Brad Templeton's Home Pagehttps://www.templetons.com/brad/
with opportunistic encryption. How to solve sysadmin and upgrade problems in modern operating systems. A conceptual draft for Out-of-Band SGML /HTML/XMLs which are a way to provid
From Here to There, or: Walls Have Ears | unsigned.iohttps://unsigned.io/articles/2022_04_02_From_Here_to_There.html
not just End-to-End Encryption. The creation of any sort of private, human-friendly or freedom-enhancing system requires the inclusion of end-to-end connectivity as a fundamental
Once the centerpiece in the hopes of a free and prosperous world, the Internet is currently undergoing significant mutations towards a consumption-oriented content delivery system,
A FreeBSD 11 Desktop How-to » Cooltrainer.orghttps://cooltrainer.org/a-freebsd-desktop-howto/
at boot, i.e. I use encryption on my workstation but not on my FreeBSD router. Encrypting multiple physical devices with the same key will only require the passphrase once. You wi
A guide to a full-featured modern desktop FreeBSD installation
Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
(i.e. circumvent encryption access control) or to strip out copy protection measures are devices that should clearly be illegal. General personal computers, at the other extreme,
I don't trust Signalhttps://drewdevault.com/2018/08/08/Signal.html
the point of end-to-end encryption. But we have to trust that Moxie is running the server software he says he is. We have to trust that he isn’t writing down a list of peopl
FrogFind!http://frogfind.de/about.php/?lg=en-us
JavaScript, CSS and encryption of modern websites. That said, they can browse simple websites quite well. So Sean decided to find out how much of the internet could be converted i
Threat modelling case study: bicycleshttps://calpaterson.com/bicycle-threat-model.html
important data" or "use encryption" but these can all be just as vapid. "Strong passwords!" as a slogan fails to address the fact that the average internet user has hundreds of lo
How to avoid buying your bike again every 6-12 months and tips for how to apply the same reasoning to other things, like computers
Cryptography Amicus Brief 10/96https://archive.epic.org/crypto/export_controls/amicus_brief.html
atechnical expertise in encryption that helps to illuminate thepractical aspects of the issues currently before the Court. EPIC isconcerned that the district court's ruling, if al
www.riscos.com - Main Indexhttp://riscos.com/
1.20 and uses 256 byte encryption methods to store order information on our server rather than downloading the information from PayPal when it's required. The system for downloadi
Home | Neil's bloghttps://neilzone.co.uk/
has Tor's own transport encryption. Updating my TicWatch to AsteroidOS 2.0 Published on 2026-02-20 12:45:42 by Neil Brown I have a TicWatch Pro 2020, running AsteroidOS. Moving aw
Home page, Bob Jenkinshttp://burtleburtle.net/bob/
authentication code, no encryption. SpookyHash is 19GB/sec, 128 bit digest, not cryptographic, no encryption. My ISAAC64 encrypts (no authentication code) at 2.3GB/sec, 8.5x slowe
Peter Neumann's Home Pagehttps://www.csl.sri.com/users/neumann/
Waters (Attribute-Based Encryption), Carl Gunter (Attribute-Based Messaging), and Chris Peikert (Lattice-Based Cryptography). In the early 2000s, DARPA funded thirteen projects un
Find more...