Hacker News
- A path to niche skill-sets and community https://cendyne.dev/posts/2023-05-29-a-path-to-niche-skillsets-and-community.html 7 comments
- Passwords are weaker than you believe https://cendyne.dev/posts/2023-01-07-passwords-are-weaker-than-you-believe.html 5 comments
- Do Not Recommend: User Provided Primary Keys https://cendyne.dev/posts/2022-02-18-user-provided-primary-keys.html 72 comments
- A Base64 Surprise https://cendyne.dev/posts/2022-01-23-base64.html 7 comments
Lobsters
- Process Engineering at a Furry Convention https://cendyne.dev/posts/2023-04-16-process-engineering-at-a-furry-convention.html 12 comments practices , programming
- How to use HKDF to derive new keys https://cendyne.dev/posts/2023-01-30-how-to-use-hkdf.html 4 comments cryptography , security
- A few thoughts about Uber's breach https://cendyne.dev/posts/2022-09-19-a-few-thoughts-about-ubers-breach.html 24 comments security
- How Google played with bad cryptography https://cendyne.dev/posts/2022-08-07-how-google-played-with-bad-cryptography.html 6 comments cryptography , security
- A Deep dive into Ed25519 Signatures https://cendyne.dev/posts/2022-03-06-ed25519-signatures.html 3 comments cryptography
- Do not recommend: User Provided Primary Keys https://cendyne.dev/posts/2022-02-18-user-provided-primary-keys.html 11 comments programming , security
- A Base64 Surprise https://cendyne.dev/posts/2022-01-23-base64.html 11 comments cryptography , programming
- How to use HKDF to derive new keys https://cendyne.dev/posts/2023-01-30-how-to-use-hkdf.html 3 comments crypto
- Ed25519 Deep Dive Addendum https://cendyne.dev/posts/2022-09-11-ed25519-deep-dive-addendum.html 7 comments crypto
- How Google played with bad cryptography https://cendyne.dev/posts/2022-08-07-how-google-played-with-bad-cryptography.html 7 comments crypto
- A Deep Dive into Ed25519 Signatures https://cendyne.dev/posts/2022-03-06-ed25519-signatures.html 6 comments crypto