wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

of the password as an authentication scheme can be abolished once cryptographic authenticity is implicit in all transactions. We recommend the pervasive deployment of TALER for an

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

will add two factor authentication, improve interoperability, scalability and add some new features like better archiving capabilities. ▸ For more details see : https://nlnet.nl/p

Linux

https://www.billdietrich.me/Linux.html

standard facilities : Authentication (PAM, certificates, more), access control, IPC ( D-Bus , sockets, Varlink , more). Some other variations or modifications, some of them user c
Linux operating system basics, parts, myths, and truths

Kernel Planet

https://planet.kernel.org/

: Adding Two Factor Authentication to Android (LineageOS) I really like the idea of using biometrics to add extra security, but have always hated the idea that simply touching the

Amicus Brief

https://archive.epic.org/crypto/export_controls/bernstein_brief.html

on cryptography forauthentication and privacy, and IMC's members desire a wideunfettered market for secure Internet mail products. The Internet Society ("ISOC") is a non-governmen

Blog - Suffix

https://www.suffix.be/blog/

Second Factor Authentication for SSH Using ecdsa-sk or ed25519-sk combined with a hardware security key for multifactor SSH authentication. Building a Website with my Kids Introdu
Personal blog for posting my ramblings, mostly about programming.

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

with Nintendo’s authentication servers. Developers then use the authentication data to interact with their own servers and provide whatever online functionality they offer. As a s
An in-depth analysis that explains how this console works internally

DVD FAQ

https://demystified.info/dvdfaq.html

a data encryption and authentication scheme intended to prevent copying video files directly from DVD-Video discs. CSS was developed primarily by Matsushita and Toshiba. Each CSS
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.

Publishing and Linking on the Web

https://www.w3.org/2001/tag/doc/publishingAndLinkingOnTheWeb-2011-10-27.html

and unprotected by authentication barriers), it is impossible to completely limit how that material is used through technical means — HTTP headers can be faked, metadata ca

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

probably do the basics (authentication, input sanitizing, URL-checking, permissions, database access, etc) fairly safely. If all you learn is how to catch simple bugs, you may be
How to become a bug-bounty hunter and do penetration testing

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

means of encryption and authentication – features that can only be provided if cryptographic know-how is widely available and unencumbered by government regulation. Cryptography c

FOSDEM 2017 - Sunday

https://archive.fosdem.org/2017/schedule/day/sunday/

- PostgreSQL Client Authentication Find the best place in the city Rust ELBE BOF SpinalHDL Designing in the open - The UX of UX [nextcloud] Cloud Federation Living Orb Open Source


Find more...