Hacker News
- Stuxnet is embarrassing, not amazing (2011) https://rdist.root.org/2011/01/17/stuxnet-is-embarrassing-not-amazing/ 91 comments
- Stuxnet was embarrassing, not amazing (2011) https://rdist.root.org/2011/01/17/stuxnet-is-embarrassing-not-amazing/ 82 comments
- The lost Van Jacobson paper that could save the Internet http://rdist.root.org/2011/12/30/the-lost-van-jacobson-paper-that-could-save-the-internet/ 48 comments
- Encrypted Google Docs done well http://rdist.root.org/2011/05/09/encrypted-google-docs-done-well/ 10 comments
- Stuxnet is embarrassing, not amazing http://rdist.root.org/2011/01/17/stuxnet-is-embarrassing-not-amazing/ 107 comments
- Building a USB protocol analyzer http://rdist.root.org/ 4 comments
- All the reasons why you shouldn't do JavaScript Crypto http://rdist.root.org/2010/11/29/final-post-on-javascript-crypto/ 2 comments
- Why buffer overflow exploitation took so long to mature http://rdist.root.org/2010/05/03/why-buffer-overflow-exploitation-took-so-long-to-mature/ 13 comments
- Analysis of the PS3 hypervisor exploit http://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/ 2 comments
- Smart meter crypto flaw worse than thought http://rdist.root.org/2010/01/11/smart-meter-crypto-flaw-worse-than-thought/ 13 comments
- Timing-independent array comparison http://rdist.root.org/2010/01/07/timing-independent-array-comparison/ 3 comments
- H(m || k) also insecure, you really should use HMAC http://rdist.root.org/2009/10/29/stop-using-unsafe-keyed-hashes-use-hmac/ 35 comments
- Why RSA encryption padding is critical (cool RSA implementation flaw) http://rdist.root.org/2009/10/06/why-rsa-encryption-padding-is-critical/ 9 comments
- C64 Visual Debugger http://rdist.root.org/2009/08/11/awesome-c64-visual-debugger/ 6 comments
- Exploiting common crypto flaws (Google Tech Talk) http://rdist.root.org/2009/08/06/google-tech-talk-on-common-crypto-flaws/ 6 comments
- NaCl: DJB’s new crypto library http://rdist.root.org/2009/07/14/nacl-djbs-new-crypto-library/ 26 comments
- Nate Lawson Breaks Google Keyczar's HMAC Crypto Signatures http://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar-library/ 24 comments
- Amazon WS Crypto Sigs v2 Broken (Even Amazon Can't Get Crypto Right) http://rdist.root.org/2009/05/20/amazon-web-services-signature-vulnerability/ 31 comments
- "Executing code via a buffer overflow was published at least as early as 1972" http://rdist.root.org/2010/05/03/why-buffer-overflow-exploitation-took-so-long-to-mature/ 12 comments programming
- Is it safe and secure to RSA-encrypt? http://rdist.root.org/2010/11/29/final-post-on-javascript-crypto/ 33 comments crypto
- Has HTML5 made us more secure? http://rdist.root.org/2012/12/04/has-html5-made-us-more-secure/ 4 comments netsec
- Cyber-weapon authors catch up on blog reading http://rdist.root.org/2012/08/14/cyber-weapon-authors-catch-up-on-blog-reading/ 4 comments netsec
- Why RSA is misleading about SecurID vulnerability http://rdist.root.org/2012/06/28/why-rsa-is-misleading-about-securid-vulnerability/ 21 comments netsec
- On the evolving security of password schemes « root labs rdist http://rdist.root.org/2012/01/10/on-the-evolving-security-of-password-schemes/ 3 comments netsec
- The Magic Inside Bunnie's New NeTV: HDCP Overlays without Decryption http://rdist.root.org/2011/09/13/the-magic-inside-bunnies-new-netv/ 20 comments programming
- Stuxnet is embarrassing, not amazing http://rdist.root.org/2011/01/17/stuxnet-is-embarrassing-not-amazing/ 21 comments netsec
- An obvious solution to the password problem http://rdist.root.org/2011/01/07/an-obvious-solution-to-the-password-problem/ 5 comments netsec
- Why RSA encryption padding is critical http://rdist.root.org/2009/10/06/why-rsa-encryption-padding-is-critical/ 3 comments programming
- How the PS3 hypervisor was hacked http://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/ 38 comments programming
- Smart meter crypto flaw worse than thought http://rdist.root.org/2010/01/11/smart-meter-crypto-flaw-worse-than-thought/ 6 comments netsec
- Smart meter crypto flaw worse than thought http://rdist.root.org/2010/01/11/smart-meter-crypto-flaw-worse-than-thought/ 15 comments programming
- Stop using unsafe keyed hashes, use HMAC http://rdist.root.org/2009/10/29/stop-using-unsafe-keyed-hashes-use-hmac/ 19 comments programming
- Awesome C64 visual debugger http://rdist.root.org/2009/08/11/awesome-c64-visual-debugger/ 10 comments programming
- NaCl: DJB's new crypto library http://rdist.root.org/2009/07/14/nacl-djbs-new-crypto-library/ 5 comments programming
- “If a Microsoft developer commented out seeding in Vista CryptGenRandom(), they would be fired 12 times. Then Microsoft would buy the next company that hired them in order to fire them again.” http://rdist.root.org/2008/05/19/debian-needs-some-serious-commit-review/ 154 comments programming
- Dead-listing is analyzing the raw disassembly of some target software and figuring it out using only pen and paper. http://rdist.root.org/2008/07/03/dead-listing-while-on-vacation/ 12 comments programming