- Why is md5 still widely used, despite the known collision vulnerabilites? http://en.wikipedia.org/wiki/md5#collision_vulnerabilities 54 comments programming
Linking pages
- Once seen as bulletproof, 11 million+ Ashley Madison passwords already cracked | Ars Technica http://arstechnica.com/security/2015/09/once-seen-as-bulletproof-11-million-ashley-madison-passwords-already-cracked/ 679 comments
- GitHub - karanpratapsingh/system-design: Learn how to design systems at scale and prepare for system design interviews https://github.com/karanpratapsingh/system-design 331 comments
- The First Few Milliseconds of an HTTPS Connection http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html 286 comments
- Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/ 286 comments
- Starbucks should really make their APIs public. | by Nick Lee | Tendigi https://blog.tendigi.com/starbucks-should-really-make-their-apis-public-6b64a1c2e923 167 comments
- DJI - The ART of obfuscation http://blog.quarkslab.com/dji-the-art-of-obfuscation.html 135 comments
- Why You Shouldn't Roll Your Own Authentication | Cloudbees Blog https://blog.codeship.com/why-you-shouldnt-roll-your-own-authentication/ 127 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- GitHub - mikeroyal/Self-Hosting-Guide: Self-Hosting Guide. Learn all about locally hosting (on premises & private web servers) and managing software applications by yourself or your organization. Including Cloud, LLMs, WireGuard, Automation, Home Assistant, and Networking. https://github.com/mikeroyal/Self-Hosting-Guide 108 comments
- Time-lock encryption · Gwern.net http://www.gwern.net/Self-decrypting%20files?2= 101 comments
- GitHub - betty200744/ultimate-go: This repo contains my notes on working with Go and computer systems. https://github.com/betty200744/ultimate-go 82 comments
- Breaking CityHash64, MurmurHash2/3, wyhash, and more... | orlp.net https://orlp.net/blog/breaking-hash-functions/ 82 comments
- Illegal Hashes – Terence Eden’s Blog https://shkspr.mobi/blog/2022/11/illegal-hashes/ 75 comments
- PGP keys, software security, and much more threatened by new SHA1 exploit | Ars Technica https://arstechnica.com/information-technology/2020/01/pgp-keys-software-security-and-much-more-threatened-by-new-sha1-exploit/ 63 comments
- Anatomy of a hack: even your 'complicated' password is easy to crack | WIRED UK http://www.wired.co.uk/news/archive/2013-05/28/password-cracking/viewall 60 comments
- GitHub - mmcloughlin/avo: Generate x86 Assembly with Go https://github.com/mmcloughlin/avo#readme 50 comments
- At death’s door for years, widely used SHA1 function is now dead | Ars Technica https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ 49 comments
- flawed.net.nz | Hacking, hardware, software, and general curiosities of computing machinery! Docendo discumus. https://flawed.net.nz/2018/02/21/attacking-merkle-trees-with-a-second-preimage-attack/ 48 comments
- Password Security The Right Way http://www.stormpath.com/blog/password-security-right-way 47 comments
- Time-lock encryption · Gwern.net https://www.gwern.net/Self-decrypting-files 45 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: MD5 - Wikipedia
See how to search.