Hacker News
- Attack of the Week: Group Messaging in WhatsApp and Signal https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/ 34 comments
- On the new Snowden documents http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html 27 comments
Lobsters
- Was the Efail disclosure horribly screwed up? https://blog.cryptographyengineering.com/2018/05/17/was-the-efail-disclosure-horribly-screwed-up/ 29 comments security
- Attack of the Week: Group Messaging in WhatsApp and Signal https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/ 5 comments cryptography , security
- A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/ 2 comments security
- An update on Truecrypt http://blog.cryptographyengineering.com/2013/12/an-update-on-truecrypt.html 2 comments security
- Remarks on “Chat Control” https://blog.cryptographyengineering.com/2023/03/23/remarks-on-chat-control/ 17 comments programming
- Zero Knowledge Proofs: An illustrated primer https://blog.cryptographyengineering.com/2014/11/27/zero-knowledge-proofs-illustrated-primer/ 3 comments netsec
- Does Zoom use end-to-end encryption? – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2020/04/03/does-zoom-use-end-to-end-encryption/ 14 comments crypto
- EARN IT is a direct attack on end-to-end encryption https://blog.cryptographyengineering.com/2020/03/06/earn-it-is-an-attack-on-encryption 5 comments crypto
- EARN IT is a direct attack on end-to-end encryption https://blog.cryptographyengineering.com/2020/03/06/earn-it-is-an-attack-on-encryption/ 12 comments privacy
- How safe is Apple’s Safe Browsing? https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/ 6 comments privacy
- How safe is Apple’s Safe Browsing? On iOS 13, Apple is sharing some of your web browsing with Tencent. https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/ 8 comments technology
- Looking back at the Snowden revelations https://blog.cryptographyengineering.com/2019/09/24/looking-back-at-the-snowden-revelations/ 4 comments privacy
- Data Leakage from Encrypted Databases https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/ 3 comments programming
- A proposal by GCHQ "to take advantage of existing weaknesses in the identity management systems of group chat and calling systems" to insert a "ghost" user into encrypted conversations could go very, very wrong. https://blog.cryptographyengineering.com/2018/12/17/on-ghost-users-and-messaging-backdoors/amp/#click=https://t.co/uUl0Lm6Xyb 8 comments privacy
- Let’s talk about PAKE https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/ 12 comments crypto
- Why I’m leaving Chrome https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/ 208 comments programming
- Why I’m done with Chrome – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/ 40 comments firefox
- Attack of the Week: Group Messaging in WhatsApp and Signal https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/ 9 comments netsec
- The strange story of “Extended Random” https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/ 8 comments netsec
- The strange story of "Extended Random" https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/ 4 comments crypto
- Falling through the KRACKs – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2017/10/16/falling-through-the-kracks/ 11 comments programming
- A Few Thoughts on Cryptographic Engineering: Is Apple's Cloud Key Vault a crypto backdoor? http://blog.cryptographyengineering.com/2016/08/is-apples-cloud-key-vault-crypto.html 3 comments apple
- A Few Thoughts on Cryptographic Engineering: Attack of the week: DROWN http://blog.cryptographyengineering.com/2016/03/attack-of-week-drown.html 7 comments crypto
- Prof. Matthew Green: How Apple could easily backdoor iMessage for the FBI (without you knowing it) http://blog.cryptographyengineering.com/2015/09/lets-talk-about-imessage-again.html 77 comments technology
- Truecrypt report http://blog.cryptographyengineering.com/2015/04/truecrypt-report.html 61 comments programming
- Truecrypt report http://blog.cryptographyengineering.com/2015/04/truecrypt-report.html 10 comments crypto
- A Few Thoughts on Cryptographic Engineering: Another update on the Truecrypt audit http://blog.cryptographyengineering.com/2015/02/another-update-on-truecrypt-audit.html 26 comments crypto
- Prof. Matthew Green: Why can't Apple decrypt your iPhone? http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html 145 comments netsec
- Cryptographic obfuscation and 'unhackable' software http://blog.cryptographyengineering.com/2014/02/cryptographic-obfuscation-and.html 16 comments netsec
- Let's audit Truecrypt! http://blog.cryptographyengineering.com/2013/10/lets-audit-truecrypt.html?showcomment=1381802478312 192 comments netsec
- A Few Thoughts on Cryptographic Engineering: Let's audit Truecrypt! http://blog.cryptographyengineering.com/2013/10/lets-audit-truecrypt.html 53 comments technology
- RSA warns developers not to use RSA products http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html 21 comments technology
- The Many Flaws of Dual_EC_DRBG -- A technical follow up about the NSA's war on crypto, specifically addressing the allegation that the NSA inserted a backdoor into the Dual-EC pseudorandom number generator http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html 22 comments netsec
- A cryptographer's view on recent NSA revelations http://blog.cryptographyengineering.com/2013/09/on-nsa.html 74 comments linux
- Is the cryptopocalypse nigh? http://blog.cryptographyengineering.com/2013/08/is-cryptopocalypse-nigh.html 19 comments netsec
- Here come encryption apps http://blog.cryptographyengineering.com/2013/03/here-come-encryption-apps.html 21 comments programming
- The anatomy of a bad idea - W3C Web Cryptography API http://blog.cryptographyengineering.com/2012/12/the-anatomy-of-bad-idea.html 19 comments netsec
- The Internet is broken: could we please fix it? http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html?utm_source=feedburner&utm_medium=feed&utm_campaign=feed%3A+afewthoughtsoncryptographicengineering+%28a+few+thoughts+on+cryptographic+engineering%29 32 comments netsec
Linking pages
- GitHub - kilimchoi/engineering-blogs: A curated list of engineering blogs https://github.com/kilimchoi/engineering-blogs 66 comments
- GitHub - sobolevn/awesome-cryptography: A curated list of cryptography resources and links. https://github.com/sobolevn/awesome-cryptography 15 comments
- Crypto prof asked to remove NSA-related blog post | Ars Technica http://arstechnica.com/security/2013/09/crypto-prof-asked-to-remove-nsa-related-blog-post/ 14 comments
- Who Are Privacy Seekers?. Since the revelations of Edward Snowden… | by Jefe001 | Medium https://medium.com/@Jefe001/who-are-privacy-seekers-a-survey-of-privacy-embracing-people-e53463033b8 7 comments
- My favorite talks of the Real World Crypto 2018 https://mijailovic.net/2018/01/15/rwc-2018/ 3 comments
- Am I logged in or not? Addition to the GDPR case study on the example of Google Chrome 69/70 https://blog.lukaszolejnik.com/am-i-logged-in-or-not-addition-to-the-gdpr-case-study-on-the-example-of-google-chrome-69-70/ 3 comments
- GitHub - sanmak/awesome-blogs: List of awesome blogs run, managed by a human or two and not an organisation, company or institution. https://github.com/sanmak/awesome-blogs 3 comments
- Dual EC, The Saga Continues: BUT MAYBE I'M BIASED · GitHub https://gist.github.com/0xabad1dea/8165378 1 comment
- GitHub - foorilla/allinfosecnews_sources: A list of online news & info sources in the InfoSec/Cybersecurity space https://github.com/foorilla/allinfosecnews_sources 1 comment
- GitHub - dwyl/phoenix-ecto-encryption-example: 🔐 A detailed example for how to encrypt data in a Phoenix (Elixir) App before inserting into a database using Ecto Types https://github.com/dwyl/phoenix-ecto-encryption-example 0 comments
- GitHub - mrtouch93/awesome-security-feed: A semi-curated list of Security Feeds https://github.com/mrtouch93/awesome-security-feed 0 comments
- People to follow on Twitter who actually tweet about Software Engineering · tkainrad https://tkainrad.dev/posts/twitter-accounts-in-software-engineering/ 0 comments
- The Flawed System Behind the Krack Wi-Fi Meltdown | WIRED https://www.wired.com/story/krack-wi-fi-meltdown-open-standards 0 comments
- SSL scanners — Idea of the day https://idea.popcount.org/2012-11-12-ssl-scanners/ 0 comments
- allinfosecnews_sources/README.md at main · foorilla/allinfosecnews_sources · GitHub https://github.com/foorilla/allinfosecnews_sources/blob/main/README.md 0 comments