Hacker News
- 3D printing a programming jig and embedding pogo pins https://conorpp.com/3d-printing-a-programming-jig-and-embedding-pogo-pins-using-eagle-and-fusion-360 18 comments
- Designing Solo, a new U2F/FIDO2 Token https://conorpp.com/designing-solo-a-new-u2ffido2-token 93 comments
- Designing and Producing 2FA tokens to Sell on Amazon https://conorpp.com/2016/09/23/designing-and-producing-2fa-tokens-to-sell-on-amazon/ 109 comments
- How to accelerate a program using hardware https://conorpp.com/blog/how-to-accelerate-a--program-with-hardware/ 9 comments
- Trying out Let's Encrypt (beta) https://conorpp.com/blog/trying-out-lets-encrypt/ 51 comments
- A close look at an operating botnet http://conorpp.com/blog/a-close-look-at-an-operating-botnet/ 4 comments
- How to support PGP encryption in Gmail http://conorpp.com/blog/How-to-support-PGP-encryption-in-Gmail/ 49 comments
- Easy method to make nice programming jig using 3D printing https://conorpp.com/3d-printing-a-programming-jig-and-embedding-pogo-pins-using-eagle-and-fusion-360 12 comments electronics
- Keyak: a candidate for the authenticated encryption standard https://conorpp.com/2016/02/17/keyak-a-candidate-for-the-authenticated-encryption-standard/ 3 comments crypto
- Keyak: a candidate for the authenticated encryption standard https://conorpp.com/2016/02/17/keyak-a-candidate-for-the-authenticated-encryption-standard/ 9 comments crypto
- A closer look at an operating botnet http://conorpp.com/blog/a-close-look-at-an-operating-botnet/ 30 comments netsec
- Proxying Bluetooth devices for security analysis using btproxy http://conorpp.com/blog/proxying-bluetooth-devices-for-security-analysis-using-btproxy/ 5 comments netsec