Hacker Newsnew | past | comments | ask | show | jobs | submit | some_furry's submissionslogin
1.Everything You Need to Know About Email Encryption in 2026 (soatok.blog)
6 points by some_furry 2 days ago | past | 2 comments
2.To sign or not to sign: Practical vulnerabilities in GPG and friends (ccc.de)
2 points by some_furry 16 days ago | past
3.Show HN: Freeon – Distributed Ed25519 signature tool (github.com/soatok)
1 point by some_furry 4 months ago | past
4.Pre-Draft Call for Comments: GCM and GMAC Block Cipher Modes of Operation (nist.gov)
1 point by some_furry 12 months ago | past
5.Roasting Christmas Spam from Muhu AI (2024) (soatok.blog)
5 points by some_furry on Jan 1, 2025 | past
6.Imagining Private Spaces for Bluesky (Using Cryptography) (soatok.blog)
4 points by some_furry on Dec 3, 2024 | past
7.Automatic Content Recognition Tracking in Smart TVs (arxiv.org)
159 points by some_furry on Sept 26, 2024 | past | 155 comments
8.Security Issues in Matrix's Olm Library (soatok.blog)
2 points by some_furry on Aug 14, 2024 | past
9.Expat (XML parser) is understaffed and needs funding (hartwork.org)
3 points by some_furry on April 3, 2024 | past | 1 comment
10.How to Hold KEMs (Key Encapsulation Mechanisms, Cryptography) (durumcrustulum.com)
4 points by some_furry on Feb 25, 2024 | past | 1 comment
11.Commit signing in 2023 is kinda wack (lobi.to)
3 points by some_furry on Dec 30, 2023 | past | 1 comment
12.Would Be More Professionally Useful If Not for the Furry Art (soatok.blog)
2 points by some_furry on Nov 21, 2023 | past
13.A path to niche skillsets and community (cendyne.dev)
1 point by some_furry on May 29, 2023 | past
14.On Departure (plygrnd.net)
2 points by some_furry on May 22, 2023 | past
15.Security Research on Twitter: Before and After Musk's Takeover (soatok.blog)
4 points by some_furry on Dec 16, 2022 | past
16.Ed25519 Deep Dive Addendum (cendyne.dev)
7 points by some_furry on Sept 11, 2022 | past
17.Should you delete your Patreon account after they laid off their security team? (soatok.blog)
86 points by some_furry on Sept 9, 2022 | past | 85 comments
18.How Google Played with Bad Cryptography (cendyne.dev)
4 points by some_furry on Aug 7, 2022 | past
19.The Hate Store: Amazon’s Self-Publishing Arm Is a Haven for White Supremacists (propublica.org)
3 points by some_furry on May 9, 2022 | past | 1 comment
20.Who Runs the Internet? Furries (thespinoff.co.nz)
2 points by some_furry on Jan 11, 2022 | past | 1 comment
21.How to Remove Twitter Spaces (soatok.blog)
3 points by some_furry on Jan 7, 2022 | past
22.The “Bi-Symmetric Encryption” Fraud (soatok.blog)
3 points by some_furry on Sept 28, 2021 | past
23.Lobste.rs Password Reset Vulnerability (Via Timing Attack) (soatok.blog)
3 points by some_furry on Aug 20, 2021 | past
24.Dead Ends in Cryptanalysis: Timing Side-Channels (soatok.blog)
2 points by some_furry on June 8, 2021 | past
25.Proctorio Is Using Racist Algorithms to Detect Faces (vice.com)
3 points by some_furry on April 12, 2021 | past | 1 comment
26.The technology industry is hurt at every level by toxic gatekeeping (soatok.blog)
2 points by some_furry on March 10, 2021 | past
27.Toxic Gatekeeping in the Technology Industry (soatok.blog)
1 point by some_furry on March 10, 2021 | past
28.Build Pipeline Security (sprocketfox.io)
2 points by some_furry on Feb 19, 2021 | past
29.Please Stop Encrypting with RSA Directly (soatok.blog)
21 points by some_furry on Jan 21, 2021 | past | 1 comment
30.Masks Off for TheDonald.win (soatok.blog)
4 points by some_furry on Jan 9, 2021 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: