Hacker News
- Deep-learning side-channel attacks: the theory https://elie.net/blog/security/hacker-guide-to-deep-learning-side-channel-attacks-the-theory/ 2 comments
- Fuller House: Exposing high-end poker cheating devices (2016) https://elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices/ 23 comments
- Password checkup: from 0 to 650k users in 20 days https://elie.net/blog/security/password-checkup-from-0-to-650-000-users-in-20-days/ 15 comments
- Account Security – A Divided User Perception https://www.elie.net/blog/security/account-security-a-divided-user-perception 3 comments
- The bleak picture of two-factor authentication adoption in the wild https://elie.net/blog/security/the-bleak-picture-of-two-factor-authentication-adoption-in-the-wild/ 95 comments
- Quantifying the impact of the Twitter fake accounts purge – a technical analysis https://elie.net/blog/web/quantifying-the-impact-of-the-twitter-fake-accounts-purge-a-technical-analysis 20 comments
- Attacks against machine learning – an overview https://elie.net/blog/ai/attacks-against-machine-learning-an-overview 64 comments
- Taking down Gooligan, an Android botnet https://www.elie.net/blog/security/taking-down-gooligan-part-1-overview 2 comments
- Insights on the First Three Years of the Right to Be Forgotten at Google https://elie.net/blog/web/insights-about-the-first-three-years-of-the-right-to-be-forgotten-requests-at-google 83 comments
- Exposing high-end poker cheating devices https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices 140 comments
- What are malicious USB keys and how to create a realistic one? https://www.elie.net/blog/security/what-are-malicious-usb-keys-and-how-to-create-a-realistic-one 77 comments
- 19.5% of HTTPS sites trigger browser warnings because of SHA-1 certificates http://www.elie.net/blog/security/19.5-percent-of-https-sites-trigger-browser-warning-as-they-use-sha-1-signed-certificates 2 comments
- Hacking Hearthstone with machine learning – Defcon talk wrap-up http://www.elie.net/blog/hearthstone/i-am-a-legend-hacking-hearthstone-with-machine-learning-defcon-talk-wrap-up 31 comments
Lobsters
- Exposing high-end poker cheating devices https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices 18 comments security
- How AI helps keeping Gmail inboxes malware free https://elie.net/talk/how-ai-helps-keeping-gmail-inboxes-malware-free/ 10 comments netsec
- Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective https://elie.net/talk/building-safe-end-to-end-encrypted-services-for-business-a-google-workspace-perspective/ 2 comments netsec
- Hacker's guide to deep-learning side-channel attacks: the theory https://elie.net/blog/security/hacker-guide-to-deep-learning-side-channel-attacks-the-theory/?utm_source=reddit&utm_medium=social&utm_campaign=side1 21 comments netsec
- Account protections - A Google Perspective https://elie.net/talk/account-protections-a-google-perspective/ 8 comments netsec
- Password checkup: from 0 to 650, 000 users in 20 days https://elie.net/blog/security/password-checkup-from-0-to-650-000-users-in-20-days/ 3 comments webdev
- The bleak picture of two-factor authentication adoption in the wild https://elie.net/blog/security/the-bleak-picture-of-two-factor-authentication-adoption-in-the-wild/ 88 comments netsec
- The bleak picture of two-factor authentication adoption in the wild https://elie.net/blog/security/the-bleak-picture-of-two-factor-authentication-adoption-in-the-wild/ 15 comments technology
- Exposing high-end poker cheating devices http://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices/amp 15 comments poker
- Full(er) House: Exposing high-end poker cheating devices https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices 7 comments netsec
- Full(er) House: Exposing high-end poker cheating devices https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices 23 comments poker
- 48% of people do plug-in USB drives they find in parking lots https://www.elie.net/blog/security/concerns-about-usb-security-are-real-48-percent-of-people-do-plug-in-usb-drives-found-in-parking-lots 47 comments technology
- What we learned while protecting Gmail users https://www.elie.net/blog/security/in-depth-analysis-of-the-lessons-we-learned-while-protecting-gmail-users 20 comments technology
- The dark side of online poker or the commoditization & weaponization of big data and espionage https://www.elie.net/blog/security/the-dark-side-of-online-poker-or-the-commoditization-and-weaponization-of-big-data-and-espionage 6 comments netsec
- What tools do the FBI use when seizing computers or the curious case of the mouse jiggler device https://www.elie.net/blog/security/what-tools-do-the-fbi-use-when-seizing-computers-or-the-curious-case-of-the-mouse-jiggler-device 40 comments technology
- How to Improve your Online Security and Privacy in 10 Easy Steps https://www.elie.net/blog/security/how-to-improve-your-online-security-and-privacy-in-10-easy-steps 3 comments technology
- Understanding how TLS downgrade attacks prevent email encryption http://www.elie.net/blog/understanding-how-tls-downgrade-attacks-prevent-email-encryption 6 comments technology