil's blog

https://neilzone.co.uk/

has Tor's own transport encryption. Updating my TicWatch to AsteroidOS 2.0 Published on 2026-02-20 12:45:42 by Neil Brown I have a TicWatch Pro 2020, running AsteroidOS. Moving aw

Home page, Bob Jenkins

http://burtleburtle.net/bob/

authentication code, no encryption. SpookyHash is 19GB/sec, 128 bit digest, not cryptographic, no encryption. My ISAAC64 encrypts (no authentication code) at 2.3GB/sec, 8.5x slowe

Peter Neumann's Home Page

https://www.csl.sri.com/users/neumann/

Waters (Attribute-Based Encryption), Carl Gunter (Attribute-Based Messaging), and Chris Peikert (Lattice-Based Cryptography). In the early 2000s, DARPA funded thirteen projects un


Find more...