Hacker News
- The Tech Industry Doesn't Understand Consent – Opt-Out Is Not Consent https://soatok.blog/2024/02/27/the-tech-industry-doesnt-understand-consent/ 67 comments
- Cryptographic Agility and Superior Alternatives https://soatok.blog/2022/08/20/cryptographic-agility-and-superior-alternatives/ 2 comments
- Guidance for Choosing an Elliptic Curve Signature Algorithm https://soatok.blog/2022/05/19/guidance-for-choosing-an-elliptic-curve-signature-algorithm-in-2022/ 34 comments
- Threema: Three Strikes, You’re Out https://soatok.blog/2021/11/05/threema-three-strikes-youre-out/ 15 comments
- A Furry’s Guide to Cryptocurrency https://soatok.blog/2021/04/19/a-furrys-guide-to-cryptocurrency/ 11 comments
- On the Toxicity of Zed A. Shaw (With Bonus 0days) https://soatok.blog/2021/02/11/on-the-toxicity-of-zed-a-shaw/ 35 comments
- EduTech Spyware Is Still Spyware: Proctorio Edition https://soatok.blog/2020/09/12/edutech-spyware-is-still-spyware-proctorio-edition/ 9 comments
Lobsters
- KEM Trails – Understanding Key Encapsulation Mechanisms https://soatok.blog/2024/02/26/kem-trails-understanding-key-encapsulation-mechanisms/ 10 comments cryptography
- What We Do in the /etc/shadow – Cryptography with Passwords https://soatok.blog/2022/12/29/what-we-do-in-the-etc-shadow-cryptography-with-passwords/ 3 comments cryptography , security
- Cryptographic Agility and Superior Alternatives https://soatok.blog/2022/08/20/cryptographic-agility-and-superior-alternatives/ 15 comments cryptography
- Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022 https://soatok.blog/2022/05/19/guidance-for-choosing-an-elliptic-curve-signature-algorithm-in-2022/ 15 comments cryptography
- Understanding HKDF https://soatok.blog/2021/11/17/understanding-hkdf/ 14 comments cryptography
- Hypothetical Timing Attack on MariaDB Through Lobste.rs Password Reset https://soatok.blog/2021/08/20/lobste-rs-password-reset-vulnerability/ 55 comments cryptography , security
- A Brief Introduction to Deniability https://soatok.blog/2020/11/04/a-brief-introduction-to-deniability/ 4 comments email , security
- EduTech Spyware is Still Spyware: Proctorio Edition https://soatok.blog/2020/09/12/edutech-spyware-is-still-spyware-proctorio-edition/ 3 comments security
- GNU: A Heuristic for Bad Cryptography https://soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-cryptography/ 14 comments cryptography , rant
- Response to Automattic / WordPress.com Plan to Sell Public Data to AI Companies - Opt-Out is NOT Consent https://soatok.blog/2024/02/27/the-tech-industry-doesnt-understand-consent/ 19 comments wordpress
- Cryptographic Agility and Superior Alternatives https://soatok.blog/2022/08/20/cryptographic-agility-and-superior-alternatives/ 10 comments crypto
- Introducing Cupcake - Secure Form Handling Library for PHP 8 https://soatok.blog/2022/07/06/introducing-cupcake/ 27 comments php
- Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022 https://soatok.blog/2022/05/19/guidance-for-choosing-an-elliptic-curve-signature-algorithm-in-2022/ 27 comments crypto
- The Controversy Surrounding Hybrid Cryptography https://soatok.blog/2022/01/27/the-controversy-surrounding-hybrid-cryptography/ 9 comments crypto
- Threema: Three Strikes, You’re Out https://soatok.blog/2021/11/05/threema-three-strikes-youre-out/ 151 comments crypto
- The "Bi-Symmetric Encryption" Fraud https://soatok.blog/2021/09/28/the-bi-symmetric-encryption-fraud/ 70 comments crypto
- On The Toxicity of Zed A. Shaw (With Bonus SRP 0days) https://soatok.blog/2021/02/11/on-the-toxicity-of-zed-a-shaw/ 33 comments crypto
- Please Stop Encrypting with RSA Directly https://soatok.blog/2021/01/20/please-stop-encrypting-with-rsa-directly 55 comments crypto
- Block Cipher Structures: Ranked https://soatok.blog/2021/01/11/block-cipher-structures-ranked/ 4 comments crypto
- Going Bark: A Furry’s Guide to End-to-End Encryption https://soatok.blog/2020/11/14/going-bark-a-furrys-guide-to-end-to-end-encryption/?utm_source=/r/netsec 18 comments netsec
- Going Bark: A Furry’s Guide to End-to-End Encryption https://soatok.blog/2020/11/14/going-bark-a-furrys-guide-to-end-to-end-encryption/ 37 comments netsec
- Going Bark: A Furry’s Guide to End-to-End Encryption https://soatok.blog/2020/11/14/going-bark-a-furrys-guide-to-end-to-end-encryption/ 16 comments crypto
- Bizarre Design Choices in Zoom’s End-to-End Encryption https://soatok.blog/2020/10/28/bizarre-design-choices-in-zooms-end-to-end-encryption/ 71 comments netsec
- Dead Ends in Cryptanalysis #1: Length Extension Attacks https://soatok.blog/2020/10/06/dead-ends-in-cryptanalysis-1-length-extension-attacks/ 7 comments crypto
- EduTech Spyware is Still Spyware: Proctorio Edition https://soatok.blog/2020/09/12/edutech-spyware-is-still-spyware-proctorio-edition/ 17 comments netsec
- A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates https://soatok.blog/2020/07/24/a-brief-opinionated-of-nists-post-quantum-cryptography-round-3-candidates/ 16 comments crypto
- Comparison of Symmetric Encryption Methods https://soatok.blog/2020/07/12/comparison-of-symmetric-encryption-methods 33 comments crypto
- GNU: A Heuristic for Bad Cryptography https://soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-cryptography/ 36 comments netsec
- GNU: A Heuristic for Bad Cryptography https://soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-cryptography/ 89 comments crypto
- Why AES-GCM Sucks https://soatok.blog/2020/05/13/why-aes-gcm-sucks 55 comments crypto
- Hedged Signatures with Libsodium (Ed25519) https://soatok.blog/2020/05/03/hedged-signatures-with-libsodium-using-dhole/ 3 comments netsec
- Twitter Thinks My Gender is [EICAR string] - Why Server-Side Input Validation Matters https://soatok.blog/2020/04/27/why-server-side-input-validation-matters/ 91 comments netsec
- Guide to Digital Signature Algorithms - Dhole Moments https://soatok.blog/2020/04/26/a-furrys-guide-to-digital-signature-algorithms/ 6 comments crypto