Hacker News
- JavaScript Cryptography Considered Harmful http://matasano.com/articles/javascript-cryptography/ 140 comments
- Announcing The Matasano/Square CTF http://www.matasano.com/matasano-square-microcontroller-ctf/ 72 comments
- The Matasano Crypto Challenges http://www.matasano.com/articles/crypto-challenges/ 34 comments
- Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript-cryptography/ 103 comments
- Javascript Cryptography Considered Harmful http://www.matasano.com/articles/javascript-cryptography/ 174 comments
- This is the exploit equivalent of that guy who played the perfect game (2008) http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ 33 comments
- Typing The Letters A-E-S Into Your Code? You’re Doing It Wrong http://www.matasano.com/log/1749/typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/ 74 comments
- The Security Implications Of Google Native Client http://www.matasano.com/log/1674/the-security-implications-of-google-native-client/ 23 comments
- Ruby’s Vulnerability Handling Debacle http://www.matasano.com/log/1079/rubys-vulnerability-handling-debacle/ 5 comments
- 37Signals "just says no" to feature request: "please fix that security flaw" http://www.matasano.com/log/1067/web-20-redux/ 33 comments
- This New Vulnerability: Dowd’s Inhuman Flash Exploit http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ 6 comments
- Aguri: Coolest Data Structure You've Never Heard Of http://www.matasano.com/log/1009/aguri-coolest-data-structure-youve-never-heard-of/ 39 comments
Lobsters
- Announcing The Matasano/Square CTF http://www.matasano.com/matasano-square-microcontroller-ctf/ 6 comments event , security
- The Anatomy of a Rails Vulnerability-CVE-2014-0130: From Directory Traversal to Shell http://matasano.com/research/anatomyofrailsvuln-cve-2014-0130.pdf 5 comments netsec
- Announcing The Matasano/Square CTF http://www.matasano.com/matasano-square-microcontroller-ctf/ 17 comments netsec
- You Should Do The Matasano Crypto Challenges (x-post /r/netsec) http://www.matasano.com/articles/crypto-challenges/ 20 comments crypto
- You Should Do The Matasano Crypto Challenges http://www.matasano.com/articles/crypto-challenges/ 44 comments netsec
- Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript-cryptography/n 9 comments netsec
- Multiple 0-days found in DarkComet RAT http://matasano.com/research/pest-control.pdf 15 comments netsec
- Jacascript Crypto Considered Harmful http://www.matasano.com/articles/javascript-cryptography/ 7 comments javascript
- Javascript Crypto Considered Harmful http://www.matasano.com/articles/javascript-cryptography/ 29 comments netsec
- Javascript Cryptography Considered Harmful http://www.matasano.com/articles/javascript-cryptography/ 288 comments programming
- Kivlad 0.1: Decompiler for Android's Dalvik binaries http://www.matasano.com/research/kivlad/ 4 comments netsec
- [Crypto] Why Doesn't RC4 Ever Die? http://www.matasano.com/log/1774/a-working-theory-about-rc4/ 30 comments programming
- Typing The Letters A-E-S Into Your Code? You’re Doing It Wrong! http://www.matasano.com/log/1749/typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/ 148 comments programming
- Google Native Client: An attacker's perspective http://www.matasano.com/log/1674/the-security-implications-of-google-native-client/ 72 comments programming
- Applicable Lessons from the Embedded World (aka Forth rules) http://www.matasano.com/log/1349/applicable-lessons-from-the-embedded-world-aka-forth-rules/ 2 comments programming
- It's easy to decompile "encrypted" Perl, "bytecode compiled" Python, etc. http://www.matasano.com/log/1055/de-obfuscation-for-the-impatient/ 5 comments programming
- Mark Dowd’s Inhuman Flash Exploit: "Portions of his shellcode have to run as both Flash bytecode and an X86 first-stage shellcode boot." http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ 140 comments programming
- Thomas Ptacek on Stealing Private Keys From Memory (Wife in Comments) http://www.matasano.com/log/178/recover-a-private-key-from-process-memory/ 21 comments programming
- AIX. (alternate title: Welcome to 1987) http://www.matasano.com/log/category/this-old-vulnerability/ 2 comments netsec
- Aguri: Coolest Data Structure You've Never Heard Of http://www.matasano.com/log/1009/aguri-coolest-data-structure-youve-never-heard-of/ 103 comments programming
- The X86 Memory System And Why It’s Hard To Virtualize Securely http://www.matasano.com/log/963/the-x86-memory-system-and-why-its-hard-to-virtualize-securely/ 5 comments programming
- Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes http://www.matasano.com/log/958/enough-with-the-rainbow-tables-what-you-need-to-know-about-secure-password-schemes/ 8 comments programming
- Four C Programming Anti-Idioms http://www.matasano.com/log/182/four-c-programming-anti-idioms/ 34 comments programming
- C++: A Cautionary Tale, or, 1 Hour Of Your Black Hat Trip is Spoken For http://www.matasano.com/log/914/c-a-cautionary-tale-or-1-hour-of-your-black-hat-trip-is-spoken-for/ 183 comments programming
- Built-in ATM Backdoor: Many ATMs have default-passworded admin interface! http://www.matasano.com/log/506/atm-backdoor-why-is-no-one-talking-about-this/ 12 comments reddit.com
- New attack on RSA signatures breaks SSL in browsers and servers. http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/ 2 comments reddit.com