Hacker News
Linking pages
- Tracking One Year of Malicious Tor Exit Relay Activities (Part II) | by nusenu | Medium https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-relay-activities-part-ii-85c80875c5df 148 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- Is “KAX17” performing de-anonymization Attacks against Tor Users? | by nusenu | Medium https://nusenu.medium.com/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8 101 comments
- Digging into the Privacy Sandbox https://web.dev/digging-into-the-privacy-sandbox/ 4 comments
- Well-Known Locations: A Reserved URI Path Prefix | by Dorai Ashok S A | Dev Genius https://medium.com/@0snet/well-known-locations-a-reserved-uri-path-prefix-5277b2f37db7 4 comments
Linked pages
- Matrix.org https://matrix.org 1602 comments
- Keybase https://keybase.io/ 160 comments
- Global Privacy Control — Take Control Of Your Privacy https://globalprivacycontrol.org/ 5 comments
- A privacy-friendly Do Not Track (DNT) Policy | Electronic Frontier Foundation https://www.eff.org/dnt-policy 4 comments
- User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html 0 comments
- CAB Forum | Certificate Issuers, Certificate Consumers, and Interested Parties Working to Secure the Web https://cabforum.org/ 0 comments